Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4FkYkTt9dE.exe

Overview

General Information

Sample name:4FkYkTt9dE.exe
renamed because original name is a hash value
Original sample name:73e3c089e5e10d52872ee4f434bd6d23.exe
Analysis ID:1472367
MD5:73e3c089e5e10d52872ee4f434bd6d23
SHA1:13ad356c27f6832ecaae6b63afd1c76f00bcac63
SHA256:4589cef24c0d5800c245c74d5b4c3f38bb5bc5893db52a58740a26b011ebe4c9
Tags:64exe
Infos:

Detection

PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain checking for process token information
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 4FkYkTt9dE.exe (PID: 4456 cmdline: "C:\Users\user\Desktop\4FkYkTt9dE.exe" MD5: 73E3C089E5E10D52872EE4F434BD6D23)
    • availableresearch.exe (PID: 4564 cmdline: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe MD5: 17F0A21C1B5F9BDF2B8A9E9DF9A84A2D)
      • InstallUtil.exe (PID: 3496 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
        • powershell.exe (PID: 5696 cmdline: "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -Force MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 2472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • rundll32.exe (PID: 5248 cmdline: "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\" MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.2560519473.00000000061D0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    00000005.00000002.2560519473.00000000061D0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000005.00000002.2560519473.00000000061D0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_zgRATDetects zgRATditekSHen
      • 0x3d14e:$s1: file:///
      • 0x3d05c:$s2: {11111-22222-10009-11112}
      • 0x3d0de:$s3: {11111-22222-50001-00000}
      • 0x3b325:$s4: get_Module
      • 0x3b63f:$s5: Reverse
      • 0x36352:$s6: BlockCopy
      • 0x3632c:$s7: ReadByte
      • 0x3d160:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
      00000001.00000002.2376767816.0000000007200000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000001.00000002.2362493618.00000000031E6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          Click to see the 10 entries
          SourceRuleDescriptionAuthorStrings
          5.2.InstallUtil.exe.59a0000.5.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            5.2.InstallUtil.exe.61d0000.6.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
              5.2.InstallUtil.exe.61d0000.6.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                5.2.InstallUtil.exe.61d0000.6.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
                • 0x3b34e:$s1: file:///
                • 0x3b25c:$s2: {11111-22222-10009-11112}
                • 0x3b2de:$s3: {11111-22222-50001-00000}
                • 0x39525:$s4: get_Module
                • 0x3983f:$s5: Reverse
                • 0x34552:$s6: BlockCopy
                • 0x3452c:$s7: ReadByte
                • 0x3b360:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
                5.2.InstallUtil.exe.5740000.4.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  Click to see the 6 entries

                  System Summary

                  barindex
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\4FkYkTt9dE.exe, ProcessId: 4456, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -Force, CommandLine: "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -Force, CommandLine|base64offset|contains: Jy, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ParentProcessId: 3496, ParentProcessName: InstallUtil.exe, ProcessCommandLine: "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -Force, ProcessId: 5696, ProcessName: powershell.exe
                  Timestamp:07/12/24-17:41:35.711862
                  SID:2856255
                  Source Port:49710
                  Destination Port:7702
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeReversingLabs: Detection: 31%
                  Source: 4FkYkTt9dE.exeReversingLabs: Detection: 23%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeJoe Sandbox ML: detected
                  Source: 4FkYkTt9dE.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB30EC GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,GetWindowsDirectoryA,SetCurrentDirectoryA,0_2_00007FF753AB30EC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                  Source: 4FkYkTt9dE.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: Binary string: wextract.pdb source: 4FkYkTt9dE.exe
                  Source: Binary string: wextract.pdbGCTL source: 4FkYkTt9dE.exe
                  Source: Binary string: costura.dotnetzip.pdb.compressed source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: $]q costura.dotnetzip.pdb.compressedlB]q source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: availableresearch.exe, 00000001.00000002.2362493618.00000000033A0000.00000004.00000800.00020000.00000000.sdmp, availableresearch.exe, 00000001.00000002.2376418258.0000000007130000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: Donexctvbl.pdb source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2552792218.0000000005170000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: availableresearch.exe, 00000001.00000002.2362493618.00000000033A0000.00000004.00000800.00020000.00000000.sdmp, availableresearch.exe, 00000001.00000002.2376418258.0000000007130000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdbSHA256}Lq source: availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: C:\projects\dotnetzip-semverd\src\Zip\obj\Release\DotNetZip.pdb source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003B72000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2564508466.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdb source: availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: $]q costura.dotnetzip.pdb.compressed source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB204C FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00007FF753AB204C
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h1_2_02F60560
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 4x nop then jmp 050DEFDFh1_2_050DEF70
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 4x nop then jmp 050DEFDFh1_2_050DEF60
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 4x nop then jmp 050DEFDFh1_2_050DF127
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 4x nop then jmp 050D8B64h1_2_050D8968
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 4x nop then jmp 050D8B64h1_2_050D89A0
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h1_2_050DE8C8
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h1_2_050DE8C0
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 4x nop then jmp 050DEFDFh1_2_050DF2AB

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2856255 ETPRO TROJAN Win32/zgRAT CnC Checkin 192.168.2.5:49710 -> 185.125.50.121:7702
                  Source: global trafficTCP traffic: 192.168.2.5:49710 -> 185.125.50.121:7702
                  Source: Joe Sandbox ViewIP Address: 185.125.50.121 185.125.50.121
                  Source: Joe Sandbox ViewASN Name: INPLATLABS-ASRU INPLATLABS-ASRU
                  Source: unknownDNS traffic detected: query: 81.189.14.0.in-addr.arpa replaycode: Name error (3)
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                  Source: global trafficDNS traffic detected: DNS query: 81.189.14.0.in-addr.arpa
                  Source: powershell.exe, 00000008.00000002.2685102321.000000000594A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: powershell.exe, 00000008.00000002.2669562309.0000000004A35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: availableresearch.exe, 00000001.00000002.2362493618.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2669562309.00000000048E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000008.00000002.2669562309.0000000004A35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: InstallUtil.exe, 00000005.00000002.2564508466.0000000006EC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://www.codeplex.com/DotNetZip
                  Source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: powershell.exe, 00000008.00000002.2669562309.00000000048E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                  Source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://archive.torproject.org/tor-package-archive/torbrowser/13.0.9/tor-expert-bundle-windows-i686-
                  Source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: powershell.exe, 00000008.00000002.2685102321.000000000594A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000008.00000002.2685102321.000000000594A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000008.00000002.2685102321.000000000594A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: powershell.exe, 00000008.00000002.2669562309.0000000004A35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                  Source: availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                  Source: availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                  Source: powershell.exe, 00000008.00000002.2669562309.0000000004C8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                  Source: powershell.exe, 00000008.00000002.2685102321.000000000594A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                  Source: availableresearch.exe, 00000001.00000002.2362493618.000000000331E000.00000004.00000800.00020000.00000000.sdmp, availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                  Source: availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                  Source: Svbdftkncjw.tmpdb.5.drString found in binary or memory: https://support.mozilla.org
                  Source: Svbdftkncjw.tmpdb.5.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                  Source: Svbdftkncjw.tmpdb.5.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
                  Source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: Svbdftkncjw.tmpdb.5.drString found in binary or memory: https://www.mozilla.org
                  Source: Svbdftkncjw.tmpdb.5.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
                  Source: Svbdftkncjw.tmpdb.5.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
                  Source: Svbdftkncjw.tmpdb.5.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                  Source: Svbdftkncjw.tmpdb.5.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                  Source: Svbdftkncjw.tmpdb.5.drString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
                  Source: Svbdftkncjw.tmpdb.5.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                  System Summary

                  barindex
                  Source: 5.2.InstallUtil.exe.61d0000.6.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 5.2.InstallUtil.exe.61d0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 00000005.00000002.2560519473.00000000061D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB2C7B GetModuleHandleW,GetProcAddress,ExitWindowsEx,CloseHandle,0_2_00007FF753AB2C7B
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB1C0C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,0_2_00007FF753AB1C0C
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB66C40_2_00007FF753AB66C4
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB40C40_2_00007FF753AB40C4
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB6CA40_2_00007FF753AB6CA4
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB1D280_2_00007FF753AB1D28
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB5D900_2_00007FF753AB5D90
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB1C0C0_2_00007FF753AB1C0C
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB35300_2_00007FF753AB3530
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F632801_2_02F63280
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F6F0AC1_2_02F6F0AC
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F6105B1_2_02F6105B
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F627D81_2_02F627D8
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F617001_2_02F61700
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F6DCC01_2_02F6DCC0
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F632701_2_02F63270
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F6C6201_2_02F6C620
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F6C6101_2_02F6C610
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F6A4C81_2_02F6A4C8
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F644AB1_2_02F644AB
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F648701_2_02F64870
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F669691_2_02F66969
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F6690D1_2_02F6690D
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F62E281_2_02F62E28
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F63FEB1_2_02F63FEB
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F6DCB71_2_02F6DCB7
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F6DCB01_2_02F6DCB0
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F64C181_2_02F64C18
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F64C081_2_02F64C08
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_050DEF701_2_050DEF70
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_050D54D81_2_050D54D8
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_050DEF601_2_050DEF60
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_050DF1271_2_050DF127
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_050DF2AB1_2_050DF2AB
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_057EA6381_2_057EA638
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_057E91801_2_057E9180
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_057E962A1_2_057E962A
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_057E96C31_2_057E96C3
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_057E91711_2_057E9171
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_057E933B1_2_057E933B
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_057E3C731_2_057E3C73
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_057E3C801_2_057E3C80
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_057E1EF81_2_057E1EF8
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_057E1EE81_2_057E1EE8
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_057E8A601_2_057E8A60
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_057E8A501_2_057E8A50
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_05848F901_2_05848F90
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_058416781_2_05841678
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_058488C81_2_058488C8
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_05848F801_2_05848F80
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_0584BF581_2_0584BF58
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_0584BF681_2_0584BF68
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_058416681_2_05841668
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_0584297D1_2_0584297D
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_058488B71_2_058488B7
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_07128DA81_2_07128DA8
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_071283381_2_07128338
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_0712C2E01_2_0712C2E0
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_07128D981_2_07128D98
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_071FEAB81_2_071FEAB8
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_071F00061_2_071F0006
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_071F00401_2_071F0040
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_0748D6E01_2_0748D6E0
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_074700401_2_07470040
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_074700061_2_07470006
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F8E0005_2_00F8E000
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F81AE85_2_00F81AE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F820D85_2_00F820D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F820C85_2_00F820C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F890705_2_00F89070
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F890615_2_00F89061
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F820165_2_00F82016
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F826E85_2_00F826E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F846345_2_00F84634
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F8278C5_2_00F8278C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F827765_2_00F82776
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F8275E5_2_00F8275E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F8273F5_2_00F8273F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F8272C5_2_00F8272C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F8270B5_2_00F8270B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F84B885_2_00F84B88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_00F81AE85_2_00F81AE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05522B455_2_05522B45
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05522B605_2_05522B60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_056EA9F05_2_056EA9F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_056E6BAA5_2_056E6BAA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_056EBA205_2_056EBA20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_0572F5085_2_0572F508
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_057280985_2_05728098
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_0572ED285_2_0572ED28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05724E955_2_05724E95
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_058470A85_2_058470A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_0584F4205_2_0584F420
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05846D8F5_2_05846D8F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05846DE15_2_05846DE1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_058499F85_2_058499F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_058470A85_2_058470A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_0584F7685_2_0584F768
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05846E075_2_05846E07
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05846E185_2_05846E18
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_0585A3185_2_0585A318
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_0585FB505_2_0585FB50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_0585FB415_2_0585FB41
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_059C02C85_2_059C02C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_059CB4505_2_059CB450
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_059CB4405_2_059CB440
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_059C50D05_2_059C50D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_059C50C15_2_059C50C1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05B55EB05_2_05B55EB0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05B54C005_2_05B54C00
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_02EA190F8_2_02EA190F
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_02EA1D0D8_2_02EA1D0D
                  Source: 4FkYkTt9dE.exeStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, Windows 2000/XP setup, 2490974 bytes, 1 file, at 0x2c +A "availableresearch.exe", ID 2142, number 1, 77 datablocks, 0x1503 compression
                  Source: 4FkYkTt9dE.exeBinary or memory string: OriginalFilename vs 4FkYkTt9dE.exe
                  Source: 4FkYkTt9dE.exe, 00000000.00000003.1997772513.0000025443D65000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameavailableresearch.exeD vs 4FkYkTt9dE.exe
                  Source: 4FkYkTt9dE.exeBinary or memory string: OriginalFilenameWEXTRACT.EXE .MUID vs 4FkYkTt9dE.exe
                  Source: 5.2.InstallUtil.exe.61d0000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 5.2.InstallUtil.exe.61d0000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 00000005.00000002.2560519473.00000000061D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                  Source: availableresearch.exe.0.dr, -.csBase64 encoded string: 'YyB4GRwaHgtuCxUSUy1iAhdZcSp4CBQVXCAwKhwDdTd/HwA2QypuABsbSWJsCA0odixnATcWXTwwAgkoeTduHAwWXDB/FEIQVS1UIRwZVy1jVj4SRA1yHRwxQjZmJRgZVDVuVh4SRAZFDBQSCxBlCRwPfz8wPxwWVAp/HxAZV2JKCR1MVzx/MikYQzB/BBYZCz5uGSY0RSt5CBcDdDZmDBAZCwpuGT0WRDgwX0lGBG4wLAoEVTRpAQAkVSt9CAtMYzBmHRUScSp4CBQVXCBOFQkbXytuH0IVUTtuAQ8aCypmAhISRDx4GQ=='
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/26@1/1
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB6CA4 GetCurrentDirectoryA,SetCurrentDirectoryA,GetDiskFreeSpaceA,MulDiv,GetVolumeInformationA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,0_2_00007FF753AB6CA4
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB1C0C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,0_2_00007FF753AB1C0C
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB66C4 LocalAlloc,LocalFree,lstrcmpA,LocalFree,GetTempPathA,GetDriveTypeA,GetFileAttributesA,GetDiskFreeSpaceA,MulDiv,GetWindowsDirectoryA,GetFileAttributesA,CreateDirectoryA,SetFileAttributesA,GetWindowsDirectoryA,0_2_00007FF753AB66C4
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB2ECD FindResourceA,LoadResource,#17,0_2_00007FF753AB2ECD
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\availableresearch.exe.logJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\ff47b2f48f5e179d
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2472:120:WilError_03
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMPJump to behavior
                  Source: 4FkYkTt9dE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
                  Source: Rsxjztuo.tmpdb.5.dr, Dyxytcxmg.tmpdb.5.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: 4FkYkTt9dE.exeReversingLabs: Detection: 23%
                  Source: unknownProcess created: C:\Users\user\Desktop\4FkYkTt9dE.exe "C:\Users\user\Desktop\4FkYkTt9dE.exe"
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe
                  Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -Force
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeProcess created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -ForceJump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeSection loaded: feclient.dllJump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeSection loaded: advpack.dllJump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: napinsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: pnrpnsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wshbth.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: nlaapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winrnr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: 4FkYkTt9dE.exeStatic PE information: Image base 0x140000000 > 0x60000000
                  Source: 4FkYkTt9dE.exeStatic file information: File size 2648064 > 1048576
                  Source: 4FkYkTt9dE.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x27b800
                  Source: 4FkYkTt9dE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: 4FkYkTt9dE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: 4FkYkTt9dE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: 4FkYkTt9dE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: 4FkYkTt9dE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: 4FkYkTt9dE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: 4FkYkTt9dE.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: 4FkYkTt9dE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wextract.pdb source: 4FkYkTt9dE.exe
                  Source: Binary string: wextract.pdbGCTL source: 4FkYkTt9dE.exe
                  Source: Binary string: costura.dotnetzip.pdb.compressed source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: $]q costura.dotnetzip.pdb.compressedlB]q source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: availableresearch.exe, 00000001.00000002.2362493618.00000000033A0000.00000004.00000800.00020000.00000000.sdmp, availableresearch.exe, 00000001.00000002.2376418258.0000000007130000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: Donexctvbl.pdb source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2552792218.0000000005170000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: availableresearch.exe, 00000001.00000002.2362493618.00000000033A0000.00000004.00000800.00020000.00000000.sdmp, availableresearch.exe, 00000001.00000002.2376418258.0000000007130000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdbSHA256}Lq source: availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: C:\projects\dotnetzip-semverd\src\Zip\obj\Release\DotNetZip.pdb source: InstallUtil.exe, 00000005.00000002.2545467698.0000000003B72000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2564508466.0000000006EC0000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdb source: availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: $]q costura.dotnetzip.pdb.compressed source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmp
                  Source: 4FkYkTt9dE.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: 4FkYkTt9dE.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: 4FkYkTt9dE.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: 4FkYkTt9dE.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: 4FkYkTt9dE.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                  Data Obfuscation

                  barindex
                  Source: availableresearch.exe.0.dr, -.cs.Net Code: _E000 System.Reflection.Assembly.Load(byte[])
                  Source: availableresearch.exe.0.dr, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                  Source: availableresearch.exe.0.dr, JSONParser.cs.Net Code: _E002
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                  Source: 1.2.availableresearch.exe.7130000.9.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                  Source: 1.2.availableresearch.exe.62de310.3.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                  Source: 1.2.availableresearch.exe.62de310.3.raw.unpack, ListDecorator.cs.Net Code: Read
                  Source: 1.2.availableresearch.exe.62de310.3.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                  Source: 1.2.availableresearch.exe.62de310.3.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                  Source: 1.2.availableresearch.exe.62de310.3.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                  Source: 1.2.availableresearch.exe.628e2f0.5.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                  Source: 1.2.availableresearch.exe.628e2f0.5.raw.unpack, ListDecorator.cs.Net Code: Read
                  Source: 1.2.availableresearch.exe.628e2f0.5.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                  Source: 1.2.availableresearch.exe.628e2f0.5.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                  Source: 1.2.availableresearch.exe.628e2f0.5.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                  Source: Yara matchFile source: 5.2.InstallUtil.exe.59a0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.InstallUtil.exe.5740000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.availableresearch.exe.7200000.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.availableresearch.exe.60236b0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.availableresearch.exe.61636d0.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2376767816.0000000007200000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2362493618.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2556873833.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2555740366.0000000005740000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2367911326.0000000006163000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2367911326.0000000005C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: availableresearch.exe PID: 4564, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3496, type: MEMORYSTR
                  Source: 4FkYkTt9dE.exeStatic PE information: 0xAE1BC4F8 [Tue Jul 25 12:18:00 2062 UTC]
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB30EC GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,GetWindowsDirectoryA,SetCurrentDirectoryA,0_2_00007FF753AB30EC
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F6689E push ecx; retf 1_2_02F6689F
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_02F689A9 push 05D0F717h; iretd 1_2_02F689AE
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_050DB62E push esp; retf 1_2_050DB631
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_050DB213 push eax; iretd 1_2_050DB235
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_05849E58 push E8FFFFFEh; ret 1_2_05849E5D
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeCode function: 1_2_05843884 pushfd ; retf 1_2_05843885
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_056E7560 pushfd ; iretd 5_2_056E7569
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_056E2E0E push esp; retf 5_2_056E2E1D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_059C89C8 pushfd ; retf 5_2_059C89F1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_059D353F push ss; retf 5_2_059D3559
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05B53109 push es; ret 5_2_05B53110
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_02EA6B42 push esp; retf 8_2_02EA6BD5
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeJump to dropped file
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB1684 CompareStringA,GetFileAttributesA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,CompareStringA,LocalAlloc,LocalAlloc,GetFileAttributesA,0_2_00007FF753AB1684
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: availableresearch.exe PID: 4564, type: MEMORYSTR
                  Source: availableresearch.exe, 00000001.00000002.2362493618.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL0SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory allocated: 2F20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory allocated: 30C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory allocated: 50C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory allocated: 5C10000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory allocated: 6C10000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: F40000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2950000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 4950000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 3934Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 4258Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4216Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5549Jump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-2051
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe TID: 1996Thread sleep count: 33 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe TID: 1996Thread sleep time: -33000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe TID: 1372Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6020Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3160Thread sleep count: 4216 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2828Thread sleep count: 31 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2828Thread sleep time: -28592453314249787s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3160Thread sleep count: 5549 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB204C FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00007FF753AB204C
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB64E4 GetSystemInfo,CreateDirectoryA,RemoveDirectoryA,0_2_00007FF753AB64E4
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: discord.comVMware20,11696428655f
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: global block list test formVMware20,11696428655
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: outlook.office.comVMware20,11696428655s
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: AMC password management pageVMware20,11696428655
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: tasks.office.comVMware20,11696428655o
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: dev.azure.comVMware20,11696428655j
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                  Source: InstallUtil.exe, 00000005.00000002.2557674459.0000000005A10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll1
                  Source: availableresearch.exe, 00000001.00000002.2362493618.00000000031E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                  Source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                  Source: Wjtjgnxt.tmpdb.5.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05B52DA0 LdrInitializeThunk,5_2_05B52DA0
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB30EC GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,GetWindowsDirectoryA,SetCurrentDirectoryA,0_2_00007FF753AB30EC
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB8790 SetUnhandledExceptionFilter,0_2_00007FF753AB8790
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB8494 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF753AB8494
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 900000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 900000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 900000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 902000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 9E4000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 9E6000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 726008Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -ForceJump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB11CC LoadLibraryA,GetProcAddress,AllocateAndInitializeSid,FreeSid,FreeLibrary,0_2_00007FF753AB11CC
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeQueries volume information: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB8964 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,0_2_00007FF753AB8964
                  Source: C:\Users\user\Desktop\4FkYkTt9dE.exeCode function: 0_2_00007FF753AB7F04 GetVersionExA,GetSystemMetrics,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,CharNextA,0_2_00007FF753AB7F04
                  Source: C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: InstallUtil.exe, 00000005.00000002.2535517270.0000000000BFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 5.2.InstallUtil.exe.61d0000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.InstallUtil.exe.61d0000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.2560519473.00000000061D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 5.2.InstallUtil.exe.61d0000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.InstallUtil.exe.61d0000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.2560519473.00000000061D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumLO
                  Source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
                  Source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus Web3
                  Source: InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: EthereumLO
                  Source: availableresearch.exe, 00000001.00000002.2374008801.0000000006D40000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: set_UseMachineKeyStore
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\monero-project\monero-coreJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3496, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 5.2.InstallUtil.exe.61d0000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.InstallUtil.exe.61d0000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.2560519473.00000000061D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 5.2.InstallUtil.exe.61d0000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.InstallUtil.exe.61d0000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.2560519473.00000000061D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts41
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Encrypted Channel
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  1
                  Scheduled Task/Job
                  1
                  Access Token Manipulation
                  21
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  1
                  File and Directory Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts1
                  Scheduled Task/Job
                  1
                  Registry Run Keys / Startup Folder
                  311
                  Process Injection
                  1
                  Software Packing
                  Security Account Manager38
                  System Information Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                  Scheduled Task/Job
                  1
                  Timestomp
                  NTDS241
                  Security Software Discovery
                  Distributed Component Object Model1
                  Clipboard Data
                  1
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                  Registry Run Keys / Startup Folder
                  1
                  DLL Side-Loading
                  LSA Secrets1
                  Process Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  File Deletion
                  Cached Domain Credentials51
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job51
                  Virtualization/Sandbox Evasion
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Access Token Manipulation
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron311
                  Process Injection
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                  Rundll32
                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  4FkYkTt9dE.exe24%ReversingLabs
                  4FkYkTt9dE.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe32%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://nuget.org/NuGet.exe0%URL Reputationsafe
                  https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
                  http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                  http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                  https://go.micro0%URL Reputationsafe
                  https://contoso.com/License0%URL Reputationsafe
                  https://contoso.com/Icon0%URL Reputationsafe
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                  https://aka.ms/pscore6lB0%URL Reputationsafe
                  https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
                  https://stackoverflow.com/q/2152978/233540%URL Reputationsafe
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                  https://contoso.com/0%URL Reputationsafe
                  https://nuget.org/nuget.exe0%URL Reputationsafe
                  https://support.mozilla.org0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                  https://github.com/mgravell/protobuf-netJ0%Avira URL Cloudsafe
                  https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                  https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                  https://github.com/mgravell/protobuf-net0%Avira URL Cloudsafe
                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                  https://github.com/Pester/Pester0%Avira URL Cloudsafe
                  https://github.com/mgravell/protobuf-neti0%Avira URL Cloudsafe
                  https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL0%Avira URL Cloudsafe
                  http://www.codeplex.com/DotNetZip0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  81.189.14.0.in-addr.arpa
                  unknown
                  unknownfalse
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://duckduckgo.com/chrome_newtabInstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://nuget.org/NuGet.exepowershell.exe, 00000008.00000002.2685102321.000000000594A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/ac/?q=InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://stackoverflow.com/q/14436606/23354availableresearch.exe, 00000001.00000002.2362493618.000000000331E000.00000004.00000800.00020000.00000000.sdmp, availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/mgravell/protobuf-netJavailableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C46000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoInstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000008.00000002.2669562309.0000000004A35000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000008.00000002.2669562309.0000000004A35000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://go.micropowershell.exe, 00000008.00000002.2669562309.0000000004C8E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://contoso.com/Licensepowershell.exe, 00000008.00000002.2685102321.000000000594A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://contoso.com/Iconpowershell.exe, 00000008.00000002.2685102321.000000000594A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/mgravell/protobuf-netavailableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drfalse
                    • URL Reputation: safe
                    unknown
                    https://www.ecosia.org/newtab/InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drfalse
                    • URL Reputation: safe
                    unknown
                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brSvbdftkncjw.tmpdb.5.drfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/Pester/Pesterpowershell.exe, 00000008.00000002.2669562309.0000000004A35000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ac.ecosia.org/autocomplete?q=InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/mgravell/protobuf-netiavailableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://aka.ms/pscore6lBpowershell.exe, 00000008.00000002.2669562309.00000000048E1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://stackoverflow.com/q/11564914/23354;availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://stackoverflow.com/q/2152978/23354availableresearch.exe, 00000001.00000002.2375912173.0000000007030000.00000004.08000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchInstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drfalse
                    • URL Reputation: safe
                    unknown
                    https://contoso.com/powershell.exe, 00000008.00000002.2685102321.000000000594A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://nuget.org/nuget.exepowershell.exe, 00000008.00000002.2685102321.000000000594A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBLSvbdftkncjw.tmpdb.5.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.codeplex.com/DotNetZipInstallUtil.exe, 00000005.00000002.2564508466.0000000006EC0000.00000004.08000000.00040000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://support.mozilla.orgSvbdftkncjw.tmpdb.5.drfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameavailableresearch.exe, 00000001.00000002.2362493618.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2669562309.00000000048E1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=InstallUtil.exe, 00000005.00000002.2545467698.0000000003AD9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2545467698.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, Hwmvsac.tmpdb.5.dr, Qfzfdtsfdp.tmpdb.5.dr, Hzudnscxaoe.tmpdb.5.drfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.125.50.121
                    unknownRussian Federation
                    207064INPLATLABS-ASRUtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1472367
                    Start date and time:2024-07-12 17:40:07 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 10m 3s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:10
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:4FkYkTt9dE.exe
                    renamed because original name is a hash value
                    Original Sample Name:73e3c089e5e10d52872ee4f434bd6d23.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@9/26@1/1
                    EGA Information:
                    • Successful, ratio: 75%
                    HCA Information:
                    • Successful, ratio: 88%
                    • Number of executed functions: 579
                    • Number of non-executed functions: 38
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240s for sample based on specific behavior
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target powershell.exe, PID 5696 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenFile calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: 4FkYkTt9dE.exe
                    TimeTypeDescription
                    11:41:26API Interceptor3x Sleep call for process: availableresearch.exe modified
                    11:41:47API Interceptor44x Sleep call for process: powershell.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    185.125.50.121SecuriteInfo.com.Trojan.DownLoaderNET.987.29728.6216.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                      SecuriteInfo.com.Win32.RATX-gen.24946.23294.exeGet hashmaliciousPureLog StealerBrowse
                        SecuriteInfo.com.Trojan.DownLoad4.16337.3540.9873.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                          SecuriteInfo.com.Win32.CrypterX-gen.8664.12357.exeGet hashmaliciousPureLog StealerBrowse
                            SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                              ka0UKl7202.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                INPLATLABS-ASRUSecuriteInfo.com.Trojan.DownLoaderNET.987.29728.6216.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                • 185.125.50.121
                                SecuriteInfo.com.Win32.RATX-gen.24946.23294.exeGet hashmaliciousPureLog StealerBrowse
                                • 185.125.50.121
                                SecuriteInfo.com.Trojan.DownLoad4.16337.3540.9873.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                • 185.125.50.121
                                SecuriteInfo.com.Win32.CrypterX-gen.8664.12357.exeGet hashmaliciousPureLog StealerBrowse
                                • 185.125.50.121
                                SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                • 185.125.50.121
                                ka0UKl7202.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                                • 185.125.50.121
                                https://steamcommunlty.duckdns.org/br-redeemSteamGiftCard=481928385858/IP:Get hashmaliciousUnknownBrowse
                                • 185.125.50.1
                                El7TD9RYMH.exeGet hashmaliciousRedLineBrowse
                                • 185.125.50.19
                                xqj4nAXq60.exeGet hashmaliciousRedLineBrowse
                                • 185.125.50.19
                                networkmanagerGet hashmaliciousUnknownBrowse
                                • 185.125.49.121
                                No context
                                No context
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1338
                                Entropy (8bit):5.3406586469525745
                                Encrypted:false
                                SSDEEP:24:ML9E4KlKDE4KhKiKhRAE4KzecKIE4oKNzKoZsXE4qdKqE4Kx1qE4DJE4j:MxHKlYHKh3oRAHKzectHo60H8HKx1qH1
                                MD5:50DC251CABD311F53342E0B618D1E70B
                                SHA1:4FA5983202E63C4D169712B21DE3963BA7F0E3EE
                                SHA-256:6CEFB5DF8EFEBE9C1DC57D8F5BD3455839E05FA5E8A30D35FFA455D4F0263276
                                SHA-512:3722C0EACA565AD70EC48801F628174C8E7D92E600ACC744BB2E4C3A52DB1AD378ED177C79234AD210C4CA836C21CC257B5A510EBEEAEF5C0ED1A1B1C5B3073D
                                Malicious:false
                                Reputation:low
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Managemen
                                Process:C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):958
                                Entropy (8bit):5.354692878444033
                                Encrypted:false
                                SSDEEP:24:ML9E4KlKDE4KhKiKh1E4KhZAE4KzeRE4Ks:MxHKlYHKh3o1HKPAHKzeRHKs
                                MD5:B5989F5DD240EF83C0BFEB26FF7BB802
                                SHA1:E90F8945BB8D603FF83B3F8AB769E00F609ABD57
                                SHA-256:AA47F6379933C421912C1F004E3D9BBF93C0CE385494918BEBCB2B3127CF7956
                                SHA-512:AB3307D6601A5CCD9BA77BFFDA6168D539058A8928F0EB2AA98EDFD151FF84EA8AC8836528BD8E97B158427418D6638444845386B5E085E9908CC05AB5F639A6
                                Malicious:false
                                Reputation:low
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\a3127677749631df61e96a8400ddcb87\System.Runtime.Serialization.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):1328
                                Entropy (8bit):5.409796295544531
                                Encrypted:false
                                SSDEEP:24:3K2WSKco4KmBs4RPT6BmFoUebIlmjKcmZ9t7J0gt/NK3R8UHr6sW:bWSU4y4RQmFoUeUmfmZ9tK8NWR8W+
                                MD5:014C5B6A69958358D896560A9D79AFA4
                                SHA1:7BCB68EA31C0BF817190A6CF2193D190FB5B4A1C
                                SHA-256:CF8861A9C3435D550A756E314C197D1DA49ED46E14DD5C6932DF5C9C4980A864
                                SHA-512:4B312283936B28442337F8ED4D7DB1A1A439B8CC080DE974220C215665143220202F853A6C304EADFCDF71076BBB1B2AE142CC6E61AD959834E2D80B5D9F79E8
                                Malicious:false
                                Reputation:low
                                Preview:@...e.................................,..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):155648
                                Entropy (8bit):0.5407252242845243
                                Encrypted:false
                                SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                MD5:7B955D976803304F2C0505431A0CF1CF
                                SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):155648
                                Entropy (8bit):0.5407252242845243
                                Encrypted:false
                                SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                MD5:7B955D976803304F2C0505431A0CF1CF
                                SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                Category:dropped
                                Size (bytes):20480
                                Entropy (8bit):0.8439810553697228
                                Encrypted:false
                                SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                Category:dropped
                                Size (bytes):20480
                                Entropy (8bit):0.8439810553697228
                                Encrypted:false
                                SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                Category:dropped
                                Size (bytes):20480
                                Entropy (8bit):0.6732424250451717
                                Encrypted:false
                                SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):51200
                                Entropy (8bit):0.8746135976761988
                                Encrypted:false
                                SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                MD5:9E68EA772705B5EC0C83C2A97BB26324
                                SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):159744
                                Entropy (8bit):0.5394293526345721
                                Encrypted:false
                                SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                MD5:52701A76A821CDDBC23FB25C3FCA4968
                                SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                Malicious:false
                                Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                Category:dropped
                                Size (bytes):196608
                                Entropy (8bit):1.121297215059106
                                Encrypted:false
                                SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                MD5:D87270D0039ED3A5A72E7082EA71E305
                                SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                Malicious:false
                                Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                Category:dropped
                                Size (bytes):106496
                                Entropy (8bit):1.136413900497188
                                Encrypted:false
                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                MD5:429F49156428FD53EB06FC82088FD324
                                SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                Malicious:false
                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                Category:dropped
                                Size (bytes):106496
                                Entropy (8bit):1.136413900497188
                                Encrypted:false
                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                MD5:429F49156428FD53EB06FC82088FD324
                                SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                Malicious:false
                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\4FkYkTt9dE.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):2519040
                                Entropy (8bit):7.9946716796175865
                                Encrypted:true
                                SSDEEP:49152:B8HJt7IakaekGdTCraWHyewqy2VdgWp1mh6MJTkbe3zEHVe8Zc:+E91CraWHy5m+TkIw1
                                MD5:17F0A21C1B5F9BDF2B8A9E9DF9A84A2D
                                SHA1:A6F6C20C424C83E760CC881D4689BFE19DFEE983
                                SHA-256:D80327695EEBEE6940B7A55704B4C712E22C37F5BC95F2D5D6FC83E90F87BF55
                                SHA-512:4CC0BF50D21D2163A6267153F6D140D4A7C8181D026BFE64600A0934CE02DF68BE0A70A49F0F5F02B8A47766652040DFEDC86AB2E912D11A198D53FFAD6CCD5A
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 32%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....f.................f&..........&.. ........@.. ........................&...........`...................................&.K.....&.......................&...................................................... ............... ..H............text....e&.. ...f&................. ..`.rsrc.........&......h&.............@..@.reloc........&......n&.............@..B..................&.....H........'&..]...............%..........................................0..........(Z...*.*.0..8......... .N..(N... .O..(N....(....(......~....(......,.s....z. RO..(N... .O..(N....(....(......~....(......,.s....z...(...........,%. FO..(N... .O..(N....(....(.......+#. .L..(N... .O..(N....(....(................,.s....z....i.@..(...........,.s....z.......i(.........i....(...........,.s....z...&....s........(......*A...........!..."...........&.(......*...0..>........~.........,
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                Category:dropped
                                Size (bytes):106496
                                Entropy (8bit):1.136413900497188
                                Encrypted:false
                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                MD5:429F49156428FD53EB06FC82088FD324
                                SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                Malicious:false
                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                Category:dropped
                                Size (bytes):196608
                                Entropy (8bit):1.121297215059106
                                Encrypted:false
                                SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                MD5:D87270D0039ED3A5A72E7082EA71E305
                                SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                Malicious:false
                                Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):40960
                                Entropy (8bit):0.8553638852307782
                                Encrypted:false
                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                MD5:28222628A3465C5F0D4B28F70F97F482
                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):155648
                                Entropy (8bit):0.5407252242845243
                                Encrypted:false
                                SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                MD5:7B955D976803304F2C0505431A0CF1CF
                                SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                Malicious:false
                                Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                Category:dropped
                                Size (bytes):20480
                                Entropy (8bit):0.6732424250451717
                                Encrypted:false
                                SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                Category:dropped
                                Size (bytes):5242880
                                Entropy (8bit):0.03859996294213402
                                Encrypted:false
                                SSDEEP:192:58rJQaXoMXp0VW9FxWHxDSjENbx56p3DisuwAyHI:58r54w0VW3xWdkEFxcp3y/y
                                MD5:D2A38A463B7925FE3ABE31ECCCE66ACA
                                SHA1:A1824888F9E086439B287DEA497F660F3AA4B397
                                SHA-256:474361353F00E89A9ECB246EC4662682392EBAF4F2A4BE9ABB68BBEBE33FA4A0
                                SHA-512:62DB46A530D952568EFBFF7796106E860D07754530B724E0392862EF76FDF99043DA9538EC0044323C814DF59802C3BB55454D591362CB9B6E39947D11E981F7
                                Malicious:false
                                Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                Category:dropped
                                Size (bytes):98304
                                Entropy (8bit):0.08235737944063153
                                Encrypted:false
                                SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):159744
                                Entropy (8bit):0.5394293526345721
                                Encrypted:false
                                SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                MD5:52701A76A821CDDBC23FB25C3FCA4968
                                SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                Malicious:false
                                Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                Category:dropped
                                Size (bytes):196608
                                Entropy (8bit):1.121297215059106
                                Encrypted:false
                                SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                MD5:D87270D0039ED3A5A72E7082EA71E305
                                SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                Malicious:false
                                Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):159744
                                Entropy (8bit):0.5394293526345721
                                Encrypted:false
                                SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                MD5:52701A76A821CDDBC23FB25C3FCA4968
                                SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                Malicious:false
                                Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                Entropy (8bit):7.981840635369075
                                TrID:
                                • Win64 Executable GUI (202006/5) 92.65%
                                • Win64 Executable (generic) (12005/4) 5.51%
                                • Generic Win/DOS Executable (2004/3) 0.92%
                                • DOS Executable Generic (2002/1) 0.92%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:4FkYkTt9dE.exe
                                File size:2'648'064 bytes
                                MD5:73e3c089e5e10d52872ee4f434bd6d23
                                SHA1:13ad356c27f6832ecaae6b63afd1c76f00bcac63
                                SHA256:4589cef24c0d5800c245c74d5b4c3f38bb5bc5893db52a58740a26b011ebe4c9
                                SHA512:6e9be1d8e1592d729a9328f0dcb96aceecd6796a36e2a720267c826320e5576335902940ca4b367ac88072a47f599afe0ce6a374fb4e55a83a18f9f3b28ca7b5
                                SSDEEP:49152:6bSt0H7n4mlQkG8XeAaMHy2NAeuVZSWloP7Fs/KDi/ZOEGSh3:kDNLeAaMHyKiHKDIhR
                                TLSH:41C5331791C425B5D5F403B484FA41835272787B9F7680EB2ED5B53BAA23BC0A273B27
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D..e...6...6...6...7...6...7...6...7...6...7...6...6...6...7...6..o6...6...7...6Rich...6................PE..d................."
                                Icon Hash:3b6120282c4c5a1f
                                Entrypoint:0x140008200
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x140000000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                Time Stamp:0xAE1BC4F8 [Tue Jul 25 12:18:00 2062 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:10
                                OS Version Minor:0
                                File Version Major:10
                                File Version Minor:0
                                Subsystem Version Major:10
                                Subsystem Version Minor:0
                                Import Hash:4cea7ae85c87ddc7295d39ff9cda31d1
                                Instruction
                                dec eax
                                sub esp, 28h
                                call 00007FEFB87DF8B0h
                                dec eax
                                add esp, 28h
                                jmp 00007FEFB87DF15Bh
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                dec eax
                                mov dword ptr [esp+08h], ebx
                                dec eax
                                mov dword ptr [esp+10h], edi
                                inc ecx
                                push esi
                                dec eax
                                sub esp, 000000B0h
                                and dword ptr [esp+20h], 00000000h
                                dec eax
                                lea ecx, dword ptr [esp+40h]
                                call dword ptr [000011CDh]
                                nop
                                dec eax
                                mov eax, dword ptr [00000030h]
                                dec eax
                                mov ebx, dword ptr [eax+08h]
                                xor edi, edi
                                xor eax, eax
                                dec eax
                                cmpxchg dword ptr [00004922h], ebx
                                je 00007FEFB87DF15Ch
                                dec eax
                                cmp eax, ebx
                                jne 00007FEFB87DF16Ch
                                mov edi, 00000001h
                                mov eax, dword ptr [00004918h]
                                cmp eax, 01h
                                jne 00007FEFB87DF169h
                                lea ecx, dword ptr [eax+1Eh]
                                call 00007FEFB87DF743h
                                jmp 00007FEFB87DF1CCh
                                mov ecx, 000003E8h
                                call dword ptr [0000117Eh]
                                jmp 00007FEFB87DF119h
                                mov eax, dword ptr [000048F6h]
                                test eax, eax
                                jne 00007FEFB87DF1ABh
                                mov dword ptr [000048E8h], 00000001h
                                dec esp
                                lea esi, dword ptr [000013E9h]
                                dec eax
                                lea ebx, dword ptr [000013CAh]
                                dec eax
                                mov dword ptr [esp+30h], ebx
                                mov dword ptr [esp+24h], eax
                                dec ecx
                                cmp ebx, esi
                                jnc 00007FEFB87DF177h
                                test eax, eax
                                jne 00007FEFB87DF177h
                                dec eax
                                cmp dword ptr [ebx], 00000000h
                                je 00007FEFB87DF162h
                                dec eax
                                mov eax, dword ptr [ebx]
                                dec eax
                                mov ecx, dword ptr [00001388h]
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xa23c0xb4.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xf0000x27b7f8.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0xe0000x408.pdata
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x28b0000x20.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x9a100x54.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x90100x118.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x91280x520.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x7b800x7c0060800deac1fde21b98089f2241ee6168False0.5499936995967742data6.096261782871538IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x90000x22c80x240059d15cdf89780817c3d48dd588a6a129False0.4136284722222222data4.727841929207054IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0xc0000x1f000x4009d1580dccaf8e787a43caf4bba48a079False0.3212890625data3.1889769845125677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .pdata0xe0000x4080x60015cd12257317071f28e4f7b728f8825eFalse0.3932291666666667data3.1563665040475675IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .rsrc0xf0000x27c0000x27b8001ae7d20c0910ab72e4b30c1a448d8374unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x28b0000x200x200637787151ee546a94902de9694a58fd6False0.083984375data0.4068473715812382IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                AVI0xf9f80x2e1aRIFF (little-endian) data, AVI, 272 x 60, 10.00 fps, video: RLE 8bppEnglishUnited States0.2713099474665311
                                RT_ICON0x128140x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3225609756097561
                                RT_ICON0x12e7c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.41263440860215056
                                RT_ICON0x131640x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.4569672131147541
                                RT_ICON0x1334c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5574324324324325
                                RT_ICON0x134740xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.6223347547974414
                                RT_ICON0x1431c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7369133574007221
                                RT_ICON0x14bc40x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.783410138248848
                                RT_ICON0x1528c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3829479768786127
                                RT_ICON0x157f40xd9d2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0004662673505254
                                RT_ICON0x231c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5300829875518672
                                RT_ICON0x257700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6137429643527205
                                RT_ICON0x268180x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.703688524590164
                                RT_ICON0x271a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.425531914893617
                                RT_DIALOG0x276080x2f2dataEnglishUnited States0.4389920424403183
                                RT_DIALOG0x278fc0x1b0dataEnglishUnited States0.5625
                                RT_DIALOG0x27aac0x166dataEnglishUnited States0.5223463687150838
                                RT_DIALOG0x27c140x1c0dataEnglishUnited States0.5446428571428571
                                RT_DIALOG0x27dd40x130dataEnglishUnited States0.5526315789473685
                                RT_DIALOG0x27f040x120dataEnglishUnited States0.5763888888888888
                                RT_STRING0x280240x8cMatlab v4 mat-file (little endian) l, numeric, rows 0, columns 0EnglishUnited States0.6214285714285714
                                RT_STRING0x280b00x520dataEnglishUnited States0.4032012195121951
                                RT_STRING0x285d00x5ccdataEnglishUnited States0.36455525606469
                                RT_STRING0x28b9c0x4b0dataEnglishUnited States0.385
                                RT_STRING0x2904c0x44adataEnglishUnited States0.3970856102003643
                                RT_STRING0x294980x3cedataEnglishUnited States0.36858316221765913
                                RT_RCDATA0x298680x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
                                RT_RCDATA0x298700x26025eMicrosoft Cabinet archive data, Windows 2000/XP setup, 2490974 bytes, 1 file, at 0x2c +A "availableresearch.exe", ID 2142, number 1, 77 datablocks, 0x1503 compressionEnglishUnited States1.0003108978271484
                                RT_RCDATA0x289ad00x4dataEnglishUnited States3.0
                                RT_RCDATA0x289ad40x24dataEnglishUnited States0.6666666666666666
                                RT_RCDATA0x289af80x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
                                RT_RCDATA0x289b000x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
                                RT_RCDATA0x289b080x4dataEnglishUnited States3.0
                                RT_RCDATA0x289b0c0x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
                                RT_RCDATA0x289b140x4dataEnglishUnited States3.0
                                RT_RCDATA0x289b180x18dataEnglishUnited States1.3333333333333333
                                RT_RCDATA0x289b300x4dataEnglishUnited States3.0
                                RT_RCDATA0x289b340x6dataEnglishUnited States2.3333333333333335
                                RT_RCDATA0x289b3c0x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
                                RT_RCDATA0x289b440x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
                                RT_GROUP_ICON0x289b4c0xbcdataEnglishUnited States0.6117021276595744
                                RT_VERSION0x289c080x408dataEnglishUnited States0.42151162790697677
                                RT_MANIFEST0x28a0100x7e6XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.37734915924826906
                                DLLImport
                                ADVAPI32.dllGetTokenInformation, RegDeleteValueA, RegOpenKeyExA, RegQueryInfoKeyA, FreeSid, OpenProcessToken, RegSetValueExA, RegCreateKeyExA, LookupPrivilegeValueA, AllocateAndInitializeSid, RegQueryValueExA, EqualSid, RegCloseKey, AdjustTokenPrivileges
                                KERNEL32.dll_lopen, _llseek, CompareStringA, GetLastError, GetFileAttributesA, GetSystemDirectoryA, LoadLibraryA, DeleteFileA, GlobalAlloc, GlobalFree, CloseHandle, WritePrivateProfileStringA, IsDBCSLeadByte, GetWindowsDirectoryA, SetFileAttributesA, GetProcAddress, GlobalLock, LocalFree, RemoveDirectoryA, FreeLibrary, _lclose, CreateDirectoryA, GetPrivateProfileIntA, GetPrivateProfileStringA, GlobalUnlock, ReadFile, SizeofResource, WriteFile, GetDriveTypeA, LoadLibraryExA, SetFileTime, SetFilePointer, FindResourceA, CreateMutexA, GetVolumeInformationA, WaitForSingleObject, GetCurrentDirectoryA, FreeResource, GetVersion, SetCurrentDirectoryA, GetTempPathA, LocalFileTimeToFileTime, CreateFileA, SetEvent, TerminateThread, GetVersionExA, LockResource, GetSystemInfo, CreateThread, ResetEvent, LoadResource, ExitProcess, GetModuleHandleW, CreateProcessA, FormatMessageA, GetTempFileNameA, DosDateTimeToFileTime, CreateEventA, GetExitCodeProcess, ExpandEnvironmentStringsA, LocalAlloc, lstrcmpA, FindNextFileA, GetCurrentProcess, FindFirstFileA, GetModuleFileNameA, GetShortPathNameA, Sleep, GetStartupInfoW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, GetTickCount, EnumResourceLanguagesA, GetDiskFreeSpaceA, MulDiv, FindClose
                                GDI32.dllGetDeviceCaps
                                USER32.dllShowWindow, MsgWaitForMultipleObjects, SetWindowPos, GetDC, GetWindowRect, DispatchMessageA, GetSystemMetrics, CallWindowProcA, SetWindowTextA, MessageBoxA, SendDlgItemMessageA, SendMessageA, GetDlgItem, DialogBoxIndirectParamA, GetWindowLongPtrA, SetWindowLongPtrA, SetForegroundWindow, ReleaseDC, EnableWindow, CharNextA, LoadStringA, CharPrevA, EndDialog, MessageBeep, ExitWindowsEx, SetDlgItemTextA, CharUpperA, GetDesktopWindow, PeekMessageA, GetDlgItemTextA
                                msvcrt.dll?terminate@@YAXXZ, _commode, _fmode, _acmdln, __C_specific_handler, memset, __setusermatherr, _ismbblead, _cexit, _exit, exit, __set_app_type, __getmainargs, _amsg_exit, _XcptFilter, memcpy_s, _vsnprintf, _initterm, memcpy
                                COMCTL32.dll
                                Cabinet.dll
                                VERSION.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                07/12/24-17:41:35.711862TCP2856255ETPRO TROJAN Win32/zgRAT CnC Checkin497107702192.168.2.5185.125.50.121
                                TimestampSource PortDest PortSource IPDest IP
                                Jul 12, 2024 17:41:30.668515921 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:30.674184084 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:30.674283028 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:35.705949068 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:35.711704969 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:35.711862087 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:35.716924906 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:35.983366013 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:35.983406067 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:35.983438969 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:35.983473063 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:35.983505964 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:35.983537912 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:35.983570099 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:35.983603001 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:35.983620882 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:35.983620882 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:35.983620882 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:35.983634949 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:35.983670950 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:35.983696938 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:35.983722925 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:35.988500118 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.033145905 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.064694881 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.064732075 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.064920902 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.073333979 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.073390961 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.073420048 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.073472977 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.073506117 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.073564053 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.073564053 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.073896885 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.073929071 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.073961973 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.074067116 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.074067116 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.079412937 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.079489946 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.079523087 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.079560041 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.084984064 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.085016012 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.085047960 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.085165977 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.085165977 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.091336012 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.091407061 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.091439009 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.091567039 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.096421003 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.096455097 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.096517086 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.096586943 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.096586943 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.102308989 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.102341890 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.102374077 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.102502108 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.107955933 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.107986927 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.108020067 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.108030081 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.108114004 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.113814116 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.113882065 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.113950014 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.172306061 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172339916 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172373056 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172504902 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.172602892 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172652960 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172688007 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172738075 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172771931 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172804117 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172837973 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172863960 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.172863960 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.172863960 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.172889948 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172924995 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172939062 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.172959089 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.172974110 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.172992945 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.173026085 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.173058033 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.173186064 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.173186064 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.179044962 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.179079056 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.179111004 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.179145098 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.184278011 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.184310913 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.184341908 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.184473991 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.184473991 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.196789980 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.196822882 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.196854115 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.196986914 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.197429895 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.197463036 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.197494030 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.197591066 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.197591066 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.205377102 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.205415964 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.205450058 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.205476999 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.207117081 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.207186937 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.207218885 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.207278967 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.207278967 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.215357065 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.215423107 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.215457916 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.215492964 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.215526104 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.215570927 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.215570927 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.220877886 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.220911026 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.220941067 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.221061945 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.221061945 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.235160112 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.235193014 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.235224009 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.235354900 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.250304937 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.250339985 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.250372887 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.250502110 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.250502110 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.251348019 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.251420975 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.251452923 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.251575947 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.260023117 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.260207891 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.260612011 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.261219978 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.261251926 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.261286974 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.261318922 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.261353016 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.261439085 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.261439085 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.261439085 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.265448093 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.265481949 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.265515089 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.265542984 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.265547037 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.265580893 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.265747070 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.269025087 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.269057989 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.269089937 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.269100904 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.269155025 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.269156933 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.269187927 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.269402027 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.269453049 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.269486904 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.269536972 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.269541025 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.269570112 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.269603968 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.269618988 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.270365953 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.270397902 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.270416975 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.270432949 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.270467997 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.270493031 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.273070097 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.273102045 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.273134947 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.273140907 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.273206949 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.275258064 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.275290966 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.275322914 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.275347948 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.287663937 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.287695885 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.287729979 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.287761927 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.287796021 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.287848949 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.287848949 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.287848949 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.288403988 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.288431883 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.288499117 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.288547039 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.288579941 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.288600922 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.288600922 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.288613081 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.288691044 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.292956114 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.293004990 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.293037891 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.293070078 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.293102026 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.293170929 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.293170929 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.297415972 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.297450066 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.297482967 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.297638893 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.297646046 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.297646046 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.297673941 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.297739029 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.302982092 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.313138008 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:36.318937063 CEST770249710185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:36.319149017 CEST497107702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:39.492697001 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:39.497898102 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:39.497987032 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:44.509604931 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:44.509680986 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:44.515522957 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.515537977 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.515547037 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.515551090 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.515572071 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.515610933 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.515634060 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.515644073 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.515685081 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:44.515903950 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.515911102 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.515950918 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:44.524367094 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.524375916 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.524455070 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:44.524499893 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.524507999 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.524517059 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.524550915 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:44.524569035 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:44.524667025 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.524714947 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.524772882 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:44.525171995 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.527508974 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:44.530311108 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.530771017 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.530828953 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:44.531558037 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.536237955 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.536266088 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:44.536293030 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.519215107 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:45.524451017 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.524547100 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:45.529340029 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.771845102 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:45.772058964 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:45.772185087 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:45.777450085 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.777463913 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.777472019 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.777477980 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.777487040 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.777496099 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.777503967 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.777513027 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.777522087 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.777532101 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.777570963 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:45.777633905 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:45.782254934 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782291889 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782322884 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:45.782335997 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782344103 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782453060 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782460928 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782552958 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782560110 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782608986 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782618046 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782654047 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782691002 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782736063 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782807112 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782814026 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782821894 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.782830000 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.784617901 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.784626007 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.784631968 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.794922113 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.794931889 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.796024084 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.796055079 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.796087980 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.796117067 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.796143055 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.797373056 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.797426939 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.797465086 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.797491074 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.797509909 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.797542095 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.797573090 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.797646046 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.797671080 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.797746897 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798122883 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798183918 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798192978 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798230886 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798238993 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798326969 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798333883 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798342943 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798378944 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798388004 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798480988 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798487902 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798542023 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798548937 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798557997 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798625946 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798655987 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.798746109 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.799556017 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.799675941 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.799726009 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.799798965 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.799858093 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.799865007 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.799911976 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.799918890 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.799962997 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.799969912 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.987193108 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:45.992506027 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:45.992602110 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:45.998032093 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:47.324615955 CEST770249711185.125.50.121192.168.2.5
                                Jul 12, 2024 17:41:47.324753046 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:47.326544046 CEST497117702192.168.2.5185.125.50.121
                                Jul 12, 2024 17:41:47.337845087 CEST770249711185.125.50.121192.168.2.5
                                TimestampSource PortDest PortSource IPDest IP
                                Jul 12, 2024 17:41:36.620996952 CEST5949253192.168.2.51.1.1.1
                                Jul 12, 2024 17:41:36.629111052 CEST53594921.1.1.1192.168.2.5
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Jul 12, 2024 17:41:36.620996952 CEST192.168.2.51.1.1.10x48aStandard query (0)81.189.14.0.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Jul 12, 2024 17:41:36.629111052 CEST1.1.1.1192.168.2.50x48aName error (3)81.189.14.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:11:40:53
                                Start date:12/07/2024
                                Path:C:\Users\user\Desktop\4FkYkTt9dE.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\Desktop\4FkYkTt9dE.exe"
                                Imagebase:0x7ff753ab0000
                                File size:2'648'064 bytes
                                MD5 hash:73E3C089E5E10D52872EE4F434BD6D23
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:1
                                Start time:11:40:53
                                Start date:12/07/2024
                                Path:C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Local\Temp\IXP000.TMP\availableresearch.exe
                                Imagebase:0xba0000
                                File size:2'519'040 bytes
                                MD5 hash:17F0A21C1B5F9BDF2B8A9E9DF9A84A2D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000001.00000002.2376767816.0000000007200000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000001.00000002.2362493618.00000000031E6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000001.00000002.2367911326.0000000006163000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000001.00000002.2367911326.0000000005C11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 32%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:3
                                Start time:11:41:03
                                Start date:12/07/2024
                                Path:C:\Windows\System32\rundll32.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
                                Imagebase:0x7ff7a8810000
                                File size:71'680 bytes
                                MD5 hash:EF3179D498793BF4234F708D3BE28633
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:11:41:29
                                Start date:12/07/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                Imagebase:0x4c0000
                                File size:42'064 bytes
                                MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: 00000005.00000002.2560519473.00000000061D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000005.00000002.2560519473.00000000061D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000005.00000002.2560519473.00000000061D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000005.00000002.2556873833.00000000059A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000005.00000002.2555740366.0000000005740000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2537393608.0000000002951000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:moderate
                                Has exited:true

                                Target ID:8
                                Start time:11:41:46
                                Start date:12/07/2024
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:"powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -Force
                                Imagebase:0x3c0000
                                File size:433'152 bytes
                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:9
                                Start time:11:41:46
                                Start date:12/07/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6d64d0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:27.1%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:40.3%
                                  Total number of Nodes:917
                                  Total number of Limit Nodes:48
                                  execution_graph 2778 7ff753ab8750 2779 7ff753ab8782 2778->2779 2780 7ff753ab875f 2778->2780 2780->2779 2781 7ff753ab877b ?terminate@ 2780->2781 2781->2779 2782 7ff753ab8790 SetUnhandledExceptionFilter 2142 7ff753ab5690 2149 7ff753ab3b40 2142->2149 2145 7ff753ab56c2 WriteFile 2146 7ff753ab56ba 2145->2146 2147 7ff753ab56f9 2145->2147 2147->2146 2148 7ff753ab5725 SendDlgItemMessageA 2147->2148 2148->2146 2150 7ff753ab3b4c MsgWaitForMultipleObjects 2149->2150 2151 7ff753ab3be5 2150->2151 2152 7ff753ab3b74 PeekMessageA 2150->2152 2151->2145 2151->2146 2152->2150 2153 7ff753ab3b99 2152->2153 2153->2150 2153->2151 2154 7ff753ab3ba7 DispatchMessageA 2153->2154 2155 7ff753ab3bb8 PeekMessageA 2153->2155 2154->2155 2155->2153 2783 7ff753ab80d0 2786 7ff753ab80e2 2783->2786 2785 7ff753ab8149 __set_app_type 2787 7ff753ab8186 2785->2787 2790 7ff753ab8818 GetModuleHandleW 2786->2790 2788 7ff753ab818f __setusermatherr 2787->2788 2789 7ff753ab819c 2787->2789 2788->2789 2791 7ff753ab882d 2790->2791 2791->2785 2792 7ff753ab3910 2793 7ff753ab3a09 2792->2793 2794 7ff753ab3933 2792->2794 2795 7ff753ab3954 2793->2795 2796 7ff753ab3b1a EndDialog 2793->2796 2794->2793 2797 7ff753ab3a11 GetDesktopWindow 2794->2797 2798 7ff753ab3948 2794->2798 2796->2795 2814 7ff753ab4c68 6 API calls 2797->2814 2800 7ff753ab397b 2798->2800 2801 7ff753ab394c 2798->2801 2800->2795 2802 7ff753ab3985 ResetEvent 2800->2802 2801->2795 2804 7ff753ab395b TerminateThread 2801->2804 2805 7ff753ab4dcc 24 API calls 2802->2805 2804->2796 2808 7ff753ab39c3 2805->2808 2806 7ff753ab3a38 GetDlgItem SendMessageA GetDlgItem SendMessageA 2807 7ff753ab3a9b SetWindowTextA CreateThread 2806->2807 2807->2795 2809 7ff753ab3ae8 2807->2809 2810 7ff753ab39e4 SetEvent 2808->2810 2812 7ff753ab39cc SetEvent 2808->2812 2811 7ff753ab4dcc 24 API calls 2809->2811 2813 7ff753ab3b40 4 API calls 2810->2813 2811->2793 2812->2795 2813->2793 2815 7ff753ab4d3f SetWindowPos 2814->2815 2817 7ff753ab8470 7 API calls 2815->2817 2818 7ff753ab3a2f 2817->2818 2818->2806 2818->2807 2819 7ff753ab2e96 2820 7ff753ab2ea2 2819->2820 2821 7ff753ab4dcc 24 API calls 2820->2821 2822 7ff753ab2eb4 2821->2822 2823 7ff753ab8470 7 API calls 2822->2823 2824 7ff753ab30d0 2823->2824 2217 7ff753ab828e 2220 7ff753ab82af 2217->2220 2218 7ff753ab8444 2219 7ff753ab83f8 _ismbblead 2219->2220 2220->2218 2220->2219 2825 7ff753ab2ecd 2826 7ff753ab2ed5 2825->2826 2827 7ff753ab2fa3 2825->2827 2828 7ff753ab5050 7 API calls 2826->2828 2830 7ff753ab2fb5 2827->2830 2831 7ff753ab2fc4 2827->2831 2829 7ff753ab2ea2 2828->2829 2835 7ff753ab4dcc 24 API calls 2829->2835 2838 7ff753ab4dcc 24 API calls 2830->2838 2832 7ff753ab2fcd 2831->2832 2833 7ff753ab2fde FindResourceA 2831->2833 2834 7ff753ab204c 16 API calls 2832->2834 2836 7ff753ab2fff LoadResource 2833->2836 2837 7ff753ab3014 2833->2837 2848 7ff753ab2eb4 2834->2848 2835->2848 2836->2837 2839 7ff753ab3029 2837->2839 2840 7ff753ab301d #17 2837->2840 2838->2848 2841 7ff753ab3bf4 45 API calls 2839->2841 2839->2848 2840->2839 2844 7ff753ab3042 2841->2844 2842 7ff753ab8470 7 API calls 2843 7ff753ab30d0 2842->2843 2845 7ff753ab12ec 23 API calls 2844->2845 2844->2848 2846 7ff753ab3071 2845->2846 2847 7ff753ab7ac8 28 API calls 2846->2847 2846->2848 2847->2848 2848->2842 2849 7ff753ab86ce 2850 7ff753ab86ea 2849->2850 2853 7ff753ab8494 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2850->2853 2854 7ff753ab8200 2860 7ff753ab8964 2854->2860 2856 7ff753ab8209 GetStartupInfoW 2859 7ff753ab824b 2856->2859 2858 7ff753ab83f8 _ismbblead 2858->2859 2859->2858 2861 7ff753ab8990 6 API calls 2860->2861 2862 7ff753ab8a0f 2860->2862 2861->2862 2862->2856 2863 7ff753ab1500 2864 7ff753ab1530 2863->2864 2865 7ff753ab1557 GetDesktopWindow 2863->2865 2866 7ff753ab1553 2864->2866 2868 7ff753ab1542 EndDialog 2864->2868 2867 7ff753ab4c68 14 API calls 2865->2867 2870 7ff753ab8470 7 API calls 2866->2870 2869 7ff753ab156e LoadStringA SetDlgItemTextA MessageBeep 2867->2869 2868->2866 2869->2866 2871 7ff753ab15d0 2870->2871 2872 7ff753ab3840 2873 7ff753ab3852 2872->2873 2874 7ff753ab385a 2872->2874 2873->2874 2876 7ff753ab388e GetDesktopWindow 2873->2876 2875 7ff753ab38ec EndDialog 2874->2875 2879 7ff753ab385f 2874->2879 2875->2879 2877 7ff753ab4c68 14 API calls 2876->2877 2878 7ff753ab38a5 SetWindowTextA SetDlgItemTextA SetForegroundWindow 2877->2878 2878->2879 2880 7ff753ab8685 RtlVirtualUnwind 2881 7ff753ab86ea 2880->2881 2884 7ff753ab8494 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2881->2884 2212 7ff753ab83b8 2213 7ff753ab83cf 2212->2213 2214 7ff753ab83c7 exit 2212->2214 2215 7ff753ab83e4 2213->2215 2216 7ff753ab83d8 _cexit 2213->2216 2214->2213 2216->2215 2221 7ff753ab2c7b 2222 7ff753ab2c7f GetModuleHandleW 2221->2222 2226 7ff753ab2cc3 2221->2226 2223 7ff753ab2c97 GetProcAddress 2222->2223 2222->2226 2224 7ff753ab2cb2 2223->2224 2223->2226 2224->2226 2225 7ff753ab2d7f 2228 7ff753ab2d97 2225->2228 2229 7ff753ab2d8b CloseHandle 2225->2229 2226->2225 2242 7ff753ab30ec 2226->2242 2229->2228 2233 7ff753ab2d29 2233->2225 2234 7ff753ab2d33 2233->2234 2235 7ff753ab2d5e 2233->2235 2237 7ff753ab4dcc 24 API calls 2234->2237 2238 7ff753ab2d7a 2235->2238 2239 7ff753ab2d67 ExitWindowsEx 2235->2239 2240 7ff753ab2d59 2237->2240 2313 7ff753ab1c0c GetCurrentProcess OpenProcessToken 2238->2313 2239->2225 2240->2225 2240->2235 2243 7ff753ab3141 2242->2243 2244 7ff753ab3116 2242->2244 2341 7ff753ab5fe4 2243->2341 2246 7ff753ab3134 2244->2246 2321 7ff753ab60a4 2244->2321 2499 7ff753ab3f74 2246->2499 2254 7ff753ab8470 7 API calls 2256 7ff753ab2ce1 2254->2256 2255 7ff753ab315b GetSystemDirectoryA 2257 7ff753ab7ba8 CharPrevA 2255->2257 2288 7ff753ab61ec 2256->2288 2258 7ff753ab3186 LoadLibraryA 2257->2258 2259 7ff753ab319f GetProcAddress 2258->2259 2260 7ff753ab31c9 FreeLibrary 2258->2260 2259->2260 2261 7ff753ab31ba DecryptFileA 2259->2261 2262 7ff753ab3273 SetCurrentDirectoryA 2260->2262 2263 7ff753ab31e4 2260->2263 2261->2260 2264 7ff753ab3291 2262->2264 2265 7ff753ab320d 2262->2265 2263->2262 2266 7ff753ab31f0 GetWindowsDirectoryA 2263->2266 2269 7ff753ab331f 2264->2269 2274 7ff753ab32fb 2264->2274 2278 7ff753ab32cb 2264->2278 2270 7ff753ab4dcc 24 API calls 2265->2270 2266->2265 2267 7ff753ab325a 2266->2267 2404 7ff753ab6ca4 GetCurrentDirectoryA SetCurrentDirectoryA 2267->2404 2273 7ff753ab2318 18 API calls 2269->2273 2277 7ff753ab3347 2269->2277 2286 7ff753ab3236 2269->2286 2271 7ff753ab322b 2270->2271 2518 7ff753ab7700 GetLastError 2271->2518 2273->2277 2431 7ff753ab5d90 2274->2431 2276 7ff753ab3368 2284 7ff753ab3383 2276->2284 2276->2286 2277->2276 2453 7ff753ab40c4 2277->2453 2281 7ff753ab7ac8 28 API calls 2278->2281 2279 7ff753ab3230 2279->2286 2282 7ff753ab32f6 2281->2282 2282->2286 2519 7ff753ab772c 2282->2519 2529 7ff753ab494c 2284->2529 2286->2254 2289 7ff753ab6214 2288->2289 2290 7ff753ab624c LocalFree LocalFree 2289->2290 2292 7ff753ab6229 SetFileAttributesA DeleteFileA 2289->2292 2297 7ff753ab6273 2289->2297 2290->2289 2291 7ff753ab6311 2293 7ff753ab6387 2291->2293 2295 7ff753ab632d RegOpenKeyExA 2291->2295 2292->2290 2294 7ff753ab8470 7 API calls 2293->2294 2296 7ff753ab2ce8 2294->2296 2295->2293 2298 7ff753ab635e RegDeleteValueA RegCloseKey 2295->2298 2296->2225 2296->2233 2302 7ff753ab2318 2296->2302 2297->2291 2299 7ff753ab62f4 SetCurrentDirectoryA 2297->2299 2300 7ff753ab7c40 4 API calls 2297->2300 2298->2293 2301 7ff753ab204c 16 API calls 2299->2301 2300->2299 2301->2291 2303 7ff753ab2330 2302->2303 2304 7ff753ab2447 2302->2304 2306 7ff753ab233a 2303->2306 2307 7ff753ab23cb RegOpenKeyExA 2303->2307 2770 7ff753ab2244 GetWindowsDirectoryA 2304->2770 2308 7ff753ab23c3 2306->2308 2311 7ff753ab234a RegOpenKeyExA 2306->2311 2307->2308 2309 7ff753ab23fe RegQueryInfoKeyA 2307->2309 2308->2233 2310 7ff753ab23a8 RegCloseKey 2309->2310 2310->2308 2311->2308 2312 7ff753ab237d RegQueryValueExA 2311->2312 2312->2310 2314 7ff753ab1c6f LookupPrivilegeValueA AdjustTokenPrivileges CloseHandle 2313->2314 2315 7ff753ab1c4c 2313->2315 2314->2315 2316 7ff753ab1cec ExitWindowsEx 2314->2316 2317 7ff753ab4dcc 24 API calls 2315->2317 2316->2315 2318 7ff753ab1c68 2316->2318 2317->2318 2319 7ff753ab8470 7 API calls 2318->2319 2320 7ff753ab1d1a 2319->2320 2320->2225 2542 7ff753ab5050 FindResourceA SizeofResource 2321->2542 2324 7ff753ab60dd 2327 7ff753ab4dcc 24 API calls 2324->2327 2325 7ff753ab610b 2326 7ff753ab5050 7 API calls 2325->2326 2328 7ff753ab611d 2326->2328 2329 7ff753ab60fb 2327->2329 2331 7ff753ab6121 2328->2331 2332 7ff753ab615a lstrcmp 2328->2332 2547 7ff753ab7700 GetLastError 2329->2547 2333 7ff753ab4dcc 24 API calls 2331->2333 2334 7ff753ab6174 LocalFree 2332->2334 2335 7ff753ab618a 2332->2335 2337 7ff753ab613f LocalFree 2333->2337 2336 7ff753ab3123 2334->2336 2338 7ff753ab4dcc 24 API calls 2335->2338 2336->2243 2336->2246 2336->2286 2337->2336 2339 7ff753ab61ac LocalFree 2338->2339 2340 7ff753ab6100 2339->2340 2340->2336 2342 7ff753ab5050 7 API calls 2341->2342 2344 7ff753ab6001 2342->2344 2343 7ff753ab6006 2346 7ff753ab4dcc 24 API calls 2343->2346 2344->2343 2345 7ff753ab604a 2344->2345 2347 7ff753ab5050 7 API calls 2345->2347 2348 7ff753ab6025 2346->2348 2349 7ff753ab6063 2347->2349 2350 7ff753ab3146 2348->2350 2351 7ff753ab772c 13 API calls 2349->2351 2350->2286 2355 7ff753ab66c4 2350->2355 2352 7ff753ab606f 2351->2352 2352->2350 2353 7ff753ab6073 2352->2353 2354 7ff753ab4dcc 24 API calls 2353->2354 2354->2348 2356 7ff753ab5050 7 API calls 2355->2356 2357 7ff753ab6706 LocalAlloc 2356->2357 2358 7ff753ab6756 2357->2358 2359 7ff753ab6726 2357->2359 2360 7ff753ab5050 7 API calls 2358->2360 2361 7ff753ab4dcc 24 API calls 2359->2361 2362 7ff753ab6768 2360->2362 2363 7ff753ab6744 2361->2363 2364 7ff753ab67a5 lstrcmpA LocalFree 2362->2364 2365 7ff753ab676c 2362->2365 2572 7ff753ab7700 GetLastError 2363->2572 2368 7ff753ab6837 2364->2368 2369 7ff753ab67ec 2364->2369 2367 7ff753ab4dcc 24 API calls 2365->2367 2372 7ff753ab678a LocalFree 2367->2372 2371 7ff753ab6b14 2368->2371 2374 7ff753ab684f GetTempPathA 2368->2374 2378 7ff753ab64e4 53 API calls 2369->2378 2370 7ff753ab6749 2373 7ff753ab674f 2370->2373 2375 7ff753ab7ac8 28 API calls 2371->2375 2372->2373 2377 7ff753ab8470 7 API calls 2373->2377 2376 7ff753ab6872 2374->2376 2385 7ff753ab68a5 2374->2385 2375->2373 2548 7ff753ab64e4 2376->2548 2380 7ff753ab3153 2377->2380 2381 7ff753ab680c 2378->2381 2380->2255 2380->2286 2381->2373 2383 7ff753ab6814 2381->2383 2384 7ff753ab4dcc 24 API calls 2383->2384 2384->2370 2385->2373 2386 7ff753ab68f9 GetDriveTypeA 2385->2386 2387 7ff753ab6adb GetWindowsDirectoryA 2385->2387 2389 7ff753ab6916 GetFileAttributesA 2386->2389 2402 7ff753ab6911 2386->2402 2391 7ff753ab6ca4 38 API calls 2387->2391 2389->2402 2391->2385 2392 7ff753ab64e4 53 API calls 2392->2385 2393 7ff753ab6ca4 38 API calls 2393->2402 2394 7ff753ab6955 GetDiskFreeSpaceA 2396 7ff753ab6983 MulDiv 2394->2396 2394->2402 2395 7ff753ab2468 25 API calls 2395->2402 2396->2402 2397 7ff753ab6a02 GetWindowsDirectoryA 2397->2402 2398 7ff753ab7ba8 CharPrevA 2399 7ff753ab6a2a GetFileAttributesA 2398->2399 2400 7ff753ab6a40 CreateDirectoryA 2399->2400 2399->2402 2400->2402 2401 7ff753ab6a6d SetFileAttributesA 2401->2402 2402->2373 2402->2386 2402->2387 2402->2389 2402->2393 2402->2394 2402->2395 2402->2397 2402->2398 2402->2401 2403 7ff753ab64e4 53 API calls 2402->2403 2403->2402 2405 7ff753ab6d12 2404->2405 2406 7ff753ab6d3f GetDiskFreeSpaceA 2404->2406 2407 7ff753ab4dcc 24 API calls 2405->2407 2408 7ff753ab6d80 MulDiv 2406->2408 2409 7ff753ab6f63 memset 2406->2409 2410 7ff753ab6d2f 2407->2410 2408->2409 2412 7ff753ab6dae GetVolumeInformationA 2408->2412 2623 7ff753ab7700 GetLastError 2409->2623 2604 7ff753ab7700 GetLastError 2410->2604 2415 7ff753ab6e45 SetCurrentDirectoryA 2412->2415 2416 7ff753ab6de6 memset 2412->2416 2414 7ff753ab6f7b GetLastError FormatMessageA 2417 7ff753ab6fbd 2414->2417 2423 7ff753ab6e6c 2415->2423 2605 7ff753ab7700 GetLastError 2416->2605 2420 7ff753ab4dcc 24 API calls 2417->2420 2419 7ff753ab6f41 2424 7ff753ab8470 7 API calls 2419->2424 2422 7ff753ab6fd8 SetCurrentDirectoryA 2420->2422 2421 7ff753ab6dfe GetLastError FormatMessageA 2421->2417 2422->2419 2426 7ff753ab6eb4 2423->2426 2429 7ff753ab6ed8 2423->2429 2425 7ff753ab326f 2424->2425 2425->2262 2425->2286 2427 7ff753ab4dcc 24 API calls 2426->2427 2428 7ff753ab6d34 2427->2428 2428->2419 2429->2419 2606 7ff753ab24f8 2429->2606 2432 7ff753ab5050 7 API calls 2431->2432 2433 7ff753ab5dab FindResourceA LoadResource LockResource 2432->2433 2434 7ff753ab5dfc 2433->2434 2450 7ff753ab5fcf 2433->2450 2435 7ff753ab5e56 2434->2435 2436 7ff753ab5e08 GetDlgItem ShowWindow GetDlgItem ShowWindow 2434->2436 2624 7ff753ab5c60 #20 2435->2624 2436->2435 2439 7ff753ab5e5f 2444 7ff753ab4dcc 24 API calls 2439->2444 2440 7ff753ab5e69 #20 2440->2439 2441 7ff753ab5ed1 #22 2440->2441 2442 7ff753ab5f55 2441->2442 2443 7ff753ab5f15 #23 2441->2443 2446 7ff753ab5f61 FreeResource 2442->2446 2447 7ff753ab5f75 2442->2447 2443->2439 2443->2442 2445 7ff753ab5f53 2444->2445 2445->2442 2446->2447 2448 7ff753ab5f9f 2447->2448 2449 7ff753ab5f81 2447->2449 2448->2450 2452 7ff753ab5fb1 SendMessageA 2448->2452 2451 7ff753ab4dcc 24 API calls 2449->2451 2450->2282 2451->2448 2452->2450 2454 7ff753ab4118 2453->2454 2472 7ff753ab412f 2453->2472 2455 7ff753ab5050 7 API calls 2454->2455 2455->2472 2456 7ff753ab4145 memset 2456->2472 2457 7ff753ab4254 2458 7ff753ab4dcc 24 API calls 2457->2458 2459 7ff753ab4273 2458->2459 2460 7ff753ab44ee 2459->2460 2463 7ff753ab8470 7 API calls 2460->2463 2462 7ff753ab5050 7 API calls 2462->2472 2464 7ff753ab44ff 2463->2464 2464->2276 2465 7ff753ab42f5 CompareStringA 2466 7ff753ab45d8 2465->2466 2465->2472 2466->2460 2468 7ff753ab45f2 RegOpenKeyExA 2466->2468 2467 7ff753ab44df LocalFree 2467->2460 2468->2460 2473 7ff753ab4627 RegQueryValueExA 2468->2473 2469 7ff753ab4599 2471 7ff753ab4dcc 24 API calls 2469->2471 2474 7ff753ab45b8 LocalFree 2471->2474 2472->2456 2472->2457 2472->2460 2472->2462 2472->2465 2472->2466 2472->2467 2472->2469 2478 7ff753ab44ad LocalFree 2472->2478 2481 7ff753ab41fd CompareStringA 2472->2481 2496 7ff753ab4394 2472->2496 2636 7ff753ab1684 2472->2636 2675 7ff753ab1d28 memset memset RegCreateKeyExA 2472->2675 2702 7ff753ab473c CreateProcessA 2472->2702 2476 7ff753ab471c RegCloseKey 2473->2476 2477 7ff753ab466c memset GetSystemDirectoryA 2473->2477 2474->2460 2476->2460 2479 7ff753ab46b3 2477->2479 2480 7ff753ab469d 2477->2480 2478->2466 2478->2472 2483 7ff753ab114c _vsnprintf 2479->2483 2484 7ff753ab7ba8 CharPrevA 2480->2484 2481->2472 2485 7ff753ab46dc RegSetValueExA 2483->2485 2484->2479 2485->2476 2486 7ff753ab43a5 GetProcAddress 2488 7ff753ab4521 2486->2488 2486->2496 2487 7ff753ab4574 2489 7ff753ab4dcc 24 API calls 2487->2489 2492 7ff753ab4dcc 24 API calls 2488->2492 2491 7ff753ab4597 2489->2491 2493 7ff753ab4553 LocalFree 2491->2493 2494 7ff753ab4544 FreeLibrary 2492->2494 2727 7ff753ab7700 GetLastError 2493->2727 2494->2493 2496->2486 2496->2487 2497 7ff753ab4480 FreeLibrary 2496->2497 2498 7ff753ab44d3 FreeLibrary 2496->2498 2717 7ff753ab79f0 2496->2717 2497->2478 2498->2467 2500 7ff753ab5050 7 API calls 2499->2500 2501 7ff753ab3f8b LocalAlloc 2500->2501 2502 7ff753ab3fdd 2501->2502 2503 7ff753ab3fad 2501->2503 2505 7ff753ab5050 7 API calls 2502->2505 2504 7ff753ab4dcc 24 API calls 2503->2504 2506 7ff753ab3fcb 2504->2506 2507 7ff753ab3fef 2505->2507 2769 7ff753ab7700 GetLastError 2506->2769 2508 7ff753ab4030 lstrcmpA 2507->2508 2509 7ff753ab3ff3 2507->2509 2512 7ff753ab4098 LocalFree 2508->2512 2513 7ff753ab404e 2508->2513 2511 7ff753ab4dcc 24 API calls 2509->2511 2514 7ff753ab4011 LocalFree 2511->2514 2516 7ff753ab3139 2512->2516 2515 7ff753ab7ac8 28 API calls 2513->2515 2514->2516 2517 7ff753ab406e LocalFree 2515->2517 2516->2243 2516->2286 2517->2516 2518->2279 2520 7ff753ab778a 2519->2520 2521 7ff753ab114c _vsnprintf 2520->2521 2527 7ff753ab7803 FreeResource 2520->2527 2528 7ff753ab77b8 FreeResource 2520->2528 2522 7ff753ab77df FindResourceA 2521->2522 2523 7ff753ab7801 2522->2523 2524 7ff753ab775e LoadResource LockResource 2522->2524 2525 7ff753ab8470 7 API calls 2523->2525 2524->2520 2524->2523 2526 7ff753ab782e 2525->2526 2526->2269 2527->2523 2528->2520 2530 7ff753ab5050 7 API calls 2529->2530 2531 7ff753ab4967 LocalAlloc 2530->2531 2532 7ff753ab49a9 2531->2532 2533 7ff753ab4989 2531->2533 2534 7ff753ab5050 7 API calls 2532->2534 2535 7ff753ab4dcc 24 API calls 2533->2535 2537 7ff753ab49bb 2534->2537 2536 7ff753ab49a7 2535->2536 2536->2286 2538 7ff753ab49bf 2537->2538 2539 7ff753ab49d5 lstrcmpA 2537->2539 2541 7ff753ab4dcc 24 API calls 2538->2541 2539->2538 2540 7ff753ab4a0e LocalFree 2539->2540 2540->2536 2541->2540 2543 7ff753ab5109 LocalAlloc 2542->2543 2544 7ff753ab509b 2542->2544 2543->2324 2543->2325 2544->2543 2545 7ff753ab50a4 FindResourceA LoadResource LockResource 2544->2545 2545->2543 2546 7ff753ab50e3 memcpy_s FreeResource 2545->2546 2546->2543 2547->2340 2549 7ff753ab6516 2548->2549 2552 7ff753ab65dd 2548->2552 2579 7ff753ab63b8 2549->2579 2551 7ff753ab6688 2555 7ff753ab8470 7 API calls 2551->2555 2590 7ff753ab6b70 2552->2590 2559 7ff753ab66a8 2555->2559 2557 7ff753ab6577 GetSystemInfo 2570 7ff753ab6591 2557->2570 2558 7ff753ab65cc 2564 7ff753ab7ba8 CharPrevA 2558->2564 2559->2373 2573 7ff753ab2468 GetWindowsDirectoryA 2559->2573 2560 7ff753ab6649 2560->2551 2565 7ff753ab6ca4 38 API calls 2560->2565 2561 7ff753ab662a CreateDirectoryA 2562 7ff753ab663f 2561->2562 2563 7ff753ab667d 2561->2563 2562->2560 2602 7ff753ab7700 GetLastError 2563->2602 2564->2552 2568 7ff753ab665a 2565->2568 2567 7ff753ab7ba8 CharPrevA 2567->2558 2568->2551 2571 7ff753ab6666 RemoveDirectoryA 2568->2571 2569 7ff753ab6682 2569->2551 2570->2558 2570->2567 2571->2551 2572->2370 2574 7ff753ab24a6 2573->2574 2575 7ff753ab24c4 2573->2575 2576 7ff753ab4dcc 24 API calls 2574->2576 2577 7ff753ab8470 7 API calls 2575->2577 2576->2575 2578 7ff753ab24df 2577->2578 2578->2385 2578->2392 2581 7ff753ab63e3 2579->2581 2580 7ff753ab114c _vsnprintf 2580->2581 2581->2580 2582 7ff753ab7ba8 CharPrevA 2581->2582 2585 7ff753ab644b GetTempFileNameA 2581->2585 2583 7ff753ab6420 RemoveDirectoryA GetFileAttributesA 2582->2583 2583->2581 2584 7ff753ab64b6 CreateDirectoryA 2583->2584 2584->2585 2586 7ff753ab6490 2584->2586 2585->2586 2587 7ff753ab646b DeleteFileA CreateDirectoryA 2585->2587 2588 7ff753ab8470 7 API calls 2586->2588 2587->2586 2589 7ff753ab64a2 2588->2589 2589->2551 2589->2557 2589->2558 2591 7ff753ab6b8b 2590->2591 2591->2591 2592 7ff753ab6b94 LocalAlloc 2591->2592 2593 7ff753ab6bf5 2592->2593 2594 7ff753ab6bb4 2592->2594 2597 7ff753ab7ba8 CharPrevA 2593->2597 2595 7ff753ab4dcc 24 API calls 2594->2595 2601 7ff753ab6bd2 2595->2601 2598 7ff753ab6c14 CreateFileA LocalFree 2597->2598 2599 7ff753ab6c61 CloseHandle GetFileAttributesA 2598->2599 2598->2601 2599->2601 2600 7ff753ab6626 2600->2560 2600->2561 2601->2600 2603 7ff753ab7700 GetLastError 2601->2603 2602->2569 2603->2600 2604->2428 2605->2421 2607 7ff753ab2562 2606->2607 2608 7ff753ab2525 2606->2608 2609 7ff753ab2567 2607->2609 2612 7ff753ab25ab 2607->2612 2610 7ff753ab114c _vsnprintf 2608->2610 2611 7ff753ab114c _vsnprintf 2609->2611 2614 7ff753ab253d 2610->2614 2617 7ff753ab257f 2611->2617 2613 7ff753ab255d 2612->2613 2618 7ff753ab114c _vsnprintf 2612->2618 2615 7ff753ab8470 7 API calls 2613->2615 2616 7ff753ab4dcc 24 API calls 2614->2616 2619 7ff753ab2609 2615->2619 2616->2613 2620 7ff753ab4dcc 24 API calls 2617->2620 2621 7ff753ab25c7 2618->2621 2619->2419 2620->2613 2622 7ff753ab4dcc 24 API calls 2621->2622 2622->2613 2623->2414 2625 7ff753ab5ced 2624->2625 2635 7ff753ab5d62 2624->2635 2626 7ff753ab5380 29 API calls 2625->2626 2628 7ff753ab5d04 2626->2628 2627 7ff753ab8470 7 API calls 2629 7ff753ab5d78 2627->2629 2630 7ff753ab5d0d #21 2628->2630 2628->2635 2629->2439 2629->2440 2631 7ff753ab5d28 2630->2631 2630->2635 2632 7ff753ab5770 FindCloseChangeNotification 2631->2632 2631->2635 2633 7ff753ab5d4a 2632->2633 2634 7ff753ab5d4f #23 2633->2634 2633->2635 2634->2635 2635->2627 2637 7ff753ab16d3 2636->2637 2728 7ff753ab15e8 2637->2728 2640 7ff753ab7ba8 CharPrevA 2642 7ff753ab1766 2640->2642 2736 7ff753ab7d68 2642->2736 2644 7ff753ab181a CompareStringA 2645 7ff753ab1a1b 2644->2645 2646 7ff753ab184d GetFileAttributesA 2644->2646 2647 7ff753ab7d68 2 API calls 2645->2647 2648 7ff753ab19f3 2646->2648 2649 7ff753ab1867 2646->2649 2650 7ff753ab1a28 2647->2650 2656 7ff753ab4dcc 24 API calls 2648->2656 2649->2648 2654 7ff753ab15e8 2 API calls 2649->2654 2651 7ff753ab1a31 CompareStringA 2650->2651 2652 7ff753ab1acb LocalAlloc 2650->2652 2651->2652 2653 7ff753ab1a60 LocalAlloc 2651->2653 2652->2648 2655 7ff753ab1aeb GetFileAttributesA 2652->2655 2653->2648 2669 7ff753ab1ab2 2653->2669 2657 7ff753ab188b 2654->2657 2661 7ff753ab1b01 2655->2661 2673 7ff753ab194f 2656->2673 2658 7ff753ab18b5 LocalAlloc 2657->2658 2662 7ff753ab15e8 2 API calls 2657->2662 2658->2648 2663 7ff753ab18d7 GetPrivateProfileIntA GetPrivateProfileStringA 2658->2663 2659 7ff753ab1bd1 2660 7ff753ab8470 7 API calls 2659->2660 2664 7ff753ab1be9 2660->2664 2674 7ff753ab1b54 2661->2674 2662->2658 2666 7ff753ab1984 2663->2666 2663->2673 2664->2472 2667 7ff753ab1995 GetShortPathNameA 2666->2667 2668 7ff753ab19ba 2666->2668 2667->2668 2672 7ff753ab114c _vsnprintf 2668->2672 2671 7ff753ab114c _vsnprintf 2669->2671 2671->2673 2672->2673 2673->2659 2741 7ff753ab2a6c 2674->2741 2676 7ff753ab2019 2675->2676 2677 7ff753ab1dce 2675->2677 2678 7ff753ab8470 7 API calls 2676->2678 2680 7ff753ab114c _vsnprintf 2677->2680 2682 7ff753ab1e25 2677->2682 2679 7ff753ab2028 2678->2679 2679->2472 2681 7ff753ab1dee RegQueryValueExA 2680->2681 2681->2677 2681->2682 2683 7ff753ab1e46 GetSystemDirectoryA 2682->2683 2684 7ff753ab1e29 RegCloseKey 2682->2684 2685 7ff753ab7ba8 CharPrevA 2683->2685 2684->2676 2686 7ff753ab1e6a LoadLibraryA 2685->2686 2687 7ff753ab1f55 GetModuleFileNameA 2686->2687 2688 7ff753ab1e86 GetProcAddress FreeLibrary 2686->2688 2689 7ff753ab1f78 RegCloseKey 2687->2689 2693 7ff753ab1ee8 2687->2693 2688->2687 2690 7ff753ab1ebe GetSystemDirectoryA 2688->2690 2689->2676 2691 7ff753ab1ed5 2690->2691 2690->2693 2692 7ff753ab7ba8 CharPrevA 2691->2692 2692->2693 2693->2693 2694 7ff753ab1f11 LocalAlloc 2693->2694 2695 7ff753ab1f35 2694->2695 2696 7ff753ab1f8e 2694->2696 2697 7ff753ab4dcc 24 API calls 2695->2697 2698 7ff753ab114c _vsnprintf 2696->2698 2699 7ff753ab1f53 2697->2699 2700 7ff753ab1fc4 2698->2700 2699->2689 2700->2700 2701 7ff753ab1fcd RegSetValueExA RegCloseKey LocalFree 2700->2701 2701->2676 2703 7ff753ab47c2 WaitForSingleObject GetExitCodeProcess 2702->2703 2704 7ff753ab48b3 2702->2704 2708 7ff753ab47f9 2703->2708 2768 7ff753ab7700 GetLastError 2704->2768 2706 7ff753ab48b8 GetLastError FormatMessageA 2709 7ff753ab4dcc 24 API calls 2706->2709 2707 7ff753ab482a CloseHandle CloseHandle 2712 7ff753ab48aa 2707->2712 2713 7ff753ab491c 2707->2713 2708->2707 2711 7ff753ab2318 18 API calls 2708->2711 2709->2713 2715 7ff753ab484d 2711->2715 2712->2713 2714 7ff753ab8470 7 API calls 2713->2714 2716 7ff753ab492f 2714->2716 2715->2707 2716->2472 2718 7ff753ab7a25 2717->2718 2719 7ff753ab7ba8 CharPrevA 2718->2719 2720 7ff753ab7a63 GetFileAttributesA 2719->2720 2721 7ff753ab7a96 LoadLibraryA 2720->2721 2722 7ff753ab7a79 2720->2722 2724 7ff753ab7aa9 2721->2724 2722->2721 2723 7ff753ab7a7d LoadLibraryExA 2722->2723 2723->2724 2725 7ff753ab8470 7 API calls 2724->2725 2726 7ff753ab7ab9 2725->2726 2726->2496 2727->2459 2729 7ff753ab1609 2728->2729 2731 7ff753ab1621 2729->2731 2732 7ff753ab1651 2729->2732 2754 7ff753ab7ce8 2729->2754 2733 7ff753ab7ce8 2 API calls 2731->2733 2732->2640 2732->2642 2734 7ff753ab162f 2733->2734 2734->2732 2735 7ff753ab7ce8 2 API calls 2734->2735 2735->2734 2737 7ff753ab1811 2736->2737 2738 7ff753ab7d88 2736->2738 2737->2644 2737->2645 2739 7ff753ab7d90 IsDBCSLeadByte 2738->2739 2740 7ff753ab7db6 CharNextA 2738->2740 2739->2738 2740->2737 2740->2738 2742 7ff753ab2aa0 GetModuleFileNameA 2741->2742 2743 7ff753ab2c24 2741->2743 2742->2743 2744 7ff753ab2ac8 2742->2744 2745 7ff753ab8470 7 API calls 2743->2745 2746 7ff753ab2acc IsDBCSLeadByte 2744->2746 2748 7ff753ab2af1 CharNextA CharUpperA 2744->2748 2749 7ff753ab2bf6 CharNextA 2744->2749 2750 7ff753ab2c08 CharNextA 2744->2750 2753 7ff753ab2b36 CharPrevA 2744->2753 2759 7ff753ab7c40 2744->2759 2747 7ff753ab2c37 2745->2747 2746->2744 2747->2659 2748->2744 2751 7ff753ab2b9b CharUpperA 2748->2751 2749->2750 2750->2743 2750->2746 2751->2744 2753->2744 2757 7ff753ab7d00 2754->2757 2755 7ff753ab7d47 2755->2729 2756 7ff753ab7d0a IsDBCSLeadByte 2756->2755 2756->2757 2757->2755 2757->2756 2758 7ff753ab7d30 CharNextA 2757->2758 2758->2757 2760 7ff753ab7c58 2759->2760 2760->2760 2761 7ff753ab7c61 CharPrevA 2760->2761 2762 7ff753ab7c7d CharPrevA 2761->2762 2763 7ff753ab7c94 2762->2763 2764 7ff753ab7c75 2762->2764 2765 7ff753ab7cb5 CharNextA 2763->2765 2766 7ff753ab7c9e CharPrevA 2763->2766 2767 7ff753ab7cc7 2763->2767 2764->2762 2764->2763 2765->2767 2766->2765 2766->2767 2767->2744 2768->2706 2769->2516 2771 7ff753ab2281 2770->2771 2772 7ff753ab22eb 2770->2772 2773 7ff753ab7ba8 CharPrevA 2771->2773 2774 7ff753ab8470 7 API calls 2772->2774 2775 7ff753ab2294 WritePrivateProfileStringA _lopen 2773->2775 2776 7ff753ab22fd 2774->2776 2775->2772 2777 7ff753ab22c7 _llseek _lclose 2775->2777 2776->2308 2777->2772 2885 7ff753ab81b0 __getmainargs 2886 7ff753ab8b30 _XcptFilter 2156 7ff753ab58b0 2157 7ff753ab5904 2156->2157 2158 7ff753ab58ee 2156->2158 2159 7ff753ab58fc 2157->2159 2162 7ff753ab5a29 2157->2162 2165 7ff753ab591a 2157->2165 2158->2159 2160 7ff753ab5770 FindCloseChangeNotification 2158->2160 2161 7ff753ab8470 7 API calls 2159->2161 2160->2159 2163 7ff753ab5af4 2161->2163 2164 7ff753ab5a35 SetDlgItemTextA 2162->2164 2166 7ff753ab5a4a 2162->2166 2164->2166 2165->2159 2167 7ff753ab5982 DosDateTimeToFileTime 2165->2167 2166->2159 2184 7ff753ab51bc GetFileAttributesA 2166->2184 2167->2159 2169 7ff753ab59a3 LocalFileTimeToFileTime 2167->2169 2169->2159 2171 7ff753ab59c1 SetFileTime 2169->2171 2171->2159 2172 7ff753ab59e9 2171->2172 2181 7ff753ab5770 2172->2181 2177 7ff753ab5ac1 2203 7ff753ab527c LocalAlloc 2177->2203 2179 7ff753ab5acb 2179->2159 2182 7ff753ab57a4 FindCloseChangeNotification 2181->2182 2183 7ff753ab578f SetFileAttributesA 2181->2183 2182->2183 2183->2159 2185 7ff753ab525f 2184->2185 2187 7ff753ab51de 2184->2187 2185->2159 2191 7ff753ab5380 2185->2191 2186 7ff753ab5246 SetFileAttributesA 2186->2185 2187->2185 2187->2186 2188 7ff753ab7ac8 28 API calls 2187->2188 2189 7ff753ab5228 2188->2189 2189->2185 2189->2186 2190 7ff753ab523c 2189->2190 2190->2186 2192 7ff753ab53b3 2191->2192 2193 7ff753ab53d0 2192->2193 2194 7ff753ab53fd lstrcmpA 2192->2194 2196 7ff753ab4dcc 24 API calls 2193->2196 2195 7ff753ab53f4 2194->2195 2197 7ff753ab5454 2194->2197 2195->2159 2195->2177 2196->2195 2197->2195 2198 7ff753ab54a8 CreateFileA 2197->2198 2198->2195 2200 7ff753ab54de 2198->2200 2199 7ff753ab5561 CreateFileA 2199->2195 2200->2195 2200->2199 2201 7ff753ab5549 CharNextA 2200->2201 2202 7ff753ab5532 CreateDirectoryA 2200->2202 2201->2200 2202->2201 2204 7ff753ab52d4 LocalAlloc 2203->2204 2205 7ff753ab52aa 2203->2205 2207 7ff753ab52cd 2204->2207 2209 7ff753ab5300 2204->2209 2206 7ff753ab4dcc 24 API calls 2205->2206 2206->2207 2207->2179 2210 7ff753ab4dcc 24 API calls 2209->2210 2211 7ff753ab5323 LocalFree 2210->2211 2211->2207 2887 7ff753ab78b0 2888 7ff753ab78fd 2887->2888 2889 7ff753ab7ba8 CharPrevA 2888->2889 2890 7ff753ab7935 CreateFileA 2889->2890 2891 7ff753ab797e WriteFile 2890->2891 2892 7ff753ab7970 2890->2892 2893 7ff753ab79a2 CloseHandle 2891->2893 2895 7ff753ab8470 7 API calls 2892->2895 2893->2892 2896 7ff753ab79d5 2895->2896 2897 7ff753ab33f0 2898 7ff753ab34ec 2897->2898 2899 7ff753ab3402 2897->2899 2901 7ff753ab34e5 2898->2901 2902 7ff753ab34f5 SendDlgItemMessageA 2898->2902 2900 7ff753ab340f 2899->2900 2903 7ff753ab3441 GetDesktopWindow 2899->2903 2900->2901 2904 7ff753ab3430 EndDialog 2900->2904 2902->2901 2905 7ff753ab4c68 14 API calls 2903->2905 2904->2901 2906 7ff753ab3458 6 API calls 2905->2906 2906->2901 2907 7ff753ab4a30 2908 7ff753ab4a50 2907->2908 2909 7ff753ab4a39 SendMessageA 2907->2909 2909->2908 2910 7ff753ab3530 2911 7ff753ab3802 EndDialog 2910->2911 2912 7ff753ab3557 2910->2912 2916 7ff753ab356b 2911->2916 2913 7ff753ab3567 2912->2913 2914 7ff753ab377e GetDesktopWindow 2912->2914 2913->2916 2917 7ff753ab3635 GetDlgItemTextA 2913->2917 2918 7ff753ab357b 2913->2918 2915 7ff753ab4c68 14 API calls 2914->2915 2919 7ff753ab3795 SetWindowTextA SendDlgItemMessageA 2915->2919 2923 7ff753ab365e 2917->2923 2927 7ff753ab36e9 2917->2927 2921 7ff753ab3584 2918->2921 2922 7ff753ab3618 EndDialog 2918->2922 2919->2916 2920 7ff753ab37d8 GetDlgItem EnableWindow 2919->2920 2920->2916 2921->2916 2924 7ff753ab3591 LoadStringA 2921->2924 2922->2916 2923->2927 2930 7ff753ab3694 GetFileAttributesA 2923->2930 2925 7ff753ab35bd 2924->2925 2926 7ff753ab35de 2924->2926 2931 7ff753ab4dcc 24 API calls 2925->2931 2947 7ff753ab4a60 LoadLibraryA 2926->2947 2929 7ff753ab4dcc 24 API calls 2927->2929 2929->2916 2933 7ff753ab36fa 2930->2933 2934 7ff753ab36a8 2930->2934 2946 7ff753ab35d7 2931->2946 2938 7ff753ab7ba8 CharPrevA 2933->2938 2936 7ff753ab4dcc 24 API calls 2934->2936 2935 7ff753ab35eb SetDlgItemTextA 2935->2916 2935->2925 2939 7ff753ab36cb 2936->2939 2937 7ff753ab374b EndDialog 2937->2916 2940 7ff753ab370e 2938->2940 2939->2916 2941 7ff753ab36d4 CreateDirectoryA 2939->2941 2942 7ff753ab6b70 31 API calls 2940->2942 2941->2927 2941->2933 2943 7ff753ab3716 2942->2943 2943->2927 2944 7ff753ab3721 2943->2944 2945 7ff753ab6ca4 38 API calls 2944->2945 2944->2946 2945->2946 2946->2916 2946->2937 2948 7ff753ab4c20 2947->2948 2949 7ff753ab4aa0 GetProcAddress 2947->2949 2953 7ff753ab4dcc 24 API calls 2948->2953 2950 7ff753ab4ac2 GetProcAddress 2949->2950 2951 7ff753ab4c0a FreeLibrary 2949->2951 2950->2951 2952 7ff753ab4ae2 GetProcAddress 2950->2952 2951->2948 2952->2951 2954 7ff753ab4b04 2952->2954 2955 7ff753ab35e3 2953->2955 2956 7ff753ab4b13 GetTempPathA 2954->2956 2961 7ff753ab4b65 2954->2961 2955->2916 2955->2935 2957 7ff753ab4b2b 2956->2957 2957->2957 2958 7ff753ab4b34 CharPrevA 2957->2958 2959 7ff753ab4b4e CharPrevA 2958->2959 2958->2961 2959->2961 2960 7ff753ab4bee FreeLibrary 2960->2955 2961->2960 2962 7ff753ab5870 GlobalAlloc 1955 7ff753ab2f22 GetLastError 1956 7ff753ab2f35 1955->1956 1957 7ff753ab2fa3 1955->1957 1958 7ff753ab2f62 1956->1958 1959 7ff753ab2f4a 1956->1959 1963 7ff753ab2fb5 1957->1963 1964 7ff753ab2fc4 1957->1964 1961 7ff753ab4dcc 24 API calls 1958->1961 1984 7ff753ab4dcc 1959->1984 1962 7ff753ab2f60 1961->1962 1962->1957 1965 7ff753ab2f81 CloseHandle 1962->1965 1971 7ff753ab4dcc 24 API calls 1963->1971 1966 7ff753ab2fcd 1964->1966 1967 7ff753ab2fde FindResourceA 1964->1967 1965->1957 1972 7ff753ab2fd9 1965->1972 2013 7ff753ab204c 1966->2013 1969 7ff753ab2fff LoadResource 1967->1969 1970 7ff753ab3014 1967->1970 1969->1970 1973 7ff753ab3029 1970->1973 1974 7ff753ab301d #17 1970->1974 1971->1972 2070 7ff753ab8470 1972->2070 1973->1972 1975 7ff753ab303a 1973->1975 1974->1973 2028 7ff753ab3bf4 GetVersionExA 1975->2028 1985 7ff753ab5024 1984->1985 1986 7ff753ab4e49 LoadStringA 1984->1986 1987 7ff753ab8470 7 API calls 1985->1987 1988 7ff753ab4eb5 1986->1988 1989 7ff753ab4e73 1986->1989 1990 7ff753ab5035 1987->1990 1991 7ff753ab4f31 1988->1991 1998 7ff753ab4ec1 LocalAlloc 1988->1998 2078 7ff753ab7f04 1989->2078 1990->1962 1995 7ff753ab4f44 LocalAlloc 1991->1995 1996 7ff753ab4f8e LocalAlloc 1991->1996 1994 7ff753ab4e81 MessageBoxA 1994->1985 1995->1985 2002 7ff753ab4f79 1995->2002 1996->1985 2008 7ff753ab4f2c 1996->2008 1998->1985 2004 7ff753ab4f14 1998->2004 2005 7ff753ab114c _vsnprintf 2002->2005 2003 7ff753ab4fbc MessageBeep 2006 7ff753ab7f04 13 API calls 2003->2006 2093 7ff753ab114c 2004->2093 2005->2008 2010 7ff753ab4fd3 2006->2010 2008->2003 2009 7ff753ab4fdc MessageBoxA LocalFree 2009->1985 2010->2009 2012 7ff753ab7e34 2 API calls 2010->2012 2012->2009 2014 7ff753ab2213 2013->2014 2017 7ff753ab2086 2013->2017 2015 7ff753ab8470 7 API calls 2014->2015 2016 7ff753ab2222 2015->2016 2016->1972 2018 7ff753ab20dc FindFirstFileA 2017->2018 2018->2014 2026 7ff753ab20fe 2018->2026 2019 7ff753ab21a3 2023 7ff753ab21b4 SetFileAttributesA DeleteFileA 2019->2023 2020 7ff753ab2138 lstrcmpA 2021 7ff753ab21d9 FindNextFileA 2020->2021 2022 7ff753ab2158 lstrcmpA 2020->2022 2024 7ff753ab21f5 FindClose RemoveDirectoryA 2021->2024 2021->2026 2022->2021 2022->2026 2023->2021 2024->2014 2026->2019 2026->2020 2026->2021 2027 7ff753ab204c 8 API calls 2026->2027 2096 7ff753ab7ba8 2026->2096 2027->2026 2033 7ff753ab3c59 2028->2033 2034 7ff753ab3c4f 2028->2034 2029 7ff753ab4dcc 24 API calls 2030 7ff753ab3f05 2029->2030 2031 7ff753ab8470 7 API calls 2030->2031 2032 7ff753ab3042 2031->2032 2032->1972 2043 7ff753ab12ec 2032->2043 2033->2030 2033->2034 2036 7ff753ab3db1 2033->2036 2100 7ff753ab2834 2033->2100 2034->2029 2034->2030 2036->2030 2036->2034 2037 7ff753ab3eb7 MessageBeep 2036->2037 2038 7ff753ab7f04 13 API calls 2037->2038 2039 7ff753ab3eca 2038->2039 2040 7ff753ab3ed3 MessageBoxA 2039->2040 2041 7ff753ab7e34 2 API calls 2039->2041 2040->2030 2041->2040 2044 7ff753ab133c 2043->2044 2049 7ff753ab14b5 2043->2049 2132 7ff753ab11cc LoadLibraryA 2044->2132 2046 7ff753ab8470 7 API calls 2048 7ff753ab14da 2046->2048 2048->1972 2062 7ff753ab7ac8 FindResourceA 2048->2062 2049->2046 2050 7ff753ab134d GetCurrentProcess OpenProcessToken 2050->2049 2051 7ff753ab1377 GetTokenInformation 2050->2051 2052 7ff753ab14a0 CloseHandle 2051->2052 2053 7ff753ab13a0 GetLastError 2051->2053 2052->2049 2053->2052 2054 7ff753ab13b5 LocalAlloc 2053->2054 2054->2052 2055 7ff753ab13d2 GetTokenInformation 2054->2055 2056 7ff753ab1491 LocalFree 2055->2056 2057 7ff753ab13fc AllocateAndInitializeSid 2055->2057 2056->2052 2057->2056 2058 7ff753ab1445 2057->2058 2059 7ff753ab1481 FreeSid 2058->2059 2060 7ff753ab1452 EqualSid 2058->2060 2061 7ff753ab1476 2058->2061 2059->2056 2060->2058 2060->2061 2061->2059 2063 7ff753ab7b63 2062->2063 2064 7ff753ab7b03 LoadResource 2062->2064 2065 7ff753ab4dcc 24 API calls 2063->2065 2064->2063 2067 7ff753ab7b1d DialogBoxIndirectParamA FreeResource 2064->2067 2066 7ff753ab7b82 2065->2066 2068 7ff753ab309b 2066->2068 2067->2063 2067->2068 2068->1972 2071 7ff753ab8479 2070->2071 2072 7ff753ab30d0 2071->2072 2073 7ff753ab84d0 RtlCaptureContext RtlLookupFunctionEntry 2071->2073 2074 7ff753ab8515 RtlVirtualUnwind 2073->2074 2075 7ff753ab8557 2073->2075 2074->2075 2141 7ff753ab8494 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2075->2141 2079 7ff753ab7f44 GetVersionExA 2078->2079 2080 7ff753ab8076 2078->2080 2079->2080 2081 7ff753ab7f6d 2079->2081 2082 7ff753ab8470 7 API calls 2080->2082 2081->2080 2084 7ff753ab7f90 GetSystemMetrics 2081->2084 2083 7ff753ab4e78 2082->2083 2083->1994 2089 7ff753ab7e34 2083->2089 2084->2080 2085 7ff753ab7fa7 RegOpenKeyExA 2084->2085 2085->2080 2086 7ff753ab7fdc RegQueryValueExA RegCloseKey 2085->2086 2086->2080 2088 7ff753ab8026 2086->2088 2087 7ff753ab8065 CharNextA 2087->2088 2088->2080 2088->2087 2090 7ff753ab7e5a EnumResourceLanguagesA 2089->2090 2091 7ff753ab7edd 2089->2091 2090->2091 2092 7ff753ab7e9f EnumResourceLanguagesA 2090->2092 2091->1994 2092->2091 2094 7ff753ab1178 _vsnprintf 2093->2094 2095 7ff753ab1199 2093->2095 2094->2095 2095->2008 2097 7ff753ab7bc8 2096->2097 2097->2097 2098 7ff753ab7bda 2097->2098 2099 7ff753ab7bec CharPrevA 2097->2099 2098->2026 2099->2098 2101 7ff753ab2a2f 2100->2101 2109 7ff753ab2872 2100->2109 2102 7ff753ab2a41 GlobalFree 2101->2102 2103 7ff753ab2a50 2101->2103 2102->2103 2103->2036 2105 7ff753ab28a5 GetFileVersionInfoSizeA 2106 7ff753ab28c2 GlobalAlloc 2105->2106 2105->2109 2106->2101 2107 7ff753ab28e1 GlobalLock 2106->2107 2107->2101 2108 7ff753ab28fc GetFileVersionInfoA 2107->2108 2108->2109 2110 7ff753ab2920 VerQueryValueA 2108->2110 2109->2101 2109->2105 2111 7ff753ab29ed GlobalUnlock 2109->2111 2112 7ff753ab29d9 GlobalUnlock 2109->2112 2113 7ff753ab261c 2109->2113 2110->2109 2110->2111 2111->2109 2112->2101 2114 7ff753ab27e0 GetSystemDirectoryA 2113->2114 2115 7ff753ab265b CharUpperA CharNextA CharNextA 2113->2115 2116 7ff753ab27f1 2114->2116 2117 7ff753ab27dd 2115->2117 2118 7ff753ab269c 2115->2118 2120 7ff753ab2805 2116->2120 2121 7ff753ab7ba8 CharPrevA 2116->2121 2117->2114 2119 7ff753ab27c7 GetWindowsDirectoryA 2118->2119 2123 7ff753ab26a6 2118->2123 2119->2116 2122 7ff753ab8470 7 API calls 2120->2122 2121->2120 2124 7ff753ab2814 2122->2124 2125 7ff753ab7ba8 CharPrevA 2123->2125 2124->2109 2126 7ff753ab2705 RegOpenKeyExA 2125->2126 2126->2116 2127 7ff753ab2738 RegQueryValueExA 2126->2127 2128 7ff753ab27b4 RegCloseKey 2127->2128 2129 7ff753ab276b 2127->2129 2128->2116 2130 7ff753ab2774 ExpandEnvironmentStringsA 2129->2130 2131 7ff753ab2792 2129->2131 2130->2131 2131->2128 2133 7ff753ab1221 GetProcAddress 2132->2133 2134 7ff753ab12bb 2132->2134 2135 7ff753ab123f AllocateAndInitializeSid 2133->2135 2136 7ff753ab12ac FreeLibrary 2133->2136 2137 7ff753ab8470 7 API calls 2134->2137 2135->2136 2138 7ff753ab1288 FreeSid 2135->2138 2136->2134 2139 7ff753ab12ca 2137->2139 2138->2136 2139->2049 2139->2050 2963 7ff753ab33a0 2964 7ff753ab33bb CallWindowProcA 2963->2964 2965 7ff753ab33ac 2963->2965 2966 7ff753ab33b7 2964->2966 2965->2964 2965->2966 2967 7ff753ab55e0 2968 7ff753ab5641 ReadFile 2967->2968 2969 7ff753ab560d 2967->2969 2968->2969 2970 7ff753ab57e0 2972 7ff753ab57fc 2970->2972 2973 7ff753ab581e 2970->2973 2971 7ff753ab583d SetFilePointer 2971->2972 2973->2971 2973->2972 2974 7ff753ab8258 2975 7ff753ab8277 Sleep 2974->2975 2977 7ff753ab824b 2974->2977 2975->2977 2976 7ff753ab83f8 _ismbblead 2976->2977 2977->2976 2978 7ff753ab8417 2979 7ff753ab842f 2978->2979 2980 7ff753ab8426 _exit 2978->2980 2981 7ff753ab8444 2979->2981 2982 7ff753ab8438 _cexit 2979->2982 2980->2979 2982->2981

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_00007FF753AB88D0 55 Function_00007FF753AB8930 0->55 77 Function_00007FF753AB8880 0->77 1 Function_00007FF753AB80D0 66 Function_00007FF753AB8818 1->66 85 Function_00007FF753AB8870 1->85 2 Function_00007FF753AB7AC8 6 Function_00007FF753AB4DCC 2->6 3 Function_00007FF753AB2ECD 3->2 3->6 34 Function_00007FF753AB3BF4 3->34 37 Function_00007FF753AB12EC 3->37 46 Function_00007FF753AB5050 3->46 47 Function_00007FF753AB204C 3->47 84 Function_00007FF753AB8470 3->84 4 Function_00007FF753AB86CE 75 Function_00007FF753AB8494 4->75 5 Function_00007FF753AB11CC 5->84 23 Function_00007FF753AB1008 6->23 30 Function_00007FF753AB7F04 6->30 48 Function_00007FF753AB114C 6->48 59 Function_00007FF753AB7E34 6->59 6->84 7 Function_00007FF753AB40C4 7->6 16 Function_00007FF753AB7BA8 7->16 27 Function_00007FF753AB7700 7->27 32 Function_00007FF753AB79F0 7->32 7->46 7->48 54 Function_00007FF753AB473C 7->54 61 Function_00007FF753AB1D28 7->61 80 Function_00007FF753AB1684 7->80 7->84 8 Function_00007FF753AB66C4 8->2 8->6 8->16 19 Function_00007FF753AB6CA4 8->19 8->27 42 Function_00007FF753AB64E4 8->42 8->46 8->84 92 Function_00007FF753AB2468 8->92 9 Function_00007FF753AB83B8 10 Function_00007FF753AB63B8 10->16 10->23 10->48 10->84 11 Function_00007FF753AB87BC 12 Function_00007FF753AB51BC 12->2 13 Function_00007FF753AB81B0 14 Function_00007FF753AB58B0 14->12 63 Function_00007FF753AB512C 14->63 68 Function_00007FF753AB5B18 14->68 78 Function_00007FF753AB5380 14->78 83 Function_00007FF753AB527C 14->83 14->84 86 Function_00007FF753AB5770 14->86 15 Function_00007FF753AB78B0 15->16 15->84 81 Function_00007FF753AB1084 16->81 17 Function_00007FF753AB33A0 18 Function_00007FF753AB60A4 18->6 18->27 18->46 19->6 19->27 31 Function_00007FF753AB24F8 19->31 19->84 20 Function_00007FF753AB8A9C 21 Function_00007FF753AB8910 22 Function_00007FF753AB3910 22->6 52 Function_00007FF753AB3B40 22->52 90 Function_00007FF753AB4C68 22->90 24 Function_00007FF753AB1C0C 24->6 24->84 25 Function_00007FF753AB8802 26 Function_00007FF753AB8200 98 Function_00007FF753AB8964 26->98 28 Function_00007FF753AB1500 28->84 28->90 29 Function_00007FF753AB7E00 30->84 31->6 31->48 31->84 32->16 32->84 33 Function_00007FF753AB33F0 33->90 34->6 34->30 34->59 60 Function_00007FF753AB2834 34->60 34->84 35 Function_00007FF753AB15E8 36 Function_00007FF753AB7CE8 35->36 37->5 37->84 38 Function_00007FF753AB30EC 38->2 38->6 38->7 38->8 38->16 38->18 38->19 38->27 43 Function_00007FF753AB5FE4 38->43 49 Function_00007FF753AB494C 38->49 62 Function_00007FF753AB772C 38->62 67 Function_00007FF753AB2318 38->67 73 Function_00007FF753AB5D90 38->73 38->84 89 Function_00007FF753AB3F74 38->89 39 Function_00007FF753AB61EC 39->47 50 Function_00007FF753AB7C40 39->50 39->84 40 Function_00007FF753AB55E0 41 Function_00007FF753AB57E0 42->10 42->16 42->19 42->27 42->84 87 Function_00007FF753AB6B70 42->87 43->6 43->46 43->62 44 Function_00007FF753AB8750 45 Function_00007FF753AB7850 47->16 47->47 47->81 47->84 49->6 49->46 51 Function_00007FF753AB3840 51->90 53 Function_00007FF753AB2244 53->16 53->84 54->6 54->27 54->67 54->84 56 Function_00007FF753AB8B30 57 Function_00007FF753AB4A30 58 Function_00007FF753AB3530 58->6 58->16 58->19 58->87 58->90 96 Function_00007FF753AB4A60 58->96 70 Function_00007FF753AB261C 60->70 61->6 61->16 61->48 61->84 62->48 62->84 63->23 63->81 64 Function_00007FF753AB2F22 64->2 64->6 64->34 64->37 64->47 64->84 65 Function_00007FF753AB7024 66->11 67->53 69 Function_00007FF753AB8417 70->16 70->23 70->84 71 Function_00007FF753AB8790 72 Function_00007FF753AB5690 72->52 73->6 73->46 97 Function_00007FF753AB5C60 73->97 74 Function_00007FF753AB2E96 74->6 74->84 76 Function_00007FF753AB828E 78->6 79 Function_00007FF753AB8685 79->75 80->6 80->16 80->23 80->35 80->48 80->81 80->84 91 Function_00007FF753AB7D68 80->91 93 Function_00007FF753AB2A6C 80->93 82 Function_00007FF753AB2C7B 82->6 82->24 82->38 82->39 82->67 83->6 83->23 84->75 87->6 87->16 87->23 87->27 88 Function_00007FF753AB5870 89->2 89->6 89->27 89->46 90->84 92->6 92->84 93->23 93->50 93->84 94 Function_00007FF753AB8A62 94->20 95 Function_00007FF753AB8B60 96->6 96->23 97->78 97->84 97->86 99 Function_00007FF753AB8258

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 7ff753ab40c4-7ff753ab4116 1 7ff753ab4139-7ff753ab4141 0->1 2 7ff753ab4118-7ff753ab4133 call 7ff753ab5050 0->2 4 7ff753ab4145-7ff753ab4167 memset 1->4 2->1 9 7ff753ab4254-7ff753ab427d call 7ff753ab4dcc 2->9 6 7ff753ab4282-7ff753ab4295 4->6 7 7ff753ab416d-7ff753ab4188 call 7ff753ab5050 4->7 8 7ff753ab4299-7ff753ab42a3 6->8 7->9 18 7ff753ab418e-7ff753ab4194 7->18 12 7ff753ab42a5-7ff753ab42ab 8->12 13 7ff753ab42b7-7ff753ab42c2 8->13 19 7ff753ab44ee 9->19 12->13 16 7ff753ab42ad-7ff753ab42b5 12->16 17 7ff753ab42c5-7ff753ab42c8 13->17 16->8 16->13 20 7ff753ab42ca-7ff753ab42e2 call 7ff753ab5050 17->20 21 7ff753ab4328-7ff753ab433d call 7ff753ab1684 17->21 22 7ff753ab4196-7ff753ab419b 18->22 23 7ff753ab419d-7ff753ab41a0 18->23 28 7ff753ab44f0-7ff753ab451f call 7ff753ab8470 19->28 20->9 38 7ff753ab42e8-7ff753ab42ef 20->38 21->19 35 7ff753ab4343-7ff753ab434a 21->35 24 7ff753ab41b5 22->24 25 7ff753ab41a2-7ff753ab41ab 23->25 26 7ff753ab41ad-7ff753ab41af 23->26 31 7ff753ab41b8-7ff753ab41bb 24->31 25->24 30 7ff753ab41b1 26->30 26->31 30->24 31->17 36 7ff753ab41c1-7ff753ab41cb 31->36 41 7ff753ab436a-7ff753ab436c 35->41 42 7ff753ab434c-7ff753ab4353 35->42 43 7ff753ab4231-7ff753ab4234 36->43 44 7ff753ab41cd-7ff753ab41d0 36->44 39 7ff753ab42f5-7ff753ab4322 CompareStringA 38->39 40 7ff753ab45d8-7ff753ab45df 38->40 39->21 39->40 49 7ff753ab45e5-7ff753ab45ec 40->49 50 7ff753ab472d-7ff753ab472f 40->50 51 7ff753ab4372-7ff753ab4379 41->51 52 7ff753ab4493-7ff753ab449b 41->52 42->41 46 7ff753ab4355-7ff753ab435c 42->46 43->21 45 7ff753ab423a-7ff753ab4252 call 7ff753ab5050 43->45 47 7ff753ab41d2-7ff753ab41d9 44->47 48 7ff753ab41db-7ff753ab41dd 44->48 45->9 45->17 46->41 56 7ff753ab435e-7ff753ab4360 46->56 57 7ff753ab41ea-7ff753ab41fb call 7ff753ab5050 47->57 48->19 58 7ff753ab41e3 48->58 49->50 59 7ff753ab45f2-7ff753ab4621 RegOpenKeyExA 49->59 50->28 60 7ff753ab437f-7ff753ab4381 51->60 61 7ff753ab4599-7ff753ab45d3 call 7ff753ab4dcc LocalFree 51->61 54 7ff753ab44df-7ff753ab44e9 LocalFree 52->54 55 7ff753ab449d-7ff753ab44a4 call 7ff753ab473c 52->55 54->19 69 7ff753ab44a9-7ff753ab44ab 55->69 56->51 65 7ff753ab4362-7ff753ab4365 call 7ff753ab1d28 56->65 57->9 79 7ff753ab41fd-7ff753ab422d CompareStringA 57->79 58->57 59->50 66 7ff753ab4627-7ff753ab4666 RegQueryValueExA 59->66 60->52 68 7ff753ab4387-7ff753ab438e 60->68 61->19 65->41 72 7ff753ab471c-7ff753ab4728 RegCloseKey 66->72 73 7ff753ab466c-7ff753ab469b memset GetSystemDirectoryA 66->73 68->52 75 7ff753ab4394-7ff753ab439f call 7ff753ab79f0 68->75 69->54 76 7ff753ab44ad-7ff753ab44c3 LocalFree 69->76 72->50 77 7ff753ab46b3-7ff753ab46dc call 7ff753ab114c 73->77 78 7ff753ab469d-7ff753ab46ae call 7ff753ab7ba8 73->78 86 7ff753ab43a5-7ff753ab43c1 GetProcAddress 75->86 87 7ff753ab4574-7ff753ab4597 call 7ff753ab4dcc 75->87 76->40 83 7ff753ab44c9-7ff753ab44ce 76->83 88 7ff753ab46e3-7ff753ab46ea 77->88 78->77 79->43 83->4 89 7ff753ab4521-7ff753ab454e call 7ff753ab4dcc FreeLibrary 86->89 90 7ff753ab43c7-7ff753ab4415 86->90 99 7ff753ab4553-7ff753ab456f LocalFree call 7ff753ab7700 87->99 88->88 92 7ff753ab46ec-7ff753ab4717 RegSetValueExA 88->92 89->99 93 7ff753ab441f-7ff753ab4427 90->93 94 7ff753ab4417-7ff753ab441b 90->94 92->72 97 7ff753ab4431-7ff753ab4433 93->97 98 7ff753ab4429-7ff753ab442d 93->98 94->93 102 7ff753ab4435-7ff753ab4439 97->102 103 7ff753ab443d-7ff753ab4445 97->103 98->97 99->19 102->103 105 7ff753ab444f-7ff753ab4451 103->105 106 7ff753ab4447-7ff753ab444b 103->106 107 7ff753ab4453-7ff753ab4457 105->107 108 7ff753ab445b-7ff753ab447e 105->108 106->105 107->108 110 7ff753ab4480-7ff753ab4491 FreeLibrary 108->110 111 7ff753ab44d3-7ff753ab44da FreeLibrary 108->111 110->76 111->54
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Resource$Free$CompareFindLibraryLocalString$AddressLoadLockProcSizeofmemcpy_smemset
                                  • String ID: <None>$ADMQCMD$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$DoInfInstall$POSTRUNPROGRAM$REBOOT$RUNPROGRAM$SHOWWINDOW$Software\Microsoft\Windows\CurrentVersion\RunOnce$USRQCMD$advpack.dll$graft$rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"$wextract_cleanup0
                                  • API String ID: 2679723528-3799551373
                                  • Opcode ID: 47eb29a787de270268fb154fbc2d409703058abd89df6d54f7005b929927f1b1
                                  • Instruction ID: 035a82bcde47881b38e2a2ecd5e24a6cc884488b8e6d9c8c694ec8a50ca8af64
                                  • Opcode Fuzzy Hash: 47eb29a787de270268fb154fbc2d409703058abd89df6d54f7005b929927f1b1
                                  • Instruction Fuzzy Hash: 0B02A471A2864286F7A0AFA0E8609B9B7A6FB55744FC80135FA4D63674DF3CDC54C720

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Close$DirectoryFreeLibraryLocalSystemValuememset$AddressAllocCreateFileLoadModuleNameProcQuery_vsnprintf
                                  • String ID: %s /D:%s$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$DelNodeRunDLL32$Software\Microsoft\Windows\CurrentVersion\RunOnce$advpack.dll$rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"$wextract_cleanup%d$wextract_cleanup0
                                  • API String ID: 178549006-1709460465
                                  • Opcode ID: 276e9805d9b7e1d57039d94b06db834f3dbf8df68e4bbb97ed4dd8757e439085
                                  • Instruction ID: 12bc740cccd4d16a27f3c8d465bcf25e60c1624aaf4601dcb77a5c37df271297
                                  • Opcode Fuzzy Hash: 276e9805d9b7e1d57039d94b06db834f3dbf8df68e4bbb97ed4dd8757e439085
                                  • Instruction Fuzzy Hash: D981E932A28B4186E790AFA0E460AB9F7A6FB89B54FC85135E94D23774DF3CD905C710

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 144 7ff753ab1684-7ff753ab16ce 145 7ff753ab16d3-7ff753ab16dd 144->145 146 7ff753ab16f2-7ff753ab1704 145->146 147 7ff753ab16df-7ff753ab16e5 145->147 149 7ff753ab1706-7ff753ab1711 146->149 150 7ff753ab1713-7ff753ab171a 146->150 147->146 148 7ff753ab16e7-7ff753ab16f0 147->148 148->145 148->146 151 7ff753ab171e-7ff753ab173c call 7ff753ab15e8 149->151 150->151 154 7ff753ab17aa-7ff753ab17c2 151->154 155 7ff753ab173e 151->155 157 7ff753ab17c7-7ff753ab17d1 154->157 156 7ff753ab1741-7ff753ab1748 155->156 156->156 158 7ff753ab174a-7ff753ab174e 156->158 159 7ff753ab17e6-7ff753ab17ff call 7ff753ab7ba8 157->159 160 7ff753ab17d3-7ff753ab17d9 157->160 158->154 162 7ff753ab1750-7ff753ab1757 158->162 164 7ff753ab1804-7ff753ab1814 call 7ff753ab7d68 159->164 160->159 163 7ff753ab17db-7ff753ab17e4 160->163 165 7ff753ab1759-7ff753ab175c 162->165 166 7ff753ab175e-7ff753ab1760 162->166 163->157 163->159 172 7ff753ab181a-7ff753ab1847 CompareStringA 164->172 173 7ff753ab1a1b-7ff753ab1a2b call 7ff753ab7d68 164->173 165->166 168 7ff753ab1766-7ff753ab1776 165->168 166->154 169 7ff753ab1762-7ff753ab1764 166->169 171 7ff753ab177b-7ff753ab1785 168->171 169->154 169->168 174 7ff753ab179a-7ff753ab17a8 171->174 175 7ff753ab1787-7ff753ab178d 171->175 172->173 176 7ff753ab184d-7ff753ab1861 GetFileAttributesA 172->176 182 7ff753ab1a31-7ff753ab1a5e CompareStringA 173->182 183 7ff753ab1acb-7ff753ab1ae9 LocalAlloc 173->183 174->164 175->174 177 7ff753ab178f-7ff753ab1798 175->177 179 7ff753ab19f3-7ff753ab19fb 176->179 180 7ff753ab1867-7ff753ab186f 176->180 177->171 177->174 185 7ff753ab1a00-7ff753ab1a16 call 7ff753ab4dcc 179->185 180->179 184 7ff753ab1875-7ff753ab1891 call 7ff753ab15e8 180->184 182->183 186 7ff753ab1a60-7ff753ab1a67 182->186 188 7ff753ab1aa2-7ff753ab1aad 183->188 189 7ff753ab1aeb-7ff753ab1aff GetFileAttributesA 183->189 198 7ff753ab18b5-7ff753ab18d1 LocalAlloc 184->198 199 7ff753ab1893-7ff753ab18b0 call 7ff753ab15e8 184->199 201 7ff753ab1bda-7ff753ab1c03 call 7ff753ab8470 185->201 191 7ff753ab1a6a-7ff753ab1a71 186->191 188->185 193 7ff753ab1b01-7ff753ab1b03 189->193 194 7ff753ab1b7e-7ff753ab1b88 189->194 191->191 196 7ff753ab1a73 191->196 193->194 200 7ff753ab1b05-7ff753ab1b16 193->200 197 7ff753ab1b8f-7ff753ab1b99 194->197 203 7ff753ab1a78-7ff753ab1a7f 196->203 204 7ff753ab1bae-7ff753ab1bb9 197->204 205 7ff753ab1b9b-7ff753ab1ba1 197->205 198->188 207 7ff753ab18d7-7ff753ab194d GetPrivateProfileIntA GetPrivateProfileStringA 198->207 199->198 208 7ff753ab1b1d-7ff753ab1b27 200->208 203->203 210 7ff753ab1a81-7ff753ab1aa0 LocalAlloc 203->210 212 7ff753ab1bbc-7ff753ab1bcc call 7ff753ab2a6c 204->212 205->204 211 7ff753ab1ba3-7ff753ab1bac 205->211 213 7ff753ab194f-7ff753ab197f call 7ff753ab1008 * 2 207->213 214 7ff753ab1984-7ff753ab1993 207->214 215 7ff753ab1b29-7ff753ab1b2f 208->215 216 7ff753ab1b3c-7ff753ab1b4d 208->216 210->188 221 7ff753ab1ab2-7ff753ab1ac6 call 7ff753ab114c 210->221 211->197 211->204 228 7ff753ab1bd1-7ff753ab1bd5 212->228 213->228 219 7ff753ab1995-7ff753ab19b8 GetShortPathNameA 214->219 220 7ff753ab19ba 214->220 215->216 217 7ff753ab1b31-7ff753ab1b3a 215->217 216->212 218 7ff753ab1b4f-7ff753ab1b52 216->218 217->208 217->216 218->212 225 7ff753ab1b54-7ff753ab1b7c call 7ff753ab1084 * 2 218->225 226 7ff753ab19c1-7ff753ab19ee call 7ff753ab114c 219->226 220->226 221->228 225->212 226->228 228->201
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: String$PrivateProfile$AllocAttributesCompareFileLoadLocalMessageNamePathShort
                                  • String ID: .BAT$.INF$AdvancedINF$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$Command.com /c %s$DefaultInstall$Reboot$Version$rundll32.exe %s,InstallHinfSection %s 128 %s$setupapi.dll$setupx.dll
                                  • API String ID: 383838535-1383298736
                                  • Opcode ID: ffd31459a5765e8bb283d5931304b093724e680e9c960acfeea798f9c59d150d
                                  • Instruction ID: 686209d434571a9888c3bd8e31f6f7d11c3e510afe8825da0d09f435990a0938
                                  • Opcode Fuzzy Hash: ffd31459a5765e8bb283d5931304b093724e680e9c960acfeea798f9c59d150d
                                  • Instruction Fuzzy Hash: AAE10921A2878282EB91AF90D420AF9B7A2FB46744FDC4135EA4D237A5DF3DDD49C310

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 238 7ff753ab66c4-7ff753ab6724 call 7ff753ab5050 LocalAlloc 241 7ff753ab6756-7ff753ab676a call 7ff753ab5050 238->241 242 7ff753ab6726-7ff753ab6749 call 7ff753ab4dcc call 7ff753ab7700 238->242 247 7ff753ab67a5-7ff753ab67ea lstrcmpA LocalFree 241->247 248 7ff753ab676c-7ff753ab67a3 call 7ff753ab4dcc LocalFree 241->248 259 7ff753ab674f-7ff753ab6751 242->259 251 7ff753ab6837-7ff753ab683d 247->251 252 7ff753ab67ec-7ff753ab67ee 247->252 248->259 254 7ff753ab6843-7ff753ab6849 251->254 255 7ff753ab6b14-7ff753ab6b38 call 7ff753ab7ac8 251->255 257 7ff753ab67f0-7ff753ab67f9 252->257 258 7ff753ab67fb 252->258 254->255 260 7ff753ab684f-7ff753ab6870 GetTempPathA 254->260 263 7ff753ab6b3a-7ff753ab6b66 call 7ff753ab8470 255->263 257->258 261 7ff753ab67fe-7ff753ab680e call 7ff753ab64e4 257->261 258->261 259->263 265 7ff753ab6872-7ff753ab687e call 7ff753ab64e4 260->265 266 7ff753ab68ad-7ff753ab68b9 260->266 274 7ff753ab6b0f-7ff753ab6b12 261->274 275 7ff753ab6814-7ff753ab6832 call 7ff753ab4dcc 261->275 273 7ff753ab6883-7ff753ab6885 265->273 272 7ff753ab68bc-7ff753ab68bf 266->272 276 7ff753ab68c4-7ff753ab68ce 272->276 273->274 277 7ff753ab688b-7ff753ab6895 call 7ff753ab2468 273->277 274->263 275->259 279 7ff753ab68e1-7ff753ab68f3 276->279 280 7ff753ab68d0-7ff753ab68d5 276->280 277->266 292 7ff753ab6897-7ff753ab68a7 call 7ff753ab64e4 277->292 281 7ff753ab68f9-7ff753ab690f GetDriveTypeA 279->281 282 7ff753ab6adb-7ff753ab6b04 GetWindowsDirectoryA call 7ff753ab6ca4 279->282 280->279 285 7ff753ab68d7-7ff753ab68df 280->285 286 7ff753ab6911-7ff753ab6914 281->286 287 7ff753ab6916-7ff753ab692a GetFileAttributesA 281->287 282->259 297 7ff753ab6b0a 282->297 285->276 285->279 286->287 290 7ff753ab6930-7ff753ab6933 286->290 287->290 291 7ff753ab69bd-7ff753ab69d0 call 7ff753ab6ca4 287->291 294 7ff753ab6935-7ff753ab693f 290->294 295 7ff753ab69ad 290->295 305 7ff753ab69d2-7ff753ab69de call 7ff753ab2468 291->305 306 7ff753ab69f4-7ff753ab6a00 call 7ff753ab2468 291->306 292->266 292->274 299 7ff753ab69b1-7ff753ab69b8 294->299 300 7ff753ab6941-7ff753ab6953 294->300 295->299 297->272 304 7ff753ab6ad2-7ff753ab6ad5 299->304 300->299 303 7ff753ab6955-7ff753ab6981 GetDiskFreeSpaceA 300->303 303->295 309 7ff753ab6983-7ff753ab69a4 MulDiv 303->309 304->281 304->282 305->295 313 7ff753ab69e0-7ff753ab69f2 call 7ff753ab6ca4 305->313 314 7ff753ab6a02-7ff753ab6a11 GetWindowsDirectoryA 306->314 315 7ff753ab6a16-7ff753ab6a3e call 7ff753ab7ba8 GetFileAttributesA 306->315 309->295 312 7ff753ab69a6-7ff753ab69ab 309->312 312->291 312->295 313->295 313->306 314->315 320 7ff753ab6a40-7ff753ab6a53 CreateDirectoryA 315->320 321 7ff753ab6a55 315->321 322 7ff753ab6a58-7ff753ab6a5a 320->322 321->322 323 7ff753ab6a6d-7ff753ab6a8e SetFileAttributesA 322->323 324 7ff753ab6a5c-7ff753ab6a6b 322->324 325 7ff753ab6a91-7ff753ab6a9b 323->325 324->304 326 7ff753ab6aaf-7ff753ab6acc call 7ff753ab64e4 325->326 327 7ff753ab6a9d-7ff753ab6aa3 325->327 326->274 331 7ff753ab6ace 326->331 327->326 328 7ff753ab6aa5-7ff753ab6aad 327->328 328->325 328->326 331->304
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Resource$Free$AttributesDirectoryFileFindLoadLocal$Windows$AllocCreateDialogDiskDriveErrorIndirectLastLockMessageParamPathSizeofSpaceStringTempTypelstrcmpmemcpy_s
                                  • String ID: <None>$A:\$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$RUNPROGRAM$Z$msdownld.tmp
                                  • API String ID: 3973824516-559629209
                                  • Opcode ID: 85f1494807b11b9472ca5a77044a2211021c84651af99e30d71745d0e0e9563c
                                  • Instruction ID: 08182c8743796688c51070235a07204c700bc5800a0f3d59795e1f882cc15e56
                                  • Opcode Fuzzy Hash: 85f1494807b11b9472ca5a77044a2211021c84651af99e30d71745d0e0e9563c
                                  • Instruction Fuzzy Hash: 60D16832A2868286EB90AB509470A79F7A2FBC5744FD84135FA8D636B5DF3DDC05C710

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 332 7ff753ab6ca4-7ff753ab6d10 GetCurrentDirectoryA SetCurrentDirectoryA 333 7ff753ab6d12-7ff753ab6d3a call 7ff753ab4dcc call 7ff753ab7700 332->333 334 7ff753ab6d3f-7ff753ab6d7a GetDiskFreeSpaceA 332->334 351 7ff753ab6fe9 333->351 336 7ff753ab6d80-7ff753ab6da8 MulDiv 334->336 337 7ff753ab6f63-7ff753ab6fb8 memset call 7ff753ab7700 GetLastError FormatMessageA 334->337 336->337 340 7ff753ab6dae-7ff753ab6de4 GetVolumeInformationA 336->340 346 7ff753ab6fbd-7ff753ab6fe4 call 7ff753ab4dcc SetCurrentDirectoryA 337->346 343 7ff753ab6e45-7ff753ab6e68 SetCurrentDirectoryA 340->343 344 7ff753ab6de6-7ff753ab6e40 memset call 7ff753ab7700 GetLastError FormatMessageA 340->344 348 7ff753ab6e6c-7ff753ab6e73 343->348 344->346 346->351 349 7ff753ab6e75-7ff753ab6e7a 348->349 350 7ff753ab6e86-7ff753ab6e99 348->350 349->350 354 7ff753ab6e7c-7ff753ab6e84 349->354 355 7ff753ab6e9d-7ff753ab6ea0 350->355 357 7ff753ab6feb-7ff753ab701a call 7ff753ab8470 351->357 354->348 354->350 358 7ff753ab6ea2-7ff753ab6eac 355->358 359 7ff753ab6eae-7ff753ab6eb2 355->359 358->355 358->359 362 7ff753ab6eb4-7ff753ab6ed3 call 7ff753ab4dcc 359->362 363 7ff753ab6ed8-7ff753ab6edf 359->363 362->351 365 7ff753ab6ee1-7ff753ab6ee9 363->365 366 7ff753ab6f0e-7ff753ab6f1f 363->366 365->366 368 7ff753ab6eeb-7ff753ab6f0c 365->368 369 7ff753ab6f22-7ff753ab6f2a 366->369 368->369 370 7ff753ab6f46-7ff753ab6f49 369->370 371 7ff753ab6f2c-7ff753ab6f30 369->371 372 7ff753ab6f4f-7ff753ab6f52 370->372 373 7ff753ab6f4b-7ff753ab6f4d 370->373 374 7ff753ab6f32 371->374 372->374 373->374 375 7ff753ab6f54-7ff753ab6f5e 374->375 376 7ff753ab6f34-7ff753ab6f41 call 7ff753ab24f8 374->376 375->357 376->357
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: CurrentDirectory$ErrorLastMessage$DiskFormatFreeInformationLoadSpaceStringVolumememset
                                  • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
                                  • API String ID: 4237285672-1193786559
                                  • Opcode ID: 49cd0adaaefc1983ba8fc555e95bfd9e5a633419e36afff043da1f8bde31fc7d
                                  • Instruction ID: c8b8d9e68abd297f6389851c7318de84d683af2cce1a79991e177e96853b3f6d
                                  • Opcode Fuzzy Hash: 49cd0adaaefc1983ba8fc555e95bfd9e5a633419e36afff043da1f8bde31fc7d
                                  • Instruction Fuzzy Hash: 4DA18636A2874187E790AF60E460A7AFBA6FB89744F884135EA8D53774CF3CD845CB10

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Resource$Find$FreeItemLoadLockShowWindow$MessageSendSizeofmemcpy_s
                                  • String ID: *MEMCAB$CABINET
                                  • API String ID: 1305606123-2642027498
                                  • Opcode ID: 73d02511bd41989529bcd23ff6b0e0c8ec250e42df1f9c8d155ed0afd688ad53
                                  • Instruction ID: 704cda8866ff842ac86e298d9e1460ae7a8664c2466a0b67b4138e53a46cf67c
                                  • Opcode Fuzzy Hash: 73d02511bd41989529bcd23ff6b0e0c8ec250e42df1f9c8d155ed0afd688ad53
                                  • Instruction Fuzzy Hash: 11510B31A28B4286FB90ABA0E864A75F7A6FF89745FC84139E94D16774DF3CD844C720

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 433 7ff753ab30ec-7ff753ab3114 434 7ff753ab3141-7ff753ab3148 call 7ff753ab5fe4 433->434 435 7ff753ab3116-7ff753ab311c 433->435 442 7ff753ab3236 434->442 443 7ff753ab314e-7ff753ab3155 call 7ff753ab66c4 434->443 437 7ff753ab3134-7ff753ab313b call 7ff753ab3f74 435->437 438 7ff753ab311e call 7ff753ab60a4 435->438 437->434 437->442 444 7ff753ab3123-7ff753ab3125 438->444 447 7ff753ab3238-7ff753ab3258 call 7ff753ab8470 442->447 443->442 451 7ff753ab315b-7ff753ab319d GetSystemDirectoryA call 7ff753ab7ba8 LoadLibraryA 443->451 444->442 448 7ff753ab312b-7ff753ab3132 444->448 448->434 448->437 455 7ff753ab319f-7ff753ab31b8 GetProcAddress 451->455 456 7ff753ab31c9-7ff753ab31de FreeLibrary 451->456 455->456 457 7ff753ab31ba-7ff753ab31c3 DecryptFileA 455->457 458 7ff753ab3273-7ff753ab3288 SetCurrentDirectoryA 456->458 459 7ff753ab31e4-7ff753ab31ea 456->459 457->456 460 7ff753ab3291-7ff753ab3297 458->460 461 7ff753ab328a-7ff753ab328f 458->461 459->458 462 7ff753ab31f0-7ff753ab320b GetWindowsDirectoryA 459->462 464 7ff753ab332d-7ff753ab3335 460->464 465 7ff753ab329d-7ff753ab32a4 460->465 463 7ff753ab3212-7ff753ab3230 call 7ff753ab4dcc call 7ff753ab7700 461->463 466 7ff753ab325a-7ff753ab326a call 7ff753ab6ca4 462->466 467 7ff753ab320d 462->467 463->442 469 7ff753ab3349 464->469 470 7ff753ab3337-7ff753ab3339 464->470 471 7ff753ab32a9-7ff753ab32b7 465->471 475 7ff753ab326f-7ff753ab3271 466->475 467->463 474 7ff753ab334b-7ff753ab3359 469->474 470->469 476 7ff753ab333b-7ff753ab3342 call 7ff753ab2318 470->476 471->471 477 7ff753ab32b9-7ff753ab32c0 471->477 482 7ff753ab3376-7ff753ab337d 474->482 483 7ff753ab335b-7ff753ab3361 474->483 475->442 475->458 484 7ff753ab3347 476->484 479 7ff753ab32c2-7ff753ab32c9 477->479 480 7ff753ab32fb call 7ff753ab5d90 477->480 479->480 485 7ff753ab32cb-7ff753ab32f9 call 7ff753ab7ac8 479->485 492 7ff753ab3300 480->492 489 7ff753ab337f-7ff753ab3381 482->489 490 7ff753ab3388-7ff753ab338d 482->490 483->482 488 7ff753ab3363 call 7ff753ab40c4 483->488 484->474 496 7ff753ab3302 485->496 497 7ff753ab3368-7ff753ab336a 488->497 489->490 494 7ff753ab3383 call 7ff753ab494c 489->494 490->447 492->496 494->490 499 7ff753ab3313-7ff753ab3321 call 7ff753ab772c 496->499 500 7ff753ab3304-7ff753ab330e 496->500 497->442 501 7ff753ab3370 497->501 499->442 504 7ff753ab3327 499->504 500->442 501->482 504->464
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: DirectoryLibrary$AddressAllocDecryptFileFreeLoadLocalProcSystemWindows
                                  • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$DecryptFileA$advapi32.dll
                                  • API String ID: 3010855178-3123416969
                                  • Opcode ID: 04ea8a75a86adc0cfe1bdee2eef4eb8fa21ac09284df1ddba3fddf0c9e2e9c59
                                  • Instruction ID: 3761b4221a5ac81b7870b3c56616c9042aceef5b5bf0a0b6f383290ba50a8e2e
                                  • Opcode Fuzzy Hash: 04ea8a75a86adc0cfe1bdee2eef4eb8fa21ac09284df1ddba3fddf0c9e2e9c59
                                  • Instruction Fuzzy Hash: AD713B20E2C68296FBE4BBE0A970A75A696AF95740FCC4135F58D621F1DF3CEC448630

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 505 7ff753ab64e4-7ff753ab6510 506 7ff753ab65df-7ff753ab65ee 505->506 507 7ff753ab6516-7ff753ab651b call 7ff753ab63b8 505->507 509 7ff753ab65f1-7ff753ab65fb 506->509 510 7ff753ab6520-7ff753ab6522 507->510 511 7ff753ab6610-7ff753ab661b 509->511 512 7ff753ab65fd-7ff753ab6603 509->512 513 7ff753ab6688-7ff753ab668a 510->513 514 7ff753ab6528-7ff753ab653e 510->514 516 7ff753ab661e-7ff753ab6628 call 7ff753ab6b70 511->516 512->511 515 7ff753ab6605-7ff753ab660e 512->515 518 7ff753ab6698-7ff753ab66bc call 7ff753ab8470 513->518 517 7ff753ab6541-7ff753ab654b 514->517 515->509 515->511 528 7ff753ab6649-7ff753ab664b 516->528 529 7ff753ab662a-7ff753ab663d CreateDirectoryA 516->529 520 7ff753ab6560-7ff753ab6575 517->520 521 7ff753ab654d-7ff753ab6553 517->521 525 7ff753ab6577-7ff753ab658f GetSystemInfo 520->525 526 7ff753ab65cc-7ff753ab65dd call 7ff753ab7ba8 520->526 521->520 524 7ff753ab6555-7ff753ab655e 521->524 524->517 524->520 535 7ff753ab6591-7ff753ab6594 525->535 536 7ff753ab65bb 525->536 526->516 532 7ff753ab664d-7ff753ab6655 call 7ff753ab6ca4 528->532 533 7ff753ab668c-7ff753ab6693 528->533 530 7ff753ab663f 529->530 531 7ff753ab667d-7ff753ab6682 call 7ff753ab7700 529->531 530->528 531->513 544 7ff753ab665a-7ff753ab665c 532->544 533->518 541 7ff753ab65b2-7ff753ab65b9 535->541 542 7ff753ab6596-7ff753ab6599 535->542 537 7ff753ab65c2-7ff753ab65c7 call 7ff753ab7ba8 536->537 537->526 541->537 546 7ff753ab65a9-7ff753ab65b0 542->546 547 7ff753ab659b-7ff753ab659e 542->547 544->533 548 7ff753ab665e-7ff753ab6664 544->548 546->537 547->526 549 7ff753ab65a0-7ff753ab65a7 547->549 548->513 550 7ff753ab6666-7ff753ab667b RemoveDirectoryA 548->550 549->537 550->513
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Directory$File$CreateRemove$AttributesDeleteInfoNameSystemTemp
                                  • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$alpha$i386$mips$ppc
                                  • API String ID: 1979080616-3703068183
                                  • Opcode ID: 7d4d860df232b0db62657ebb5dc88ca939e84df122defa6df573680caeaa5849
                                  • Instruction ID: cf9b37fa5887503db97c5016e4068c6518823c34b6f0db1fa671a50cedcf25bc
                                  • Opcode Fuzzy Hash: 7d4d860df232b0db62657ebb5dc88ca939e84df122defa6df573680caeaa5849
                                  • Instruction Fuzzy Hash: F1519421E3D68281FAD5AF949830AB5E7A2AF85740FDC4135E98D622B5DF7DEC04C620

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Handle$AddressCloseExitModuleProcWindows
                                  • String ID: @$HeapSetInformation$Kernel32.dll
                                  • API String ID: 504435289-1204263913
                                  • Opcode ID: bc7078129275bb125b9e5c53a11b654621f0c246cdde63ba14c8613a6829cd7c
                                  • Instruction ID: 71267fd2f6fa7ce20ead407e913bfefb0d23479a5c22b1865cb52c8464bf2d63
                                  • Opcode Fuzzy Hash: bc7078129275bb125b9e5c53a11b654621f0c246cdde63ba14c8613a6829cd7c
                                  • Instruction Fuzzy Hash: 34311221E2864286FAE47BD0A475E75F792AF55780FCC4236F54D222B6EE2DAC448730

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: File$Find$lstrcmp$AttributesCloseDeleteDirectoryFirstNextRemove
                                  • String ID:
                                  • API String ID: 836429354-0
                                  • Opcode ID: 443ad30fadf752f4578cad6f697bceb18b99ad69543bd59e09de2f484cdf82b3
                                  • Instruction ID: da16e9520833782df2a7e7b4a10aba56c633182d8e93379206dea9dc115280ae
                                  • Opcode Fuzzy Hash: 443ad30fadf752f4578cad6f697bceb18b99ad69543bd59e09de2f484cdf82b3
                                  • Instruction Fuzzy Hash: F151C831628B8595EB91AF60D4606F8B7A2FB45B84FC84176EA4D137A5DF3CDD09C310
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Resource$FindLoad$FreeLockMessageSizeofStringmemcpy_s
                                  • String ID: INSTANCECHECK$VERCHECK$d!
                                  • API String ID: 1837572300-1877934713
                                  • Opcode ID: 480a79324343c1a47d86d873c511d996e4afdf5d12f9aab1abec900122c1a940
                                  • Instruction ID: dc21eb4fa7fe65c81538a850926244d39ac4a81c48d00ecec6a8a7403b2fc120
                                  • Opcode Fuzzy Hash: 480a79324343c1a47d86d873c511d996e4afdf5d12f9aab1abec900122c1a940
                                  • Instruction Fuzzy Hash: 7B416B21A2C28285F7E07BE1A430FB9E692AF85784FCC4135F98D625F5DE7CAD418620

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: DeleteFileFreeLocal$AttributesCloseCurrentDirectoryOpenValue
                                  • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$Software\Microsoft\Windows\CurrentVersion\RunOnce$wextract_cleanup0
                                  • API String ID: 3049360512-1423647952
                                  • Opcode ID: 88b67cf9d0802eb801fbc77634297f52a5ae07bc3bb60e3e8d3801540334588a
                                  • Instruction ID: 4f08d55e7c4682421062691365d0203ab7de87ed8cc91bb256734c14e6caea90
                                  • Opcode Fuzzy Hash: 88b67cf9d0802eb801fbc77634297f52a5ae07bc3bb60e3e8d3801540334588a
                                  • Instruction Fuzzy Hash: DA512371A2868286FB94AB94E464BB5F7A2FB85744FCC4135E68D126B5CF3CEC44C720

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: CloseHandleProcess$CodeCreateErrorExitFormatLastMessageObjectSingleWait
                                  • String ID:
                                  • API String ID: 3183975587-3916222277
                                  • Opcode ID: 0612355d7098dd9214d3ec5057fb5c6aaccd7f37b0a93b2f13a3672e5b451275
                                  • Instruction ID: 772005b9185b3704ccff3fa005aef64f407089cee1eb9130113f8225bd65a30b
                                  • Opcode Fuzzy Hash: 0612355d7098dd9214d3ec5057fb5c6aaccd7f37b0a93b2f13a3672e5b451275
                                  • Instruction Fuzzy Hash: 8651A53292C68186F7A0AFA0E464B79F7A2FB88754F884135F54D566B5CF7CD844CB20

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: OpenQuery$CloseInfoValue
                                  • String ID: PendingFileRenameOperations$System\CurrentControlSet\Control\Session Manager$System\CurrentControlSet\Control\Session Manager\FileRenameOperations
                                  • API String ID: 2209512893-559176071
                                  • Opcode ID: ed84ebcdca9ba12ea1915114950aff5f0d43cebd3ec67e9f63dd23e0e0abc583
                                  • Instruction ID: 68a78bf6c5cfbf20e6eade388c8c049dc21edbd278965f15ec3c63650f7b597b
                                  • Opcode Fuzzy Hash: ed84ebcdca9ba12ea1915114950aff5f0d43cebd3ec67e9f63dd23e0e0abc583
                                  • Instruction Fuzzy Hash: 1731BF32618B41CAE7909FA0F8609A9F7A5FB88744F884535F68D13B64DF38D850CB10

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: DirectoryFile$Create$AttributesDeleteNameRemoveTemp_vsnprintf
                                  • String ID: IXP$IXP%03d.TMP
                                  • API String ID: 1082909758-3932986939
                                  • Opcode ID: a8932f2c933087a6f7710ab058026970ef7685da5f8c2755a45c3c5b36be9ab1
                                  • Instruction ID: 2a28bf46cff33c9aabb5d91e5d2b5d67f9a1d4d3585bcce2655ce3c8a2bf79f5
                                  • Opcode Fuzzy Hash: a8932f2c933087a6f7710ab058026970ef7685da5f8c2755a45c3c5b36be9ab1
                                  • Instruction Fuzzy Hash: 1B216131A1894186F694AB52A9607F9F652FF8EB80FC88134ED4E537B1CF3CD845C610

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00007FF753AB5050: FindResourceA.KERNEL32 ref: 00007FF753AB5078
                                    • Part of subcall function 00007FF753AB5050: SizeofResource.KERNEL32(?,?,00000000,00007FF753AB2E43), ref: 00007FF753AB5089
                                    • Part of subcall function 00007FF753AB5050: FindResourceA.KERNEL32 ref: 00007FF753AB50AF
                                    • Part of subcall function 00007FF753AB5050: LoadResource.KERNEL32(?,?,00000000,00007FF753AB2E43), ref: 00007FF753AB50C0
                                    • Part of subcall function 00007FF753AB5050: LockResource.KERNEL32(?,?,00000000,00007FF753AB2E43), ref: 00007FF753AB50CF
                                    • Part of subcall function 00007FF753AB5050: memcpy_s.MSVCRT ref: 00007FF753AB50EE
                                    • Part of subcall function 00007FF753AB5050: FreeResource.KERNEL32(?,?,00000000,00007FF753AB2E43), ref: 00007FF753AB50FD
                                  • LocalAlloc.KERNEL32(?,?,?,?,00000000,00007FF753AB3123), ref: 00007FF753AB60C9
                                  • LocalFree.KERNEL32 ref: 00007FF753AB6142
                                    • Part of subcall function 00007FF753AB4DCC: LoadStringA.USER32 ref: 00007FF753AB4E60
                                    • Part of subcall function 00007FF753AB4DCC: MessageBoxA.USER32 ref: 00007FF753AB4EA0
                                    • Part of subcall function 00007FF753AB7700: GetLastError.KERNEL32 ref: 00007FF753AB7704
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Resource$FindFreeLoadLocal$AllocErrorLastLockMessageSizeofStringmemcpy_s
                                  • String ID: $<None>$UPROMPT
                                  • API String ID: 957408736-2569542085
                                  • Opcode ID: 3c89efd78b919c53ae921da62a7823d40fc529b0e6928f9f5a66cf62d4f2101d
                                  • Instruction ID: fc66dad8efbf4b686afa267b6284c9ec440d2fca8203ce0fac3a79e5269b461d
                                  • Opcode Fuzzy Hash: 3c89efd78b919c53ae921da62a7823d40fc529b0e6928f9f5a66cf62d4f2101d
                                  • Instruction Fuzzy Hash: 7C31A771A2C24287F7946BA0F570B79FA62EF85784F884138EA4D136B5DF7DD8048B10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: CreateFile$lstrcmp
                                  • String ID: *MEMCAB
                                  • API String ID: 1301100335-3211172518
                                  • Opcode ID: fab58b71c17961be18cd8b0539a41123d81d0c9073bbe07ec3ef194c0142598e
                                  • Instruction ID: 8d4597f9f7480a266b378f3131d6f8b495f2447bbba02706604e0ada053cf508
                                  • Opcode Fuzzy Hash: fab58b71c17961be18cd8b0539a41123d81d0c9073bbe07ec3ef194c0142598e
                                  • Instruction Fuzzy Hash: 3761FB7292878146F7A09F55A4A0B75BB93FB45B75F884335EA6E127E0CF3CE8058720
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: FileTime$AttributesDateItemLocalText
                                  • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
                                  • API String ID: 851750970-1193786559
                                  • Opcode ID: 94d827d004676d0e23b6a3eaf0944199c835ba76f01473357c705151827b719a
                                  • Instruction ID: 7cfc80a75b8eedbfc832d395e08716082b00c4954a25671421aaa3113007bc4a
                                  • Opcode Fuzzy Hash: 94d827d004676d0e23b6a3eaf0944199c835ba76f01473357c705151827b719a
                                  • Instruction Fuzzy Hash: B6518232A3864681EAE0ABD194609B9A792FB48B50FCC5135E94E632B5CE3CED41C760
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: AllocLocal
                                  • String ID: TMP4351$.TMP
                                  • API String ID: 3494564517-2619824408
                                  • Opcode ID: d5ace99f2663905ba72166a92556dafad1272f0db083ef97e46a8f7b12bd3ef1
                                  • Instruction ID: 871f30d2605619ad6356252b76ed10c4dd3b7d6b4cdf01e5d111c0eca6119b03
                                  • Opcode Fuzzy Hash: d5ace99f2663905ba72166a92556dafad1272f0db083ef97e46a8f7b12bd3ef1
                                  • Instruction Fuzzy Hash: 53317231A1868187F7906B61A42077AFA62FB85BA4F885334EA6E177F5CF3CD8058710
                                  APIs
                                    • Part of subcall function 00007FF753AB8964: GetSystemTimeAsFileTime.KERNEL32 ref: 00007FF753AB8994
                                    • Part of subcall function 00007FF753AB8964: GetCurrentProcessId.KERNEL32 ref: 00007FF753AB89A2
                                    • Part of subcall function 00007FF753AB8964: GetCurrentThreadId.KERNEL32 ref: 00007FF753AB89AE
                                    • Part of subcall function 00007FF753AB8964: GetTickCount.KERNEL32 ref: 00007FF753AB89BA
                                    • Part of subcall function 00007FF753AB8964: GetTickCount.KERNEL32 ref: 00007FF753AB89CA
                                    • Part of subcall function 00007FF753AB8964: QueryPerformanceCounter.KERNEL32 ref: 00007FF753AB89E5
                                  • GetStartupInfoW.KERNEL32 ref: 00007FF753AB8235
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: CountCurrentTickTime$CounterFileInfoPerformanceProcessQueryStartupSystemThread
                                  • String ID:
                                  • API String ID: 1911256751-0
                                  • Opcode ID: 8a954a4edd5811ad5ef14251a18c88f34d905236b758290b01ab71a00954b362
                                  • Instruction ID: 039fec5d8dd9a97b038209a98a55b961a3c17eb6a9f46a69243637440a0a09a3
                                  • Opcode Fuzzy Hash: 8a954a4edd5811ad5ef14251a18c88f34d905236b758290b01ab71a00954b362
                                  • Instruction Fuzzy Hash: 1321713192868286F7E1AB95E460F79A6EAFB44754FDC0034F94CA22B1DF3CEC408630
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: MessagePeek$FileMultipleObjectsWaitWrite
                                  • String ID:
                                  • API String ID: 1084409-0
                                  • Opcode ID: 2a76a806002c51afc5401a5001571f8213dae6f688e945ba72fdbdbea0bf890e
                                  • Instruction ID: 796286005986e2c2e5bfd7af2d5ae28ac56be02f442832064b76ba4f76c3a9e0
                                  • Opcode Fuzzy Hash: 2a76a806002c51afc5401a5001571f8213dae6f688e945ba72fdbdbea0bf890e
                                  • Instruction Fuzzy Hash: E0217F30A2854286E7909F95E864F35F762FB85B94F988234F96D166B4CF3CD844CB10
                                  APIs
                                  • GetFileAttributesA.KERNELBASE ref: 00007FF753AB51C9
                                  • SetFileAttributesA.KERNEL32 ref: 00007FF753AB524E
                                    • Part of subcall function 00007FF753AB7AC8: FindResourceA.KERNEL32 ref: 00007FF753AB7AF2
                                    • Part of subcall function 00007FF753AB7AC8: LoadResource.KERNEL32(?,?,?,?,00000000,00007FF753AB6B32), ref: 00007FF753AB7B09
                                    • Part of subcall function 00007FF753AB7AC8: DialogBoxIndirectParamA.USER32 ref: 00007FF753AB7B3F
                                    • Part of subcall function 00007FF753AB7AC8: FreeResource.KERNEL32(?,?,?,?,00000000,00007FF753AB6B32), ref: 00007FF753AB7B51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Resource$AttributesFile$DialogFindFreeIndirectLoadParam
                                  • String ID:
                                  • API String ID: 2018477427-0
                                  • Opcode ID: 3e2a9ca54f85fb277ae83debdb817983f9715ef8d1a98a663c9d93ea4cfc633f
                                  • Instruction ID: d310d069c9c584af72a1e986ebc4344efc05ce6a5f968e7211d70ec7af716c39
                                  • Opcode Fuzzy Hash: 3e2a9ca54f85fb277ae83debdb817983f9715ef8d1a98a663c9d93ea4cfc633f
                                  • Instruction Fuzzy Hash: 1A119E31D2C68282F6D46BD0A5A4B75F692EF45758F9C4234E98C266B0CF7DEC85C320
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: _cexitexit
                                  • String ID:
                                  • API String ID: 521370574-0
                                  • Opcode ID: df9c7ee2cd9f1130dfd702b04adf9a63631bc05dbce83761df2403b416b3da34
                                  • Instruction ID: 9e8d77a6fca1b1c5d59abb55c2ee9f280fcf9c431b66a58961014ab1738f27ce
                                  • Opcode Fuzzy Hash: df9c7ee2cd9f1130dfd702b04adf9a63631bc05dbce83761df2403b416b3da34
                                  • Instruction Fuzzy Hash: 67E0ED30D28642CAF7D8BBD5A424F68B36BBB08751FC80475E95D66270DF3CAC858630
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: CharPrev
                                  • String ID:
                                  • API String ID: 122130370-0
                                  • Opcode ID: fe64812d24aaa535377f96cafa4c6c3212caf3ba105ea9cba34c300c858a7088
                                  • Instruction ID: 7a3723d962fccd74bdfa3adc9f560c66f68a521022922418a8ce103a33d130d0
                                  • Opcode Fuzzy Hash: fe64812d24aaa535377f96cafa4c6c3212caf3ba105ea9cba34c300c858a7088
                                  • Instruction Fuzzy Hash: 8F01261191C7C186F3826F51A844779FA92AB02BA0F9C9234EB6A677E5CB6DDC428710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: b743c40088155ea186d23191c44c420b4fd161faa50afe9f4e766b5de3d239a5
                                  • Instruction ID: 6a2b3e7678d90ddb067857bd48a8e3b90b1e33a92b58ac9b1b5cb180d99cdd8c
                                  • Opcode Fuzzy Hash: b743c40088155ea186d23191c44c420b4fd161faa50afe9f4e766b5de3d239a5
                                  • Instruction Fuzzy Hash: 64F0C2316187C1C3DB5C5F64F590578B661EB09B58F584639EA2B56694CF78C8C0C720
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Window$DialogItem$DesktopEnableLoadMessageSendStringText
                                  • String ID: $C:\Users\user\AppData\Local\Temp\IXP000.TMP\$graft
                                  • API String ID: 3530494346-2858097164
                                  • Opcode ID: db051c84840c0a1ce9bcce3cafedacda87a3346e9426d2c21970a37c6d42e784
                                  • Instruction ID: e4b081f13b88dc98cc097943603828b6c7004af5e33ffc97f744a05937f6423f
                                  • Opcode Fuzzy Hash: db051c84840c0a1ce9bcce3cafedacda87a3346e9426d2c21970a37c6d42e784
                                  • Instruction Fuzzy Hash: 1B717861A2868286F7D0ABE19434F79E753FB86784FDC4134EA4D226E5CF3CD8458720
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: CharCloseMetricsNextOpenQuerySystemValueVersion
                                  • String ID: Control Panel\Desktop\ResourceLocale
                                  • API String ID: 3346862599-1109908249
                                  • Opcode ID: 3b2a06a11d2becce3ce338110b622480474f8ae87116164a32f9474e2bd7df5d
                                  • Instruction ID: e687f8d5bb4f1e8585bee1d9a88166d16d860a63e665824d4f722d9093cb2a17
                                  • Opcode Fuzzy Hash: 3b2a06a11d2becce3ce338110b622480474f8ae87116164a32f9474e2bd7df5d
                                  • Instruction Fuzzy Hash: 7051EB32A18B818AE7919B68D45097DF7A6F749790FC94135EA5D237A0DF3CEC44C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: FreeLibrary$AddressAllocateInitializeLoadProc
                                  • String ID: CheckTokenMembership$advapi32.dll
                                  • API String ID: 4204503880-1888249752
                                  • Opcode ID: aca234308d6c2b9a7267944faa7f1f83278d608330c87f71542cc3174e944061
                                  • Instruction ID: d6f91834c49ac533d8daed7b286e42daec488bb21a92910a252ce7c240c504ca
                                  • Opcode Fuzzy Hash: aca234308d6c2b9a7267944faa7f1f83278d608330c87f71542cc3174e944061
                                  • Instruction Fuzzy Hash: B4319336A18B458BE7909F56F4505A9FBA1FB89B40F884139EE8D53724DF3CE405CB10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: ProcessToken$AdjustCloseCurrentExitHandleLookupOpenPrivilegePrivilegesValueWindows
                                  • String ID: SeShutdownPrivilege
                                  • API String ID: 2829607268-3733053543
                                  • Opcode ID: 0498e98a6f4da9769e9cb780a0c2dc892d1af85034222ddb2be8bb38f8c32dfd
                                  • Instruction ID: fd613606de597f38a51fed7e0bcd9c3ea13842d0e30d13fa93d9fef2b72b6053
                                  • Opcode Fuzzy Hash: 0498e98a6f4da9769e9cb780a0c2dc892d1af85034222ddb2be8bb38f8c32dfd
                                  • Instruction Fuzzy Hash: 1921D972A28642C7F7909B90F469B7AFB62FB8A745F849135E64E13664CF3CD444CB10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 4104442557-0
                                  • Opcode ID: b417f0ca43b0f1a675a55b1394a59fc23cd165e7830d58b26484a22ad4f1a579
                                  • Instruction ID: 8a5b9fde1c1d49bdfe9d2cdba146f06b0fadef9e022fa4af21a9ba3c8c4b7baf
                                  • Opcode Fuzzy Hash: b417f0ca43b0f1a675a55b1394a59fc23cd165e7830d58b26484a22ad4f1a579
                                  • Instruction Fuzzy Hash: 43119032A14F418AEB40EFB1E8546A873A4FB19758F880A34FA6D43764DF3CD964C350
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: 5301e7076f5ef957a13bc7f6d002c3f7f3b9a25b2f64b703cbde4610621febb0
                                  • Instruction ID: 515162ead9c13b8f3f0b5f212adaadf9d39ab1aae7203450b7378a7831100cc0
                                  • Opcode Fuzzy Hash: 5301e7076f5ef957a13bc7f6d002c3f7f3b9a25b2f64b703cbde4610621febb0
                                  • Instruction Fuzzy Hash: F5B09220E39442C2D644BBA19CA54A063A5BF69308FC40830D00D90130DE1C999A8710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: EventItemMessageSendThreadWindow$CreateDesktopDialogResetTerminateText
                                  • String ID: $graft
                                  • API String ID: 2654313074-152222363
                                  • Opcode ID: d29d643aeea416fab1e010946dc15223199e691555f5366313ee3528c2360453
                                  • Instruction ID: f7b89ccef6fed4d8cbdaf37630aa610aaa58642e03bd25c289f8c24d11de5460
                                  • Opcode Fuzzy Hash: d29d643aeea416fab1e010946dc15223199e691555f5366313ee3528c2360453
                                  • Instruction Fuzzy Hash: C5517431928642C6F7906BD0E864A79FB63FB89B55F889235E90D237F4CF3C98458720
                                  APIs
                                  • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF753AB35E3), ref: 00007FF753AB4A86
                                  • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF753AB35E3), ref: 00007FF753AB4AAA
                                  • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF753AB35E3), ref: 00007FF753AB4ACA
                                  • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF753AB35E3), ref: 00007FF753AB4AEC
                                  • GetTempPathA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF753AB35E3), ref: 00007FF753AB4B1B
                                  • CharPrevA.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF753AB35E3), ref: 00007FF753AB4B3A
                                  • CharPrevA.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF753AB35E3), ref: 00007FF753AB4B54
                                  • FreeLibrary.KERNEL32 ref: 00007FF753AB4BF1
                                  • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF753AB35E3), ref: 00007FF753AB4C0D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: AddressLibraryProc$CharFreePrev$LoadPathTemp
                                  • String ID: SHBrowseForFolder$SHELL32.DLL$SHGetPathFromIDList
                                  • API String ID: 1865808269-1731843650
                                  • Opcode ID: 2a5ea4b490894db445cb84de2448d12f1af4c9272f9454c89187ac1fef39355e
                                  • Instruction ID: 4d2cbd846c02db344608e2d45eb6d959a3d4c5f66060ce738e10c7b44598bc98
                                  • Opcode Fuzzy Hash: 2a5ea4b490894db445cb84de2448d12f1af4c9272f9454c89187ac1fef39355e
                                  • Instruction Fuzzy Hash: AC517125A2DB8286F684AB51B464979FB96FB4AB90FCC4134EE8E13764DF3CD844C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Local$AllocMessage$EnumLanguagesResource$BeepCharCloseFreeLoadMetricsNextOpenQueryStringSystemValueVersion
                                  • String ID: graft$rce.
                                  • API String ID: 2929476258-298454150
                                  • Opcode ID: abe435584ecd5f6fe87ce2b456f1e06dda66ab3f9fb72e6f330788004a039cce
                                  • Instruction ID: b5b776142eff195295d43bfe068ea664bd4fb493e638067ca1f9ad27b727c38b
                                  • Opcode Fuzzy Hash: abe435584ecd5f6fe87ce2b456f1e06dda66ab3f9fb72e6f330788004a039cce
                                  • Instruction Fuzzy Hash: E661C921E287C146FB91ABB5A420BB4E691BF59B54F885234FD4D233A1DF3CED418720
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Char$DirectoryNext$CloseEnvironmentExpandOpenQueryStringsSystemUpperValueWindows
                                  • String ID: Software\Microsoft\Windows\CurrentVersion\App Paths
                                  • API String ID: 2659952014-2428544900
                                  • Opcode ID: 3b652cf53a0166bf7c173558fb1758d4a4d77de799b7ad200d32d7da73422a7a
                                  • Instruction ID: 443b1697b11b4d8610dce78d5cdef030e6bf8248d425ebe8b5ac2ae32f90d70c
                                  • Opcode Fuzzy Hash: 3b652cf53a0166bf7c173558fb1758d4a4d77de799b7ad200d32d7da73422a7a
                                  • Instruction Fuzzy Hash: EA51D9726286C187EB90AF50E4646B9F7A1FB86B80F984031FA4E13764DF3CD845C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Window$Item$LongText$DesktopDialogForegroundMessageSend
                                  • String ID: graft
                                  • API String ID: 3785188418-31255620
                                  • Opcode ID: 0c8ccea153f4ee7b78298008ed30abde24da0bd623f78e8aeba97b039f8dc211
                                  • Instruction ID: 9506ae16d641c7f2039bd92723828e0e2f85d50d550122876847c49b9efa847c
                                  • Opcode Fuzzy Hash: 0c8ccea153f4ee7b78298008ed30abde24da0bd623f78e8aeba97b039f8dc211
                                  • Instruction Fuzzy Hash: 81314E3492464286E6956BE4E824674F752FB5AB51FCC9334E91E123F4CF3CD845C720
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Free$Token$AllocateInformationInitializeLibraryLocalProcess$AddressAllocCloseCurrentEqualErrorHandleLastLoadOpenProc
                                  • String ID:
                                  • API String ID: 2168512254-0
                                  • Opcode ID: 6813b6756910e0ae34933596af1690bcf55f2b4d44473aa3a3cec1d83aee30ca
                                  • Instruction ID: 16aa50f4e8e49065cc9aed9d81ffd8d9cde37122ec72fa3c1fb54e257dbc7510
                                  • Opcode Fuzzy Hash: 6813b6756910e0ae34933596af1690bcf55f2b4d44473aa3a3cec1d83aee30ca
                                  • Instruction Fuzzy Hash: 9D51B572614A41CBE790AF60E4609B9BBA5FB5DB88F895135FA4E63724CF38D844CB10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Global$Char$FileInfoNextQueryUnlockValueVersion$AllocCloseEnvironmentExpandFreeLockOpenSizeStringsUpper
                                  • String ID:
                                  • API String ID: 1051330783-0
                                  • Opcode ID: 6d4c51d06f972b13cb99adb0e904218bc9eace2558dcc6cb5054029ba0357b51
                                  • Instruction ID: f8926807d002b05560717f026547b12a68791b7760ff2fbba2dfcdd3ffda8ad4
                                  • Opcode Fuzzy Hash: 6d4c51d06f972b13cb99adb0e904218bc9eace2558dcc6cb5054029ba0357b51
                                  • Instruction Fuzzy Hash: CE51AE31B24642CAEBA09F5594109B8B766FB49B94F885136EE0D73764EF3CEC45C720
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Char$Next$Upper$ByteFileLeadModuleNamePrev
                                  • String ID:
                                  • API String ID: 975904313-0
                                  • Opcode ID: 2979d283a01604d961735a48130beb2dfdd98dda21d4e4b67344f999235a94dc
                                  • Instruction ID: 397f63e3cedb8c17b1e84c40f9836699cce0e60c061dd83d35dac88838041815
                                  • Opcode Fuzzy Hash: 2979d283a01604d961735a48130beb2dfdd98dda21d4e4b67344f999235a94dc
                                  • Instruction Fuzzy Hash: D551FB21A2C6C545FBA16F6194247B8FB93EB4AB90FCC8171EA4E173A5DE3CD8058720
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Window$CapsDeviceRect$Release
                                  • String ID:
                                  • API String ID: 2212493051-0
                                  • Opcode ID: f008325a7646b8fc205624c4fd77acf99a3c7384c25ca23c8312c3aeeac09b65
                                  • Instruction ID: 4e65d447fc92e9aa863f67c02044759d3642a7e8b7ef2e36c5cd206f9a41a167
                                  • Opcode Fuzzy Hash: f008325a7646b8fc205624c4fd77acf99a3c7384c25ca23c8312c3aeeac09b65
                                  • Instruction Fuzzy Hash: 9931B332B245418AE7509BB5E8149BDBBB1F749B99F895130DE0A63B14CF3CE845CB10
                                  APIs
                                    • Part of subcall function 00007FF753AB5050: FindResourceA.KERNEL32 ref: 00007FF753AB5078
                                    • Part of subcall function 00007FF753AB5050: SizeofResource.KERNEL32(?,?,00000000,00007FF753AB2E43), ref: 00007FF753AB5089
                                    • Part of subcall function 00007FF753AB5050: FindResourceA.KERNEL32 ref: 00007FF753AB50AF
                                    • Part of subcall function 00007FF753AB5050: LoadResource.KERNEL32(?,?,00000000,00007FF753AB2E43), ref: 00007FF753AB50C0
                                    • Part of subcall function 00007FF753AB5050: LockResource.KERNEL32(?,?,00000000,00007FF753AB2E43), ref: 00007FF753AB50CF
                                    • Part of subcall function 00007FF753AB5050: memcpy_s.MSVCRT ref: 00007FF753AB50EE
                                    • Part of subcall function 00007FF753AB5050: FreeResource.KERNEL32(?,?,00000000,00007FF753AB2E43), ref: 00007FF753AB50FD
                                  • LocalAlloc.KERNEL32(?,?,?,?,?,00007FF753AB3139), ref: 00007FF753AB3F95
                                  • LocalFree.KERNEL32 ref: 00007FF753AB4018
                                    • Part of subcall function 00007FF753AB4DCC: LoadStringA.USER32 ref: 00007FF753AB4E60
                                    • Part of subcall function 00007FF753AB4DCC: MessageBoxA.USER32 ref: 00007FF753AB4EA0
                                    • Part of subcall function 00007FF753AB7700: GetLastError.KERNEL32 ref: 00007FF753AB7704
                                  • lstrcmpA.KERNEL32(?,?,?,?,?,00007FF753AB3139), ref: 00007FF753AB403E
                                  • LocalFree.KERNEL32(?,?,?,?,?,00007FF753AB3139), ref: 00007FF753AB409F
                                    • Part of subcall function 00007FF753AB7AC8: FindResourceA.KERNEL32 ref: 00007FF753AB7AF2
                                    • Part of subcall function 00007FF753AB7AC8: LoadResource.KERNEL32(?,?,?,?,00000000,00007FF753AB6B32), ref: 00007FF753AB7B09
                                    • Part of subcall function 00007FF753AB7AC8: DialogBoxIndirectParamA.USER32 ref: 00007FF753AB7B3F
                                    • Part of subcall function 00007FF753AB7AC8: FreeResource.KERNEL32(?,?,?,?,00000000,00007FF753AB6B32), ref: 00007FF753AB7B51
                                  • LocalFree.KERNEL32 ref: 00007FF753AB4078
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Resource$Free$Local$FindLoad$AllocDialogErrorIndirectLastLockMessageParamSizeofStringlstrcmpmemcpy_s
                                  • String ID: <None>$LICENSE
                                  • API String ID: 2414642746-383193767
                                  • Opcode ID: 7e108c0cb040a1fd921d3b1ec7fd665a136da010c74c2419f855da60f9694481
                                  • Instruction ID: 91b51f701725800b449bd1bebe8b18dd2934fd525804178d6db51989490d8c5d
                                  • Opcode Fuzzy Hash: 7e108c0cb040a1fd921d3b1ec7fd665a136da010c74c2419f855da60f9694481
                                  • Instruction Fuzzy Hash: E8316F31A3864286F790BFA0E430B79B662FF85744FC84138E50E666B0DF7DE8048B20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Resource$Free$FindLoadLock_vsnprintf
                                  • String ID: UPDFILE%lu
                                  • API String ID: 2922116661-2329316264
                                  • Opcode ID: 5da28ac000a46b9a165e15456f701c43c89cc60981a221babc32eae9389c35de
                                  • Instruction ID: bb9f64171bce6d7dce761fdbc0654042ceb115cbb0151918a818a4501c8ca9bb
                                  • Opcode Fuzzy Hash: 5da28ac000a46b9a165e15456f701c43c89cc60981a221babc32eae9389c35de
                                  • Instruction Fuzzy Hash: 5731C931A18641C7F780AB91A420579FB92FF89B50F888235EA5D537B4CF3CD840C710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Resource$Find$FreeLoadLockSizeofmemcpy_s
                                  • String ID:
                                  • API String ID: 3370778649-0
                                  • Opcode ID: 354dd0a735b34388ad5f877ea76a86da7b7875453ded65a43a8ee6639794adbd
                                  • Instruction ID: 0baacfeacca8f0d7ee1df9a03e8bb64698c7f7d45f8f5a5e441b71d8138ebed8
                                  • Opcode Fuzzy Hash: 354dd0a735b34388ad5f877ea76a86da7b7875453ded65a43a8ee6639794adbd
                                  • Instruction Fuzzy Hash: DC112E31B18B4187E7946BA2B464479FAA2EB4EFC1F8D9138ED4E53764DF3CD8418610
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: DirectoryPrivateProfileStringWindowsWrite_lclose_llseek_lopen
                                  • String ID: wininit.ini
                                  • API String ID: 3273605193-4206010578
                                  • Opcode ID: 199b65378ca9828830684770953ab38004a5dc8256a53cff6ace6da1301a0c22
                                  • Instruction ID: 94ede37da1bda5e2e8ca7c29deea866fe4d6b84a1d30c7a8e4ff52239c5c2051
                                  • Opcode Fuzzy Hash: 199b65378ca9828830684770953ab38004a5dc8256a53cff6ace6da1301a0c22
                                  • Instruction Fuzzy Hash: 2A11A532A14A8187E754AB60E8646B9B7A2FBCD704FC88135EA4E43364DF3CD905CA00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Window$Text$DesktopDialogForegroundItem
                                  • String ID: graft
                                  • API String ID: 761066910-31255620
                                  • Opcode ID: 53f545d9e0ff8d341fef1ad6af6e18a944f324add3d94d70d3143487fc889582
                                  • Instruction ID: 6ff3407f4d3af74b87e7fa8ff0e3acb250408c9ef5403b752cc76ba83495a1a7
                                  • Opcode Fuzzy Hash: 53f545d9e0ff8d341fef1ad6af6e18a944f324add3d94d70d3143487fc889582
                                  • Instruction Fuzzy Hash: 9D11F460D6864286F6D47BD5A4246B8EA53EB4AB41FCC9534E90E263F4CF7CAC44C621
                                  APIs
                                    • Part of subcall function 00007FF753AB5050: FindResourceA.KERNEL32 ref: 00007FF753AB5078
                                    • Part of subcall function 00007FF753AB5050: SizeofResource.KERNEL32(?,?,00000000,00007FF753AB2E43), ref: 00007FF753AB5089
                                    • Part of subcall function 00007FF753AB5050: FindResourceA.KERNEL32 ref: 00007FF753AB50AF
                                    • Part of subcall function 00007FF753AB5050: LoadResource.KERNEL32(?,?,00000000,00007FF753AB2E43), ref: 00007FF753AB50C0
                                    • Part of subcall function 00007FF753AB5050: LockResource.KERNEL32(?,?,00000000,00007FF753AB2E43), ref: 00007FF753AB50CF
                                    • Part of subcall function 00007FF753AB5050: memcpy_s.MSVCRT ref: 00007FF753AB50EE
                                    • Part of subcall function 00007FF753AB5050: FreeResource.KERNEL32(?,?,00000000,00007FF753AB2E43), ref: 00007FF753AB50FD
                                  • LocalAlloc.KERNEL32(?,?,?,?,00000000,00007FF753AB3388), ref: 00007FF753AB4975
                                  • LocalFree.KERNEL32(?,?,?,?,00000000,00007FF753AB3388), ref: 00007FF753AB4A11
                                    • Part of subcall function 00007FF753AB4DCC: LoadStringA.USER32 ref: 00007FF753AB4E60
                                    • Part of subcall function 00007FF753AB4DCC: MessageBoxA.USER32 ref: 00007FF753AB4EA0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Resource$FindFreeLoadLocal$AllocLockMessageSizeofStringmemcpy_s
                                  • String ID: <None>$@$FINISHMSG
                                  • API String ID: 3507850446-4126004490
                                  • Opcode ID: aedc0cb394021a63a9408eb451deeea95bc994a5d044e743d2e3e1f25989d2fa
                                  • Instruction ID: 17e360cff44f84a8043de921662efa267db61f8de16972d3aa93800f1af37716
                                  • Opcode Fuzzy Hash: aedc0cb394021a63a9408eb451deeea95bc994a5d044e743d2e3e1f25989d2fa
                                  • Instruction Fuzzy Hash: B411F972A2834287F7A06B60F071B7AF662EB85784F8C5138EA4D127A5CF3CD8148B10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: LibraryLoad$AttributesFile
                                  • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$advpack.dll
                                  • API String ID: 438848745-2381869747
                                  • Opcode ID: 9f0cd13c1bb279af47be13cee5dd35000d2da7fbef8f0ef7de7ad0cc9ac3dbe3
                                  • Instruction ID: 5057882736e98a025e15b4e2c8e958272efb697e2e9a193a735a814dd9bccc9f
                                  • Opcode Fuzzy Hash: 9f0cd13c1bb279af47be13cee5dd35000d2da7fbef8f0ef7de7ad0cc9ac3dbe3
                                  • Instruction Fuzzy Hash: 6311A431A286C2C6EAE1AB50D4606F8B7A1FF89704FC80175E58D526B1CF3EDA09C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Char$Prev$Next
                                  • String ID: \
                                  • API String ID: 3260447230-2967466578
                                  • Opcode ID: 707050412bb26cc287988f04cda4ab0ae1f580e9279edb24177e5c3a1430149b
                                  • Instruction ID: a5431f75520b1ed6fc5c238b3af70db2cc51b309d8966a2456d96d662fc2b762
                                  • Opcode Fuzzy Hash: 707050412bb26cc287988f04cda4ab0ae1f580e9279edb24177e5c3a1430149b
                                  • Instruction Fuzzy Hash: 3A11E762A1868181FB921B61A514579EB92EB4AFE0F8C8334EA1F53394CF6DDC408710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: BeepDesktopDialogItemLoadMessageStringTextWindow
                                  • String ID:
                                  • API String ID: 1273765764-0
                                  • Opcode ID: 959f28d1b95b8526aa68c42a3a998ab188e5ed3d10e9a2e05c875aba66557268
                                  • Instruction ID: 37832a54ee57b37d7f1841514ef125b9e780173f1bdb7e9d2d41a053df450f06
                                  • Opcode Fuzzy Hash: 959f28d1b95b8526aa68c42a3a998ab188e5ed3d10e9a2e05c875aba66557268
                                  • Instruction Fuzzy Hash: B411BB3191868586EA906B94F4247B9F752FB89B54F884330E95E173E5CF3CD8458720
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: EnumLanguagesMessageResourceVersion$BeepCharCloseMetricsNextOpenQuerySystemValue
                                  • String ID: graft
                                  • API String ID: 2312377310-31255620
                                  • Opcode ID: 6925faca6a2cd81837304f5f4f2fd7570e59ff5b7a5509a8ec541a78deb6dc36
                                  • Instruction ID: 69ed3b437f01116c1f27c90314a65c7b1e2856427058375367d606f53395e161
                                  • Opcode Fuzzy Hash: 6925faca6a2cd81837304f5f4f2fd7570e59ff5b7a5509a8ec541a78deb6dc36
                                  • Instruction Fuzzy Hash: A7A1A431E2918286F7E5AFD59464E79A6A6BF44790F990136F90DA32E0CE3DEC44C720
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: File$CloseCreateHandleWrite
                                  • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
                                  • API String ID: 1065093856-1193786559
                                  • Opcode ID: 0f65b1997a9f98f28a06f8ce24cdc0a961af7feeb94d9fcacdfae0386ba340ac
                                  • Instruction ID: 3df4cbaa593e8008ea41848beda0c02456903484bce9a3e75b7d14868fa472ac
                                  • Opcode Fuzzy Hash: 0f65b1997a9f98f28a06f8ce24cdc0a961af7feeb94d9fcacdfae0386ba340ac
                                  • Instruction Fuzzy Hash: B331B83262C68186EB919F50E460BB9F761FB49754F884234EA9D577A4CFBDD804CB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: *MEMCAB
                                  • API String ID: 0-3211172518
                                  • Opcode ID: 84e3e731c747766a29489c21773a7ead2eab1f416db6fdf01ae2d5964e993175
                                  • Instruction ID: 9866eb68c492bd7a5a5e9f1328b5755b1597c2e9576cb0210a86371bdba84f9f
                                  • Opcode Fuzzy Hash: 84e3e731c747766a29489c21773a7ead2eab1f416db6fdf01ae2d5964e993175
                                  • Instruction Fuzzy Hash: 09315E31A28B4185EA90EB91E4647B9B7A6FF45790FC84336E55D523B0DF3CD885CB20
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                                  • String ID:
                                  • API String ID: 140117192-0
                                  • Opcode ID: 2331a3b639adea238e9a50b849fe14964fd45a281eaa4897dacf7bdda2e71fe4
                                  • Instruction ID: 63666784819f60a257d5009b845032b29447ee807de136530a3f303235284bd6
                                  • Opcode Fuzzy Hash: 2331a3b639adea238e9a50b849fe14964fd45a281eaa4897dacf7bdda2e71fe4
                                  • Instruction Fuzzy Hash: D941F935A28B4181FA94AB98F8A0B65F769FB88744FD84136E98D63774DF3CD844C720
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritableSleep_initterm
                                  • String ID:
                                  • API String ID: 266296305-0
                                  • Opcode ID: 01974a5ee5226fad23c0959ce2548c455871ad999f485c3c9186ebd05c9edd77
                                  • Instruction ID: e8ad28e3f467684af82210fb5f0ecec96125a7fba344e82dac6d127ed04d277e
                                  • Opcode Fuzzy Hash: 01974a5ee5226fad23c0959ce2548c455871ad999f485c3c9186ebd05c9edd77
                                  • Instruction Fuzzy Hash: C431213192CA8686F6E2BBE8D470E79A79BAF44754FDC0035F54DA21B5DE2CED408630
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Resource$DialogFindFreeIndirectLoadParam
                                  • String ID:
                                  • API String ID: 1214682469-0
                                  • Opcode ID: 13cac0b9ca72075f5d7f1d00aa19e0549b75852ecd71447385bebf4ad58ecc71
                                  • Instruction ID: f0eb737c229f0dc0443b40589184e8dd7339b2ac8fd02f2a7514a7183560863a
                                  • Opcode Fuzzy Hash: 13cac0b9ca72075f5d7f1d00aa19e0549b75852ecd71447385bebf4ad58ecc71
                                  • Instruction Fuzzy Hash: D7115131A18B4186EA509B51F450669FA61FB49FE0F8C4734EE5E17BA5DF7CD8408B10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: CloseErrorHandleLastLoadMessageString
                                  • String ID: $graft
                                  • API String ID: 2456952105-152222363
                                  • Opcode ID: 64089d9253cebc4d26abf71036e578722448030402cfbf3a0cea4c6db5834b1b
                                  • Instruction ID: 67d46cfa3769ecae27c5001ac960fe690aff4ff2e0a4344df026978e9f7fb32a
                                  • Opcode Fuzzy Hash: 64089d9253cebc4d26abf71036e578722448030402cfbf3a0cea4c6db5834b1b
                                  • Instruction Fuzzy Hash: 3F11A171D2C58286F3E46BA0A420BBAF652EF95355F880236F54D615F5DF3CD8008B20
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2379771105.00007FF753AB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF753AB0000, based on PE: true
                                  • Associated: 00000000.00000002.2379683244.00007FF753AB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379840740.00007FF753AB9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379926069.00007FF753ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2379991033.00007FF753ABE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff753ab0000_4FkYkTt9dE.jbxd
                                  Similarity
                                  • API ID: Message$Peek$DispatchMultipleObjectsWait
                                  • String ID:
                                  • API String ID: 2776232527-0
                                  • Opcode ID: 7c1b033473dba301dd4ecd47eb6d04f722b5b1254afffa929906cb3dfbdd32c6
                                  • Instruction ID: 519530820481fa177418abad35112dea65a8591d5963bdc0dd45ced868d49fe5
                                  • Opcode Fuzzy Hash: 7c1b033473dba301dd4ecd47eb6d04f722b5b1254afffa929906cb3dfbdd32c6
                                  • Instruction Fuzzy Hash: E611AB32A2864287E7E05FA0E454F76FA91FF99745FC49134E64A429D4DF3CD448CB10

                                  Execution Graph

                                  Execution Coverage:12%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:2.6%
                                  Total number of Nodes:422
                                  Total number of Limit Nodes:48
                                  execution_graph 48711 2e9d01c 48712 2e9d034 48711->48712 48713 2e9d08f 48712->48713 48715 71fdbe0 48712->48715 48716 71fdc39 48715->48716 48719 71fe170 48716->48719 48717 71fdc6e 48720 71fe19d 48719->48720 48721 71fd370 VirtualProtect 48720->48721 48723 71fe333 48720->48723 48722 71fe324 48721->48722 48722->48717 48723->48717 48724 2f60a00 48725 2f60a22 48724->48725 48730 2f6056c 48725->48730 48728 2f6056c VirtualProtect 48729 2f60d10 48728->48729 48731 2f6a328 VirtualProtect 48730->48731 48733 2f60ca5 48731->48733 48733->48728 48202 7127b8e 48203 7127b98 48202->48203 48207 5847200 48203->48207 48213 58471f1 48203->48213 48204 7127bd6 48208 5847215 48207->48208 48219 5847240 48208->48219 48223 5847363 48208->48223 48227 5847231 48208->48227 48209 584722b 48209->48204 48214 5847200 48213->48214 48216 5847240 10 API calls 48214->48216 48217 5847231 10 API calls 48214->48217 48218 5847363 10 API calls 48214->48218 48215 584722b 48215->48204 48216->48215 48217->48215 48218->48215 48221 5847245 48219->48221 48220 58472ac 48220->48209 48221->48220 48231 5848868 48221->48231 48225 5847297 48223->48225 48224 58472ac 48224->48209 48225->48224 48226 5848868 10 API calls 48225->48226 48226->48225 48229 5847240 48227->48229 48228 58472ac 48228->48209 48229->48228 48230 5848868 10 API calls 48229->48230 48230->48229 48232 584888d 48231->48232 48236 58488b7 48232->48236 48240 58488c8 48232->48240 48233 58488af 48233->48221 48238 58488c8 48236->48238 48237 5848b93 48237->48233 48238->48237 48244 5848f31 48238->48244 48242 58488f5 48240->48242 48241 5848b93 48241->48233 48242->48241 48243 5848f31 10 API calls 48242->48243 48243->48242 48245 5848f55 48244->48245 48284 58494cb 48245->48284 48289 584948a 48245->48289 48294 5849d8a 48245->48294 48301 5849b0f 48245->48301 48305 5849acd 48245->48305 48309 584918d 48245->48309 48313 5849c02 48245->48313 48317 5848f80 48245->48317 48321 5849240 48245->48321 48329 5849484 48245->48329 48334 5849ef9 48245->48334 48338 5849538 48245->48338 48342 58491bd 48245->48342 48346 5849d33 48245->48346 48352 5849771 48245->48352 48356 5849f34 48245->48356 48360 58498ea 48245->48360 48364 58495ea 48245->48364 48369 5849929 48245->48369 48376 5849169 48245->48376 48380 58497e9 48245->48380 48386 58496af 48245->48386 48391 5849a6e 48245->48391 48398 58491a3 48245->48398 48407 58495a1 48245->48407 48411 5849960 48245->48411 48418 584989b 48245->48418 48422 5849398 48245->48422 48426 584925e 48245->48426 48432 5849a91 48245->48432 48436 5848f90 48245->48436 48440 5849b57 48245->48440 48447 5849ed6 48245->48447 48451 5849cd6 48245->48451 48456 5849a14 48245->48456 48460 58499d4 48245->48460 48464 5849354 48245->48464 48246 5848f77 48246->48238 48285 58494d5 48284->48285 48468 584b750 48285->48468 48473 584b740 48285->48473 48286 584950f 48286->48246 48486 584b888 48289->48486 48491 584b878 48289->48491 48290 5849489 48290->48289 48291 58495f7 48290->48291 48295 58497e8 48294->48295 48296 584901d 48294->48296 48504 584b6e8 48295->48504 48509 584b6f8 48295->48509 48297 5849111 48296->48297 48514 584b699 48296->48514 48297->48246 48303 584901d 48301->48303 48302 5849111 48302->48246 48303->48302 48304 584b699 2 API calls 48303->48304 48304->48303 48307 584901d 48305->48307 48306 5849111 48306->48246 48307->48306 48308 584b699 2 API calls 48307->48308 48308->48307 48310 584901d 48309->48310 48311 5849111 48310->48311 48312 584b699 2 API calls 48310->48312 48311->48246 48312->48310 48314 584901d 48313->48314 48315 5849111 48314->48315 48316 584b699 2 API calls 48314->48316 48315->48246 48316->48314 48319 5848fc3 48317->48319 48318 5849111 48318->48246 48319->48318 48320 584b699 2 API calls 48319->48320 48320->48319 48322 5849cfc 48321->48322 48325 584901d 48321->48325 48527 50dd599 48322->48527 48531 50dd5a0 48322->48531 48323 5849111 48323->48246 48324 5849d11 48324->48246 48325->48323 48328 584b699 2 API calls 48325->48328 48328->48325 48330 5849cfd 48329->48330 48332 50dd599 ResumeThread 48330->48332 48333 50dd5a0 ResumeThread 48330->48333 48331 5849d11 48331->48246 48332->48331 48333->48331 48336 584901d 48334->48336 48335 5849111 48335->48246 48336->48335 48337 584b699 2 API calls 48336->48337 48337->48336 48339 584901d 48338->48339 48340 5849111 48339->48340 48341 584b699 2 API calls 48339->48341 48340->48246 48341->48339 48343 584901d 48342->48343 48344 5849111 48343->48344 48345 584b699 2 API calls 48343->48345 48344->48246 48345->48343 48347 5849cf0 48346->48347 48348 5849d36 48346->48348 48350 50dd599 ResumeThread 48347->48350 48351 50dd5a0 ResumeThread 48347->48351 48349 5849d11 48349->48246 48350->48349 48351->48349 48354 584901d 48352->48354 48353 5849111 48353->48246 48354->48353 48355 584b699 2 API calls 48354->48355 48355->48354 48357 584901d 48356->48357 48358 5849111 48357->48358 48359 584b699 2 API calls 48357->48359 48358->48246 48359->48357 48362 584901d 48360->48362 48361 5849111 48361->48246 48362->48361 48363 584b699 2 API calls 48362->48363 48363->48362 48365 58495f7 48364->48365 48366 5849489 48364->48366 48366->48364 48367 584b888 2 API calls 48366->48367 48368 584b878 2 API calls 48366->48368 48367->48366 48368->48366 48370 5849b7d 48369->48370 48373 584b6e8 2 API calls 48370->48373 48374 584b6f8 2 API calls 48370->48374 48371 5849111 48371->48246 48372 584901d 48372->48371 48375 584b699 2 API calls 48372->48375 48373->48372 48374->48372 48375->48372 48378 584901d 48376->48378 48377 5849111 48377->48246 48378->48377 48379 584b699 2 API calls 48378->48379 48379->48378 48384 584b6e8 2 API calls 48380->48384 48385 584b6f8 2 API calls 48380->48385 48381 5849111 48381->48246 48382 584901d 48382->48381 48383 584b699 2 API calls 48382->48383 48383->48382 48384->48382 48385->48382 48387 58496b1 48386->48387 48535 584a430 48387->48535 48541 584a440 48387->48541 48388 58496e9 48392 5849a78 48391->48392 48395 584b6e8 2 API calls 48392->48395 48396 584b6f8 2 API calls 48392->48396 48393 584901d 48394 5849111 48393->48394 48397 584b699 2 API calls 48393->48397 48394->48246 48395->48393 48396->48393 48397->48393 48399 58491b0 48398->48399 48400 58494f1 48398->48400 48399->48400 48402 584901d 48399->48402 48404 584b740 2 API calls 48400->48404 48405 584b750 2 API calls 48400->48405 48401 584950f 48401->48246 48403 5849111 48402->48403 48406 584b699 2 API calls 48402->48406 48403->48246 48404->48401 48405->48401 48406->48402 48409 584901d 48407->48409 48408 5849111 48408->48246 48409->48408 48410 584b699 2 API calls 48409->48410 48410->48409 48412 5849970 48411->48412 48414 584901d 48411->48414 48416 584b740 2 API calls 48412->48416 48417 584b750 2 API calls 48412->48417 48413 5849111 48413->48246 48414->48413 48415 584b699 2 API calls 48414->48415 48415->48414 48416->48414 48417->48414 48419 584901d 48418->48419 48420 5849111 48419->48420 48421 584b699 2 API calls 48419->48421 48420->48246 48421->48419 48424 584901d 48422->48424 48423 5849111 48423->48246 48424->48423 48425 584b699 2 API calls 48424->48425 48425->48424 48430 584b740 2 API calls 48426->48430 48431 584b750 2 API calls 48426->48431 48427 584901d 48428 5849111 48427->48428 48429 584b699 2 API calls 48427->48429 48428->48246 48429->48427 48430->48427 48431->48427 48434 584901d 48432->48434 48433 5849111 48433->48246 48434->48433 48435 584b699 2 API calls 48434->48435 48435->48434 48438 5848fc3 48436->48438 48437 5849111 48437->48246 48438->48437 48439 584b699 2 API calls 48438->48439 48439->48438 48441 5849b61 48440->48441 48444 584b6e8 2 API calls 48441->48444 48445 584b6f8 2 API calls 48441->48445 48442 584901d 48443 5849111 48442->48443 48446 584b699 2 API calls 48442->48446 48443->48246 48444->48442 48445->48442 48446->48442 48448 584901d 48447->48448 48449 5849111 48448->48449 48450 584b699 2 API calls 48448->48450 48449->48246 48450->48448 48452 5849ce0 48451->48452 48454 50dd599 ResumeThread 48452->48454 48455 50dd5a0 ResumeThread 48452->48455 48453 5849d11 48453->48246 48454->48453 48455->48453 48458 584901d 48456->48458 48457 5849111 48457->48246 48458->48457 48459 584b699 2 API calls 48458->48459 48459->48458 48461 584901d 48460->48461 48462 5849111 48461->48462 48463 584b699 2 API calls 48461->48463 48462->48246 48463->48461 48466 584901d 48464->48466 48465 5849111 48465->48246 48466->48465 48467 584b699 2 API calls 48466->48467 48467->48466 48469 584b765 48468->48469 48478 50dd208 48469->48478 48482 50dd201 48469->48482 48470 584b787 48470->48286 48474 584b765 48473->48474 48476 50dd208 WriteProcessMemory 48474->48476 48477 50dd201 WriteProcessMemory 48474->48477 48475 584b787 48475->48286 48476->48475 48477->48475 48479 50dd251 WriteProcessMemory 48478->48479 48481 50dd2ea 48479->48481 48481->48470 48483 50dd208 WriteProcessMemory 48482->48483 48485 50dd2ea 48483->48485 48485->48470 48487 584b89d 48486->48487 48496 50dc8c8 48487->48496 48500 50dc8c1 48487->48500 48488 584b8b6 48488->48290 48492 584b89d 48491->48492 48494 50dc8c8 Wow64SetThreadContext 48492->48494 48495 50dc8c1 Wow64SetThreadContext 48492->48495 48493 584b8b6 48493->48290 48494->48493 48495->48493 48497 50dc911 Wow64SetThreadContext 48496->48497 48499 50dc989 48497->48499 48499->48488 48501 50dc8c8 Wow64SetThreadContext 48500->48501 48503 50dc989 48501->48503 48503->48488 48505 584b70d 48504->48505 48519 50dcf48 48505->48519 48523 50dcf40 48505->48523 48506 584b72f 48506->48296 48510 584b70d 48509->48510 48512 50dcf48 VirtualAllocEx 48510->48512 48513 50dcf40 VirtualAllocEx 48510->48513 48511 584b72f 48511->48296 48512->48511 48513->48511 48515 584b6bd 48514->48515 48517 50dc8c8 Wow64SetThreadContext 48515->48517 48518 50dc8c1 Wow64SetThreadContext 48515->48518 48516 584b6d6 48516->48296 48517->48516 48518->48516 48520 50dcf8c VirtualAllocEx 48519->48520 48522 50dd004 48520->48522 48522->48506 48524 50dcf48 VirtualAllocEx 48523->48524 48526 50dd004 48524->48526 48526->48506 48528 50dd5a0 ResumeThread 48527->48528 48530 50dd630 48528->48530 48530->48324 48532 50dd5e4 ResumeThread 48531->48532 48534 50dd630 48532->48534 48534->48324 48536 584a457 48535->48536 48537 584a479 48536->48537 48547 584a617 48536->48547 48552 584a70f 48536->48552 48557 584a673 48536->48557 48537->48388 48542 584a457 48541->48542 48543 584a479 48542->48543 48544 584a617 2 API calls 48542->48544 48545 584a673 2 API calls 48542->48545 48546 584a70f 2 API calls 48542->48546 48543->48388 48544->48543 48545->48543 48546->48543 48548 584a620 48547->48548 48562 50dc50d 48548->48562 48566 50dc518 48548->48566 48553 584a69b 48552->48553 48555 50dc50d CreateProcessA 48553->48555 48556 50dc518 CreateProcessA 48553->48556 48554 584ad6b 48555->48554 48556->48554 48558 584a69b 48557->48558 48560 50dc50d CreateProcessA 48558->48560 48561 50dc518 CreateProcessA 48558->48561 48559 584ad6b 48560->48559 48561->48559 48564 50dc598 CreateProcessA 48562->48564 48565 50dc794 48564->48565 48568 50dc598 CreateProcessA 48566->48568 48569 50dc794 48568->48569 48570 71276cf 48571 71276d9 48570->48571 48575 50deb18 48571->48575 48581 50deb28 48571->48581 48572 71271f9 48576 50deb28 48575->48576 48587 50df127 48576->48587 48591 50def70 48576->48591 48595 50def60 48576->48595 48577 50deb53 48577->48572 48582 50deb2d 48581->48582 48584 50df127 10 API calls 48582->48584 48585 50def60 10 API calls 48582->48585 48586 50def70 10 API calls 48582->48586 48583 50deb53 48583->48572 48584->48583 48585->48583 48586->48583 48588 50defca 48587->48588 48589 50defdf 48588->48589 48599 50df42b 48588->48599 48589->48577 48593 50def9a 48591->48593 48592 50defdf 48592->48577 48593->48592 48594 50df42b 10 API calls 48593->48594 48594->48593 48597 50def65 48595->48597 48596 50defdf 48596->48577 48597->48596 48598 50df42b 10 API calls 48597->48598 48598->48597 48600 50df44d 48599->48600 48601 50df466 48600->48601 48609 5840bdb 48600->48609 48614 5840d39 48600->48614 48619 58408bf 48600->48619 48627 584014f 48600->48627 48631 584035e 48600->48631 48637 584078d 48600->48637 48643 58404c4 48600->48643 48601->48588 48610 5840bf2 48609->48610 48647 50ddc48 48610->48647 48651 50ddc50 48610->48651 48611 5840c18 48615 58408c7 48614->48615 48616 5840136 48614->48616 48615->48614 48655 50de145 48615->48655 48659 50de150 48615->48659 48620 58408c5 48619->48620 48621 58408c7 48620->48621 48625 50de145 CreateFileA 48620->48625 48626 50de150 CreateFileA 48620->48626 48622 5840136 48621->48622 48623 50de145 CreateFileA 48621->48623 48624 50de150 CreateFileA 48621->48624 48623->48621 48624->48621 48625->48621 48626->48621 48663 58411f8 48627->48663 48668 58411eb 48627->48668 48628 5840136 48632 584045a 48631->48632 48634 5840136 48631->48634 48681 58413e0 48632->48681 48686 58413cf 48632->48686 48633 584046d 48633->48601 48638 5840797 48637->48638 48639 584045b 48637->48639 48641 58413e0 2 API calls 48639->48641 48642 58413cf 2 API calls 48639->48642 48640 584046d 48640->48601 48641->48640 48642->48640 48699 50de395 48643->48699 48703 50de3a0 48643->48703 48648 50ddc50 K32GetModuleInformation 48647->48648 48650 50ddd06 48648->48650 48650->48611 48652 50ddc99 K32GetModuleInformation 48651->48652 48654 50ddd06 48652->48654 48654->48611 48657 50de150 CreateFileA 48655->48657 48658 50de2a6 48657->48658 48660 50de1b2 CreateFileA 48659->48660 48662 50de2a6 48660->48662 48664 584120d 48663->48664 48673 50de5d8 48664->48673 48677 50de5e0 48664->48677 48665 584122f 48665->48628 48669 58411f8 48668->48669 48671 50de5d8 MapViewOfFile 48669->48671 48672 50de5e0 MapViewOfFile 48669->48672 48670 584122f 48670->48628 48671->48670 48672->48670 48674 50de5e0 MapViewOfFile 48673->48674 48676 50de69c 48674->48676 48676->48665 48678 50de624 MapViewOfFile 48677->48678 48680 50de69c 48678->48680 48680->48665 48682 58413f5 48681->48682 48691 50dc108 48682->48691 48695 50dc110 48682->48695 48683 584140b 48683->48633 48687 58413e0 48686->48687 48689 50dc108 FindCloseChangeNotification 48687->48689 48690 50dc110 FindCloseChangeNotification 48687->48690 48688 584140b 48688->48633 48689->48688 48690->48688 48692 50dc110 FindCloseChangeNotification 48691->48692 48694 50dc1a0 48692->48694 48694->48683 48696 50dc154 FindCloseChangeNotification 48695->48696 48698 50dc1a0 48696->48698 48698->48683 48702 50de3a0 CreateFileMappingA 48699->48702 48701 50de4e8 48702->48701 48705 50de402 CreateFileMappingA 48703->48705 48706 50de4e8 48705->48706 48182 2f6c4f8 48183 2f6c4f9 48182->48183 48184 2f6c525 48183->48184 48187 71f1b4b 48183->48187 48190 71f3572 48183->48190 48194 71fd370 48187->48194 48193 71fd370 VirtualProtect 48190->48193 48191 71f2fc6 48191->48190 48192 71f359d 48191->48192 48193->48191 48196 71fd397 48194->48196 48198 71fd4f8 48196->48198 48199 71fd541 VirtualProtect 48198->48199 48201 71f1b69 48199->48201 48707 71fe6c0 48708 71fe704 VirtualAlloc 48707->48708 48710 71fe771 48708->48710
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,aq$4$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                  • API String ID: 0-3443518476
                                  • Opcode ID: 479f1374690b50bd9b6e8653c1a10ae1c96668a0df184202c6cf6abf291bf044
                                  • Instruction ID: cbd37ac27ee9dad1270257540aae1c2eabf85d8538a74cdfde7bcd6e0815a759
                                  • Opcode Fuzzy Hash: 479f1374690b50bd9b6e8653c1a10ae1c96668a0df184202c6cf6abf291bf044
                                  • Instruction Fuzzy Hash: 6EB209B4A00229CFDB15CFA8C884BADB7B5FB48700F158599E505AB3A4DB70DD52DF90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q
                                  • API String ID: 0-1007455737
                                  • Opcode ID: 6b1e9d5232cc73378f049215cf67ae8308b497eeec9888bee2b209664e327ad7
                                  • Instruction ID: ff67dbed797fa094938533852c13c51744839d061782192428c42ebfe40f0a15
                                  • Opcode Fuzzy Hash: 6b1e9d5232cc73378f049215cf67ae8308b497eeec9888bee2b209664e327ad7
                                  • Instruction Fuzzy Hash: 2512D474A402058FCB14DF68C988E6EBBF6FF89710B1584A9E906DB361DB35EC42DB50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te]q
                                  • API String ID: 0-52440209
                                  • Opcode ID: a7696c3f3a7bc56f1a7546aa27f324f7b5dfef6403dc20bbb4adcb14af6c88e9
                                  • Instruction ID: 0a22a0436fae4a717802214f1b69ca01581f562e10365cbd530805feeb330494
                                  • Opcode Fuzzy Hash: a7696c3f3a7bc56f1a7546aa27f324f7b5dfef6403dc20bbb4adcb14af6c88e9
                                  • Instruction Fuzzy Hash: ECF1F5B0E05229CFDB64CF69C985BA9BBF6FB49300F1090AAD40DA7290DB749D95DF00
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te]q
                                  • API String ID: 0-52440209
                                  • Opcode ID: 8bcc4d9651911c705c0e317cada41c1c7da314cb729b786d38995252e45c4f1b
                                  • Instruction ID: 58a728b3d372538e0edf89d55cc3640592af18c94a1c5f435805baef0d0603f5
                                  • Opcode Fuzzy Hash: 8bcc4d9651911c705c0e317cada41c1c7da314cb729b786d38995252e45c4f1b
                                  • Instruction Fuzzy Hash: 9DC1E4B0E00229DFDB14CF69D885B9DBBF2FF89310F1090AAD408A7295D7749996DF01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Ddq
                                  • API String ID: 0-562783569
                                  • Opcode ID: c155205fafbcdb40406ac1c9920ad70c052452c5c116398f806783287cc80994
                                  • Instruction ID: 33ddb6fb40057d17a89069f29722d84c3a7df895d3693c50f7b91eba77581c2e
                                  • Opcode Fuzzy Hash: c155205fafbcdb40406ac1c9920ad70c052452c5c116398f806783287cc80994
                                  • Instruction Fuzzy Hash: 4AD1E274E01218CFDB54DFA9D980AADBBB2FF89300F1091A9D409AB365DB35AD81CF51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te]q
                                  • API String ID: 0-52440209
                                  • Opcode ID: 34a458181ad983ca9a803218af6e9ec2da9aaa796bbe9572f21572d1e42d7a2a
                                  • Instruction ID: a20e80d2f79f88369370a5ab67920d8157be53dbe7f7c48676a58c4a1be27e09
                                  • Opcode Fuzzy Hash: 34a458181ad983ca9a803218af6e9ec2da9aaa796bbe9572f21572d1e42d7a2a
                                  • Instruction Fuzzy Hash: 6EB1D5B0E05229DFDB18CF6AD844BADBBF6BF89310F1090A5D40DA7291D7745996DF00
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: !
                                  • API String ID: 0-2657877971
                                  • Opcode ID: d296be5478fdf3384a93d61898ce096bf538f3b6e51dc2b7d88f7aee0d4cc66e
                                  • Instruction ID: 6acb8f3ddbfdf2a41db52c132b28cae85820438dc1c694fd35f014a5ac88a506
                                  • Opcode Fuzzy Hash: d296be5478fdf3384a93d61898ce096bf538f3b6e51dc2b7d88f7aee0d4cc66e
                                  • Instruction Fuzzy Hash: 4A51D370D4526CCFEB24CF56C948BEABAF6AB89304F0490EAD809B7250D7754E85CF24
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c5f589032d359dfcde43715c476d937605140f004716ae336b433f107cb706d5
                                  • Instruction ID: 3376b76622a9166c7061d6243655bb9e28cccaefa4b0b843a0912977c7f79c2e
                                  • Opcode Fuzzy Hash: c5f589032d359dfcde43715c476d937605140f004716ae336b433f107cb706d5
                                  • Instruction Fuzzy Hash: BFF1D070E05218CFDB54CFA9D988BADBBF6BB49304F1090AAD81DAB250DB745D86CF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c4e40cabb5d5fd40823ae175a21f61c8777ed40be7c8caa577b36a334366b9f2
                                  • Instruction ID: 96a539cef93ed03824fd2c872d0ab3f387572c5a3938dcd675835d0082d8aa88
                                  • Opcode Fuzzy Hash: c4e40cabb5d5fd40823ae175a21f61c8777ed40be7c8caa577b36a334366b9f2
                                  • Instruction Fuzzy Hash: 2EF1D074E05218CFDB54CFA9D988BADBBF6BB49304F1090AAD81DAB250DB745D86CF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 852d2e28ab589cf3351c577d2686e684f20e8127aeecc652a25a7b8786859e90
                                  • Instruction ID: 7c05482833ea3c162a4736553ff43671b6b868285b10239a1ff58b85542b4dbc
                                  • Opcode Fuzzy Hash: 852d2e28ab589cf3351c577d2686e684f20e8127aeecc652a25a7b8786859e90
                                  • Instruction Fuzzy Hash: 89D1EFB4E45218CFDB14CFA8D844BADBBB2FB49314F10A06AD809A7390DB789D85CF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 94a9127b57d13a91292ef74760b6541cffc659f85ebe178e765afddac5ba28ae
                                  • Instruction ID: b8ab8fe121a3fd012c0ce22039dd772d892967f64b886f0a4e3e7174690bbbe0
                                  • Opcode Fuzzy Hash: 94a9127b57d13a91292ef74760b6541cffc659f85ebe178e765afddac5ba28ae
                                  • Instruction Fuzzy Hash: 06D1EEB4E45218CFDB14CFA8D844BADBBB6FB49314F10A06AD809A7290DB785D85CF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5dd43ee133c9ab14a9129efd41be6d3579fbb24ba0ed3c8161d3713d659508ca
                                  • Instruction ID: 86cc31b0955be915d0df1b25889c2cb955919501834ac83dc7fc5db062b34e51
                                  • Opcode Fuzzy Hash: 5dd43ee133c9ab14a9129efd41be6d3579fbb24ba0ed3c8161d3713d659508ca
                                  • Instruction Fuzzy Hash: 3BC10671D04318CFDB14CFAAD884BAEBBB6FB8D300F1090AAD619A7251DB745985DF01
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 505705d8f96e8102ec8bca13d2fd7e7fff6abdd5b164a9740c8b50ea54618dda
                                  • Instruction ID: ada98fbb0bd596d658f3e163eba8885884c71256a43b04e6a946c7f7184b17b1
                                  • Opcode Fuzzy Hash: 505705d8f96e8102ec8bca13d2fd7e7fff6abdd5b164a9740c8b50ea54618dda
                                  • Instruction Fuzzy Hash: B4B12871D04318CFDB14CFA9D888BADBBB2BB4D304F1490AAD619E7251DB745985EF01
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b1f11e86787bcf8cee3075d68e134874280fed5964858366fb19ba9384344126
                                  • Instruction ID: d5833e1887be38bc4158934f4231a7e32a7d8b0ad93d04cc7887e5407589a68a
                                  • Opcode Fuzzy Hash: b1f11e86787bcf8cee3075d68e134874280fed5964858366fb19ba9384344126
                                  • Instruction Fuzzy Hash: 14B11575D04318CFDB24CF6AD888BAEBBB2BB8D300F1490AAD619A7251DB745985DF01
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e84738a6c0e6ee67bcdef58d4514d4156eb27ad965a7ae0505bd168e4027d826
                                  • Instruction ID: bc01eae1ed3bf4df6942995468ea1e0fcaddb99c9010c74ae4c08c3189ff9c04
                                  • Opcode Fuzzy Hash: e84738a6c0e6ee67bcdef58d4514d4156eb27ad965a7ae0505bd168e4027d826
                                  • Instruction Fuzzy Hash: D5B1F475E04318CFDB24CFAAD888BADBBB2FB4D304F1490AAD219A7251DB745985DF01
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4750a4fd008d6ace652237e90db858369e6311a5dc276cc7835000e13b841814
                                  • Instruction ID: ef9e2bc75f33122bcfb9191a6e5d9d80ca2ac90ccd35fc58588513bf106132db
                                  • Opcode Fuzzy Hash: 4750a4fd008d6ace652237e90db858369e6311a5dc276cc7835000e13b841814
                                  • Instruction Fuzzy Hash: D1A10675D04318CFDB14CFA6D888BAEBBB2FB4D304F1090AAD619A7251DB745985DF01
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 08d5f163cf20719521022dc995e3c159a3f6e76752a7272b1b6e573cb56f9e90
                                  • Instruction ID: 5f8b3609c9f9d6eeb92b610670c1addd1515cb2da1642296938bb749af6cfd22
                                  • Opcode Fuzzy Hash: 08d5f163cf20719521022dc995e3c159a3f6e76752a7272b1b6e573cb56f9e90
                                  • Instruction Fuzzy Hash: 88811574E44209CFDB54CFA9E485BADFBFABB4A300F64A069E40AA7351DB345985CF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 841718782fff6778a761c0d648e8c5518f865212ddbfc93a510df8a391beeb67
                                  • Instruction ID: c457c7d85f368705c847c8ce346cd63a11d45de638e9057261b4c9bfe82c5a39
                                  • Opcode Fuzzy Hash: 841718782fff6778a761c0d648e8c5518f865212ddbfc93a510df8a391beeb67
                                  • Instruction Fuzzy Hash: 35812674E04209CFDB54CFA9E485BADFBFABB49310F64A069E40AA7351DB345981CF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7e58314cc0e9424cbd84d894396cec37318e914c7c9c23fc81dcb805054c9663
                                  • Instruction ID: db9b064bd3b4563eb0eb9d5ab9cbc65df9d34ed2653920d577aec3bcd1b359e7
                                  • Opcode Fuzzy Hash: 7e58314cc0e9424cbd84d894396cec37318e914c7c9c23fc81dcb805054c9663
                                  • Instruction Fuzzy Hash: AB81D374E44209CFDB54CFA9E485BADFBF6BB4A310F64A069D40AA7251DB349982CF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 12c70153d6a90ebbc29114a07502d924c005858c604d67a1135dd05a688ae157
                                  • Instruction ID: 8bcd05f7ada10ac5d6c32aac08d3e9b2edfdfd44e36c9a8cc532b64338f53f65
                                  • Opcode Fuzzy Hash: 12c70153d6a90ebbc29114a07502d924c005858c604d67a1135dd05a688ae157
                                  • Instruction Fuzzy Hash: 4471F474E44209CFDB54CFA9E485BADFBF6BB4A300F64A069E40AA7251DB345D82CF10

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1014 57ec848-57ec870 1016 57ec8be-57ec8cc 1014->1016 1017 57ec872-57ec8b9 1014->1017 1018 57ec8ce-57ec8d9 call 57ea638 1016->1018 1019 57ec8db 1016->1019 1064 57ecd15-57ecd1c 1017->1064 1022 57ec8dd-57ec8e4 1018->1022 1019->1022 1024 57ec9cd-57ec9d1 1022->1024 1025 57ec8ea-57ec8ee 1022->1025 1029 57eca27-57eca31 1024->1029 1030 57ec9d3-57ec9e2 1024->1030 1026 57ecd1d-57ecd45 1025->1026 1027 57ec8f4-57ec8f8 1025->1027 1035 57ecd4c-57ecd76 1026->1035 1031 57ec90a-57ec968 call 57ea378 call 57eade0 1027->1031 1032 57ec8fa-57ec904 1027->1032 1033 57eca6a-57eca90 1029->1033 1034 57eca33-57eca42 1029->1034 1042 57ec9e6-57ec9eb 1030->1042 1074 57ec96e-57ec9c8 1031->1074 1075 57ecddb-57ece05 1031->1075 1032->1031 1032->1035 1053 57eca9d 1033->1053 1054 57eca92-57eca9b 1033->1054 1047 57ecd7e-57ecd94 1034->1047 1048 57eca48-57eca65 1034->1048 1035->1047 1049 57ec9ed-57eca22 call 57ec310 1042->1049 1050 57ec9e4 1042->1050 1072 57ecd9c-57ecdd4 1047->1072 1048->1064 1049->1064 1050->1042 1062 57eca9f-57ecac7 1053->1062 1054->1062 1078 57ecacd-57ecae6 1062->1078 1079 57ecb98-57ecb9c 1062->1079 1072->1075 1074->1064 1084 57ece0f-57ece15 1075->1084 1085 57ece07-57ece0d 1075->1085 1078->1079 1105 57ecaec-57ecafb 1078->1105 1082 57ecb9e-57ecbb7 1079->1082 1083 57ecc16-57ecc20 1079->1083 1082->1083 1109 57ecbb9-57ecbc8 1082->1109 1088 57ecc7d-57ecc86 1083->1088 1089 57ecc22-57ecc2c 1083->1089 1085->1084 1087 57ece16-57ece53 1085->1087 1093 57eccbe-57ecd0b 1088->1093 1094 57ecc88-57eccb6 1088->1094 1103 57ecc2e-57ecc30 1089->1103 1104 57ecc32-57ecc44 1089->1104 1115 57ecd13 1093->1115 1094->1093 1110 57ecc46-57ecc48 1103->1110 1104->1110 1117 57ecafd-57ecb03 1105->1117 1118 57ecb13-57ecb28 1105->1118 1130 57ecbca-57ecbd0 1109->1130 1131 57ecbe0-57ecbeb 1109->1131 1113 57ecc4a-57ecc4e 1110->1113 1114 57ecc76-57ecc7b 1110->1114 1120 57ecc6c-57ecc6f 1113->1120 1121 57ecc50-57ecc69 1113->1121 1114->1088 1114->1089 1115->1064 1124 57ecb07-57ecb09 1117->1124 1125 57ecb05 1117->1125 1128 57ecb5c-57ecb65 1118->1128 1129 57ecb2a-57ecb56 1118->1129 1120->1114 1121->1120 1124->1118 1125->1118 1128->1075 1135 57ecb6b-57ecb92 1128->1135 1129->1072 1129->1128 1136 57ecbd4-57ecbd6 1130->1136 1137 57ecbd2 1130->1137 1131->1075 1132 57ecbf1-57ecc14 1131->1132 1132->1083 1132->1109 1135->1079 1135->1105 1136->1131 1137->1131
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Haq$Haq$Haq
                                  • API String ID: 0-3013282719
                                  • Opcode ID: bde9659ba7195a160c98aff4503d1b9c32ce85cd0d184a27c91d889b7b4c009d
                                  • Instruction ID: 3ab0c7f7240a4149435e70231daba8b73480b3060b86c713f7e564b64bd27ad6
                                  • Opcode Fuzzy Hash: bde9659ba7195a160c98aff4503d1b9c32ce85cd0d184a27c91d889b7b4c009d
                                  • Instruction Fuzzy Hash: 92126C34A003058FCB15DFA5D494AAEBBB6FF89300F14856DE44AAB394DB35EC46DB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1148 57ee500-57ee53d 1150 57ee55f-57ee575 call 57ee308 1148->1150 1151 57ee53f-57ee542 1148->1151 1157 57ee8eb-57ee8ff 1150->1157 1158 57ee57b-57ee587 1150->1158 1262 57ee544 call 57eee08 1151->1262 1263 57ee544 call 57eee70 1151->1263 1153 57ee54a-57ee54c 1153->1150 1155 57ee54e-57ee556 1153->1155 1155->1150 1167 57ee93f-57ee948 1157->1167 1159 57ee58d-57ee590 1158->1159 1160 57ee6b8-57ee6bf 1158->1160 1164 57ee593-57ee59c 1159->1164 1162 57ee7ee-57ee82b call 57edd10 call 748f938 1160->1162 1163 57ee6c5-57ee6ce 1160->1163 1207 57ee831-57ee8e2 call 57edd10 1162->1207 1163->1162 1168 57ee6d4-57ee7e0 call 57edd10 call 57ee2a0 call 57edd10 1163->1168 1165 57ee5a2-57ee5b6 1164->1165 1166 57ee9e0 1164->1166 1182 57ee5bc-57ee651 call 57ee308 * 2 call 57edd10 call 57ee2a0 call 57ee348 call 57ee3f0 call 57ee458 1165->1182 1183 57ee6a8-57ee6b2 1165->1183 1173 57ee9e5-57ee9e9 1166->1173 1170 57ee90d-57ee916 1167->1170 1171 57ee94a-57ee951 1167->1171 1259 57ee7eb 1168->1259 1260 57ee7e2 1168->1260 1170->1166 1175 57ee91c-57ee92e 1170->1175 1177 57ee99f-57ee9a6 1171->1177 1178 57ee953-57ee996 call 57edd10 1171->1178 1179 57ee9eb 1173->1179 1180 57ee9f4 1173->1180 1194 57ee93e 1175->1194 1195 57ee930-57ee935 1175->1195 1184 57ee9cb-57ee9de 1177->1184 1185 57ee9a8-57ee9b8 1177->1185 1178->1177 1179->1180 1192 57ee9f5 1180->1192 1238 57ee653-57ee66b call 57ee3f0 call 57edd10 call 57edfc0 1182->1238 1239 57ee670-57ee6a3 call 57ee458 1182->1239 1183->1160 1183->1164 1184->1173 1185->1184 1198 57ee9ba-57ee9c2 1185->1198 1192->1192 1194->1167 1264 57ee938 call 57effa0 1195->1264 1265 57ee938 call 57eff91 1195->1265 1198->1184 1207->1157 1238->1239 1239->1183 1259->1162 1260->1259 1262->1153 1263->1153 1264->1194 1265->1194
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q$4']q$4']q
                                  • API String ID: 0-705557208
                                  • Opcode ID: ea3ca43f64afc24fabc246a17e017f0f627418de82467bb661fd4146c677e43e
                                  • Instruction ID: eda799cc995875cb9505c0e88684f530b485ac5c3308331c7e2eb0c92a3c4bed
                                  • Opcode Fuzzy Hash: ea3ca43f64afc24fabc246a17e017f0f627418de82467bb661fd4146c677e43e
                                  • Instruction Fuzzy Hash: DAF1DC34B10218DFCB04DFA4D999A9DBBB6FF89300F118958E806AB365DB74EC42DB51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1435 5849960-584996e 1436 5849970-584997a 1435->1436 1437 584990c 1435->1437 1466 584997d call 584b740 1436->1466 1467 584997d call 584b750 1436->1467 1438 5849175-584917e 1437->1438 1439 5849912-584991d 1437->1439 1440 5849187-5849fd2 call 584b699 1438->1440 1441 5849180 1438->1441 1439->1438 1462 5849fd8-584a010 1440->1462 1445 5849035-5849036 1441->1445 1446 58490d5-58490f8 1441->1446 1447 5849060-5849067 1441->1447 1448 58490a1-58490c1 1441->1448 1449 5849111-5849118 1441->1449 1450 584904d-584905e 1441->1450 1451 584910e-584910f 1441->1451 1452 584903b-584904b 1441->1452 1453 584913b-5849167 1441->1453 1454 584911b-5849136 1441->1454 1442 5849983-58499be 1442->1438 1443 58499c4-58499cf 1442->1443 1443->1438 1445->1454 1455 584901d-5849026 1446->1455 1456 58490fe-5849109 1446->1456 1447->1449 1457 584906d-584908f 1447->1457 1448->1455 1458 58490c7-58490d0 1448->1458 1450->1455 1451->1446 1452->1455 1453->1438 1454->1455 1459 584902f-5849030 1455->1459 1460 5849028 1455->1460 1456->1455 1457->1455 1463 5849091-584909c 1457->1463 1458->1455 1459->1445 1459->1454 1460->1445 1460->1446 1460->1447 1460->1448 1460->1449 1460->1450 1460->1451 1460->1452 1460->1453 1460->1454 1462->1438 1464 584a016-584a021 1462->1464 1463->1455 1464->1438 1466->1442 1467->1442
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: )$0$H
                                  • API String ID: 0-2284277653
                                  • Opcode ID: 8b8c84ddb1da4c6ef52ce95b7fa4698ee60c6ae35429d4e95145a62224e91f29
                                  • Instruction ID: 48cea0a249f8583715f360da8e898a574fd72fa9a40e26edceb437d052078f68
                                  • Opcode Fuzzy Hash: 8b8c84ddb1da4c6ef52ce95b7fa4698ee60c6ae35429d4e95145a62224e91f29
                                  • Instruction Fuzzy Hash: 1E41F37494526CCFEB20CF55C849BEABBB2AB09314F0090D6D90AB7250D77A4EC5CF24

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1468 5849a6e-5849a72 1469 5849b7d-5849b90 1468->1469 1470 5849a78-5849a82 1468->1470 1497 5849b93 call 584b6e8 1469->1497 1498 5849b93 call 584b6f8 1469->1498 1470->1469 1471 5849b99-5849bc7 1472 5849175-584917e 1471->1472 1473 5849bcd-5849bd8 1471->1473 1474 5849187-5849fd2 call 584b699 1472->1474 1475 5849180 1472->1475 1473->1472 1494 5849fd8-584a010 1474->1494 1477 5849035-5849036 1475->1477 1478 58490d5-58490f8 1475->1478 1479 5849060-5849067 1475->1479 1480 58490a1-58490c1 1475->1480 1481 5849111-5849118 1475->1481 1482 584904d-584905e 1475->1482 1483 584910e-584910f 1475->1483 1484 584903b-584904b 1475->1484 1485 584913b-5849167 1475->1485 1486 584911b-5849136 1475->1486 1477->1486 1487 584901d-5849026 1478->1487 1488 58490fe-5849109 1478->1488 1479->1481 1489 584906d-584908f 1479->1489 1480->1487 1490 58490c7-58490d0 1480->1490 1482->1487 1483->1478 1484->1487 1485->1472 1486->1487 1491 584902f-5849030 1487->1491 1492 5849028 1487->1492 1488->1487 1489->1487 1495 5849091-584909c 1489->1495 1490->1487 1491->1477 1491->1486 1492->1477 1492->1478 1492->1479 1492->1480 1492->1481 1492->1482 1492->1483 1492->1484 1492->1485 1492->1486 1494->1472 1496 584a016-584a021 1494->1496 1495->1487 1496->1472 1497->1471 1498->1471
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: %$.$H
                                  • API String ID: 0-1534012654
                                  • Opcode ID: 43465a9cc94f31f48129bc16c50840c4943abc9c96d4699f1cf5deef1a4e3aa7
                                  • Instruction ID: bf7d6d79cf812b2246d8aa429abe1c9608efaf5a3a34a10f581da312429961c3
                                  • Opcode Fuzzy Hash: 43465a9cc94f31f48129bc16c50840c4943abc9c96d4699f1cf5deef1a4e3aa7
                                  • Instruction Fuzzy Hash: 6341F07494426CCFEB20CF55C849BEABBB6BB49304F00A0D6D80AB7250D3795E85CF24

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1740 712ecc0-712ece6 1741 712ecf7-712ed00 1740->1741 1742 712ece8-712ecf5 1740->1742 1742->1741 1743 712ed03-712ed10 1742->1743 1744 712ed12-712ed19 1743->1744 1745 712ed1b 1743->1745 1746 712ed22-712ed4c 1744->1746 1745->1746 1747 712ed55-712ed68 call 712e9a0 1746->1747 1748 712ed4e 1746->1748 1751 712ed6e-712ed81 1747->1751 1752 712eeac-712eeb3 1747->1752 1748->1747 1762 712ed83-712ed8a 1751->1762 1763 712ed8f-712eda9 1751->1763 1753 712eeb9-712eece 1752->1753 1754 712f14d-712f154 1752->1754 1767 712eed0-712eed2 1753->1767 1768 712eeee-712eef4 1753->1768 1755 712f1c3-712f1ca 1754->1755 1756 712f156-712f15f 1754->1756 1758 712f1d0-712f1d9 1755->1758 1759 712f266-712f26d 1755->1759 1756->1755 1761 712f161-712f174 1756->1761 1758->1759 1764 712f1df-712f1f2 1758->1764 1765 712f289-712f28f 1759->1765 1766 712f26f-712f280 1759->1766 1761->1755 1783 712f176-712f1bb call 712bb40 1761->1783 1769 712eea5 1762->1769 1778 712edb0-712edbd 1763->1778 1779 712edab-712edae 1763->1779 1788 712f1f4-712f203 1764->1788 1789 712f205-712f209 1764->1789 1773 712f2a1-712f2aa 1765->1773 1774 712f291-712f297 1765->1774 1766->1765 1790 712f282 1766->1790 1767->1768 1771 712eed4-712eeeb 1767->1771 1775 712eefa-712eefc 1768->1775 1776 712efbc-712efc0 1768->1776 1769->1752 1771->1768 1784 712f299-712f29f 1774->1784 1785 712f2ad-712f322 1774->1785 1775->1776 1777 712ef02-712ef63 call 712bb40 * 3 1775->1777 1776->1754 1780 712efc6-712efc8 1776->1780 1841 712ef6b-712ef83 call 712bb40 1777->1841 1786 712edbf-712edd3 1778->1786 1779->1786 1780->1754 1787 712efce-712efd7 1780->1787 1783->1755 1821 712f1bd-712f1c0 1783->1821 1784->1773 1784->1785 1859 712f330 1785->1859 1860 712f324-712f32e 1785->1860 1786->1769 1820 712edd9-712ee2d 1786->1820 1795 712f12a-712f130 1787->1795 1788->1789 1796 712f20b-712f20d 1789->1796 1797 712f229-712f22b 1789->1797 1790->1765 1800 712f132-712f141 1795->1800 1801 712f143 1795->1801 1796->1797 1804 712f20f-712f226 1796->1804 1797->1759 1799 712f22d-712f233 1797->1799 1799->1759 1806 712f235-712f263 1799->1806 1809 712f145-712f147 1800->1809 1801->1809 1804->1797 1806->1759 1809->1754 1813 712efdc-712efea call 712d310 1809->1813 1827 712f002-712f01c 1813->1827 1828 712efec-712eff2 1813->1828 1862 712ee3b-712ee3f 1820->1862 1863 712ee2f-712ee31 1820->1863 1821->1755 1827->1795 1837 712f022-712f026 1827->1837 1831 712eff6-712eff8 1828->1831 1832 712eff4 1828->1832 1831->1827 1832->1827 1839 712f047 1837->1839 1840 712f028-712f031 1837->1840 1845 712f04a-712f064 1839->1845 1843 712f033-712f036 1840->1843 1844 712f038-712f03b 1840->1844 1852 712ef85-712ef97 call 712bb40 1841->1852 1853 712ef9a-712efb9 call 712bb40 1841->1853 1848 712f045 1843->1848 1844->1848 1845->1795 1867 712f06a-712f0eb call 712bb40 * 4 1845->1867 1848->1845 1852->1853 1853->1776 1865 712f335-712f337 1859->1865 1860->1865 1862->1769 1866 712ee41-712ee59 1862->1866 1863->1862 1868 712f339-712f33c 1865->1868 1869 712f33e-712f343 1865->1869 1866->1769 1873 712ee5b-712ee67 1866->1873 1893 712f102-712f128 call 712bb40 1867->1893 1894 712f0ed-712f0ff call 712bb40 1867->1894 1871 712f349-712f376 1868->1871 1869->1871 1876 712ee76-712ee7c 1873->1876 1877 712ee69-712ee6c 1873->1877 1878 712ee84-712ee8d 1876->1878 1879 712ee7e-712ee81 1876->1879 1877->1876 1881 712ee8f-712ee92 1878->1881 1882 712ee9c-712eea2 1878->1882 1879->1878 1881->1882 1882->1769 1893->1754 1893->1795 1894->1893
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q$$]q
                                  • API String ID: 0-127220927
                                  • Opcode ID: 3f03208564fa7b34038b901ca37f7fcaecf414913e06dea129d0a6f8519fbf0a
                                  • Instruction ID: 3e030de33d9cdfd1282bf218d9f96a5e35788e5987e884a720afa0517644bb6d
                                  • Opcode Fuzzy Hash: 3f03208564fa7b34038b901ca37f7fcaecf414913e06dea129d0a6f8519fbf0a
                                  • Instruction Fuzzy Hash: 38225CB4E0022ACFCB15DFA5D854AAEBBB5FF48700F148069E801A7394DB38DD56EB51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1899 57ebef8-57ebf0a 1900 57ebf0c-57ebf2d 1899->1900 1901 57ebf34-57ebf38 1899->1901 1900->1901 1902 57ebf3a-57ebf3c 1901->1902 1903 57ebf44-57ebf53 1901->1903 1902->1903 1904 57ebf5f-57ebf8b 1903->1904 1905 57ebf55 1903->1905 1909 57ec1b8-57ec1ce 1904->1909 1910 57ebf91-57ebf97 1904->1910 1905->1904 1923 57ec1d5-57ec1ff 1909->1923 1924 57ec1d0-57ec1d4 1909->1924 1911 57ebf9d-57ebfa3 1910->1911 1912 57ec069-57ec06d 1910->1912 1911->1909 1914 57ebfa9-57ebfb6 1911->1914 1915 57ec06f-57ec078 1912->1915 1916 57ec090-57ec099 1912->1916 1918 57ebfbc-57ebfc5 1914->1918 1919 57ec048-57ec051 1914->1919 1915->1909 1920 57ec07e-57ec08e 1915->1920 1921 57ec0be-57ec0c1 1916->1921 1922 57ec09b-57ec0bb 1916->1922 1918->1909 1927 57ebfcb-57ebfe3 1918->1927 1919->1909 1926 57ec057-57ec063 1919->1926 1925 57ec0c4-57ec0ca 1920->1925 1921->1925 1922->1921 1944 57ec215-57ec221 1923->1944 1945 57ec201 1923->1945 1924->1923 1925->1909 1929 57ec0d0-57ec0e3 1925->1929 1926->1911 1926->1912 1930 57ebfef-57ec001 1927->1930 1931 57ebfe5 1927->1931 1929->1909 1933 57ec0e9-57ec0f9 1929->1933 1930->1919 1939 57ec003-57ec009 1930->1939 1931->1930 1933->1909 1936 57ec0ff-57ec10c 1933->1936 1936->1909 1938 57ec112-57ec127 1936->1938 1938->1909 1948 57ec12d-57ec150 1938->1948 1940 57ec00b 1939->1940 1941 57ec015-57ec01b 1939->1941 1940->1941 1941->1909 1943 57ec021-57ec045 1941->1943 1949 57ec22d-57ec249 1944->1949 1950 57ec223 1944->1950 1947 57ec204-57ec206 1945->1947 1952 57ec24a-57ec277 1947->1952 1953 57ec208-57ec213 1947->1953 1948->1909 1957 57ec152-57ec15d 1948->1957 1950->1949 1962 57ec28f-57ec291 1952->1962 1963 57ec279-57ec27f 1952->1963 1953->1944 1953->1947 1959 57ec1ae-57ec1b5 1957->1959 1960 57ec15f-57ec169 1957->1960 1960->1959 1965 57ec16b-57ec181 1960->1965 1986 57ec293 call 57ed4d3 1962->1986 1987 57ec293 call 57ec310 1962->1987 1988 57ec293 call 57ec300 1962->1988 1966 57ec283-57ec285 1963->1966 1967 57ec281 1963->1967 1972 57ec18d-57ec1a6 1965->1972 1973 57ec183 1965->1973 1966->1962 1967->1962 1968 57ec299-57ec29d 1970 57ec29f-57ec2b6 1968->1970 1971 57ec2e8-57ec2f8 1968->1971 1970->1971 1978 57ec2b8-57ec2c2 1970->1978 1972->1959 1973->1972 1981 57ec2c4-57ec2d3 1978->1981 1982 57ec2d5-57ec2e5 1978->1982 1981->1982 1986->1968 1987->1968 1988->1968
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq$d
                                  • API String ID: 0-3557608343
                                  • Opcode ID: e30992bc36b4eadbe9387778699085a9dff83fc71086cb58f9be08ba688fbd1d
                                  • Instruction ID: c5abc50b0654fe9a5de5747d520f83b1a2b4bff1f4f6212dc9de7d71cc47b77f
                                  • Opcode Fuzzy Hash: e30992bc36b4eadbe9387778699085a9dff83fc71086cb58f9be08ba688fbd1d
                                  • Instruction Fuzzy Hash: 90D15734600702CFCB15DF68C88496ABBF6FF88314B55C969D45A9B261DB30FC46DB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1989 58018c0-58018e5 1990 58018e7 1989->1990 1991 58018ec-5801910 1989->1991 1990->1991 1992 5801931 1991->1992 1993 5801912-580191b 1991->1993 1996 5801934-5801938 1992->1996 1994 5801922-5801925 1993->1994 1995 580191d-5801920 1993->1995 1998 580192f 1994->1998 1995->1998 1997 5801c91-5801ca8 1996->1997 2000 580193d-5801941 1997->2000 2001 5801cae-5801cb2 1997->2001 1998->1996 2002 5801943-58019a0 2000->2002 2003 5801946-580194a 2000->2003 2004 5801cb4-5801cd8 2001->2004 2005 5801cdb-5801cdf 2001->2005 2011 58019a2-5801a13 2002->2011 2012 58019a5-58019a9 2002->2012 2007 5801973-5801976 2003->2007 2008 580194c-5801970 2003->2008 2004->2005 2009 5801d00 2005->2009 2010 5801ce1-5801cea 2005->2010 2104 5801978 call 50d5f08 2007->2104 2105 5801978 call 50d5ef8 2007->2105 2008->2007 2014 5801d03-5801d09 2009->2014 2015 5801cf1-5801cf4 2010->2015 2016 5801cec-5801cef 2010->2016 2023 5801a15-5801a72 2011->2023 2024 5801a18-5801a1c 2011->2024 2018 58019d2-58019e3 2012->2018 2019 58019ab-58019cf 2012->2019 2021 5801cfe 2015->2021 2016->2021 2106 58019e6 call 50d61f8 2018->2106 2107 58019e6 call 50d61eb 2018->2107 2019->2018 2021->2014 2022 580197e-5801997 2022->1997 2033 5801a74-5801ad0 2023->2033 2034 5801a77-5801a7b 2023->2034 2027 5801a45-5801a69 2024->2027 2028 5801a1e-5801a42 2024->2028 2027->1997 2028->2027 2044 5801ad2-5801b34 2033->2044 2045 5801ad5-5801ad9 2033->2045 2037 5801aa4-5801ac7 2034->2037 2038 5801a7d-5801aa1 2034->2038 2037->1997 2038->2037 2043 58019ec-58019f9 2046 5801a09-5801a0a 2043->2046 2047 58019fb-5801a01 2043->2047 2056 5801b36-5801b98 2044->2056 2057 5801b39-5801b3d 2044->2057 2049 5801b02-5801b1a 2045->2049 2050 5801adb-5801aff 2045->2050 2046->1997 2047->2046 2068 5801b2a-5801b2b 2049->2068 2069 5801b1c-5801b22 2049->2069 2050->2049 2066 5801b9a-5801bfc 2056->2066 2067 5801b9d-5801ba1 2056->2067 2059 5801b66-5801b7e 2057->2059 2060 5801b3f-5801b63 2057->2060 2079 5801b80-5801b86 2059->2079 2080 5801b8e-5801b8f 2059->2080 2060->2059 2077 5801c01-5801c05 2066->2077 2078 5801bfe-5801c5d 2066->2078 2071 5801ba3-5801bc7 2067->2071 2072 5801bca-5801be2 2067->2072 2068->1997 2069->2068 2071->2072 2090 5801bf2-5801bf3 2072->2090 2091 5801be4-5801bea 2072->2091 2082 5801c07-5801c2b 2077->2082 2083 5801c2e-5801c46 2077->2083 2088 5801c86-5801c89 2078->2088 2089 5801c5f-5801c83 2078->2089 2079->2080 2080->1997 2082->2083 2097 5801c56-5801c57 2083->2097 2098 5801c48-5801c4e 2083->2098 2088->1997 2089->2088 2090->1997 2091->2090 2097->1997 2098->2097 2104->2022 2105->2022 2106->2043 2107->2043
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366484726.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5800000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q$4']q
                                  • API String ID: 0-3120983240
                                  • Opcode ID: 89585053aa65cad28f4214f408d84c7f062381f52e282c20dca96d7dee6b9468
                                  • Instruction ID: e523c0608945f215256d2ab2a16b27e33182719ba219b46ea20cb0725d0171e0
                                  • Opcode Fuzzy Hash: 89585053aa65cad28f4214f408d84c7f062381f52e282c20dca96d7dee6b9468
                                  • Instruction Fuzzy Hash: 6CE1D974E15218DFCB54DFA8E898AECBBB2FF49325F509129E80AA7390DB345845DF10

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2108 5801598-58015bd 2110 58015c4-58015e1 2108->2110 2111 58015bf 2108->2111 2112 5801602 2110->2112 2113 58015e3-58015ec 2110->2113 2111->2110 2114 5801605-5801609 2112->2114 2115 58015f3-58015f6 2113->2115 2116 58015ee-58015f1 2113->2116 2117 5801824-580183b 2114->2117 2118 5801600 2115->2118 2116->2118 2120 5801841-5801845 2117->2120 2121 580160e-5801612 2117->2121 2118->2114 2124 5801847-580186c 2120->2124 2125 580186f-5801873 2120->2125 2122 5801614-58016b2 2121->2122 2123 580161a-580161e 2121->2123 2134 58016b4-5801752 2122->2134 2135 58016ba-58016be 2122->2135 2129 5801620-5801645 2123->2129 2130 5801648-580166d 2123->2130 2124->2125 2126 5801894 2125->2126 2127 5801875-580187e 2125->2127 2133 5801897-580189d 2126->2133 2131 5801880-5801883 2127->2131 2132 5801885-5801888 2127->2132 2129->2130 2155 580168e 2130->2155 2156 580166f-5801678 2130->2156 2140 5801892 2131->2140 2132->2140 2144 5801754-58017ef 2134->2144 2145 580175a-580175e 2134->2145 2137 58016c0-58016e5 2135->2137 2138 58016e8-580170d 2135->2138 2137->2138 2170 580172e 2138->2170 2171 580170f-5801718 2138->2171 2140->2133 2153 58017f1-5801816 2144->2153 2154 5801819-580181c 2144->2154 2149 5801760-5801785 2145->2149 2150 5801788-58017ad 2145->2150 2149->2150 2181 58017ce 2150->2181 2182 58017af-58017b8 2150->2182 2153->2154 2154->2117 2162 5801691-5801698 2155->2162 2160 580167a-580167d 2156->2160 2161 580167f-5801682 2156->2161 2167 580168c 2160->2167 2161->2167 2168 58016a8-58016a9 2162->2168 2169 580169a-58016a0 2162->2169 2167->2162 2168->2117 2169->2168 2172 5801731-5801738 2170->2172 2176 580171a-580171d 2171->2176 2177 580171f-5801722 2171->2177 2178 5801748-5801749 2172->2178 2179 580173a-5801740 2172->2179 2183 580172c 2176->2183 2177->2183 2178->2117 2179->2178 2186 58017d1-58017d8 2181->2186 2184 58017ba-58017bd 2182->2184 2185 58017bf-58017c2 2182->2185 2183->2172 2189 58017cc 2184->2189 2185->2189 2190 58017e8-58017e9 2186->2190 2191 58017da-58017e0 2186->2191 2189->2186 2190->2117 2191->2190
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366484726.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5800000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q$4']q
                                  • API String ID: 0-3120983240
                                  • Opcode ID: 812b9393eb4c19401bd8a330d8809a666b35495a4c18608401ffe41dfe1073c3
                                  • Instruction ID: 8e23f1ccbcb6bf1d224fa21efb5fa8c4639ca6f1983da84e14d03d9f0505ec6b
                                  • Opcode Fuzzy Hash: 812b9393eb4c19401bd8a330d8809a666b35495a4c18608401ffe41dfe1073c3
                                  • Instruction Fuzzy Hash: 86A10274E00208DFCB58DFA4D889AADBBB2FF49315F509029E812A7394CB399D42DF51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq$Haq
                                  • API String ID: 0-3785302501
                                  • Opcode ID: 0d24ca06f4f9ac3fb2c8d070c9411c97c8f7a52ce0c1d812bb2a651c32f3149f
                                  • Instruction ID: a8d7c42e8f61123e7c9018be900625e928bd22f415a1f92699f60f9a0574816a
                                  • Opcode Fuzzy Hash: 0d24ca06f4f9ac3fb2c8d070c9411c97c8f7a52ce0c1d812bb2a651c32f3149f
                                  • Instruction Fuzzy Hash: 248124B06007118FD729DF2AC89075ABBF6EF84310F25C569D84A8B2E1DB35E847DB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq$(aq
                                  • API String ID: 0-3916115647
                                  • Opcode ID: 886bd00cec69a6da2d90588ca5abf20db576b1328882d7604076edd3a600cda2
                                  • Instruction ID: 743ea66e6fb9217a0d6a2458cb525dc021661f931f88b825af8d022b3ec4602a
                                  • Opcode Fuzzy Hash: 886bd00cec69a6da2d90588ca5abf20db576b1328882d7604076edd3a600cda2
                                  • Instruction Fuzzy Hash: 285190317042158FDB199F29D858BAE3BA6FF89341F148169E806CB3A5CF39DC42DB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: F$H
                                  • API String ID: 0-45678692
                                  • Opcode ID: 236922db5ec8cc0556099b5633682880bd5ca7be9ca8af52599f6e176b74ec18
                                  • Instruction ID: a18661ef962dd8c6b3f2bcc19bbeaaa505878db5378ba536113415bf8572ad10
                                  • Opcode Fuzzy Hash: 236922db5ec8cc0556099b5633682880bd5ca7be9ca8af52599f6e176b74ec18
                                  • Instruction Fuzzy Hash: 4251BE7494526DCFEB20CF55C849BAABBB6BB09314F00A0D6D90AB7250D3795E85CF24
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: %$H
                                  • API String ID: 0-1210610973
                                  • Opcode ID: 9ac489072cdb6f177143410684e0f12507489537d0c18934ad34963df06eb5c9
                                  • Instruction ID: f2ad37f9b7e0aa78f37d7e62e3adef35c026c5ed53f2bd524b78b2c6d59b1c26
                                  • Opcode Fuzzy Hash: 9ac489072cdb6f177143410684e0f12507489537d0c18934ad34963df06eb5c9
                                  • Instruction Fuzzy Hash: 5041C07494426CCFEB24CF55D849BEABBB2BB49304F00A0DAD90AB7250D7795E85CF24
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 7$H
                                  • API String ID: 0-1468662275
                                  • Opcode ID: 270369c385304943f27d302f96348cf1b89c18082dea29b822ba54e36a8b7e8a
                                  • Instruction ID: c6cbc63b9b4a55aa0bdb8c8f7433831336fc5007411acaef64bf4294537c1337
                                  • Opcode Fuzzy Hash: 270369c385304943f27d302f96348cf1b89c18082dea29b822ba54e36a8b7e8a
                                  • Instruction Fuzzy Hash: E341F27494526CCFEB20CF55C949BEAB7B2AB08314F00A0D6D90AB7250D7795EC5CF24
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: /$H
                                  • API String ID: 0-1170206923
                                  • Opcode ID: b4e2ce9304cf2889bff0753e26e92700f7d38d2b555951bbc4e122288564b122
                                  • Instruction ID: 820f5542c08a266ffdb562fac383db76091e02e58512e65d9a4ef216196b2c4a
                                  • Opcode Fuzzy Hash: b4e2ce9304cf2889bff0753e26e92700f7d38d2b555951bbc4e122288564b122
                                  • Instruction Fuzzy Hash: BB41FF7484426DCEEB20CF55C849BEABBB2BB48304F00A0E6D90AB7250D7794EC5DF24
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: %$H
                                  • API String ID: 0-1210610973
                                  • Opcode ID: 4fe43a3d1120a3e4041a4ca21527bd466714454dea30745ff5d3dd00d1bb1b33
                                  • Instruction ID: f23c6731cf56ffca668594e603bdaa4d6fc0130416558df2eb5287b0b4fc6a53
                                  • Opcode Fuzzy Hash: 4fe43a3d1120a3e4041a4ca21527bd466714454dea30745ff5d3dd00d1bb1b33
                                  • Instruction Fuzzy Hash: 1441E27494426CCFEB20CF55D949BEABBB2BB49304F00A0D6E90AB7250D7795E85CF24
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 9$H
                                  • API String ID: 0-1561603849
                                  • Opcode ID: 54c67c3a7abf39487ea17a42100372f859a45b1687aeb25543524eaf8a0841b5
                                  • Instruction ID: 6c59a2c2485be99a6df556f158e00690783d9fbebfbaecf9212da4743e22cb2d
                                  • Opcode Fuzzy Hash: 54c67c3a7abf39487ea17a42100372f859a45b1687aeb25543524eaf8a0841b5
                                  • Instruction Fuzzy Hash: DD41C27494426CCFEB20CF55C849BAAB7B6AB49314F00A0D6D80EB7250D7795EC5CF24
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: a$~
                                  • API String ID: 0-4026647960
                                  • Opcode ID: 7d58ce88c6e7d95f6dd5ad2587d118d144062f3dde1cb780d3fbdbaa22c8d758
                                  • Instruction ID: 62da4336e140f7ce8a2078c90ff4894112baef8d9791eeb4516c92074e64aed7
                                  • Opcode Fuzzy Hash: 7d58ce88c6e7d95f6dd5ad2587d118d144062f3dde1cb780d3fbdbaa22c8d758
                                  • Instruction Fuzzy Hash: 124117B4901229DFCB64EF14D898AD9BBB1FB49300F5084EAD819A7351EB755F82CF40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366484726.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5800000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q$4']q
                                  • API String ID: 0-3120983240
                                  • Opcode ID: ddc1e3ac682e5430578d71f0a8fd27508c095883a81f3ead512e26a989af726e
                                  • Instruction ID: c2171e9b92d8f08c6697044ede59bba54e688a3fa42b9c50e22acd5d9661fc5d
                                  • Opcode Fuzzy Hash: ddc1e3ac682e5430578d71f0a8fd27508c095883a81f3ead512e26a989af726e
                                  • Instruction Fuzzy Hash: 6031F434E04209CFDB58DBA9D858ABEBBB6FB44315F50902AD916A7390CB345D82CF91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: F$I
                                  • API String ID: 0-1975398642
                                  • Opcode ID: 103ab0b74ca3c6cfcb4a605e0c9ffbf1902f1c669d5d02dd82de38e56435d6fd
                                  • Instruction ID: 330869e3414f487655873adf5438e645deb154ff83f9b923cd8c43332e786df7
                                  • Opcode Fuzzy Hash: 103ab0b74ca3c6cfcb4a605e0c9ffbf1902f1c669d5d02dd82de38e56435d6fd
                                  • Instruction Fuzzy Hash: 17014975945228CFDB61CF28C885BDDBBB1BF0D311F1051EAD109A7260DB769A80DF04
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: )$,
                                  • API String ID: 0-200091960
                                  • Opcode ID: f513b76ff970d60b717334d22d4ac8dfaa53455704a3718dc8705fdc2e6dd347
                                  • Instruction ID: 510a692ebd8b90434a111b4a2aed92c824b91951b77f99b0687e7622ff29002c
                                  • Opcode Fuzzy Hash: f513b76ff970d60b717334d22d4ac8dfaa53455704a3718dc8705fdc2e6dd347
                                  • Instruction Fuzzy Hash: A7F07A7490521CCFEB60DF24D548BAAB7B2FB46305F1450DADE49AB291C7749E84CF05
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,aq
                                  • API String ID: 0-3092978723
                                  • Opcode ID: bb756af84a964d1768dd148b0bcbf31113d0ef2cfdf3a3e9b70104c942f4800a
                                  • Instruction ID: 42db0be1b040e0f74e871476208d8ce1a27f12add0564d964b49947699688389
                                  • Opcode Fuzzy Hash: bb756af84a964d1768dd148b0bcbf31113d0ef2cfdf3a3e9b70104c942f4800a
                                  • Instruction Fuzzy Hash: B9523875A002288FCB64DF68C991BEDBBF6BF88300F1580D9E549A7361DA349D81DF61
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 050DC77F
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: cc4768561608a1cbf907a52a57e81723f004a2965ea26d3cef6cec5aa904fa6c
                                  • Instruction ID: ffcbd598b5390e168b5e506ec82fbed394f70cf387628553db7c6c5ade45bcdb
                                  • Opcode Fuzzy Hash: cc4768561608a1cbf907a52a57e81723f004a2965ea26d3cef6cec5aa904fa6c
                                  • Instruction Fuzzy Hash: 0AA1EFB0D043588FEB64CFA9D885BEDFBF1BB09300F14916AE859A7240DB749985CF91
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 050DC77F
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 61cb88357e84d2597a6017123fd5137d027354cfc2f2c60723b909bbf775051c
                                  • Instruction ID: ee5c85301a1d4e685a971e763f2a7592051dc028fb48ca7f633eed1d62e3e3d2
                                  • Opcode Fuzzy Hash: 61cb88357e84d2597a6017123fd5137d027354cfc2f2c60723b909bbf775051c
                                  • Instruction Fuzzy Hash: 85A1E0B0D043588FEB60CFA9D845BADFBF1BF09300F14916AE859A7240DB749985CF95
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366484726.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5800000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q
                                  • API String ID: 0-1259897404
                                  • Opcode ID: b2c2a522c492d3df115e38e2f5d0876dc7116d4e2160f9be07e0205874e82f4b
                                  • Instruction ID: b17432d56bc9975d4fb6f8acf4b1bbb9b1d5f328beda5225d0162b7b7f7a150d
                                  • Opcode Fuzzy Hash: b2c2a522c492d3df115e38e2f5d0876dc7116d4e2160f9be07e0205874e82f4b
                                  • Instruction Fuzzy Hash: 4322F134E0420DCFCB94DB94D888AAEBBB6FF45314F50A059E916AB3A4CB385D42DF51
                                  APIs
                                  • CreateFileA.KERNELBASE(?,?,?,?,?,?,?), ref: 050DE294
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: 29953f114b81937c115f3a74ec4a3d3ca31f23abeb90956e1ead70a15bc1b82a
                                  • Instruction ID: 27c53dcadd38cf71b52ef7808c4e650b7b3ca0fdbb7efe460f1a8f55091d74c8
                                  • Opcode Fuzzy Hash: 29953f114b81937c115f3a74ec4a3d3ca31f23abeb90956e1ead70a15bc1b82a
                                  • Instruction Fuzzy Hash: F151DFB4D043189FDF20DFA9D885AAEFBF5BB09300F20942AE815BB240DB749945CF94
                                  APIs
                                  • CreateFileA.KERNELBASE(?,?,?,?,?,?,?), ref: 050DE294
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: dd112dcf20e7d5ffbd6dab5301f29a59ea856974aee9ddf317ee3a5830295654
                                  • Instruction ID: 22eadf2d7ebf1e77589ac614dc9f3e1e6cec69c0905484f3cc16794848ee21c7
                                  • Opcode Fuzzy Hash: dd112dcf20e7d5ffbd6dab5301f29a59ea856974aee9ddf317ee3a5830295654
                                  • Instruction Fuzzy Hash: 0851BFB4D043189FDF20DFA9D885AAEFBF5BB09304F209429E855BB240D7749945CF94
                                  APIs
                                  • CreateFileMappingA.KERNEL32(?,?,?,?,?,?), ref: 050DE4D6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: CreateFileMapping
                                  • String ID:
                                  • API String ID: 524692379-0
                                  • Opcode ID: f45fe0f88fcc6d81f0fd3d595d5c227f8891bc06baf14e7ac2e7b472048de07d
                                  • Instruction ID: 14140e81e1920d3c12f9863756498e6cf2f7c51b4d523cfc8c2657af2536c209
                                  • Opcode Fuzzy Hash: f45fe0f88fcc6d81f0fd3d595d5c227f8891bc06baf14e7ac2e7b472048de07d
                                  • Instruction Fuzzy Hash: 9651F2B4D043089FDF20DFA9D885AAEFBB5FF09300F149029E859AB240DB749985CF94
                                  APIs
                                  • CreateFileMappingA.KERNEL32(?,?,?,?,?,?), ref: 050DE4D6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: CreateFileMapping
                                  • String ID:
                                  • API String ID: 524692379-0
                                  • Opcode ID: d69774892e62da9870f213dc1324e6ab76328f160978dfe5eefc88bebab3c224
                                  • Instruction ID: ef0de949f23135fc29f64f002f5ac51b44c9837f70078207936b378040a3627c
                                  • Opcode Fuzzy Hash: d69774892e62da9870f213dc1324e6ab76328f160978dfe5eefc88bebab3c224
                                  • Instruction Fuzzy Hash: 2B51CFB4D043189FDF20DFA9D884AAEFBB5FF09300F149029E859AB250DB749985CF94
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 050DD2D8
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 43389d0ceae3ccce3a2a2264d83c1f80ed14a1d8689e84837b5e6200c419728b
                                  • Instruction ID: 0522bac49077428f5453dde1eaeeed70c26a7435d6bdd1767b2e78b2a6a04635
                                  • Opcode Fuzzy Hash: 43389d0ceae3ccce3a2a2264d83c1f80ed14a1d8689e84837b5e6200c419728b
                                  • Instruction Fuzzy Hash: 0541ACB5D012589FCF10CFA9D984AEEFBF1BF49310F10942AE419B7210D778A945CBA4
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 050DD2D8
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 34fedb8aca28738622bd5bad0417adc1e07466f88089e5a46d7fba641e64928b
                                  • Instruction ID: 694c36d3c7ed30870feda8e1129634539ab566bdf08a8c4c28efd5e41e97d59f
                                  • Opcode Fuzzy Hash: 34fedb8aca28738622bd5bad0417adc1e07466f88089e5a46d7fba641e64928b
                                  • Instruction Fuzzy Hash: C741ACB5D012589FCF10CFA9D984AEEFBF1BF49310F10942AE419B7210D738A945CBA4
                                  APIs
                                  • MapViewOfFile.KERNELBASE(?,?,?,?,?), ref: 050DE68A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: FileView
                                  • String ID:
                                  • API String ID: 3314676101-0
                                  • Opcode ID: aa422880e6a44a1896e0582914c2376f4afbdc03ca63e58265ea11caf2670fa6
                                  • Instruction ID: af05636f3dcf62a6e3f1ae37f814ceb5ee4400c0b4578319470edcb882335a4d
                                  • Opcode Fuzzy Hash: aa422880e6a44a1896e0582914c2376f4afbdc03ca63e58265ea11caf2670fa6
                                  • Instruction Fuzzy Hash: 093189B8D042589FCF10CFA9D984ADEFBB5FB49310F10A42AE815BB210D735A945CFA4
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 050DCFF2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 3e39392338eefebf627e8a1bafcc2be1ec713847110402f4a1fd9c7d0a1e3efd
                                  • Instruction ID: 1b26adfdee77c591020d8e250f339849dc0200ed43ee97ee5dfaae23ef8cee71
                                  • Opcode Fuzzy Hash: 3e39392338eefebf627e8a1bafcc2be1ec713847110402f4a1fd9c7d0a1e3efd
                                  • Instruction Fuzzy Hash: DB3198B9D042589FCF10CFA9D984ADEFBB5FB49310F10A42AE815B7210D735A946CFA4
                                  APIs
                                  • MapViewOfFile.KERNELBASE(?,?,?,?,?), ref: 050DE68A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: FileView
                                  • String ID:
                                  • API String ID: 3314676101-0
                                  • Opcode ID: 1f69abb61fedf8fb628c941223930736d8bde1c8af13a0af666bc77e07c525fb
                                  • Instruction ID: f50ed560de6c7e000db0c448f4594f99c7054753de8785a408f6f12d2c828e3e
                                  • Opcode Fuzzy Hash: 1f69abb61fedf8fb628c941223930736d8bde1c8af13a0af666bc77e07c525fb
                                  • Instruction Fuzzy Hash: 7E3188B8D042589FCF10CFA9D980ADEFBB5FB49310F10942AE815BB210D735A945CFA4
                                  APIs
                                  • K32GetModuleInformation.KERNEL32(?,?,?,?), ref: 050DDCF4
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: InformationModule
                                  • String ID:
                                  • API String ID: 3425974696-0
                                  • Opcode ID: 4e676dfd89f17b10f8ec7df6ccd5369d634aef262eb6f279265e0e7fc04f5fd2
                                  • Instruction ID: bd356e030d68dcafb2c801607fd899cc1d5fc57c90f3f71743f6028fed2b7c83
                                  • Opcode Fuzzy Hash: 4e676dfd89f17b10f8ec7df6ccd5369d634aef262eb6f279265e0e7fc04f5fd2
                                  • Instruction Fuzzy Hash: B931ECB5D002589FCF10CFAAD484AEEFBB1BF49310F10942AE814B7210D778A945CFA4
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 050DCFF2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: a976b56bfc4ba95b418772c73fc3ba1e01f432aed89176b62b66acbc9931285f
                                  • Instruction ID: f213406374d5b086fbdc3af5cca1529728e697129e60ce4fa87ecec991d19731
                                  • Opcode Fuzzy Hash: a976b56bfc4ba95b418772c73fc3ba1e01f432aed89176b62b66acbc9931285f
                                  • Instruction Fuzzy Hash: CF3187B9D042589FCF10CFA9D980AEEFBB5BB49310F10942AE815B7210D735A946CFA4
                                  APIs
                                  • K32GetModuleInformation.KERNEL32(?,?,?,?), ref: 050DDCF4
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: InformationModule
                                  • String ID:
                                  • API String ID: 3425974696-0
                                  • Opcode ID: 80db5cfb213d4c24e58dcdd1605d7b3db2f4e0cc7d864aeec92e82219b4eaefc
                                  • Instruction ID: a54d4fb664cafe41a7e1d0311c386b7a6c323f3095ad7a03eb79b33a25401856
                                  • Opcode Fuzzy Hash: 80db5cfb213d4c24e58dcdd1605d7b3db2f4e0cc7d864aeec92e82219b4eaefc
                                  • Instruction Fuzzy Hash: A731CCB5D002589FCF10CFAAD480AEEFBB1BF49310F10942AE815B7210C738A945CFA4
                                  APIs
                                  • VirtualProtect.KERNELBASE(?,00000000,?,00000000), ref: 02F6A3CF
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2361802153.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2f60000_availableresearch.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: 782191e464b6f83ea80fafbd62d8e3a1eaf1bca5a8d72f69a71ccd2b8b60f840
                                  • Instruction ID: fd5dbd75f473e98aaa3eac38e636465f9fad7e74f2255ae045e26aae8898dbfa
                                  • Opcode Fuzzy Hash: 782191e464b6f83ea80fafbd62d8e3a1eaf1bca5a8d72f69a71ccd2b8b60f840
                                  • Instruction Fuzzy Hash: 243198B9D042589FCB10CFA9D584AEEFBF1FB19310F14906AE914B7210D375A945CFA4
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 050DC977
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: e9d1098062be683169b218d0a0da0e0777c93f777ab4d1a0419488d8c966a61c
                                  • Instruction ID: 57937341658664f520f61c51bf3140b935e5ca92aa516cea3831d55e88d84e65
                                  • Opcode Fuzzy Hash: e9d1098062be683169b218d0a0da0e0777c93f777ab4d1a0419488d8c966a61c
                                  • Instruction Fuzzy Hash: 1B41CDB5D002589FDB10DFA9D884AEEFBF1BF49310F14802AE419B7240C738A945CFA4
                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 071FD59C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376664498.00000000071F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_71f0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: acfbfa6434edac3b2bb37489903a9ae8ba927d1378c2d926a8f57b33a87e2a56
                                  • Instruction ID: 456a757b18080212db2497bf150273b61ee2e7e5c962fc74ec197290a1fd99fe
                                  • Opcode Fuzzy Hash: acfbfa6434edac3b2bb37489903a9ae8ba927d1378c2d926a8f57b33a87e2a56
                                  • Instruction Fuzzy Hash: CF31A8B8D012189FCB14DFA9D980AAEFBB1BF49310F10942AE819B7210D735A945CF94
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 050DC977
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 86a9322a97f65c766d381411367b30394ea67173b19c19b4a32c437660893cd7
                                  • Instruction ID: cad114b83d7c24352ab7fefc9012d1c642b3d67044315189cd01b7c9872676b5
                                  • Opcode Fuzzy Hash: 86a9322a97f65c766d381411367b30394ea67173b19c19b4a32c437660893cd7
                                  • Instruction Fuzzy Hash: 6B31CEB4D012589FDB10DFA9D584AEEFBF1BF49310F14902AE419B7240C738A945CFA4
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 050DC18E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: a2acc9f8a6269d7583a52677a4d55acebfa2076eb90c70bad926e34f69b7ee18
                                  • Instruction ID: 3fe419858e50a452982c94d462038d546276ba65583335afdcd7ac02089e6d04
                                  • Opcode Fuzzy Hash: a2acc9f8a6269d7583a52677a4d55acebfa2076eb90c70bad926e34f69b7ee18
                                  • Instruction Fuzzy Hash: E031EFB8C012189FDB10DFA9D885AEEFBF5BF49310F14942AE415B3200C738A941CFA4
                                  APIs
                                  • ResumeThread.KERNELBASE(?), ref: 050DD61E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 66c16ca6189bf523ada9dbe3b7b200fbd33cd01dd9e31f7da7bd15ce527927b6
                                  • Instruction ID: 354141ea6a6b64ce3c698208f6b1159642259dbb005e3ece5882201a2c6d7f64
                                  • Opcode Fuzzy Hash: 66c16ca6189bf523ada9dbe3b7b200fbd33cd01dd9e31f7da7bd15ce527927b6
                                  • Instruction Fuzzy Hash: 1031BAB4D012189FCB14CFA9E584AEEFBB5BB49310F10946AE419B7210D735A941CFA4
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 050DC18E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: dcc487fdca4e529a9b2325a94a73f5966c14d32619a426324bcd277f69a122ea
                                  • Instruction ID: f254cd8d2bde5e0b5baf1729cbd340bdc1921e551d687f99a27493a46a2ee44a
                                  • Opcode Fuzzy Hash: dcc487fdca4e529a9b2325a94a73f5966c14d32619a426324bcd277f69a122ea
                                  • Instruction Fuzzy Hash: BE31DDB8C012189FDB14DFAAD884AEEFBF5BF49310F14942AE415B7240C738A941CFA4
                                  APIs
                                  • ResumeThread.KERNELBASE(?), ref: 050DD61E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: b5255970a00b14c4ced5611a97d4840224d5aae9bfeab0f5dd6cee974f60fdca
                                  • Instruction ID: b6b51d141e82e8a36f3406df4458330f9e137bf5b14223810410405ad327798b
                                  • Opcode Fuzzy Hash: b5255970a00b14c4ced5611a97d4840224d5aae9bfeab0f5dd6cee974f60fdca
                                  • Instruction Fuzzy Hash: 5131CBB4D002189FCB10CFA9E580AAEFBB5BF49310F10942AE419B7200C735A941CFA4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Pl]q
                                  • API String ID: 0-2207481929
                                  • Opcode ID: bf81ce707e5d783937bf0692e2b39edff6ec517d921d1e64d5bdbb092adb0a78
                                  • Instruction ID: 8b0888848fdfdebfee7d48c5bedaebefb29dd46e006b7509027e688b2d54a5ad
                                  • Opcode Fuzzy Hash: bf81ce707e5d783937bf0692e2b39edff6ec517d921d1e64d5bdbb092adb0a78
                                  • Instruction Fuzzy Hash: 7B9103347402148FCB04DF69C898A6A7BF6BF89710F1584A9E506DB3B5DB71EC42CBA1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q
                                  • API String ID: 0-1259897404
                                  • Opcode ID: 5b841d4958965c501b6f2057864f648604f2156a63561fa2c1bf33135b5bb5f5
                                  • Instruction ID: cfac03224cbad6f01152857982138f49ac5872371ea4731bb7fbc8aa3e1d265e
                                  • Opcode Fuzzy Hash: 5b841d4958965c501b6f2057864f648604f2156a63561fa2c1bf33135b5bb5f5
                                  • Instruction Fuzzy Hash: CAA10D34B10218DFCB04EFA4D89899DBBB6FF89300F558959E806AB365DF74AC46DB40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq
                                  • API String ID: 0-600464949
                                  • Opcode ID: e47f2ab6e02a2965fe505558178035814cf9ab420a508ab060e53eb011cdd9ba
                                  • Instruction ID: 367012417a9fa70d2b8c32dfc296677ab099f13b370969644697c82728687a13
                                  • Opcode Fuzzy Hash: e47f2ab6e02a2965fe505558178035814cf9ab420a508ab060e53eb011cdd9ba
                                  • Instruction Fuzzy Hash: 1851D171A00626CFCB11DF68D484A6AFBB5FF85321B15C659E919A7281D730FC62CBD0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: paq
                                  • API String ID: 0-3273118895
                                  • Opcode ID: 76c4a4738f13491d569e52af5d40d0b9866a4e5329ce5bf69e47276902202db5
                                  • Instruction ID: d0cc898482e3bdf83d87e6ff24876bb164f8faec7a0cde67d66fe59533f55ce8
                                  • Opcode Fuzzy Hash: 76c4a4738f13491d569e52af5d40d0b9866a4e5329ce5bf69e47276902202db5
                                  • Instruction Fuzzy Hash: 0B514D76640104AFCB459FA8D944D697BF7FF8C31071A80D8E2099B372DA36DC22EB50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: !
                                  • API String ID: 0-2657877971
                                  • Opcode ID: 3c1bdc72a2f82feb9fae5dadffbc00d6f8ab53df9f31df739b92bf9fecf61745
                                  • Instruction ID: ba1256c261c3122455e5a4c65460f37cf70887a800c78937d7471dcd4190bf92
                                  • Opcode Fuzzy Hash: 3c1bdc72a2f82feb9fae5dadffbc00d6f8ab53df9f31df739b92bf9fecf61745
                                  • Instruction Fuzzy Hash: 9951D17494426DCFEB20CF55C949BEAB7B6AB49314F00A0E6D80AB7250D3795EC5CF24
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: H
                                  • API String ID: 0-2852464175
                                  • Opcode ID: b14dc44f0d60fc51a55a6609f73c0324eb8f71692cd885d832e5dcf940631927
                                  • Instruction ID: 6822816546bee5edec51d51442f1988ba56a16c2fda66278aeee678dc772bfad
                                  • Opcode Fuzzy Hash: b14dc44f0d60fc51a55a6609f73c0324eb8f71692cd885d832e5dcf940631927
                                  • Instruction Fuzzy Hash: 6341E27494526CCFEB20CF55C849BAABBB2BB49304F00A0E6D90AB7250D7795EC5CF24
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q
                                  • API String ID: 0-1259897404
                                  • Opcode ID: 0a0627e320ec82c713dd3ad78867d42b883a8522f786af8e8f1dbecd30d39f16
                                  • Instruction ID: 333c161a7eb2c63102c81a3853520d8d614a437cce86fd13fe5417b5ae545c0a
                                  • Opcode Fuzzy Hash: 0a0627e320ec82c713dd3ad78867d42b883a8522f786af8e8f1dbecd30d39f16
                                  • Instruction Fuzzy Hash: F031B1316102049FCB05DFA4D894A9DBFB7FF8D310F0984A9E9099B361CA35ED06DB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq
                                  • API String ID: 0-600464949
                                  • Opcode ID: 500c05a78cc12b63178a79975f9b8a000d2c9dbbfa4c39065ecbdea17233fc2a
                                  • Instruction ID: 8fddf274f3941045ed359855ab9aa5aae673d41244379926cf79c0151cff671d
                                  • Opcode Fuzzy Hash: 500c05a78cc12b63178a79975f9b8a000d2c9dbbfa4c39065ecbdea17233fc2a
                                  • Instruction Fuzzy Hash: EB21A2357002565FDB059F69D8549AEBF67EFC9720B548039FA088B3A0DF718C12DB90
                                  APIs
                                  • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 071FE75F
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376664498.00000000071F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_71f0000_availableresearch.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 3126b5d053ea652e0ff437792bbbcea366bfd61389403e0aecebbc9753bacebd
                                  • Instruction ID: da4f6bb94d67ed0389612f17af21623ddec0ccefa01e9aa93af4dded93f2d5b6
                                  • Opcode Fuzzy Hash: 3126b5d053ea652e0ff437792bbbcea366bfd61389403e0aecebbc9753bacebd
                                  • Instruction Fuzzy Hash: 303198B8D002589FCF14CFA9D984AAEFBB1FF49310F20942AE819B7210D735A945CF94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366484726.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5800000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q
                                  • API String ID: 0-1259897404
                                  • Opcode ID: f1647071f7089c635cbd6476593f5712069b893343a94d2594f16ccb2d8a954e
                                  • Instruction ID: 7aeff292664551a704534ea32c625c57e78fb0b2b62a7efbf3a2f6b2a150ee0c
                                  • Opcode Fuzzy Hash: f1647071f7089c635cbd6476593f5712069b893343a94d2594f16ccb2d8a954e
                                  • Instruction Fuzzy Hash: 71215534D04209CFDB58CBA9C8487BEBBB2FB44311F10916AD812A7290C7345D82CF91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: +
                                  • API String ID: 0-2126386893
                                  • Opcode ID: 20f68a4f2156845ea080e466cae0710beb392b0844693055f90ea04737591a3d
                                  • Instruction ID: 49bfa3e9b1c04d44ee803e97463c431950afb81dbd1c4de60d08f5e1c9d1df04
                                  • Opcode Fuzzy Hash: 20f68a4f2156845ea080e466cae0710beb392b0844693055f90ea04737591a3d
                                  • Instruction Fuzzy Hash: 9C21E974A11228CFDB60DF24D989BAABBB1FB49300F5051D6D909E7351D7749E80CF01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 1
                                  • API String ID: 0-2212294583
                                  • Opcode ID: 223d448b090dc3c2af0358794d87bbd105cc62b1f42fcd94c658e840d1e43622
                                  • Instruction ID: 4b9f9a5e9c845aeb9c561cff747653555a02a1685e2e253a642bbbf026e98040
                                  • Opcode Fuzzy Hash: 223d448b090dc3c2af0358794d87bbd105cc62b1f42fcd94c658e840d1e43622
                                  • Instruction Fuzzy Hash: 0A21B5B4A14269CFCB65DF28D988B9ABBF5BF49301F0052E9D409A7290DB309E81DF51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366484726.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5800000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q
                                  • API String ID: 0-1259897404
                                  • Opcode ID: 332602c82f83b9cc59755fd8fdab7db0f31a174e6ec3e7796c6abe800afc10c2
                                  • Instruction ID: 883078924aa2840514686723530f3ef972b81845ed1f0c3bc41921f4a90506aa
                                  • Opcode Fuzzy Hash: 332602c82f83b9cc59755fd8fdab7db0f31a174e6ec3e7796c6abe800afc10c2
                                  • Instruction Fuzzy Hash: 1211C534E1420DCFDB54DFA4D8886AEBBB2FB44315F505029E916A7290D7395C81DF50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: *
                                  • API String ID: 0-163128923
                                  • Opcode ID: b7bd3f19bf831a9a6ce0ad3d268d9993e09cac4f3be971e94f9278cf02ef5923
                                  • Instruction ID: aadeecaf9eb0f84394080bb8ec95ecbed783ef83506eeaa02f5ad36c99998ff0
                                  • Opcode Fuzzy Hash: b7bd3f19bf831a9a6ce0ad3d268d9993e09cac4f3be971e94f9278cf02ef5923
                                  • Instruction Fuzzy Hash: 4101EC74A41218DFE764CF18D985B9AB7B2BB49304F148099EA0DEA290D7B05D81CF01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -
                                  • API String ID: 0-2547889144
                                  • Opcode ID: de0e4653d7119fba7756dcc9988d3433c0bd48ec21c4ca522c3aa154805a57ff
                                  • Instruction ID: 05cdbca6d607eda24ef9c11cbad3a65b44a9797feda6695159a73ee427bb2393
                                  • Opcode Fuzzy Hash: de0e4653d7119fba7756dcc9988d3433c0bd48ec21c4ca522c3aa154805a57ff
                                  • Instruction Fuzzy Hash: 3DF07F7480526CDFDF50DFA4D888BECBBB1BB0C314F20549AC40AAB251C7782988DF15
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: :
                                  • API String ID: 0-336475711
                                  • Opcode ID: ad4a28db26b2568d823e988d6da75f444f5a823b6da22d016aa39a1bb28a6642
                                  • Instruction ID: 8e30179ec70dd3b33f358393a0a87ed581ec5317e5b434e4b6ba7ed4573defc5
                                  • Opcode Fuzzy Hash: ad4a28db26b2568d823e988d6da75f444f5a823b6da22d016aa39a1bb28a6642
                                  • Instruction Fuzzy Hash: B9F0BE3080060ADBCF119F64C80498ABB35FF16314F10D289EC4A77250DB306A82CF90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: /
                                  • API String ID: 0-2043925204
                                  • Opcode ID: 0c05e8e1fbf24e448fdad66d1c72018c3412dfafe24dfa23fea5754ebfdb8596
                                  • Instruction ID: 09758057666545af5d40b0c2557b85f11351321b89f191cf2099289fbd06b547
                                  • Opcode Fuzzy Hash: 0c05e8e1fbf24e448fdad66d1c72018c3412dfafe24dfa23fea5754ebfdb8596
                                  • Instruction Fuzzy Hash: 2FF0D435944129DFDF28DF60D854BEDBBB2AB54300F0054E9D98A67290DB751EC5DF10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: k
                                  • API String ID: 0-140662621
                                  • Opcode ID: 256836f991c6b5053002d14f5478aeaadbb558b04aa9607d1d28978c1672f7d3
                                  • Instruction ID: 891be62518aa48405333f5d080dadba15a3ab2b7f93b9fd25cda2ebd254acf8a
                                  • Opcode Fuzzy Hash: 256836f991c6b5053002d14f5478aeaadbb558b04aa9607d1d28978c1672f7d3
                                  • Instruction Fuzzy Hash: 0EF0C9F4919238CFDB258F14DC983E97BB5BB09311F4145D9D04AA62C0D7754EE2EE11
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te]q
                                  • API String ID: 0-52440209
                                  • Opcode ID: ec327b76a6672b1c3c4ac691e0cb443c6d1d31567426654d0f0dbad1b08f5a4e
                                  • Instruction ID: cc7bc9d909f23a939d188e572b8df7043a0a1225a4f25af312f0246af003f1a8
                                  • Opcode Fuzzy Hash: ec327b76a6672b1c3c4ac691e0cb443c6d1d31567426654d0f0dbad1b08f5a4e
                                  • Instruction Fuzzy Hash: 09F0DFB4A112988FCB14DF28C9847DDBBB2FB48300F1094AAD50AB3344DB305E829F10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: *
                                  • API String ID: 0-163128923
                                  • Opcode ID: 4f3b02bb8c1ce901a87c6ae603e3d9a2d4b61c8e6a7e5d2af178560d368c5313
                                  • Instruction ID: 3eb0081f1d2520e2f9a834b790aa99b6affe4b8d8c787e0872b1ff3e97dd710a
                                  • Opcode Fuzzy Hash: 4f3b02bb8c1ce901a87c6ae603e3d9a2d4b61c8e6a7e5d2af178560d368c5313
                                  • Instruction Fuzzy Hash: AFF0C97480422ECFDB30DF11D948BE9BAB6BB04304F0091D6C80AA2250D7785EC5CF11
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: *
                                  • API String ID: 0-163128923
                                  • Opcode ID: cc6dd40293c5de6f7c781e3d2174550f1c05d2e137ce11b82a0e989b609c0a9d
                                  • Instruction ID: 8a764877bc35d4e354a8617bde2b943cafbf40be918febad1c7c5b9a8092ef03
                                  • Opcode Fuzzy Hash: cc6dd40293c5de6f7c781e3d2174550f1c05d2e137ce11b82a0e989b609c0a9d
                                  • Instruction Fuzzy Hash: 44E0ED74A08244DFD750CB24D898B98FFB2EF4A304F1882D9E94CAB282DBB15D85CF41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: F
                                  • API String ID: 0-1304234792
                                  • Opcode ID: 2a98f24a0189aeb8c2723d1a88910e5141bb865707a2fd1a51fb8c9d62503410
                                  • Instruction ID: 1fe4419114b40ef0a70b6ec07447fe79cf8632377939bc6bc5562ac6f275d26d
                                  • Opcode Fuzzy Hash: 2a98f24a0189aeb8c2723d1a88910e5141bb865707a2fd1a51fb8c9d62503410
                                  • Instruction Fuzzy Hash: ABE0EC78C05328CFCBA0CF60C484A9EB772BF09305F2011D9C80967251DB369A819F45
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: F
                                  • API String ID: 0-1304234792
                                  • Opcode ID: 527b0a4cb7888c80cb628e48206f480abc8253e847167f162c4561597058e2f4
                                  • Instruction ID: 8cea6ec0ff891c1ebed754e71c7f15d6c4ae33b5ac5c215965f044efdaad0b9b
                                  • Opcode Fuzzy Hash: 527b0a4cb7888c80cb628e48206f480abc8253e847167f162c4561597058e2f4
                                  • Instruction Fuzzy Hash: 5FD06C74905228CBDBA0CF60C4C4A9AB7B2AB09304F601499C00867290DA36AA819F05
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -
                                  • API String ID: 0-2547889144
                                  • Opcode ID: ff4153b9c7a1bec88da9c555921924490323314d7258c0ecfb51a06fa1582e0a
                                  • Instruction ID: fc779753c07b2a3d35c18abd1a1663c25d53ba3ddd8790f9ebf9196a0d711525
                                  • Opcode Fuzzy Hash: ff4153b9c7a1bec88da9c555921924490323314d7258c0ecfb51a06fa1582e0a
                                  • Instruction Fuzzy Hash: 68D092B890122CDBEB60EF50D888BDDBBB1BB48300F1064DAC409B7211D7306E80CF05
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0d233d0b8646c66226094128c27a95708b7d41e830662a16a2610af4a88f83ce
                                  • Instruction ID: bfb1a1277aaafb9b841203b97bd722b985a049c1842034512d4de87b17911dc0
                                  • Opcode Fuzzy Hash: 0d233d0b8646c66226094128c27a95708b7d41e830662a16a2610af4a88f83ce
                                  • Instruction Fuzzy Hash: 9FE19DB5A042159FCB25DF68D895AADBBB6FF88310F10806AE805DB390EB35DC52DB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 945f66e18defadd9cf3c4e29bded082c5671a5b1479048c6eea043cb6beb261d
                                  • Instruction ID: 9b580cb89328dff94f95b8b3043255cee3beda6db2f2ac9eac350439dc7b063a
                                  • Opcode Fuzzy Hash: 945f66e18defadd9cf3c4e29bded082c5671a5b1479048c6eea043cb6beb261d
                                  • Instruction Fuzzy Hash: B2C1B274A44218CFDB54DF68E488BADBBB6FB49304F50A0AAE809E7351DB345D46CF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 24ff40dd79fc9ff0d9941fcd3247c359508a1117986b667ca92a8493471fae6e
                                  • Instruction ID: 132ce45e2c1f464ac2c0f6e12905776c705045430f768b6446773ab85bf9a99b
                                  • Opcode Fuzzy Hash: 24ff40dd79fc9ff0d9941fcd3247c359508a1117986b667ca92a8493471fae6e
                                  • Instruction Fuzzy Hash: 93C1C274A44218CFDB54DF68E888BADBBB6FB49304F50A0AAE809E7351DB345D46CF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 578c930e8ffa62baca82e83b8ef333d8bb0daf3be5113c2b4632645b9bdbd7b6
                                  • Instruction ID: 445ea4085352617c51dd277bd351571c635c54cfcbf14d5d311413d90fedd8fd
                                  • Opcode Fuzzy Hash: 578c930e8ffa62baca82e83b8ef333d8bb0daf3be5113c2b4632645b9bdbd7b6
                                  • Instruction Fuzzy Hash: C5B1D274A44218CFDB14DFA8E484BADBBB6FB49304F50A0A9E809E7350DB349D86CF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5ff988381bc932ba42ce37bff5fd009517cff1d257a91ab5edc966f84ee9cdaf
                                  • Instruction ID: d2e750652d0b263334851c8c2a427c920cb49d19b352156aa700e3be492a8029
                                  • Opcode Fuzzy Hash: 5ff988381bc932ba42ce37bff5fd009517cff1d257a91ab5edc966f84ee9cdaf
                                  • Instruction Fuzzy Hash: EDB1DD70E45218CFEB54DFA9D884BADBBB6FB49304F10A1AAD809E7251DB345D86CF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: adcf16ddd82a83e8bf2babc05b5035ea7b4e02e5abd9fb102b9c4b31d4fe5dab
                                  • Instruction ID: 9d91237b5f7742b34c5007b4c3ec75636582e13478b9fadd3758f7e2ecca1746
                                  • Opcode Fuzzy Hash: adcf16ddd82a83e8bf2babc05b5035ea7b4e02e5abd9fb102b9c4b31d4fe5dab
                                  • Instruction Fuzzy Hash: F3B1EE74E45218CFEB54DFA9D984BADBBB6FB49304F10A0AAD809E7251DB345D86CF00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7bc77a15436e7670ba1af032cec53a85cc2e16944243ba177b316ebf92617f0f
                                  • Instruction ID: 63ee6c013eeb997ba41458952edb1a482465a1523c799459ca2e8fc003281aa6
                                  • Opcode Fuzzy Hash: 7bc77a15436e7670ba1af032cec53a85cc2e16944243ba177b316ebf92617f0f
                                  • Instruction Fuzzy Hash: E5A1CC74E45218CFDB54DFA8E984BADBBB6FB49304F10A1AAD809E7251DB345D82CF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 988af639ad08738f25bdc5c1a4dfce42e79574662b867127d11a07714ece4378
                                  • Instruction ID: 06c16594a37307d8f9229366343e6579a99050d66ead8143954f44d94958aeac
                                  • Opcode Fuzzy Hash: 988af639ad08738f25bdc5c1a4dfce42e79574662b867127d11a07714ece4378
                                  • Instruction Fuzzy Hash: E6B1CF74D05218CFDB64CFA9C988BADBBF6BB48304F1090AAD81DAB251DB745D85CF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8316ae1cc60384d70a73fd37a9d7ccdff8cf3ea3f0aa95236c887202e7ffdefc
                                  • Instruction ID: 6c49844cb0227752f16a0c1f6219dafb530fac02911b57bb1a03d75e74603d82
                                  • Opcode Fuzzy Hash: 8316ae1cc60384d70a73fd37a9d7ccdff8cf3ea3f0aa95236c887202e7ffdefc
                                  • Instruction Fuzzy Hash: D6B1DF74D05218CFDB64CFA9C988BADBBF6BB48304F5090AAD81DAB251DB745D86CF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c0dd750a3303add4adf82a54c8603e3e35e3b3bb832766a2bb3ff3d29ec2010d
                                  • Instruction ID: d596147c46ebb2cf373195067659fac2520bf647e3f6ba797947f831e0a46b69
                                  • Opcode Fuzzy Hash: c0dd750a3303add4adf82a54c8603e3e35e3b3bb832766a2bb3ff3d29ec2010d
                                  • Instruction Fuzzy Hash: 7F81E275E1521DCFDB04CFA9D544AADBBF2FF89310F10802AE50AA7250EB749A46DF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b84ebf4db402b1914616713ff3689cf70373ccaeef6998b1975e3eb23526a522
                                  • Instruction ID: 3e0bc15b63a9027a38f3e0a13260f5203d6aae3029e5d7de985755ee5ae11cd7
                                  • Opcode Fuzzy Hash: b84ebf4db402b1914616713ff3689cf70373ccaeef6998b1975e3eb23526a522
                                  • Instruction Fuzzy Hash: 0D710271E1520DCFDB04CFA9D544AAEBBF2FF89310F10802AE50AA7250DB749A46DF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ad969b9f6d0a7445eefeb3317a7bec56825202b3bc79e625e3a716426d2faeb7
                                  • Instruction ID: 68764022f0f00a56399ab3ee3ada011e6cff8ed5726404adf9caccccece6b9c2
                                  • Opcode Fuzzy Hash: ad969b9f6d0a7445eefeb3317a7bec56825202b3bc79e625e3a716426d2faeb7
                                  • Instruction Fuzzy Hash: 18519334B20609DFCB05DF64E459AAEBB76FF89701F008519F8029B3A0DF34A946CB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4c32c79cfd192911cc96cfb0effcc509f84683c4a669f443f71b720b6b924e19
                                  • Instruction ID: 005a169f0adb14314bf217276b7579a796f61a8a07739705b169bed6d288fd8f
                                  • Opcode Fuzzy Hash: 4c32c79cfd192911cc96cfb0effcc509f84683c4a669f443f71b720b6b924e19
                                  • Instruction Fuzzy Hash: E651EA70E01208DFDB18DFB5D594A9DBBF2BF49304F20812AD40AAB361DB319941DF41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ffa4e80e4450c399dc4076a707e4ef4b3dccb02873c6175c9fb1db05ab33884
                                  • Instruction ID: c92ae516d84b266f23b792e242fd5206926af7648f42b32057bb27770aad780a
                                  • Opcode Fuzzy Hash: 4ffa4e80e4450c399dc4076a707e4ef4b3dccb02873c6175c9fb1db05ab33884
                                  • Instruction Fuzzy Hash: BB61F8B4D05268DFDBA5CF29C984BD9BBF5BB49300F4081EAA90DA7210E7319E84CF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c9bcc20fdde5da9c9e23c347484e0eb984cae0a6b721a7892fdf74941a09c9c3
                                  • Instruction ID: 56eb95aabc68469bce3c58dc9ee086ecd5a709cfb69fbc70cf9a6e8941be8e02
                                  • Opcode Fuzzy Hash: c9bcc20fdde5da9c9e23c347484e0eb984cae0a6b721a7892fdf74941a09c9c3
                                  • Instruction Fuzzy Hash: FD511975D04228DFDBA5CF68CD84BD9BBB5BB49304F1081EAA90DA7210EB319E85CF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a611c0c862af0cba5b2a6a0fd7c865acda3d5ab2d58e86f7b99bf2e146e1d17d
                                  • Instruction ID: d4c5ec396489367533402638530c3bbc4094d80d57f1d8d7c8d4445c4a072265
                                  • Opcode Fuzzy Hash: a611c0c862af0cba5b2a6a0fd7c865acda3d5ab2d58e86f7b99bf2e146e1d17d
                                  • Instruction Fuzzy Hash: 6931D576610109EFCB45DF58D888EA9BBB2FF49320F1680A9E9099B372C731ED55DB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7f7a6a72503266493baa0567dc0d0d1fc21db81c56e110aa25641465a241364e
                                  • Instruction ID: 5e3835dc50bd833d08152c0677033c311f3628de4a252523aaaa0e88e83972cc
                                  • Opcode Fuzzy Hash: 7f7a6a72503266493baa0567dc0d0d1fc21db81c56e110aa25641465a241364e
                                  • Instruction Fuzzy Hash: E741ABF0A042268FCB65CFA5C8446AEBBB1FF88750F108469D805E72A0EB34D956DB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6fa4c3836960c9f8c2bd47dda7bd7de364577db4f7bbccbd3b2cb327605eb96f
                                  • Instruction ID: 808a51d1ce96e58d47e4c2ffded20c451cdae989601d42f7350c27eea71547fc
                                  • Opcode Fuzzy Hash: 6fa4c3836960c9f8c2bd47dda7bd7de364577db4f7bbccbd3b2cb327605eb96f
                                  • Instruction Fuzzy Hash: 7341F2B4D11229DFDB08CF9AD544BEEBBF2BB89310F10906AE408A3790D7745A51CF94
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3b2bed301375d23c9b81cc90f303a9303dc95a46b972ff5883c6360cbbae329b
                                  • Instruction ID: 3e3e578497403af1dcf27d1f39b1daeab338b260f06b1e67a6019cdfe80f9381
                                  • Opcode Fuzzy Hash: 3b2bed301375d23c9b81cc90f303a9303dc95a46b972ff5883c6360cbbae329b
                                  • Instruction Fuzzy Hash: 384102B4D11229DFDB08CF9AD544AEEBBF6BB89310F10906AE408A3790D7345951CF94
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bf160c109bd30c8e8f66cdb19674424b22df0faed1cd2d4119ec30f7673b09aa
                                  • Instruction ID: 1f6d0460838d3196f08a2b749342074b84054f456df4f76327c469e248731b3f
                                  • Opcode Fuzzy Hash: bf160c109bd30c8e8f66cdb19674424b22df0faed1cd2d4119ec30f7673b09aa
                                  • Instruction Fuzzy Hash: 94511874D4422CDFDBA5CF29C980BD9BBF1BB49300F0081EA990DA7210E7319E858F50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4a1fd8385f9a41a5a5af6539ecc378cd0c37a611048ebab4780aca8ceb035bd9
                                  • Instruction ID: 23461279b890fec040ac16293ae05a49239737b7c929ad2e5a83ef4a77c68873
                                  • Opcode Fuzzy Hash: 4a1fd8385f9a41a5a5af6539ecc378cd0c37a611048ebab4780aca8ceb035bd9
                                  • Instruction Fuzzy Hash: 3041F374A40229CFDB64DF68D884BACBBB6FB48300F5091AAD80DA3350DB345E81DF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 380cdecca104797273dfd13cf04111c6f019eee430fa63228b9d7f80565ea40f
                                  • Instruction ID: cd9e4c44abed12085ee5ab1eb0bc3ce676cc8b0ae121772930c59c74d380f24f
                                  • Opcode Fuzzy Hash: 380cdecca104797273dfd13cf04111c6f019eee430fa63228b9d7f80565ea40f
                                  • Instruction Fuzzy Hash: 7A4117B4E04209DFDB05CFAAD485AAEBBF6FB89300F10D065D518A7394D7389952CF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f024409443f1112998b218f45606b8d3536cd569aa5068891591acba96e76ed7
                                  • Instruction ID: e1a90b231df3dc91f09212cf29b3f99714f7c0f85425f5f3ad9e30b7289ed327
                                  • Opcode Fuzzy Hash: f024409443f1112998b218f45606b8d3536cd569aa5068891591acba96e76ed7
                                  • Instruction Fuzzy Hash: 4E3115B0E04209DBDB09CFAAD4456AEBBF6FB89300F10D065D519A7390D7389952DFA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8f65dbb25c01806f14d3185cdda44b4b294392534c39da277a0a0a26d6307e4f
                                  • Instruction ID: cc04712e06779afdb0977da0f00adfa92e2ce80b0ed249fff6b20910160bc0fc
                                  • Opcode Fuzzy Hash: 8f65dbb25c01806f14d3185cdda44b4b294392534c39da277a0a0a26d6307e4f
                                  • Instruction Fuzzy Hash: B23108B0905129CFDB15CF58D584BAEBBF6FF4A310F10A069E109A36D0D7749892DF01
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cd024dacedd7f017ded4d2ac5135d97a1dc57eebfa07a7df97c2e2f62f3d4c6f
                                  • Instruction ID: d0080ac2cf6a97ae465429daf8f388edee1a474b07bd8d9d11a50e51112104b3
                                  • Opcode Fuzzy Hash: cd024dacedd7f017ded4d2ac5135d97a1dc57eebfa07a7df97c2e2f62f3d4c6f
                                  • Instruction Fuzzy Hash: 6C21D6323093019FD724CB69F584A6ABFEDEF85325B59887AE80EC7512DB21E841C790
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb3f41cc1b3f1a06601f7d7d4af32abd255b345ec844ded01f2c75298612e44b
                                  • Instruction ID: 272cc2362096c3fdd266e552f67ca07e9d738b78aef40d102594f1006753ffe0
                                  • Opcode Fuzzy Hash: bb3f41cc1b3f1a06601f7d7d4af32abd255b345ec844ded01f2c75298612e44b
                                  • Instruction Fuzzy Hash: 073134B4D00229CFDB09CFAAD4456EEBBF2BB89310F10902AD014B76D0DB748966CF90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ac8514bebc832e72d796bcb4b93bb34b9c842250cbad1d1c9013efcf61e5ccdb
                                  • Instruction ID: a5961ebd124ef18294e0b536b881bb4aae756665b632bffe0be2604397dcf856
                                  • Opcode Fuzzy Hash: ac8514bebc832e72d796bcb4b93bb34b9c842250cbad1d1c9013efcf61e5ccdb
                                  • Instruction Fuzzy Hash: 723115B4D00229CFDB09CFA9D8457EDBBF2BB89310F04902AD414A7690DB758965DF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ac7e6e213fd4fb29af95840d58517181f600cd15fc9ad536c3c80c88abafbf44
                                  • Instruction ID: 98127d84425354350005952657cfb2868f13c60df56f365eeb584eeb57951e21
                                  • Opcode Fuzzy Hash: ac7e6e213fd4fb29af95840d58517181f600cd15fc9ad536c3c80c88abafbf44
                                  • Instruction Fuzzy Hash: 8D312831200305DFDB14CF29D888FAE7BAAFF88355F158169F9058B2A0DB75E895DB90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e54d0504a9a0b98c12519ba2494387df3fd2ae89a2f745be68c45ce7d6071525
                                  • Instruction ID: 4f9fb75ad16461718a0784d0d5fa5f86a35cea3744aa0dc169527846a172fd4e
                                  • Opcode Fuzzy Hash: e54d0504a9a0b98c12519ba2494387df3fd2ae89a2f745be68c45ce7d6071525
                                  • Instruction Fuzzy Hash: FD312674D002099FCB09DFA9D854AEEBBF6FF88310F10846AE806A7360DB305951DFA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 38beefc8645780883ed8ce223392a4722e92eb24ab940e8e954bcbfa5e9bcc1c
                                  • Instruction ID: b4e6bf497286116fd0e887480f9ed24d164206cf856ac86ea2d7e5cc502275a8
                                  • Opcode Fuzzy Hash: 38beefc8645780883ed8ce223392a4722e92eb24ab940e8e954bcbfa5e9bcc1c
                                  • Instruction Fuzzy Hash: 4B21B072A04208DFCB19DFA8D8849DEBFB9FF89310F05456AE549DB250DA30AD06CB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b40883820bf1e8ddd43eb54a0e802aae7fca0d42a2be03e19f454ad58f7313c8
                                  • Instruction ID: 09811c06a598fe4e2cbb48c6a76393792f65cf1ff53b56e61e28a8cab59692cf
                                  • Opcode Fuzzy Hash: b40883820bf1e8ddd43eb54a0e802aae7fca0d42a2be03e19f454ad58f7313c8
                                  • Instruction Fuzzy Hash: 0C217CB1B0022AEFDB18DF74E4047AEB7B4AB04340F108066D459E7290E734CA26DB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2361506558.0000000002E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E9D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e9d000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e2e465789b59383513f5a9005e4515927c07d21e4a17283a6869e4434cc73ca0
                                  • Instruction ID: a0bdbc74203334de9b85ca02fda6aba154e95fcd7b3a99fd6e368d5b2c9cd790
                                  • Opcode Fuzzy Hash: e2e465789b59383513f5a9005e4515927c07d21e4a17283a6869e4434cc73ca0
                                  • Instruction Fuzzy Hash: 4F21D371584244DFDF15EF14D984B26BF66FB84314F24C56AE9090B256C33AD446C6A2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2b9baefc70531b598c700d0c73180ebe6cab6fa15ba2bc31755d6b5bf2c9fedb
                                  • Instruction ID: 2d143d57d0c93f5fbfa4671668429cc8b1a164351b4d8e138802443cfba6327a
                                  • Opcode Fuzzy Hash: 2b9baefc70531b598c700d0c73180ebe6cab6fa15ba2bc31755d6b5bf2c9fedb
                                  • Instruction Fuzzy Hash: 3B213D71A102199FCB15CF69C4499DE7FB6EF8D320F148629E825A73A0CF719942DFA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ec48448d3cac9a958e0d940e10c4f2e1d24cf8482de06ed68b258d88d8163f02
                                  • Instruction ID: 67a6b9c6248ddfb001a370448aed6af17dfa9ce5b2246f4015a6097dcc5dc43a
                                  • Opcode Fuzzy Hash: ec48448d3cac9a958e0d940e10c4f2e1d24cf8482de06ed68b258d88d8163f02
                                  • Instruction Fuzzy Hash: 8E210475A002198FCB05DF98C684ADDBBF6FF8C300F2041A5E505AB2A1CB76AD45DBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5f9c5a379205bc187f0470b6e5b0d21b379a0f641de7a60d004c1f30ba9fceda
                                  • Instruction ID: c28d70f25abeb46f6916a0e1ff9ab1cc6566c1cde8efa6530b9962bf73369246
                                  • Opcode Fuzzy Hash: 5f9c5a379205bc187f0470b6e5b0d21b379a0f641de7a60d004c1f30ba9fceda
                                  • Instruction Fuzzy Hash: 52217C74D00629CFDB08DFA9D4096EEBBBAFB8C311F50802AD506B3340DB750A45DBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2d0d4a119f89c1b1cd231701c686b1d2c5ed7d3e7441a7bdd0f43fb645d70333
                                  • Instruction ID: ed9a9406a7a93b6a7ea1b9b02d721e9f4c8932df1b9e15fe850910f4c612ea8a
                                  • Opcode Fuzzy Hash: 2d0d4a119f89c1b1cd231701c686b1d2c5ed7d3e7441a7bdd0f43fb645d70333
                                  • Instruction Fuzzy Hash: 9A210770E0430ADFCB04CFA9C048AAEFBBAFB89300F14D569D415A7251D7359982DF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c6215427b92c3afde38566321070a6c37a183aec42d9135c81c6e7019e780533
                                  • Instruction ID: 63f74b399c27ed4e3bb2b49b0d03a0cda6cfe3b52d1c26f7838d1688219332ec
                                  • Opcode Fuzzy Hash: c6215427b92c3afde38566321070a6c37a183aec42d9135c81c6e7019e780533
                                  • Instruction Fuzzy Hash: 55219A74D00619CFDB08CFA9D4496EEBBB6FB8C311F50802AD506B3240D7750A85DBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8706b705e5036731ae6ab67235b98790be16be5614188916910dc2fc15f54e6e
                                  • Instruction ID: 9a7f738613e7a7a8ede6c72f730ed29047df967e5cdceed00c439f3724f4c14b
                                  • Opcode Fuzzy Hash: 8706b705e5036731ae6ab67235b98790be16be5614188916910dc2fc15f54e6e
                                  • Instruction Fuzzy Hash: 01212575A00219CFCB09DF64C685A9DBBF2BF8C300F2045A9E401AB3A1CB769D45DBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 31e04d43239e1c84de6b6b233c3e1f212c4043d729c54043bbd99e0812b115d7
                                  • Instruction ID: 25fc29a9e6f9c588ab0c33fb46381ae52849b704e89bb128910424829e46fa81
                                  • Opcode Fuzzy Hash: 31e04d43239e1c84de6b6b233c3e1f212c4043d729c54043bbd99e0812b115d7
                                  • Instruction Fuzzy Hash: 4921A4706102059FCB05EB68E845BAEBBEAEF84300F40C939E10EDB655DF799D099BD1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2361506558.0000000002E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E9D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e9d000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 629ed787df8a7f7cb4c9db39ff421358c2fce1bac768f4c9ae7016925be6f956
                                  • Instruction ID: f752fe4485d8115909488457bbc7c4ba80165a25b6afe46de7a7131634f3d648
                                  • Opcode Fuzzy Hash: 629ed787df8a7f7cb4c9db39ff421358c2fce1bac768f4c9ae7016925be6f956
                                  • Instruction Fuzzy Hash: 3521B0754093C08FCB02DF24D994716BF72EB86214F28C1DBD8448B653C33A980ACB62
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c07caec1314d8bfdd045552de99f89a513e61761ab549a3ffe8ed579ff4e69ee
                                  • Instruction ID: 8f8e9bd9e2ee045675a78ec7bc6420486590c2ec7fce2059cfb94ac19f007f33
                                  • Opcode Fuzzy Hash: c07caec1314d8bfdd045552de99f89a513e61761ab549a3ffe8ed579ff4e69ee
                                  • Instruction Fuzzy Hash: 332175B0E10218CFEB15CF69D88579DBBB6FF49300F10906AE509A7391DB34499ACF61
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7cbe4af76656f0d1e80a1a562346a5effa399e05915f989fd187da7f550d84c5
                                  • Instruction ID: 8d74b7958ffcad71f6ba1c67649bdd31c23516450b44834d453e97d5cf0ee0e8
                                  • Opcode Fuzzy Hash: 7cbe4af76656f0d1e80a1a562346a5effa399e05915f989fd187da7f550d84c5
                                  • Instruction Fuzzy Hash: 3711B2B1B10215AFCB24DB6998057AA7BF5EF88311F14802AF915D73C0EF74D942EB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fcda07812804573bba762c4207d13d33df85d576a7f9c166ec183a321fee51ec
                                  • Instruction ID: 8eb89b69da79654c5b46af0d0cefcee8323c15fbab1f49b261cd3143b4ab567b
                                  • Opcode Fuzzy Hash: fcda07812804573bba762c4207d13d33df85d576a7f9c166ec183a321fee51ec
                                  • Instruction Fuzzy Hash: 9621E0B4D0421E8BCB40CFA8D8897EEBBF1FB49305F50546AD819E3291DB789A46CF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3267c6791bd87c4a5dc9334c9c99dda0236313b57277a1eeb489c648d22b8058
                                  • Instruction ID: 5b403c533b9d79a879876b9a89e2a486632f0e5460a1322efca1b85d90b9aea4
                                  • Opcode Fuzzy Hash: 3267c6791bd87c4a5dc9334c9c99dda0236313b57277a1eeb489c648d22b8058
                                  • Instruction Fuzzy Hash: 55210074D0420EDBCB40CFA8D8896EEBBF6FB49304F509469D81AE3281DB795A46CF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: da3b64a2c7f6c18ccca4598ce89d871b5cd43f8ae5a29f6a160c1fa53de07d31
                                  • Instruction ID: 7aee43c69b6c5bc62b34fd03aefcd29f1f650eac3b53ca3e98178628f2dd824e
                                  • Opcode Fuzzy Hash: da3b64a2c7f6c18ccca4598ce89d871b5cd43f8ae5a29f6a160c1fa53de07d31
                                  • Instruction Fuzzy Hash: C3110871204792CFCB12CF69DD549463FB4FF56A20B05C1ABE840CB2A2DB788916EB61
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c2a2e5a8e933ccce86b9cc87490b5753f9c4c7d4533b134169a2a1e42682336e
                                  • Instruction ID: 154f393940694bfa8b862ac536cf7b2fb2a9e5cbb48efacfadedb70378621d37
                                  • Opcode Fuzzy Hash: c2a2e5a8e933ccce86b9cc87490b5753f9c4c7d4533b134169a2a1e42682336e
                                  • Instruction Fuzzy Hash: C4219278A522199FCB04CF68E594AADBBF2BF49300F104055F805EB3B0CB30AD51DB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 59fb84d2fa76206e991b7f4557950d4c9efeabbef0ccadb1fc422b909ada500b
                                  • Instruction ID: e1def9be54728e4a9c5184899980bc24002aaaf44a4e1532341cd5058d62172b
                                  • Opcode Fuzzy Hash: 59fb84d2fa76206e991b7f4557950d4c9efeabbef0ccadb1fc422b909ada500b
                                  • Instruction Fuzzy Hash: 9C21E374904229CFDB25CF68D844BE8BBB2FB49311F0091DAE98DA7250DB34AE81CF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 818943d532c2b9a467d133c216ea90f123f10b06dcb48a63b5b8767336aace3b
                                  • Instruction ID: 002847c96584fa9f3f1ac33dcd0c98f4423ad8ab42ac51f78383244e94cf0b3f
                                  • Opcode Fuzzy Hash: 818943d532c2b9a467d133c216ea90f123f10b06dcb48a63b5b8767336aace3b
                                  • Instruction Fuzzy Hash: 6F11E071A00300AFCB10DF68D844B9EBBB5FF4A314F14856DE409AB342C772E90ACB90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 55eea0fb2f4e4d4cc141916225b6019bc23675c66c3c17cd0d68b0d734d4e565
                                  • Instruction ID: d382e535a560fd98fd7a4ff14affb10d7f2c5413febcd592aacd9a9960e41aec
                                  • Opcode Fuzzy Hash: 55eea0fb2f4e4d4cc141916225b6019bc23675c66c3c17cd0d68b0d734d4e565
                                  • Instruction Fuzzy Hash: C2018476340215AFDB008E59EC84F9A7BA9EF88721F108026FA04CB290CBB1D9119760
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 22047bbcee2ee0927b4c0b3c99dc52e4f5b95368f9c2be30db367f16c8cddaef
                                  • Instruction ID: 10a9c9513abe6b31806715404a4383a769e148c204f31508a739415dc7c67991
                                  • Opcode Fuzzy Hash: 22047bbcee2ee0927b4c0b3c99dc52e4f5b95368f9c2be30db367f16c8cddaef
                                  • Instruction Fuzzy Hash: 9E210274A50218CFEB15DF28E884B9DBBF6FB48310F5091AAE449A7380CB345E81DF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 360f8fbdb51145d2a0bb04243e14681609b08cc33b8243c714cf2311b6b6cc74
                                  • Instruction ID: 5be6cbb2003d923d90a131d760a27b1fcb608a79c5dc2f97482954d4736a2102
                                  • Opcode Fuzzy Hash: 360f8fbdb51145d2a0bb04243e14681609b08cc33b8243c714cf2311b6b6cc74
                                  • Instruction Fuzzy Hash: B4019E76A00218AFCB15DF99D940CDEBBFDFF8D350B054166E915E7210EA30A905CBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 961a1a57c828f5aeb53497f9ad2057466b8e390be0bbeb8f1b4dfe6b23104e24
                                  • Instruction ID: a484daaf61b36d2d71361ed944bad77fae09510a2659fb72a1504271f60bcfeb
                                  • Opcode Fuzzy Hash: 961a1a57c828f5aeb53497f9ad2057466b8e390be0bbeb8f1b4dfe6b23104e24
                                  • Instruction Fuzzy Hash: AB0124322242118FD7099768EC0A7A93B6AEF84310F04C06AE04ACB5D5CF3D590AEB51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7cf0f039ce237242e046f5be7edf29691c7e81e437d1caef9d85abda74db8be5
                                  • Instruction ID: a77cc74442c7e3bab2fe1561b65b190ede678b71d41a48ab884ebd0bc54faca9
                                  • Opcode Fuzzy Hash: 7cf0f039ce237242e046f5be7edf29691c7e81e437d1caef9d85abda74db8be5
                                  • Instruction Fuzzy Hash: 26115EB0D14114CBDB18DF69D84479EB7B6FF4A300F40C466D50DB3290DB7409969F51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 59939a4fec0851d37cafe4fa36b16f8c07a011ce9785efb025d662c8ce0e9f29
                                  • Instruction ID: addceb3d7d2f3fc0458609a8b1330b41d59997b95be7d707841bf6fffc91072b
                                  • Opcode Fuzzy Hash: 59939a4fec0851d37cafe4fa36b16f8c07a011ce9785efb025d662c8ce0e9f29
                                  • Instruction Fuzzy Hash: D4015B75A00205AFCB14DF68D844B9EBBB5FF49314F10896DE519AB341C772A90ACBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f9bee5dc472892dc845988e1d9a35aa3580cdba2e72efaad58d67d60062c92c8
                                  • Instruction ID: 5c28670800bbb6acad086847dc5225c9a6c7ff88c18a3aa2a319823d66fac943
                                  • Opcode Fuzzy Hash: f9bee5dc472892dc845988e1d9a35aa3580cdba2e72efaad58d67d60062c92c8
                                  • Instruction Fuzzy Hash: D31158B0914228CBCB54DF28E880B9EBB72FB45314F50C19AE48EA7384CB314D86DF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9c85fa9c9a0fae2a2af746dbc206422a50936463b1aa6b088e99dfd6249d2c52
                                  • Instruction ID: 65b717dd2d77562265e7fd68507490a81d0c406fd68317fe89d7d73215752ddf
                                  • Opcode Fuzzy Hash: 9c85fa9c9a0fae2a2af746dbc206422a50936463b1aa6b088e99dfd6249d2c52
                                  • Instruction Fuzzy Hash: 670184B0945249DFCB55CBA4C841B9DBFF0AB06311F6442EAD854976D2C3354A93DB41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a047826ae45a3ac44191ff4ba320fba6d0d944c32e781479b283364369cd86ea
                                  • Instruction ID: 475828268f7a9922e7cc8db06dda626825eb2d8e789fa974ccff7eeff056c009
                                  • Opcode Fuzzy Hash: a047826ae45a3ac44191ff4ba320fba6d0d944c32e781479b283364369cd86ea
                                  • Instruction Fuzzy Hash: E201A2B0D5520CEFCB84CFA8D9447ACB7B8FB4A311F508599D809A33A1D7719A62EB41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9aa786b4a12851261c151f8bd5124fe81109afc51c97f330f3b825e897b38cd6
                                  • Instruction ID: 7aaccab1d7ae3234c7f4f793816285a8b5c3c284b083bdef56a77e4cee0bf6ad
                                  • Opcode Fuzzy Hash: 9aa786b4a12851261c151f8bd5124fe81109afc51c97f330f3b825e897b38cd6
                                  • Instruction Fuzzy Hash: A6115B70D093098FCB45CFB998456AEBFFABB8A301F14C56AD408A3251D7354685EF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aafe83f549e4dea69c66321228dbd9ed530f124653c1a7af7a255b4bf8588378
                                  • Instruction ID: a250f3ade542ab68e0e4f40e022f727f62f3fdeb8ae5db259a4283647e2c224f
                                  • Opcode Fuzzy Hash: aafe83f549e4dea69c66321228dbd9ed530f124653c1a7af7a255b4bf8588378
                                  • Instruction Fuzzy Hash: E4F028F1867318DBC715DB64D4407E87B78E702301F900099D408532A1D77159B2F741
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e4846d08e142e3c180a41443fc060b79b66406ea256dfce6fcf47427a4aa7d95
                                  • Instruction ID: c8f5423bd09b09bf3c60871e7ff48da6d2c9fcbbd20f60bfe8a21bd28e60809e
                                  • Opcode Fuzzy Hash: e4846d08e142e3c180a41443fc060b79b66406ea256dfce6fcf47427a4aa7d95
                                  • Instruction Fuzzy Hash: C2F0FC72B483215FD305862D9C5175BBFA9EFC9711F144469E908AB391DB75BC41C390
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61c4c97d3c518d627a404991827dea3f7d508dc118f4a2f2375c1c3807778326
                                  • Instruction ID: 6d4db3ea2ecf2e7e3ada626180e2eed0f7600f14cd155c6ebd92830094e4a710
                                  • Opcode Fuzzy Hash: 61c4c97d3c518d627a404991827dea3f7d508dc118f4a2f2375c1c3807778326
                                  • Instruction Fuzzy Hash: 231128B0A4111ACFDB64DF18C888BEAB7B9FB4A310F5084E9D549A3341DB744E85CF16
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ecb5443591009823f25c5a41066ec5febfb9d6154738970815f01407b3e795e3
                                  • Instruction ID: 64d1b062d1ef996040b4de34d17141e567b6aebf57485047c11d7b3b5a513714
                                  • Opcode Fuzzy Hash: ecb5443591009823f25c5a41066ec5febfb9d6154738970815f01407b3e795e3
                                  • Instruction Fuzzy Hash: 43F024E2B4D2A15FE316033C5C103696FA1DF96600F0980EAD1819F2E2EB5AA813D351
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ca1c55f6065bdda8dbec7d4c1bb511428c896af255cf761dbfd7b6766ab3323e
                                  • Instruction ID: 9d8921fa9219bbcfc3e3a380de44d1375aa99abb0e95c775e96464f67e31f56d
                                  • Opcode Fuzzy Hash: ca1c55f6065bdda8dbec7d4c1bb511428c896af255cf761dbfd7b6766ab3323e
                                  • Instruction Fuzzy Hash: E5F02B327101046BCB159629EC449AEFB6EEFCC360B058066FD15DB361DF749D16D790
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 02b0eea1c0f18e2fb32e638ceca3b176c8331ccdf0cf59e90fad09440ca2b29d
                                  • Instruction ID: 3b3573bd05243107e0fb9a9c9947c499f8427a295683c84ab89d4fc000dea1c1
                                  • Opcode Fuzzy Hash: 02b0eea1c0f18e2fb32e638ceca3b176c8331ccdf0cf59e90fad09440ca2b29d
                                  • Instruction Fuzzy Hash: 61F0E971B442215FE719861D9800B6BFBE9EBC9710F144469E509AB390CB76BC4183D4
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 65b3902784abba378bc9191d711f3e28d1a0103ced22f4fba1ebfe9c2b96306c
                                  • Instruction ID: 6aac3819a5a933cec8a3692ac2d4dbc39d29938e9c0a00252e2316bf8a3a8743
                                  • Opcode Fuzzy Hash: 65b3902784abba378bc9191d711f3e28d1a0103ced22f4fba1ebfe9c2b96306c
                                  • Instruction Fuzzy Hash: C5F0CDF4996208DFCB55DFA4D0446ECBBB4FB06312F6041A9D808573A0CB318EA2EB00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a3dcca8e61d633bc371d9b659c614f88f441484268d6f34abf7ead366be63556
                                  • Instruction ID: b3739a1ca7157491cafc27d5f3e3bf82b27a0ac8b622a8e661aac3520c3f94af
                                  • Opcode Fuzzy Hash: a3dcca8e61d633bc371d9b659c614f88f441484268d6f34abf7ead366be63556
                                  • Instruction Fuzzy Hash: BB01ADB1C14318DFCB54DFA8C9447EDBBF4BB08310F6085AAE815A3281E7705A41EB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: edb21f281b149b8735e52aa6b199c27e21760af2af0ef4300ef71e52ba5a1982
                                  • Instruction ID: 5920bd72a6e3f3c4614d28080524610a5e822dde803812d7b2d4bcb4961c604d
                                  • Opcode Fuzzy Hash: edb21f281b149b8735e52aa6b199c27e21760af2af0ef4300ef71e52ba5a1982
                                  • Instruction Fuzzy Hash: 14016931C0024EDBCF01DF98D800AEEBB71FF89325F04C51AEA5867251D332A6A6DB90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7904a9015bc5c9c9b9ea7afa2175f29fa7f517302ada46f94a63e3f36471dc9f
                                  • Instruction ID: 6c824262111201169ce0cf99632d3db141aa7b1217b802a692b0c5f5dfa20841
                                  • Opcode Fuzzy Hash: 7904a9015bc5c9c9b9ea7afa2175f29fa7f517302ada46f94a63e3f36471dc9f
                                  • Instruction Fuzzy Hash: F8118374A4221CCFEB60DF14D948BEAB7B2BB49315F1051EADA49AB250D7745EC0CF01
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8f7d3fa43e7c96e3a650c01291645b027ecf5ef9134452d65f075ebd76d02df7
                                  • Instruction ID: 262623fd7222fc0daee9028846b7a537e2207bf4d9bc1bfd5c46ab5862b2074f
                                  • Opcode Fuzzy Hash: 8f7d3fa43e7c96e3a650c01291645b027ecf5ef9134452d65f075ebd76d02df7
                                  • Instruction Fuzzy Hash: D2117874A14218CFCB55DF28D998A9ABBF5EF49301F1051EAD40EA7260DB305D81DF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d341a183c4b365f3aa09a184410461c40aaf6a2e6a815959ac2ea2fdb6d2d534
                                  • Instruction ID: 9fbf790b3bd5b957d33e8a5a35d2a3d0f7f25ca6db77a3368a6b8d4f98f5577d
                                  • Opcode Fuzzy Hash: d341a183c4b365f3aa09a184410461c40aaf6a2e6a815959ac2ea2fdb6d2d534
                                  • Instruction Fuzzy Hash: C7F017B4D56208EFCB54DFA4D445A9CBBB0FB49311F5081E9E808A3361D7319AA1EF41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f676a5f5cba34f462dcadd6cf1cccf185984424fb3311e14c60de4ac69aba6dc
                                  • Instruction ID: eab275002f63f14f57b1b8fb3bccbdcbf7d523ff74acb2a6ed851d8370c7452c
                                  • Opcode Fuzzy Hash: f676a5f5cba34f462dcadd6cf1cccf185984424fb3311e14c60de4ac69aba6dc
                                  • Instruction Fuzzy Hash: B9F014B1D05218DFCB80DFA8D4442AEBBF4FB08301F2085AAE809E3240E7315A40DB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 737ac03fee863926abffb86eee4020b054c2ee5595626f698c336b2a7abc798e
                                  • Instruction ID: 8172f5a3d65ab605c9f3304330a168ad62eb029906b8b4070765d90dfcbbd730
                                  • Opcode Fuzzy Hash: 737ac03fee863926abffb86eee4020b054c2ee5595626f698c336b2a7abc798e
                                  • Instruction Fuzzy Hash: 8801E2B0A50229DFDB05CF58E888BAAB7F2BF59300F0051A6E508A72A0D7345C92CB01
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b1f4dd3f7361ddc0de2e82c73f64543f2336ab117f3c17763a446aab071f71b5
                                  • Instruction ID: ca6260d4872af00bc7dc227ebe4005a54917e9fc8f5e10ae6b8830248e41eb55
                                  • Opcode Fuzzy Hash: b1f4dd3f7361ddc0de2e82c73f64543f2336ab117f3c17763a446aab071f71b5
                                  • Instruction Fuzzy Hash: 63F0143180020EABCF01DF99C8008EEBB75FF89320F00C51AEA5867211D732A5A2DBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3d0b88e57e66c8d723d3642405b4fd06b8f4646f47dbc1bd6a2f6f7110df038
                                  • Instruction ID: 73e920d52e6146bd7d38d9c9aadcdf4e43549bb54bcf8b0091537eb9a2d6c59d
                                  • Opcode Fuzzy Hash: c3d0b88e57e66c8d723d3642405b4fd06b8f4646f47dbc1bd6a2f6f7110df038
                                  • Instruction Fuzzy Hash: FEF0B4B48492489FCB41EF90E84499D7FB4FF1A311F1081C6EC48576A1D7315E65EB51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 418b42797667db220657f0a3a71e9d2cc7c70cf55c69d63f5f76f1ff39fcb437
                                  • Instruction ID: 926fa0622941760d4abe246b9fc0832ee1f4c19c1f81e277e0e4493af19c6bd2
                                  • Opcode Fuzzy Hash: 418b42797667db220657f0a3a71e9d2cc7c70cf55c69d63f5f76f1ff39fcb437
                                  • Instruction Fuzzy Hash: 53F01974A09318CFDB04DF98CD486ADBBBAFB8D305F1080559509AB251DB349A41DF00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6cee29dda1d277209bfe55530342e8aa39685ac50e8f17aefb8416e7a31b7714
                                  • Instruction ID: 98045e9a5aa37ffdbcf233c3c327c47fa478b06cb05b53b18a0ed72093590ac0
                                  • Opcode Fuzzy Hash: 6cee29dda1d277209bfe55530342e8aa39685ac50e8f17aefb8416e7a31b7714
                                  • Instruction Fuzzy Hash: 55F05E7484A10CEBCB01DFA4E9405ADBBB9BB46214F5882DADC0963251DA329E55EB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 00099bb17ad791ed428f5ad28c1e4f2c8408c3ada38aa9380a5887439982bebd
                                  • Instruction ID: 1abe82cc53551aa393e24869d7e18474e8706a10f1aed8b86c7961f9d0e3f3a4
                                  • Opcode Fuzzy Hash: 00099bb17ad791ed428f5ad28c1e4f2c8408c3ada38aa9380a5887439982bebd
                                  • Instruction Fuzzy Hash: 2CF0FC709082889FC746CF74D440295FFB0AF06124F2841DEC48987393D731DA57DB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8919c3cc0eae8879a45e3b24433b7eb4c9eee694da2d0ce09f490a2adc88819b
                                  • Instruction ID: 35298810791f61dafce243a824f894c18581ce646d367ab96e74fffeb7a80274
                                  • Opcode Fuzzy Hash: 8919c3cc0eae8879a45e3b24433b7eb4c9eee694da2d0ce09f490a2adc88819b
                                  • Instruction Fuzzy Hash: 4FF089B095510CDFCB42DFA4D94059DBBB5EF05310F44C4DAD80CD7291EB328A15DB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 30775dbe39bf273180a8c67d073953c99b4e6d100e4b738aa4ad584843bdd343
                                  • Instruction ID: a5e880f8eb95cf8c5b5ed58a2f0378d40fac4a6c41f231428a6facd1de13ed31
                                  • Opcode Fuzzy Hash: 30775dbe39bf273180a8c67d073953c99b4e6d100e4b738aa4ad584843bdd343
                                  • Instruction Fuzzy Hash: 1CF0A7312002055BC7155B69FC81E8FBF9EDFC1215B14D975E44587635CE74F809C6A0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9f86827f14e305a1d697ea1515344a94effd8c7c089603f0c02822fb33103863
                                  • Instruction ID: 3b8b9c2b9c616eb235b8beed89843651c17f2a054a97dc08d3152283c61684fb
                                  • Opcode Fuzzy Hash: 9f86827f14e305a1d697ea1515344a94effd8c7c089603f0c02822fb33103863
                                  • Instruction Fuzzy Hash: B501A274A005599FCB68EF58D9C59D9BBB2BB88300F2145D4E549E7350DA309D95CF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a8f4b1101f687f78a425b5a4cfdf67215511e4867fdb870cfcfba8394f636347
                                  • Instruction ID: 63089fbfbdfbce7100dda7555abd4e13d5d0c06f6fc8803e8506a45d524ad722
                                  • Opcode Fuzzy Hash: a8f4b1101f687f78a425b5a4cfdf67215511e4867fdb870cfcfba8394f636347
                                  • Instruction Fuzzy Hash: B1F05E3554410CEFCF05CF94C981A9D7BB2FB49315F14819AEE1993362C3329A61EF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03c26ef8b2a4663fcc6cdd47d7a3c525a1c8e1acf88c28fbd8f6f5ee27efed25
                                  • Instruction ID: 58ccda5cd2e4d9ad7ee9587da0053145cbb1b1492a50be193536a7415e7f126c
                                  • Opcode Fuzzy Hash: 03c26ef8b2a4663fcc6cdd47d7a3c525a1c8e1acf88c28fbd8f6f5ee27efed25
                                  • Instruction Fuzzy Hash: 5FE09A2670922257D631161EBC91B7F9E9AFBCBA10B94017DFC89CB204E924CC02A790
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e9c3096b4758fd0fe2478e319ee7e657eb9a46b0b4ab301d8015b3aae9eb240c
                                  • Instruction ID: 0ed816cc1e545190349a44c5012f0d5bebd3e8fe691f9726cb0998bd40e82ff1
                                  • Opcode Fuzzy Hash: e9c3096b4758fd0fe2478e319ee7e657eb9a46b0b4ab301d8015b3aae9eb240c
                                  • Instruction Fuzzy Hash: DDF0F2B0A402198FDB94DF18E880A9DB7F6FB98300F5090A5E20DA32A0DB385D86DF01
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d7aa7942b73fb3bb25f2c010265ddb0c30f34b6de69221d7098b432e19715357
                                  • Instruction ID: 91c84a7f4932970187128ac4c4ea426f4e8ee7bef27faadf292439dcba07303e
                                  • Opcode Fuzzy Hash: d7aa7942b73fb3bb25f2c010265ddb0c30f34b6de69221d7098b432e19715357
                                  • Instruction Fuzzy Hash: 5FF0EC72954119DBD702DFACDD5176DB76DFF94310F2444A8E404AB240E935AD05AB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 06302c6712a3ad56677387386ac3681f78c0c89118def8c7a61177f20eb9935d
                                  • Instruction ID: 8fafc93ac1affd2b8f4bd2e9337369cca56113f658892c9a04d15a92d20adb43
                                  • Opcode Fuzzy Hash: 06302c6712a3ad56677387386ac3681f78c0c89118def8c7a61177f20eb9935d
                                  • Instruction Fuzzy Hash: 7CF05834E09208AFC780EBA8D4407ACBBB6BB89214F14C4AADC18E3246DA355E51CF80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 50346d492106924fefaf595bf74c95de689519aed4e336997c1637e819616ab2
                                  • Instruction ID: f89422602b10681d924bdd330de42b09b9946c7ef5d6921f96565c46d8b629c4
                                  • Opcode Fuzzy Hash: 50346d492106924fefaf595bf74c95de689519aed4e336997c1637e819616ab2
                                  • Instruction Fuzzy Hash: 38E0E534909248DBC705DB68D84456CBBB4BB46225F148AD9CC14972D1CD326D82CE41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 90569f4c0e4a92dd05121f06a77453a8013816b833dc2262cc9e87dae0713d5f
                                  • Instruction ID: 257be51bfea79683cbd2950175a8b1fafd80ba22d483ec2882ad3c14bcb120f5
                                  • Opcode Fuzzy Hash: 90569f4c0e4a92dd05121f06a77453a8013816b833dc2262cc9e87dae0713d5f
                                  • Instruction Fuzzy Hash: F0F0FFB890025CDFDB60DF64D884ADDBBB1AB4A314F0490DAC80EA7362C7319E86CF41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4d36e9c9bcc91c7428fcaeeaf6d82b544896a718296cf539c5b642bd1240dc86
                                  • Instruction ID: f151eb2da432b7d566cbc90a5da3daeab2f7b68130d081f36135957eb59d9951
                                  • Opcode Fuzzy Hash: 4d36e9c9bcc91c7428fcaeeaf6d82b544896a718296cf539c5b642bd1240dc86
                                  • Instruction Fuzzy Hash: AAF0FE75C49108EFCF45DF94D940AADBFB1FB49311F14C49AEC5496261D2328A61EF41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5aca2964ec836b88f1934f00a3577494bf5b20a719474937e3ac8aaa48573614
                                  • Instruction ID: 62b72fcd7843c2d6b693f9d71a49fed131e14dfc714fab240fa7833c00bdbb72
                                  • Opcode Fuzzy Hash: 5aca2964ec836b88f1934f00a3577494bf5b20a719474937e3ac8aaa48573614
                                  • Instruction Fuzzy Hash: 15F0823594528CEFCB45CF90C800AAEBFB2FB49311F14C19AEC6646352C2368B11DF60
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 364a077a8a36e7fac01fd1c5a2d2835e3e29d42b0ee2b1cb09b24201208d0c0d
                                  • Instruction ID: fab897ac6c28c92e13c9e2ec163da8dad8343670f2c7cb2a46180acb45a3c8fb
                                  • Opcode Fuzzy Hash: 364a077a8a36e7fac01fd1c5a2d2835e3e29d42b0ee2b1cb09b24201208d0c0d
                                  • Instruction Fuzzy Hash: A4F0DA3594410CAFCB45CF94D845AACBBB5FB49314F14C09AEC0492351D6329A61EF41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3e230b23c3151b5d603d1cca170fc52ccc66b7ec5b900fe3cf6cd15e5bc9b464
                                  • Instruction ID: 5282aeb4be3b65b5b405a2a7f29046ed5304d2eaab9e4893d268227c7f99e564
                                  • Opcode Fuzzy Hash: 3e230b23c3151b5d603d1cca170fc52ccc66b7ec5b900fe3cf6cd15e5bc9b464
                                  • Instruction Fuzzy Hash: EEF0A075448048EBCB06CE80C941AA97F72FB05325F188489ED08562A2C732CA22DB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 74dd8fb58aae636bd05ed7a5e4e906fdc0b57eef7119794e52a0e9f9497fb305
                                  • Instruction ID: b7182a89ce3543259f3790391c365d5fc3c6a6426f970b0f3b05ac0bfc2b8c3b
                                  • Opcode Fuzzy Hash: 74dd8fb58aae636bd05ed7a5e4e906fdc0b57eef7119794e52a0e9f9497fb305
                                  • Instruction Fuzzy Hash: 5BF0E530A0A208EBCB05DB98D8805AC7B70EB46326F14919ACC14872C2D6329E56CA81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 484b69a896fa4a2f275817024cd65dd8991c5906d304dbaf0b891fe03bc88cb6
                                  • Instruction ID: 619c6d79b9c0d0624190b5549a21220601cb9ba8cab37f5d4a1c71fd7d5a2812
                                  • Opcode Fuzzy Hash: 484b69a896fa4a2f275817024cd65dd8991c5906d304dbaf0b891fe03bc88cb6
                                  • Instruction Fuzzy Hash: 95F0F8B4E05248AFCB80DFA9C840AADBBF8AB49310F14C4AAE958D3341D6359A51EF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c6bf6c971ec5734b0fdd6f6b2093008400720fc6a829f5a99058227ecff7f15
                                  • Instruction ID: b4a42301b211fda2e8138e7ca7fb194e9c6264800369014bdd3e1ec3a3e52b07
                                  • Opcode Fuzzy Hash: 3c6bf6c971ec5734b0fdd6f6b2093008400720fc6a829f5a99058227ecff7f15
                                  • Instruction Fuzzy Hash: C8E02B30D086189BC705DB54E8419E8BF78AB09315F54C0DADC0457341D5719D42DB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0c99721ad12ea241474587ecc06d84f97e60d338397bd5f5096d5b680764aa39
                                  • Instruction ID: fc2a6422bff73d971576ccf1d38b71c41da715ed27291abc98efd79fd2ff2809
                                  • Opcode Fuzzy Hash: 0c99721ad12ea241474587ecc06d84f97e60d338397bd5f5096d5b680764aa39
                                  • Instruction Fuzzy Hash: 7FF0A974A40218DFD760CF14DC85F9AB7B1EB49314F1481D9EA88AB291D7B5AEC1CF41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: abde8de715e5f05f28f335f02cca57fb965cefdf9eea79ff68914393e56fd59b
                                  • Instruction ID: 44d40fabd5fb6c0c71b999093e6cdfa3a6a31e3e8247ce09685d97237068800c
                                  • Opcode Fuzzy Hash: abde8de715e5f05f28f335f02cca57fb965cefdf9eea79ff68914393e56fd59b
                                  • Instruction Fuzzy Hash: 56F0A036449008EFCB06CF80C940AE97B72FB1A310F188485EC19862A3C2329D62EF00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 993e885434c3fef53d53e282ae25420a98d7e96600926cdc969b3ef2c4893067
                                  • Instruction ID: fea3df08cfc8d59c8f82d7c88bb3c30026f9542aad9be699eb31cffc2341f9bb
                                  • Opcode Fuzzy Hash: 993e885434c3fef53d53e282ae25420a98d7e96600926cdc969b3ef2c4893067
                                  • Instruction Fuzzy Hash: 1EF09B30D0D248EBDB15DB64D44455DBFB4BB46319F1880DEDC0497292D6725D56CB41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c1c30fcbc6cbe9fd8bf09d861b4f90cbdb96bd26ef45c62648e90793731228be
                                  • Instruction ID: 239f8a29e1edc08c62d81a8a3df266708a7e87be58d9b63bb939487cbd1cfef0
                                  • Opcode Fuzzy Hash: c1c30fcbc6cbe9fd8bf09d861b4f90cbdb96bd26ef45c62648e90793731228be
                                  • Instruction Fuzzy Hash: C1F01474A40229CFCB05DF58E895BDEB7B2FF49310F4050A5E649AB380CB745D82AF01
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 37872e9e522d1d11094249b9907a4e0e0d8b139d250b90e367708f701f789c54
                                  • Instruction ID: e76a2fa4e1d2ee9f30b558c48cd165c6191ccc1fc7c019fffc6591df0a09f571
                                  • Opcode Fuzzy Hash: 37872e9e522d1d11094249b9907a4e0e0d8b139d250b90e367708f701f789c54
                                  • Instruction Fuzzy Hash: 5501BDB0D10269CFEB61CF68D886B9DBBF1FF09310F1041AAE509A7691CB354996DF02
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 01535010dd70c350d6b3aae8a3d832048d26e8fadeffb8594bfd8da488a0d8cd
                                  • Instruction ID: fb996c84b7e6cebd56d16043cb7a9865406618e5d5aa4c1b3cbb2ccdc2b2eee8
                                  • Opcode Fuzzy Hash: 01535010dd70c350d6b3aae8a3d832048d26e8fadeffb8594bfd8da488a0d8cd
                                  • Instruction Fuzzy Hash: E1F0E770A60228DFDB11DF58E8A4BADB7B6FB58314F4051AAE50DA3380CB345D92DF11
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 88926791458b8669ab38ccc775a1b71299e1822d0b0fdab382d68cb2c61f5249
                                  • Instruction ID: f73b68d8a897340aebfc27b1da05b8e57eff037581a806b5c3fbfdfb9cebe5d5
                                  • Opcode Fuzzy Hash: 88926791458b8669ab38ccc775a1b71299e1822d0b0fdab382d68cb2c61f5249
                                  • Instruction Fuzzy Hash: 19F0C074D04208EFC794DFA8D54569CBBB0FB49310F10C19AD81893391D7755A56EF41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cafadc7b3b73933be50ad9853593216bfa85e66ad92aa7de69da595b86218de9
                                  • Instruction ID: b669c7f89719fe2b21e767674ef7f7c745f93be92b2945a2ac0a27a2c58196df
                                  • Opcode Fuzzy Hash: cafadc7b3b73933be50ad9853593216bfa85e66ad92aa7de69da595b86218de9
                                  • Instruction Fuzzy Hash: 03F02B61945248EFCB13E774D81459A3FBCAF07210F8809EAD840571A2EF765A25E3E6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 810f6d73f35ff74eeba2d69b6e2d1f4b42da279e1e04125a31146673b4133a36
                                  • Instruction ID: 2232b2736da15da74898783b134a2f210405de46b97a7a52fa56eaa87bae0025
                                  • Opcode Fuzzy Hash: 810f6d73f35ff74eeba2d69b6e2d1f4b42da279e1e04125a31146673b4133a36
                                  • Instruction Fuzzy Hash: ABF0303494410CAFCB41CB94C981AACBBB2FB45315F1481A6DC5992251C6328E52DF44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 220384c94189df2f476045e3a281af27fe2a24a6f088fb5a4c2614d075217596
                                  • Instruction ID: 3595c9fd2c79ce479b4eb64318d069af679942d1db2fd71f6cecb547b53fb1b4
                                  • Opcode Fuzzy Hash: 220384c94189df2f476045e3a281af27fe2a24a6f088fb5a4c2614d075217596
                                  • Instruction Fuzzy Hash: 01F0A97884410CEFCB40CF98C5423A8BBB2FB09315F2482AACC4892341C6328A92EE00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 114f6b422b9eb1f98179a36e823daea3a1633bb56c27c646767bca0d1bb61e65
                                  • Instruction ID: a401308a26a56a35fea6e720da47ff1b7359271b4a856cba3915e5c77480e579
                                  • Opcode Fuzzy Hash: 114f6b422b9eb1f98179a36e823daea3a1633bb56c27c646767bca0d1bb61e65
                                  • Instruction Fuzzy Hash: 01F06574C0810CAFC740DB95D8457ACBBB4EB45304F2480EADC5593341D6369A51DF45
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4afe17214046fa99fc3d8090c04557f0e5281c84d3facb2555f9979fddb58546
                                  • Instruction ID: b7d0c3c73c8a75f4f9ee420e8ed835f3240acda91971653d39ff4130e42c60ac
                                  • Opcode Fuzzy Hash: 4afe17214046fa99fc3d8090c04557f0e5281c84d3facb2555f9979fddb58546
                                  • Instruction Fuzzy Hash: BDF015B0E182089FCB45EFB8981639CBFB5AB45212F5082AAC858936E1D7354A56EB41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0d1985d8d911d1af7785454278e35a79966f977fb3a3ea5f6807384991ffc605
                                  • Instruction ID: f3ccb20a02fbe5d56daf7cd9820cb9f4c63adb4066341506fe754df4cc44cc7a
                                  • Opcode Fuzzy Hash: 0d1985d8d911d1af7785454278e35a79966f977fb3a3ea5f6807384991ffc605
                                  • Instruction Fuzzy Hash: 3FE012313002055BC7159B1AF884D8FFF9EDFC1265714C939A50A87225DE74ED4AC6A0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 06df3a0a7046d376c152b8950f690787facce5e863ce47030e2f0c78bd903abb
                                  • Instruction ID: 5c420fd9a10cca5bad4f17c29c12e7366db457ac00aa0d45fb5ebc8d05b62656
                                  • Opcode Fuzzy Hash: 06df3a0a7046d376c152b8950f690787facce5e863ce47030e2f0c78bd903abb
                                  • Instruction Fuzzy Hash: 0DF0E571544248EBC711EBB88810A9E7FB4FF07210F9809E9D5455B192EA321611B796
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c8cbbfa90bdbdde226567495a4f06a0d487530f82f38c2b9170b40d2f2e46ba3
                                  • Instruction ID: 943685b947828e2a638c8f117e9f81cb02a49d7c6afbd77560956870955c3fbe
                                  • Opcode Fuzzy Hash: c8cbbfa90bdbdde226567495a4f06a0d487530f82f38c2b9170b40d2f2e46ba3
                                  • Instruction Fuzzy Hash: 1BF082309441859FCB48CF58C0446ACBFF1FF05315F6442E6D86897392D7354D42EB51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a89ffcb837e73aec6e73fef9477b57443c4293991e998304d249c59288d77350
                                  • Instruction ID: 8d77281a1ef2071f213d35d507f555ff14d76dfc0008c0b3c2b53fff830d36aa
                                  • Opcode Fuzzy Hash: a89ffcb837e73aec6e73fef9477b57443c4293991e998304d249c59288d77350
                                  • Instruction Fuzzy Hash: 25E0ED38809248DFCB01CFA4C440BB9BFB0EB4A302F4401EAE84693362C6348A40DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 912568a2f31834d4b936b24e5a2a47287b9ce49a675373f2fe28789bb4eff269
                                  • Instruction ID: 445953b58261ba9b2b6c4146b18dd296769f8181b4e6807dd1e83baac3b58763
                                  • Opcode Fuzzy Hash: 912568a2f31834d4b936b24e5a2a47287b9ce49a675373f2fe28789bb4eff269
                                  • Instruction Fuzzy Hash: A4E086B6943108DFCB80EBF8C80478E77B8EB05241F8449A5DA45D3291EA755E14979A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e423a10bfe60fa0f9573e1d863b2265529ccaa405b0321560d5868ee9c814b99
                                  • Instruction ID: 704f6530623c5d60b2460cbf21b5b8045323ef9398893f69708900bdf29830cb
                                  • Opcode Fuzzy Hash: e423a10bfe60fa0f9573e1d863b2265529ccaa405b0321560d5868ee9c814b99
                                  • Instruction Fuzzy Hash: 85F0153480420CEFCF41DF94D9409ADBBB5FB48321F14C09AEC54A3261C6329A61EF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9825750e33866e6925f9d26d40c913086d4e19caa90e3b7db1e2247e3c0c1d43
                                  • Instruction ID: 851e6a58e9ec68254a971e061d808bb63e6be144e5429a05e9dae4716dfeda2a
                                  • Opcode Fuzzy Hash: 9825750e33866e6925f9d26d40c913086d4e19caa90e3b7db1e2247e3c0c1d43
                                  • Instruction Fuzzy Hash: 86F0F23490420CEFCF45CF98D8409ADBBB5FB48310F1080AAEC0892351D7329A61EF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a5fdf13dc06749cc9fa9b3aad2a1eab0935953d5d146fb812ebf956ec0ae5777
                                  • Instruction ID: 61596b85228d3f330483b1d7b46823be7d0efc34c8cc07acad61b6902103ad11
                                  • Opcode Fuzzy Hash: a5fdf13dc06749cc9fa9b3aad2a1eab0935953d5d146fb812ebf956ec0ae5777
                                  • Instruction Fuzzy Hash: A7E0DF32C49108EBCB44DAD8D8417A8BBB4FB56310F6484AADC05D3381D632AE43EB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9825750e33866e6925f9d26d40c913086d4e19caa90e3b7db1e2247e3c0c1d43
                                  • Instruction ID: 430fc3fce8eb083035f1d64cc3b15081a6add82ca8075058284e53afd1ab9550
                                  • Opcode Fuzzy Hash: 9825750e33866e6925f9d26d40c913086d4e19caa90e3b7db1e2247e3c0c1d43
                                  • Instruction Fuzzy Hash: 31F0F23494420CEFCB45CF98D844AACBBB5FB49310F1080AAEC0892251C6329AA1EF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 313bf8ec20d3f69eba088ff695ff5b1924358ffd9ce29605b44b6abaedd5641a
                                  • Instruction ID: 9c4aa7bafc12f24ea7ccba6eacc2790c82bd514ff6ca6c1750a30cb3d4b368b2
                                  • Opcode Fuzzy Hash: 313bf8ec20d3f69eba088ff695ff5b1924358ffd9ce29605b44b6abaedd5641a
                                  • Instruction Fuzzy Hash: B5E0CD759480089BD705CAD4D9407E977A1FB46329F2895CADC0A873D3D5379E53CB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 51d8e463ca9140af3e3773643f1ed206f2b05204afc181b989abcfce4e54dd32
                                  • Instruction ID: 5221409b2e6c00a6457216b17c24d9c51cbce4de228135081f449ab22f205442
                                  • Opcode Fuzzy Hash: 51d8e463ca9140af3e3773643f1ed206f2b05204afc181b989abcfce4e54dd32
                                  • Instruction Fuzzy Hash: F9E0E574955218EFCB84DFA8D5413A9BBB4BB09214F24C4AAD808D7291DB31AE56EB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 13d361ffc36b175578e716f51a16620b5175064c1a69229087e045d7790f8bb1
                                  • Instruction ID: 39de360174163fe4751651bd00940a4cbb45150ce7de6ed9e7bab7d1f23a1cda
                                  • Opcode Fuzzy Hash: 13d361ffc36b175578e716f51a16620b5175064c1a69229087e045d7790f8bb1
                                  • Instruction Fuzzy Hash: 78E09234809208EBC744DF54DC45A99BBB5BB45315F54C19DEC4423311C7329E56DB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9a8f48f912251b87ad6723194eeeec6c1b80f1ecbe96f2ab983a2ffbe0f78ebc
                                  • Instruction ID: 2ad084722b859ad4d5aaa7db1f002266cd1a8590a03e12c7ac2dd3dd62abf6b1
                                  • Opcode Fuzzy Hash: 9a8f48f912251b87ad6723194eeeec6c1b80f1ecbe96f2ab983a2ffbe0f78ebc
                                  • Instruction Fuzzy Hash: B2F03070D442489FCB88DFA8D0442ACBFF5FB48300F5080A6D858A3341D6344E41DF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f4a0daf0253a7cdd16b690df839a913c24978828b85a311c0e24548422fbd006
                                  • Instruction ID: 19a86fe11a19f0c029c5b78da27ac0b2edae189b477f6cf4f87b0d9ac895dbfe
                                  • Opcode Fuzzy Hash: f4a0daf0253a7cdd16b690df839a913c24978828b85a311c0e24548422fbd006
                                  • Instruction Fuzzy Hash: 46F03074C492849FC746CFA4D8502ACBFB0AB4A305F14C0DAD89897392D6354E45DF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 46ca049055e6de06aac5c2210242bcb20a13a7104659021ee66b28c7a6e23ba7
                                  • Instruction ID: b4054042e3fa7c6fe560f0ce8772ef658410e35093ff3e240f774d55010575dc
                                  • Opcode Fuzzy Hash: 46ca049055e6de06aac5c2210242bcb20a13a7104659021ee66b28c7a6e23ba7
                                  • Instruction Fuzzy Hash: 0BE0DF38808008CFCB00CFA8E4817ACBF70FB4A315F148099EC0997351CA329D52DB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1d012f60a9b25fd34dad5117704d4b76795c0fd102c2d137a92741a14a452a9b
                                  • Instruction ID: 63e6b07e40420ff918724705e410363ff8d79f6fc358840e1882d2b36fd62867
                                  • Opcode Fuzzy Hash: 1d012f60a9b25fd34dad5117704d4b76795c0fd102c2d137a92741a14a452a9b
                                  • Instruction Fuzzy Hash: 81E09230909108ABC705DBA4E9416A8FFB5B781305F24C59ADC0863213DE325D52DBC0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b3bf8e5abc8aa1300db6f22cbefe603ce16aa6d18632c3da5042ad0e8fbc48f9
                                  • Instruction ID: 94b9cab311cc960e2130cf82c7750eba83d2e1ffd9fb104f191bae2f7c078aca
                                  • Opcode Fuzzy Hash: b3bf8e5abc8aa1300db6f22cbefe603ce16aa6d18632c3da5042ad0e8fbc48f9
                                  • Instruction Fuzzy Hash: 86F0C93494420CEFCB45DF95D840AADBBB6FB49310F14C09AEC5496351D6369A61EF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fef267e6dc8a626fc4f648c51df91b71230f451b1797617b9522d0c50b1ffffd
                                  • Instruction ID: aefe78c194378cd89c59aa6e1693abc0e2721052551a3288762bd812407ab803
                                  • Opcode Fuzzy Hash: fef267e6dc8a626fc4f648c51df91b71230f451b1797617b9522d0c50b1ffffd
                                  • Instruction Fuzzy Hash: BAE0123494920CDFC705DBA4E9456A8BF75BB45318F18819EDC0867352D7319E95DB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 74d814651915a791d0e1e3564cf95cddad861d3e93cf81bbb326223b8fc94195
                                  • Instruction ID: 751d8ef7b39ddbca505ad7d844394d95df1a7c52cf71fda76c90d350c26211c8
                                  • Opcode Fuzzy Hash: 74d814651915a791d0e1e3564cf95cddad861d3e93cf81bbb326223b8fc94195
                                  • Instruction Fuzzy Hash: 9BF0DA74A8121CDFEB60CF14D885F9AB7B1BB49304F1080D5EA4CAB290C7B5AE84CF45
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 88ece09407bb3bcbd50405a30408e5fea48611f40620480355149129f3c80a5a
                                  • Instruction ID: d142008a45a777714152b17e2d2930954382ecedd73b172524853e29c873a912
                                  • Opcode Fuzzy Hash: 88ece09407bb3bcbd50405a30408e5fea48611f40620480355149129f3c80a5a
                                  • Instruction Fuzzy Hash: E5E0DF30D8928CAFC740DBF8E8443AC7FB5BB06214F1441AADC08E3252E7304B98CB82
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1cb1854eff76f2d1fa73b662309b9c6c373511a14a1d16551991caf1e7b51031
                                  • Instruction ID: eb4039a10a8fece135cb2baf7958625a7d2421344acb620fc03520e10ab6b2eb
                                  • Opcode Fuzzy Hash: 1cb1854eff76f2d1fa73b662309b9c6c373511a14a1d16551991caf1e7b51031
                                  • Instruction Fuzzy Hash: EBE0C27098B10DAECB41DA94C802F697B5CE702211F1024ABCC0997262E6B20E80CA51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 604dfdb91f2989efda1c2766cdf4e64e0206d420fd28217acfe40f06a0c51150
                                  • Instruction ID: ce5225fbf6bae4849270884ee800ed2172db2f9ebda2b60691f1a918734e6ec0
                                  • Opcode Fuzzy Hash: 604dfdb91f2989efda1c2766cdf4e64e0206d420fd28217acfe40f06a0c51150
                                  • Instruction Fuzzy Hash: D9E0C9B4E04208EFCB84EFA8D44069DBBF4EB49310F10C5AAD81893351D6719A96DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 604dfdb91f2989efda1c2766cdf4e64e0206d420fd28217acfe40f06a0c51150
                                  • Instruction ID: 0ee0b179380a7a396ee1b38467bfe8b26811d598c57ec4f5f8c68d95e28acdad
                                  • Opcode Fuzzy Hash: 604dfdb91f2989efda1c2766cdf4e64e0206d420fd28217acfe40f06a0c51150
                                  • Instruction Fuzzy Hash: A2E0C9B4D44208EFCB84DFA8D4406ADFBF4EB49310F10C4AAD81893351D632AA52DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 604dfdb91f2989efda1c2766cdf4e64e0206d420fd28217acfe40f06a0c51150
                                  • Instruction ID: f766f8f6192dc75755014c191776b4aa1db2a251c7860228387cfeb8c46bd0ed
                                  • Opcode Fuzzy Hash: 604dfdb91f2989efda1c2766cdf4e64e0206d420fd28217acfe40f06a0c51150
                                  • Instruction Fuzzy Hash: ECE0A5B4D04208EFCB85DFA8D44069DFBF4AB49310F10C4AA981893351D6319AA1DF80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3230de217fe6867773c5df631229c1222295f21553971c0903aba6eb5b6b63ce
                                  • Instruction ID: 3ce50219f171e84697e3ef4a6ba95ea6cd72d356f61c9d40b9c9d670729ac6d4
                                  • Opcode Fuzzy Hash: 3230de217fe6867773c5df631229c1222295f21553971c0903aba6eb5b6b63ce
                                  • Instruction Fuzzy Hash: 02E0EDB0915118DFCB84DFA8D9457A8BBB1EB09214F2485A9D81CD7391EB718A52EB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0040e59a14dc758bf940ec97a2488c3b3559674155bda80eadea6940fae05a09
                                  • Instruction ID: 6fb7a8caa7f0e418779baba8485979541199acd84a24e32b98884e27273ea6b9
                                  • Opcode Fuzzy Hash: 0040e59a14dc758bf940ec97a2488c3b3559674155bda80eadea6940fae05a09
                                  • Instruction Fuzzy Hash: 9CE02B72904149DFDB11DB7CE80074E7BB9DB01314F10899DE80C93381DB366E02AB41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b9df63cf17660072c1b5a80adf52223870fe3c4ef5abae00094773ae504de9f0
                                  • Instruction ID: 681f538fd123dcb7dd98d652ce3ecdc160f990aaa7ed802bf9fb58320cfc918c
                                  • Opcode Fuzzy Hash: b9df63cf17660072c1b5a80adf52223870fe3c4ef5abae00094773ae504de9f0
                                  • Instruction Fuzzy Hash: 0FE026B03443209BD628A2A4980575133A98B42610F204429E6069B2C0EF71E812E725
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cf24a0b3ae584361fa12c0642d41542d5b0d05eb4b1a975d10f13b52321eefce
                                  • Instruction ID: 462381d1ef17d8dad0fe3acb9fbc303b77340e6c0a1d28344817f66496021c31
                                  • Opcode Fuzzy Hash: cf24a0b3ae584361fa12c0642d41542d5b0d05eb4b1a975d10f13b52321eefce
                                  • Instruction Fuzzy Hash: E0F030308092849FCB48DBA8D4556EDBFB0EB49315F1481EED85857382D6354A55DB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9fbf44bdbc584ca50367237efd90f5802b54fb90582475d0df7abc753ac0b72d
                                  • Instruction ID: b94e1dea00093ecdb8a49757954e09a1cd760339ab96e3b326f571ceb64b8fb1
                                  • Opcode Fuzzy Hash: 9fbf44bdbc584ca50367237efd90f5802b54fb90582475d0df7abc753ac0b72d
                                  • Instruction Fuzzy Hash: FDE0C274E0820CAFCB84DFA8D4406ACBBF4BB48214F1084AA9C19D3341DA319A91CF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 269833f62e621eceaa3159e3b052631d9022ca6b3356c01300cd3040fc109a3e
                                  • Instruction ID: 7be9eca6ccfd944492886ee9b74ef975c956776c226f6fafa2a193418353c5c8
                                  • Opcode Fuzzy Hash: 269833f62e621eceaa3159e3b052631d9022ca6b3356c01300cd3040fc109a3e
                                  • Instruction Fuzzy Hash: 22E092709481498BC796CB98D9807A8BFE0EB06225F1842CA8C58DB3D2C7769D42CB41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fa31ddf84ba451412949efc09344be84e5dbf2753fe3974baef0b49010b74006
                                  • Instruction ID: 3541ec8ac9555116aa7a125a24f7efaee790041de339130c91ab2a2400235d10
                                  • Opcode Fuzzy Hash: fa31ddf84ba451412949efc09344be84e5dbf2753fe3974baef0b49010b74006
                                  • Instruction Fuzzy Hash: 05E02CB094C0488BCB08CB90C902AA9BB70AB5232AF2980CDDC0D873D2CA33DD43CA40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9020ed4251e0e61a1cb93f2de21f1dd0fb9a15966a8f40282b9472b90e56adcc
                                  • Instruction ID: 7b4b45595282aca541bb95efb99bdf4848f58f4f4140970947522cb85797771a
                                  • Opcode Fuzzy Hash: 9020ed4251e0e61a1cb93f2de21f1dd0fb9a15966a8f40282b9472b90e56adcc
                                  • Instruction Fuzzy Hash: 03E0C9B4D04208EFCB84DFA8D44069CBBF4EB49310F1084AA981893341D6319A51CB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9020ed4251e0e61a1cb93f2de21f1dd0fb9a15966a8f40282b9472b90e56adcc
                                  • Instruction ID: cbc043318ebf71773a14bf969dda3fa6e45fbfc3003219c6167e271b169d7ceb
                                  • Opcode Fuzzy Hash: 9020ed4251e0e61a1cb93f2de21f1dd0fb9a15966a8f40282b9472b90e56adcc
                                  • Instruction Fuzzy Hash: B8E0E5B4E14208EFCB84EFA8D4406ACBBF9FB49310F50C4AAD81893341D7319A52DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 363510b2475409b3378c5c512bcbd594198a1006192add96c8c611fba8b40fa6
                                  • Instruction ID: 9dbb5398d03346fde8028ac7271028a9fd47dc7d68abb10f8a9b7d6c4dd4f620
                                  • Opcode Fuzzy Hash: 363510b2475409b3378c5c512bcbd594198a1006192add96c8c611fba8b40fa6
                                  • Instruction Fuzzy Hash: B9E0C2B4E04208AFCB84DFA8D4406ACBBF4EB49210F1084AA981893341D7319A56DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8008d1b55e735a5147b70dd92043ec2de8bde011ac882550d01adb0788492e31
                                  • Instruction ID: 108a0b829c5f69b9caad9e8ca4cf15e0d918776e2bcd5ee4814ddca29b85b78f
                                  • Opcode Fuzzy Hash: 8008d1b55e735a5147b70dd92043ec2de8bde011ac882550d01adb0788492e31
                                  • Instruction Fuzzy Hash: DFE01AB0D05208EFCB45DFA8D44069DBBF5FB49301F5084AAD808A3791D7359AA1EF81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 363510b2475409b3378c5c512bcbd594198a1006192add96c8c611fba8b40fa6
                                  • Instruction ID: 7005348267e1bf770a96626b1a35c4f5ec7efbac6551f5f97d0219302cb841c3
                                  • Opcode Fuzzy Hash: 363510b2475409b3378c5c512bcbd594198a1006192add96c8c611fba8b40fa6
                                  • Instruction Fuzzy Hash: 43E0E5B4E04208EFCB84DFA8D4406ACBBF4FB49310F10C0AAD81893341D771AA62DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1cbe24a13a47a1d4f3ca5d148500e1848d8a684b0b860fe04f70052409a5ae7d
                                  • Instruction ID: 7c1f62e1744e9223a2f9659510196d451f479c2d95dcf7ff2f8e974d45660200
                                  • Opcode Fuzzy Hash: 1cbe24a13a47a1d4f3ca5d148500e1848d8a684b0b860fe04f70052409a5ae7d
                                  • Instruction Fuzzy Hash: 78E0DF35A48200EFCB46CB90C541AA97B36EB1A325F24C48AD80547292CA36AE93DB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e1fd5ab1a49716d98883cb6c69da84f1c5fc9b9b98fb5eb36fb075377f3836b2
                                  • Instruction ID: 43b1bbe51923a6a19cba8df4c09eb1952dee5e48a3782524b27ba6c1847db1e5
                                  • Opcode Fuzzy Hash: e1fd5ab1a49716d98883cb6c69da84f1c5fc9b9b98fb5eb36fb075377f3836b2
                                  • Instruction Fuzzy Hash: 04E0E574D0820CEFCB44DF99D4415ACBBB5AB49311F24C0AADC4493351D6329A91DF80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 694c130cde767804d3de9aeb9d309d83e6bace6e036d9c7cf09cd913c36a0d87
                                  • Instruction ID: f47cc7927bc2ed88937dc45c31b32bbf2fc54631d64420b096629f0945beaca3
                                  • Opcode Fuzzy Hash: 694c130cde767804d3de9aeb9d309d83e6bace6e036d9c7cf09cd913c36a0d87
                                  • Instruction Fuzzy Hash: 06E086B4D4811CEFCB44DF94D4409AEBFB8BB46311F24C09AE84457341C6329A52DB90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 53f62271d3b846d1196bba3d3d8903f72c7b374859771db1eaf3277bddc3849e
                                  • Instruction ID: 4372c73eda73fbc9926bd8ed0cb4b2edb225affbc0361ce1b4c1bb6c92707176
                                  • Opcode Fuzzy Hash: 53f62271d3b846d1196bba3d3d8903f72c7b374859771db1eaf3277bddc3849e
                                  • Instruction Fuzzy Hash: 6CE0D870548285CBCB62D778C409BADBFF06B03221F5842EAD8A5C76D3C7760992D743
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d3b6e370bfd61a006f294383fde655e845e4f566fb031dc9f089954c8c770b25
                                  • Instruction ID: e50a14013c972601ac7d84a37fac371b787b81daf5402b6424a664984aafa4e7
                                  • Opcode Fuzzy Hash: d3b6e370bfd61a006f294383fde655e845e4f566fb031dc9f089954c8c770b25
                                  • Instruction Fuzzy Hash: DBE04FB0E05208EFCB44DFA8D4402ACBBF4FB85301F5080AAC80893381D7355A51EF41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6195363979966ab920f738ca62b43027647ee1c24c791b3fa82722e8898b1536
                                  • Instruction ID: d033cabd7d3490c10029fb0b52f067f412639b39a14e1e9e84665353a6aa90c8
                                  • Opcode Fuzzy Hash: 6195363979966ab920f738ca62b43027647ee1c24c791b3fa82722e8898b1536
                                  • Instruction Fuzzy Hash: A2F0A57494021C8FCB68DF54D890ADCBBB1EF8A304F1494D9C90EA7360CA31AE82CF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e692b2a0f1b02ca52b53ee1ec2bf03c8a136231b51488d68e162d9fd714922c5
                                  • Instruction ID: 5e18c3aa4eeb7276477ee87350dfe75e866b76e936e43ecc31851c8646bea8be
                                  • Opcode Fuzzy Hash: e692b2a0f1b02ca52b53ee1ec2bf03c8a136231b51488d68e162d9fd714922c5
                                  • Instruction Fuzzy Hash: C5F0D474901228DFEB20CF54E994BA9BBB1FB49304F0080DAE908A7390D7729E41CF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6de55eab7789d9788204c1e128632096a10de663f795f6c82b244e162e637178
                                  • Instruction ID: df781a6e9a8e78e739bc7985cb9c31708ef3acb3ed29026dd4943c938bac6168
                                  • Opcode Fuzzy Hash: 6de55eab7789d9788204c1e128632096a10de663f795f6c82b244e162e637178
                                  • Instruction Fuzzy Hash: 10E01234D0820CEFCB44DBA8D4446ACBBB4EB89214F2480AADC5993341C636AE92DF80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e174968894d3f5ca2b9b0376f216695440734a2344cffb91429cf3e563abadde
                                  • Instruction ID: 916fc5db523e4156d1932739033c12ccf088d4bd1fc0df59f0add55fe2b924ed
                                  • Opcode Fuzzy Hash: e174968894d3f5ca2b9b0376f216695440734a2344cffb91429cf3e563abadde
                                  • Instruction Fuzzy Hash: 39E01AB4D48108AFCB85DFE9D4505ACBBB5AB49214F2480AAD80857341C6319A52DB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3442ae382da24c80c6988b577a19b87dd2aa6984c9ca09aa90545f67c3d9cc7b
                                  • Instruction ID: dde5539014b42332e7961d3a285ecd885c1c41338295b5fb43fe5e785e2f47fc
                                  • Opcode Fuzzy Hash: 3442ae382da24c80c6988b577a19b87dd2aa6984c9ca09aa90545f67c3d9cc7b
                                  • Instruction Fuzzy Hash: 6BE04F70915108DFCB84DFA8D4406ACBBF4EB09210F2084A9C80CD3391D7719A52DB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d16585b3ef347f4f1639a1d69fe4dd09ee332bd0ccf3ca1f49598dda6b7a643d
                                  • Instruction ID: d4ca525627f63d3457bf360e4fdfd6a41fb1a7216b650d004d200f9199a6fd98
                                  • Opcode Fuzzy Hash: d16585b3ef347f4f1639a1d69fe4dd09ee332bd0ccf3ca1f49598dda6b7a643d
                                  • Instruction Fuzzy Hash: A2F03070A50225CFDB14DF14E854B5E77B6FB46300F5090A5E249A3380CB345D91DF62
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 73402114576066e2b7a55c1c0fd9ba9f5992a98bade3385313666eea5f8e8281
                                  • Instruction ID: 69bb56efd787e1d4e731808a0ac2779f2282d4621ef8af68d6bb9fe9dd53a0d0
                                  • Opcode Fuzzy Hash: 73402114576066e2b7a55c1c0fd9ba9f5992a98bade3385313666eea5f8e8281
                                  • Instruction Fuzzy Hash: 77E0CD34D48208DBCF04DFA4EC4556CBBB4FB45314F648099D80457341C6719E51EB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 996a3c7f59a1621ab3fb8d73548045dbe8bb15f8549d9fd31985306b92304501
                                  • Instruction ID: 4d902ba12ad3c282d4b45c504d9944b573382da99bcf017948b418459b9038fc
                                  • Opcode Fuzzy Hash: 996a3c7f59a1621ab3fb8d73548045dbe8bb15f8549d9fd31985306b92304501
                                  • Instruction Fuzzy Hash: 20E08634908208EFCB45DF94D4459ACBB79FB49310F10C499DC0413351C632AE91EB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c6399549a5979fe20126355ade24e98eba1b84bfada7b66b3f59d6711b99cf41
                                  • Instruction ID: af8f89a25df3ef49982286dcecace5bd882e1a33506a4237fe7d666edff1b6ab
                                  • Opcode Fuzzy Hash: c6399549a5979fe20126355ade24e98eba1b84bfada7b66b3f59d6711b99cf41
                                  • Instruction Fuzzy Hash: 19E01A34D08248EFCB85DBA8D4405ACBBB4EB49315F1480AADC5853341D6319E51DB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction ID: fcceb2836eaa342bbc462bee282f9f6745512eedca63fea31262bf8cc1f2c1b7
                                  • Opcode Fuzzy Hash: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction Fuzzy Hash: F9E0C23490910CDBCB04DF98D4405ACFBB4FB46315F608499CC0893341CA32AE92DB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 10c31f7a7c18e0f4be66ff7c6f1a41e953b01bed0964d27349d6f91f2019b982
                                  • Instruction ID: d3885a67ac3ccaafa50c63fd9e8126495d445508371744c646ff1201860195de
                                  • Opcode Fuzzy Hash: 10c31f7a7c18e0f4be66ff7c6f1a41e953b01bed0964d27349d6f91f2019b982
                                  • Instruction Fuzzy Hash: 7BE0C27198210CDFCB00EBF4880068E77B8AB05200F4008A6CA04D3160EA714E14DB96
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction ID: 1233867e9c92c31ccaa3d96c6bdc89609cf0c4761df0ef31f42acda37e67ae88
                                  • Opcode Fuzzy Hash: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction Fuzzy Hash: 0EE0C238D0C10CDBCB04DF94E4405ACBBB4FB45315F208099DC0993341C6329E52CB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction ID: edcb2fa43953423e8fe46116f67dc3f554e05e987af0eab38a7522fb08687881
                                  • Opcode Fuzzy Hash: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction Fuzzy Hash: 66E08C3490810CDBCB44DF94D4415ACBBB8BB45326F2080E9DC0863341CA32AE92CF80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction ID: 32c87077bf4816ea4bba47d4b0a409e4cde8d5dc977b2a564726edcd6e83a7be
                                  • Opcode Fuzzy Hash: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction Fuzzy Hash: 59E08C3490810CEBCB04DF94E4405ACFBB8BB45315F2085A9DC0D53342CA32AE92DB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction ID: cc3fadedfd79f53c3182062bc8d7a3d5b177b2d7094513af73b8b7a19641c299
                                  • Opcode Fuzzy Hash: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction Fuzzy Hash: 7CE0C234D0810CEBCB04EF94E4406ACBBB4FB45315F208099CC0853351C6729E52CF80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction ID: f16b0fe42531b5f855b3ba3e90f091f5c77b033a2b9b6478d434be561dff7248
                                  • Opcode Fuzzy Hash: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction Fuzzy Hash: D7E0C23490810CDBCB04DF94E5445ACFBB9FB45314F2480ADCC0853341CA329E92DF80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 690c104e395e13612cf6c49beac7c54a594eeb7fe18a37332155b00d65112ed7
                                  • Instruction ID: 8b5192d2bb9a6b434ca87c88eea766fbb7b316047aa343a8eb1e9012883ac5cd
                                  • Opcode Fuzzy Hash: 690c104e395e13612cf6c49beac7c54a594eeb7fe18a37332155b00d65112ed7
                                  • Instruction Fuzzy Hash: FDE0EC70D9524C9FCB80DBA8D4496ADBBB4AB05215F5041A98D09D3250E6715A94CB42
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction ID: b4f78f7d7592dd1ce31d4066649bed7410dae9ec5c1be0a15bc89d99e197ab6b
                                  • Opcode Fuzzy Hash: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction Fuzzy Hash: E6E0C23494810CDBCB04DF94D4405BCBBB8FB45314F60859ECC0853351CA329E92CF80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction ID: 755d568efc7ca100f08b88720cbf2a94c51fc0678a70630f717fb7876d8420db
                                  • Opcode Fuzzy Hash: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction Fuzzy Hash: C9E0C234D0810CDBCB04DF94D4405ACBBB4FB46314F20809ACC0853341D6329E52CB85
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction ID: 16a76747cd456f0e7c8416996669411ee858d1671420a30cefd1ef5418c94d89
                                  • Opcode Fuzzy Hash: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction Fuzzy Hash: EDE08C3494810CEBCB04DF94D4405ACBBB4FB46314F2085A9DC0993341C7329E52CB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction ID: 35644dd80b95855d32cf2a2b8733558cd4e75a0a9b0189ce77505ff9d011725f
                                  • Opcode Fuzzy Hash: 8e338b6218ffae757a710f1786cab91942b565a6cdf019dc055c7d3cafa9307c
                                  • Instruction Fuzzy Hash: F0E0C234A0910CDFCB04DF94D4405ACBBB4FB46315F60909ACC0893341C6329E52DB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1a3142a25408417e4e93770f42c9173a00bf39f6f13753fcfbd7429c52fa8293
                                  • Instruction ID: e9aa5384443008fdbc0bddfe7bb9b5988d314147460884235d92e9420bb45199
                                  • Opcode Fuzzy Hash: 1a3142a25408417e4e93770f42c9173a00bf39f6f13753fcfbd7429c52fa8293
                                  • Instruction Fuzzy Hash: EAE06D70A18124CBDB04EB94D8546ED7B76FB89300F41A89AE00E53380CF352C42CF20
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 32f3b61bf2549db8b51e97a78dc1c89659ccff13370611c671454915632f9f09
                                  • Instruction ID: 3471bb12c583616889b0ccc2410238d28c6b430810bc4991f8bcbca14b39c3f1
                                  • Opcode Fuzzy Hash: 32f3b61bf2549db8b51e97a78dc1c89659ccff13370611c671454915632f9f09
                                  • Instruction Fuzzy Hash: E3E08C7494810CDFCB44EB94D4806ACBBB5EB46310F2084DAC80827341C6729E52CBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b233b6d838d53f92949c8df271b8338bbf557b967406386939e75faf743cd2db
                                  • Instruction ID: 1eb98b39de60ad5741c84ff4479ac6c78cc9ce78fdbfc661601f268a6d9f026a
                                  • Opcode Fuzzy Hash: b233b6d838d53f92949c8df271b8338bbf557b967406386939e75faf743cd2db
                                  • Instruction Fuzzy Hash: 00E065B0A64215DBEB05DF9CE184B6EB3B6FB06320F509016E202A72D4C7388C56DF05
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ce9c9d20e7da73c7eb0f2d59cce8d9f8205bdc6a5bb2cb27dab1f25153d7c689
                                  • Instruction ID: 0b3f690f68791813e85596bcf5d579a0f2f5639be269f4d1086456336034ae5b
                                  • Opcode Fuzzy Hash: ce9c9d20e7da73c7eb0f2d59cce8d9f8205bdc6a5bb2cb27dab1f25153d7c689
                                  • Instruction Fuzzy Hash: 68E012B4D5521CEFCB84DFB8D44969CBFF8AB05211F6044AAD808D3790E7715EA0DB42
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c9929dffec6b8cbd848531782d7246e314d2da7293e39e581e44dbc63afe4fc9
                                  • Instruction ID: 638fa546c920c1bf66471e51317c0ca863a18bdb11108ae173556bdb957ade0f
                                  • Opcode Fuzzy Hash: c9929dffec6b8cbd848531782d7246e314d2da7293e39e581e44dbc63afe4fc9
                                  • Instruction Fuzzy Hash: 09F0AEB4D0521ACFEB64CF5AD845B99BBF2BB48311F1490A6D008A3290E7349D929F00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d67e54e5a3f6a3809fafb8532e01147eb80580cdffe47c6b3f2607486e5847fb
                                  • Instruction ID: 6e1e3898fe2c69b456d51f87325a0105fd58a85e75aeed41be5fff80d9fef0df
                                  • Opcode Fuzzy Hash: d67e54e5a3f6a3809fafb8532e01147eb80580cdffe47c6b3f2607486e5847fb
                                  • Instruction Fuzzy Hash: 3FE0C234D0820CDBCB04DF94E4419ACBBB8FB49310F6080DDD80813341CA329E52DB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 26ca7751f8bbc4e78d4616e91847932d3eb75bb4dc785e6bf28eecd5bc0fd149
                                  • Instruction ID: 52f71e9f0c6a68be7a10ba58fa7420e0d734e02e79b82b8bee65e95fa6737dba
                                  • Opcode Fuzzy Hash: 26ca7751f8bbc4e78d4616e91847932d3eb75bb4dc785e6bf28eecd5bc0fd149
                                  • Instruction Fuzzy Hash: 27E0127188110CDFCB01EBF4C94069E7BF9EB09210F5045A6D50593260EA754A54E7A6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a1f3a18c0c4482c6002967e12684dcf29c455656252c4e207b2041fd32250f09
                                  • Instruction ID: 8ee039c78b45b66b26783eb6fccc4e5da03dcfcc31ef94569bcc90bb40678973
                                  • Opcode Fuzzy Hash: a1f3a18c0c4482c6002967e12684dcf29c455656252c4e207b2041fd32250f09
                                  • Instruction Fuzzy Hash: C0E02B303083028FC722C76CB91479A3FE69B89208B148665F445D3216EF34DC4BC7C0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 043f20b032a8fb102dfdaee26aaaf78a2a6f4ae4d0dd31e5cf760b7004e3d1db
                                  • Instruction ID: ca6d8e0884f0c9642f26a973a29849ef0855662911b0aa1606a54601615cf794
                                  • Opcode Fuzzy Hash: 043f20b032a8fb102dfdaee26aaaf78a2a6f4ae4d0dd31e5cf760b7004e3d1db
                                  • Instruction Fuzzy Hash: 5CE0127188110CEFCB01EBB4990469E77BDAB09210F5445A6D50593160EB764A54E7A6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e264fa87ae06ba13ae8a69b9498b18c7c2783da3cf7ec0c3ab7fc13dfb584516
                                  • Instruction ID: 03b534b92ff61a60acff2b4400f768b06c0240bc7221a1195d7b3a97ac0b0691
                                  • Opcode Fuzzy Hash: e264fa87ae06ba13ae8a69b9498b18c7c2783da3cf7ec0c3ab7fc13dfb584516
                                  • Instruction Fuzzy Hash: 93D01736B006124FD715CB2DF841B5A37EAAF89201B09C564A045C7729EA34EC529B80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d67e54e5a3f6a3809fafb8532e01147eb80580cdffe47c6b3f2607486e5847fb
                                  • Instruction ID: 721dc9a3d28a377f2172b89b01cd668fb65483078c447348dc5bb070916b6ad9
                                  • Opcode Fuzzy Hash: d67e54e5a3f6a3809fafb8532e01147eb80580cdffe47c6b3f2607486e5847fb
                                  • Instruction Fuzzy Hash: 20E0C234D08208DBCB04DFA4E8445ACBBB4FB49310F608099C80817341C6729E52EB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: beb9c7f677fd1ac6307106e6f2cc580f0fa49c676e62e24e99ecd0a8e9dbc600
                                  • Instruction ID: c49b8561f97bbadba85ea7d9f5000ab843629f171230559949c354bf9d5dee61
                                  • Opcode Fuzzy Hash: beb9c7f677fd1ac6307106e6f2cc580f0fa49c676e62e24e99ecd0a8e9dbc600
                                  • Instruction Fuzzy Hash: 7CE08C3080820C9FC780DBA8C4402ACBBB8EB06215F14849ECC0893342D6729E52CB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2377670892.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7470000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3b9f9d904ce40fc89b0573d2c6bb4efc1577d4b089f39e6c31dae9e7d727e521
                                  • Instruction ID: 76c51a68acb415f42b1c0d0a6c6a70bcdbbb16b281df9ea4e53b66dfa0319979
                                  • Opcode Fuzzy Hash: 3b9f9d904ce40fc89b0573d2c6bb4efc1577d4b089f39e6c31dae9e7d727e521
                                  • Instruction Fuzzy Hash: 6EF0F2789582298FEB20DF24C844AD8B7B1FB48340F1040EAE409A2281EB748E858F00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f0f571c98c1372bdbb7552878ebb67a01c1ba320b8442ca8fef3463a942ad2c3
                                  • Instruction ID: 098a2a1f4f21fdc5daab2523b55ed2dabdf2afcc684e2d909decfb0c3e716ed7
                                  • Opcode Fuzzy Hash: f0f571c98c1372bdbb7552878ebb67a01c1ba320b8442ca8fef3463a942ad2c3
                                  • Instruction Fuzzy Hash: 4EF0FF749146288FCB65DF24EC45B9ABBB5BB48342F1091DAA809B3250EB705E81DF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 25e17fa6ea03c5e91980dda18ee68f889e7a15bc794fcfc31424b1d9f082ddea
                                  • Instruction ID: a68bedbc85d2a4c4a5b800e7afd0c66cbe8af54dd735a546c0176cf03e19d724
                                  • Opcode Fuzzy Hash: 25e17fa6ea03c5e91980dda18ee68f889e7a15bc794fcfc31424b1d9f082ddea
                                  • Instruction Fuzzy Hash: CEE01230A5420CEFDB04DFB4E941A7DB7BEEF55300F5099A8E90897240DE355E00AF80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 158818a919d24bfb6405c1734b96087ae18921dfb3d99db75b18ff1d3ef33658
                                  • Instruction ID: 9e15e197f3fbe99ea9266eb376ce0e57618c334200c544caede68f6711412ef9
                                  • Opcode Fuzzy Hash: 158818a919d24bfb6405c1734b96087ae18921dfb3d99db75b18ff1d3ef33658
                                  • Instruction Fuzzy Hash: 49E01270A1010CEFCB04DFA4E54165D7BFEDB45304F5085A8D90CD3310DA765E04AB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6617b868e40b27957a00e6eef57f9e3b9cb83f1b17db3c64ec058a5543176e65
                                  • Instruction ID: 404708c5acdd1b1d62994ab120feea2cb34c841c99d157aa5d0f6281d8efe2f4
                                  • Opcode Fuzzy Hash: 6617b868e40b27957a00e6eef57f9e3b9cb83f1b17db3c64ec058a5543176e65
                                  • Instruction Fuzzy Hash: 17E0E575A2011ACFDB14EF28D899B69BBB2FB44304F4090E5A50AA3781EB304E41DF15
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 504f06c6b930d652ac30517d2664a589e9b8a2fd636da668a3806362c6afd2c9
                                  • Instruction ID: 825506926d509939c83b07490e1b2cb17936fbedf647163e40d583d742683c21
                                  • Opcode Fuzzy Hash: 504f06c6b930d652ac30517d2664a589e9b8a2fd636da668a3806362c6afd2c9
                                  • Instruction Fuzzy Hash: 47E06530A00318DFDB68EF18C8A8799BBB1FB49310F009094E14EA3350EB304D81DF61
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8aca85cc0d94d79c4c15ef82f44aded275a9d23ad0f45fd02deaca8f52af51d6
                                  • Instruction ID: 0b0a3015c3db2acabe55ef391d16274f5ae1a5539601becafaa1dfc4810ef9e1
                                  • Opcode Fuzzy Hash: 8aca85cc0d94d79c4c15ef82f44aded275a9d23ad0f45fd02deaca8f52af51d6
                                  • Instruction Fuzzy Hash: D1D022308CB10CEFCB40CAA8C402BA9BB6CF702210F0014AECC0893210DBB10E50CA84
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a349c88fa312d60baae0682820d1f8be4f7514faeefc195e3260525d15345fcd
                                  • Instruction ID: d03bd675e54be561375bd98238eb1c57f370d9cc7e2ac7ace3669f142f1e3f72
                                  • Opcode Fuzzy Hash: a349c88fa312d60baae0682820d1f8be4f7514faeefc195e3260525d15345fcd
                                  • Instruction Fuzzy Hash: F4E0E570A1022C8FCB18EB14D84979DBBB2FF86B00F8150A8A649A3384CB301D41DF22
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: de01660832c072cd4b56fab13a421dd7df84be8bc2e36c3800918c4af6924e9d
                                  • Instruction ID: f006aec17e3d83ecb9c13afb18457b1ebef3a6d33f63d33d92274e4945b4b155
                                  • Opcode Fuzzy Hash: de01660832c072cd4b56fab13a421dd7df84be8bc2e36c3800918c4af6924e9d
                                  • Instruction Fuzzy Hash: 39E01A70A542188BCB58EF28D88479EB7B3FB49304F409099E609A3390CF301D81DF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6519b611c9630410bef7d0c0b9099b8dc9785a052a95f12b1a86b42268b993d6
                                  • Instruction ID: eba4cee5a1edf804053cf190b29fb14c238a7b8e13d8acd4c9fdbb60023d9575
                                  • Opcode Fuzzy Hash: 6519b611c9630410bef7d0c0b9099b8dc9785a052a95f12b1a86b42268b993d6
                                  • Instruction Fuzzy Hash: A6E01A70E51119CBEB18EF24E944B9EB7B2EB45300F5091A9E50DA3380CB341E869F71
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 812197bf1a740e829318dfc3dfc9aa505755c1d6730e48feb900541eb1264680
                                  • Instruction ID: e93d2a96732154eba92fb608ee15ba4e61bf0f23223c70642ff3eaf7d9238689
                                  • Opcode Fuzzy Hash: 812197bf1a740e829318dfc3dfc9aa505755c1d6730e48feb900541eb1264680
                                  • Instruction Fuzzy Hash: 7DE0ED70A402158FDB54EB14D884F5DB7B2EB45310F5091A5D00D63740DF301D85AF25
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ac52f7ce1c77bac89ee7c2f077de03e6834a24802c3c3b6b0af6e72f9f6dadb0
                                  • Instruction ID: ed58a3c536a3920b21cb356cb6404374d2c841265378356928e7a39619871918
                                  • Opcode Fuzzy Hash: ac52f7ce1c77bac89ee7c2f077de03e6834a24802c3c3b6b0af6e72f9f6dadb0
                                  • Instruction Fuzzy Hash: 85E01A74A002288BCB14EF24D89579DB773FB45301F4090A9E609A3384CB311F41DF52
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9fb534c36c11a6c2ff013b135a9a1fb020bed2645e67fb15e3f426c4611385e6
                                  • Instruction ID: a448a48f6aa54151d7000f317170629a35d1f1fb6159d2337647ec2c7bdb6847
                                  • Opcode Fuzzy Hash: 9fb534c36c11a6c2ff013b135a9a1fb020bed2645e67fb15e3f426c4611385e6
                                  • Instruction Fuzzy Hash: 32E048709902158FCB14EF54D95576DB772FB89301F4050E9D60DB3340DB301D41AF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ddc6f8545ea6c839bea4134783d78505ee7ac206747f29cee1ba2bf274e1aae
                                  • Instruction ID: 87ae133253e6b339fe233e3f8b102e1b595cf83cbf38208e6d46a6b665fe264a
                                  • Opcode Fuzzy Hash: 4ddc6f8545ea6c839bea4134783d78505ee7ac206747f29cee1ba2bf274e1aae
                                  • Instruction Fuzzy Hash: 06E09274A541288BCB08EF68D8946ADBBB6FB49308F40D0A9E58AA7784CF341D15EF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1a420ed3fc787bcc7ded30b683916905424b729ff3980a32c78d18cb3613b5c4
                                  • Instruction ID: 122e46a95e546a1fc2b18c19b9c70a8b74a5e43f48907d9baf65cc7bf15f980e
                                  • Opcode Fuzzy Hash: 1a420ed3fc787bcc7ded30b683916905424b729ff3980a32c78d18cb3613b5c4
                                  • Instruction Fuzzy Hash: 04E02D78900218CFDB60CF54D484A99BBB6EB49314F14909ACC0EA7361D735AD82CF00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ecac6dd36ab7cd18ec54f5ef9fd6907af56f2e27d9fc564c01ff36966e6cd885
                                  • Instruction ID: 9dfffb8a89ae7789b7aabe1e32fef10ea95677a2d2c2cc88108eacbe267bc7b9
                                  • Opcode Fuzzy Hash: ecac6dd36ab7cd18ec54f5ef9fd6907af56f2e27d9fc564c01ff36966e6cd885
                                  • Instruction Fuzzy Hash: 37E0B67880422ECFDB20DF21D948BE8BBB6BB04304F0091E6C80AA2260D7745A85DF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fe8c19b4660789ba2f2f1361f9a94a37a0b64625e36600ae5d3693c449d1a577
                                  • Instruction ID: 6b110193eb9d4c9555acc8c014f423a5c81e363cc331d7fdb07a43324e9653ff
                                  • Opcode Fuzzy Hash: fe8c19b4660789ba2f2f1361f9a94a37a0b64625e36600ae5d3693c449d1a577
                                  • Instruction Fuzzy Hash: DDD0427490521CCFDB24DF20D9487ABB771AB46309F04509A9E496A290C7B45D84DF15
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 06d2323aec01745969686f02dc56976f77e3794ea4817c3013d117793b8351f8
                                  • Instruction ID: 7326ba910ce45194ea754f20ff5a231629311d48890f3cfa42073b465748ec2f
                                  • Opcode Fuzzy Hash: 06d2323aec01745969686f02dc56976f77e3794ea4817c3013d117793b8351f8
                                  • Instruction Fuzzy Hash: 64D0C976004144AFCB019B78D885A9A7FB5DF5B628F1980D4E5848B233C222E824D640
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 70198801975f37fabce23bab2c85d803e84d2b5031469e94b771a994f1b41e9d
                                  • Instruction ID: 0884ed01db99eb79b7d40203024f1578214f2fd0a5ec99be11b4169d047c49da
                                  • Opcode Fuzzy Hash: 70198801975f37fabce23bab2c85d803e84d2b5031469e94b771a994f1b41e9d
                                  • Instruction Fuzzy Hash: 2EE0E2709692298FCF65CF34E85DB98BBB9FF48300F00A2E9900DA2260DB301E85DF10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366790491.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5840000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b4ea2dd56f531336a6cf0cbedd9b114078fbf63ee362ea53ba17e11ba4b201d2
                                  • Instruction ID: be606d5206b3f0b81746786bde2029585a6ad50e8489f9d0e614a0b3492b353a
                                  • Opcode Fuzzy Hash: b4ea2dd56f531336a6cf0cbedd9b114078fbf63ee362ea53ba17e11ba4b201d2
                                  • Instruction Fuzzy Hash: 5FA0122315410D4680249B48A4482B4F718D98B2962203D52DC0DC14010A1005014740
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c83c7396efb14b3b2ef3618054e11fa191913e3104414febc4a10c8f78d09fd7
                                  • Instruction ID: e44faabafe886c57e821725cfba3a1eb7ca76dea46c755fb7d815098a4a5280e
                                  • Opcode Fuzzy Hash: c83c7396efb14b3b2ef3618054e11fa191913e3104414febc4a10c8f78d09fd7
                                  • Instruction Fuzzy Hash: B1D09274A4562E8BCB64DF94C994BAABBF1BF09710F2091E5D40CA7340D7309E818F01
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7f83323bb8536592d42da0ed7fdd15646d0af0de58474969d7b99ff4d33634f6
                                  • Instruction ID: fc0a37d66e711b92a7e0ef12a8bcdfd9c397f2f67e7e374a227797a584d6e7c0
                                  • Opcode Fuzzy Hash: 7f83323bb8536592d42da0ed7fdd15646d0af0de58474969d7b99ff4d33634f6
                                  • Instruction Fuzzy Hash: 94C00276E5001A9A8B00DAD9E4508DCB774EB94321B004066E224A6104D63015268B50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2376311064.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7120000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a07e56d3c0ce314d55574e69855a11db87a81a84896c11f830f5c3a247e6ebf5
                                  • Instruction ID: 93269aa91f197a5f5d37073f07e0ccdbc956cddb0d99210158deb85dbf91b1c8
                                  • Opcode Fuzzy Hash: a07e56d3c0ce314d55574e69855a11db87a81a84896c11f830f5c3a247e6ebf5
                                  • Instruction Fuzzy Hash: 05C048B082AB48EBEA50DB20EA0B700BFB2B700220F14C6D9E808418A18A241882DF52
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                  • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                  • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                  • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 35eb33b63d8e68776c729e666cebd09b287f0746b8a8c621dac331488acad5a7
                                  • Instruction ID: 8ecb681f56f3b4bf8a40eaf599ddf7ac9cc3dca5a4401d69190ebb66e25b57c8
                                  • Opcode Fuzzy Hash: 35eb33b63d8e68776c729e666cebd09b287f0746b8a8c621dac331488acad5a7
                                  • Instruction Fuzzy Hash: BBD0C5789143289BDBA4DF25D889B98BAB1BB0A304F00D199A48DA2251DE301AC99F14
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3b41d44b920bf2f2946e5c0806d36c19d7eff693d4c78b97ee98ca2d5daaa464
                                  • Instruction ID: e59120035c3b3f0834d53c83502dc9050ff17ea72cf1cb6b9093cfd24b7f878d
                                  • Opcode Fuzzy Hash: 3b41d44b920bf2f2946e5c0806d36c19d7eff693d4c78b97ee98ca2d5daaa464
                                  • Instruction Fuzzy Hash: BEB012041162C009C703E3F098043827F222745188F9CC685C1A4350138F2C481C9780
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0bc289f32111af24e03513249531a4573b0029994d4f0ee27ed2558929416044
                                  • Instruction ID: aeab57e648217d92d513958f42052861c56d51f08a6076642a54b8f5a5804026
                                  • Opcode Fuzzy Hash: 0bc289f32111af24e03513249531a4573b0029994d4f0ee27ed2558929416044
                                  • Instruction Fuzzy Hash: 75513571905308DFEB05DFA8E454BADFBB6FF4A310F14A06AE009A72A1D7785946CB24
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b07ae975dd54945d239274cc31744c65985cae5b506a37085fb21df91403139
                                  • Instruction ID: e57149af21cd2b09e2a988bf03e6f4c8a4139e3d21a85419f4f37298b8519d6f
                                  • Opcode Fuzzy Hash: 7b07ae975dd54945d239274cc31744c65985cae5b506a37085fb21df91403139
                                  • Instruction Fuzzy Hash: 1A51F171D05208DFEB54DFA8E444BADFBB6FF4A310F14A02AE409A7290D7786946CB24
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2361802153.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2f60000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 774a06e84a770f09f1c7b5bd1dd95ba396bd1a40311d8abe3445c63729cd3cbf
                                  • Instruction ID: a2254431891fdce8c784404249e5d7fba2ed47d78c43f53308a3e78606412ca5
                                  • Opcode Fuzzy Hash: 774a06e84a770f09f1c7b5bd1dd95ba396bd1a40311d8abe3445c63729cd3cbf
                                  • Instruction Fuzzy Hash: 2741E2B4D003489FDB14DFA9D988BAEBBF1FB09304F209129E515B7250D7759845CF85
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8965b9d0985b6c4f4621d7db93f452ae091c9989c9bcb0e55a501c8341d5e196
                                  • Instruction ID: 7327df836e0a26f08af15f906fed9695fbf559d828b9a3fc182ef7e624f0253f
                                  • Opcode Fuzzy Hash: 8965b9d0985b6c4f4621d7db93f452ae091c9989c9bcb0e55a501c8341d5e196
                                  • Instruction Fuzzy Hash: AD41EEB9C05258DFCB10CFA9D480AEEFBF1BB49310F24946AE455B7250C738AA45CFA4
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2364931733.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_50d0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d56a9bd8aad27c80e305268fb00f495fd48128cb7961117f7997e8e3d9abea5d
                                  • Instruction ID: d88fabecc3ea6b8c6f236ca14d5c3d736785c63cb86840143dc0a9adc921e3c0
                                  • Opcode Fuzzy Hash: d56a9bd8aad27c80e305268fb00f495fd48128cb7961117f7997e8e3d9abea5d
                                  • Instruction Fuzzy Hash: D341DDB5C05258DFCB10CFA9D484AEEFBF5BB09310F24946AE455B7240C738AA85CFA4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2366408610.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_57e0000_availableresearch.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq$4']q$4']q$4']q$4']q$paq
                                  • API String ID: 0-463314800
                                  • Opcode ID: 1d22cbcec87987f06ac10ee984bdaf0d2879dcb081e176812d69e7c6541cd7c5
                                  • Instruction ID: 1695042bd375bfc1578de56a7039ec414ded67131a60d43d88ed68df7873388f
                                  • Opcode Fuzzy Hash: 1d22cbcec87987f06ac10ee984bdaf0d2879dcb081e176812d69e7c6541cd7c5
                                  • Instruction Fuzzy Hash: 43518230A403058FC718EF69D9506AEBBEBBFC8300F14896CD44997365DF799906CBA1

                                  Execution Graph

                                  Execution Coverage:10.8%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:6%
                                  Total number of Nodes:67
                                  Total number of Limit Nodes:6
                                  execution_graph 58386 5727e50 58387 5727e90 FindCloseChangeNotification 58386->58387 58389 5727ec1 58387->58389 58378 59c4808 58379 59c484e KiUserCallbackDispatcher 58378->58379 58381 59c48a1 58379->58381 58390 59ccdb8 58391 59ccdce 58390->58391 58394 59cd208 58391->58394 58392 59ccdc8 58396 59cd210 58394->58396 58395 59cd224 58395->58392 58396->58395 58400 59cd250 58396->58400 58410 59cd241 58396->58410 58397 59cd239 58397->58392 58401 59cd262 58400->58401 58402 59cd27d 58401->58402 58404 59cd2a9 58401->58404 58408 59cd250 OleGetClipboard 58402->58408 58409 59cd241 OleGetClipboard 58402->58409 58403 59cd283 58403->58397 58406 59cd329 58404->58406 58420 59cf998 58404->58420 58406->58397 58408->58403 58409->58403 58411 59cd251 58410->58411 58412 59cd27d 58411->58412 58414 59cd2a9 58411->58414 58418 59cd250 OleGetClipboard 58412->58418 58419 59cd241 OleGetClipboard 58412->58419 58413 59cd283 58413->58397 58416 59cd329 58414->58416 58417 59cf998 OleGetClipboard 58414->58417 58415 59cd347 58415->58397 58416->58397 58417->58415 58418->58413 58419->58413 58422 59cf9ad 58420->58422 58423 59cd347 58422->58423 58424 59cf4b8 58422->58424 58423->58397 58425 59cfa40 OleGetClipboard 58424->58425 58427 59cfada 58425->58427 58428 59cf8a8 58429 59cf8b3 58428->58429 58430 59cf8c3 58429->58430 58432 59cf3a4 58429->58432 58433 59cf8f8 OleInitialize 58432->58433 58434 59cf95c 58433->58434 58434->58430 58435 59cf5c8 58438 59cf60e 58435->58438 58442 59cf38c 58438->58442 58439 59cf716 58440 59cf7d8 DuplicateHandle 58441 59cf86e 58440->58441 58443 59cf7d8 DuplicateHandle 58442->58443 58444 59cf704 58443->58444 58444->58439 58444->58440 58382 5b52da0 58383 5b52dc5 58382->58383 58384 5b52e73 LdrInitializeThunk 58383->58384 58385 5b52ddf 58383->58385 58384->58385 58445 f88fa0 58446 f88fb4 58445->58446 58449 572165b 58445->58449 58452 57239c7 58445->58452 58456 5727bd0 58449->58456 58455 5727bd0 VirtualProtect 58452->58455 58453 5720a9e 58453->58452 58454 57239e5 58453->58454 58455->58453 58457 5727be3 58456->58457 58460 5727c80 58457->58460 58461 5727cc8 VirtualProtect 58460->58461 58463 572166e 58461->58463
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,aq$4$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                  • API String ID: 0-3443518476
                                  • Opcode ID: 14a4ee01500cdb685ac65cbb54477f8842bc492b18f72ebccfca9247b97944fd
                                  • Instruction ID: ac20b322e5ba1dee7dff9a19ce2c433a9f66d2dc4be25319b8c48b74fd0da944
                                  • Opcode Fuzzy Hash: 14a4ee01500cdb685ac65cbb54477f8842bc492b18f72ebccfca9247b97944fd
                                  • Instruction Fuzzy Hash: 56B2F634A02218CFDB14DFA8C994BADB7B6FF48700F158599E506AB3A5DB70AC85CF50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 719 58470a8-58470cd 720 5847136-584713d 719->720 721 58470cf-584712d 719->721 722 5847143-58471aa 720->722 723 584721e-584722f 720->723 721->720 757 58471ac-58471eb 722->757 758 5847218 722->758 724 5847236-5847259 723->724 725 5847231 723->725 733 58472cb-5847361 724->733 734 584725b-5847264 724->734 725->724 743 5847382-5847388 733->743 736 5847266-584726b 734->736 737 5847273-5847279 734->737 736->737 740 584737d 737->740 741 584727f-5847286 737->741 740->743 741->733 744 5847288-5847291 741->744 750 5847392-5847393 743->750 751 584738a 743->751 747 58472a0-58472a6 744->747 748 5847293-5847298 744->748 747->740 753 58472ac-58472c6 747->753 748->747 761 58473c9-584741b 750->761 751->750 753->743 775 58471ed-58471fd 757->775 776 584720e-5847212 757->776 758->723 772 5847420-5847425 761->772 773 5847793-5847797 772->773 774 584742b-584751b 772->774 778 5849457-584946d 773->778 779 584779d-58477a7 773->779 774->772 783 58471ff-5847206 775->783 784 5847208-584720c 775->784 776->758 776->761 785 584947b-58494a9 778->785 779->772 783->776 784->775 784->776 786 584942f 785->786 787 58494ab-58494d1 785->787 786->772 786->778 787->778 788 58494d3-58494f5 787->788 788->785 789 58494f7-5849528 788->789 791 584952f-584958a 789->791 792 5849597-58495a9 791->792 792->791 794 58495ab-584960c 792->794 799 5849611 794->799 799->792 800 5849613-5849684 799->800 800->799
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Ddq$K$X
                                  • API String ID: 0-1328582118
                                  • Opcode ID: f4536dabf47c19c58b8693d4c6cd11207f7832b52b29101076ee6904c7768fe8
                                  • Instruction ID: 1f8d87488d91fd36c74789594f320f07c83a44fa253906cb30174d1f335153e8
                                  • Opcode Fuzzy Hash: f4536dabf47c19c58b8693d4c6cd11207f7832b52b29101076ee6904c7768fe8
                                  • Instruction Fuzzy Hash: 50F1EF75A002888FDB11DFA8D885B5ABBF2FF45204F59846ADC55DB292DB30EC0ACF40

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1841 5b52da0-5b52dd9 1844 5b52eef-5b52f03 1841->1844 1845 5b52ddf-5b52ecf 1841->1845 1849 5b52f05-5b52f07 1844->1849 1850 5b52f09 1844->1850 1847 5b53069-5b5306d 1845->1847 1851 5b5306f 1847->1851 1852 5b53078 1847->1852 1853 5b52f0c-5b52f2e LdrInitializeThunk 1849->1853 1850->1853 1851->1852 1854 5b53079 1852->1854 1866 5b52de4-5b52df6 call 5b509d0 1853->1866 1854->1854 1870 5b52f33-5b52f46 1866->1870 1871 5b52dfc-5b52e08 1866->1871 1870->1847 1872 5b52e85-5b52e98 call 5b509d0 1871->1872 1873 5b52e0a 1871->1873 1877 5b52f61-5b52fa9 1872->1877 1878 5b52e9e 1872->1878 1873->1872 1886 5b52faf-5b52fb4 1877->1886 1887 5b52fab-5b52fad 1877->1887 1878->1870 1888 5b52fb9-5b52fe8 1886->1888 1887->1888 1894 5b52fee-5b52ff2 1888->1894 1895 5b52fea-5b52fec 1888->1895 1896 5b52ff7-5b5304f 1894->1896 1895->1896 1896->1847
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2559548903.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5b50000_InstallUtil.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: LR]q
                                  • API String ID: 2994545307-3081347316
                                  • Opcode ID: d8f1ec80e7e8bc46a95ed0a730cb1021f9af4f2408908ac781d77ac0ae769781
                                  • Instruction ID: 89c1613e2465fdc288bc01ec9e3768a08b1c8118733dc928b4ba782c3805cdd8
                                  • Opcode Fuzzy Hash: d8f1ec80e7e8bc46a95ed0a730cb1021f9af4f2408908ac781d77ac0ae769781
                                  • Instruction Fuzzy Hash: F8517435B106159FDB0CEB79C458B6EB2F2AF8C650F604468D806DB3A0DE75AC42CB56
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq
                                  • API String ID: 0-600464949
                                  • Opcode ID: d0a3b6c8c00aee3507489bc4b9b94602b3a29215d32c4a54e20636afaebd4126
                                  • Instruction ID: f8097b19fe04e0a2ebacbd9df52af62ec5057b58a44fb8ba0d7cd71e15db2015
                                  • Opcode Fuzzy Hash: d0a3b6c8c00aee3507489bc4b9b94602b3a29215d32c4a54e20636afaebd4126
                                  • Instruction Fuzzy Hash: C4527874B007158FCB19CF68C494A6EBBF2BF88311F18866AE956D7781DB30AD05CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te]q
                                  • API String ID: 0-52440209
                                  • Opcode ID: 1ea4a1e92b2b5fc4911e7e20aa613c41193c05501ae71131b2934a533095e058
                                  • Instruction ID: ede533fa80d5679c62d94ceabedf939dfd019f74d2e2c8fbd6d3ed48d1f944a8
                                  • Opcode Fuzzy Hash: 1ea4a1e92b2b5fc4911e7e20aa613c41193c05501ae71131b2934a533095e058
                                  • Instruction Fuzzy Hash: 0DC16E34A05104CFD754EF68D899BAEB3F7BB88311F248569E5069B3A5CB349C86EB01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te]q
                                  • API String ID: 0-52440209
                                  • Opcode ID: 1d205138f420a0feb72f957db848c187818e1a25f44f1203c5e114074e193da5
                                  • Instruction ID: 781416f49af2453b77bfdefb8ac2fd3911d8b57e220834032cca35f89a78946d
                                  • Opcode Fuzzy Hash: 1d205138f420a0feb72f957db848c187818e1a25f44f1203c5e114074e193da5
                                  • Instruction Fuzzy Hash: DBC15C35A05104CFD744EF68D989BAEB3F7BB88311F248569E5069B3A5CB349C86EB01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: \Vl
                                  • API String ID: 0-682378881
                                  • Opcode ID: cc15519042c3259e33e79df4bce679671b5e37bfb6bc7a2815c064803c7d01c5
                                  • Instruction ID: d705bee2db8d9095d00874a9d0ed7b6f7ad3aac4dca8b85f68d424d8d48b144e
                                  • Opcode Fuzzy Hash: cc15519042c3259e33e79df4bce679671b5e37bfb6bc7a2815c064803c7d01c5
                                  • Instruction Fuzzy Hash: 51912770E0024D9BDB14CFA9C9857AEBBF2BF88314F148129E919E7394EB749845CF91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aee3936f7977c8a497b2cb3fe5b1f2e52570ec53af3569dde9c88c8b57ceb17d
                                  • Instruction ID: 656de36d64493406c9483fe060f7fde155a1f29628d9070b3eeb19def4a09990
                                  • Opcode Fuzzy Hash: aee3936f7977c8a497b2cb3fe5b1f2e52570ec53af3569dde9c88c8b57ceb17d
                                  • Instruction Fuzzy Hash: 8C812D70A04208DFCB84EFA9E495BADBBF2FF48304F148469E416AB355DB75A984CF41
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 10c28a32b8303a43c9b56bb357cd254e75c79f127197409c9b0d6a7f4859e625
                                  • Instruction ID: 4efe621285b6ffc375d6924035fb6585cc85cc5422ea25d87af44bb9d015f2b5
                                  • Opcode Fuzzy Hash: 10c28a32b8303a43c9b56bb357cd254e75c79f127197409c9b0d6a7f4859e625
                                  • Instruction Fuzzy Hash: 3951DFB0B14209CFEB44DB55D445BBA77E3BB88320F248475EE02DB299DBB49C85CB41
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c01340ff58a481b771ec8323e42176d5f4a125bb04e9d7287efa48e6946e1087
                                  • Instruction ID: 85759625b42085bb19c869faa26cfb33cc9da176e066175649306fb4e5dca553
                                  • Opcode Fuzzy Hash: c01340ff58a481b771ec8323e42176d5f4a125bb04e9d7287efa48e6946e1087
                                  • Instruction Fuzzy Hash: A751CCB0B14209CFEB44DB55D445BBA77E3BB88324F248475EE02DB298CB749C85CB41

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 306 5851490-58514dc 310 58514e2-58514f4 306->310 311 585165a-5851693 306->311 314 5851544-585158d 310->314 315 58514f6-5851542 310->315 331 5851590-58515d0 314->331 315->331 336 58515d2-58515d8 331->336 337 58515da-58515e4 331->337 338 58515e7-585162a 336->338 337->338 345 5851650-5851657 338->345 346 585162c-5851648 338->346 346->345
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq$4']q$4']q$4']q$4']q$paq
                                  • API String ID: 0-463314800
                                  • Opcode ID: ea0397f65aba4b9ab4b65732af3b5edcbef309dc5231981b814f69630d6ed2f0
                                  • Instruction ID: cbf737d03908ecb0cbc4a670cb247849489ddac9f65a01570f584afcef27a4e5
                                  • Opcode Fuzzy Hash: ea0397f65aba4b9ab4b65732af3b5edcbef309dc5231981b814f69630d6ed2f0
                                  • Instruction Fuzzy Hash: B8518330A402058FCB48DF69D9517AFBAEBBFC8300F148969D44697359DF789D06C7A1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 496 585d638-585d64a 497 585d651-585d671 496->497 498 585d64c-585d650 496->498 501 585d6e7-585d70c 497->501 502 585d673-585d67f 497->502 498->497 506 585d713-585d75a 501->506 505 585d685-585d69b 502->505 502->506 513 585d69d-585d6ac 505->513 514 585d6ae-585d6ca 505->514 524 585d761-585d762 506->524 525 585d75c-585d760 506->525 513->514 520 585d6d4 514->520 521 585d6cc-585d6d2 514->521 523 585d6d8-585d6e4 520->523 521->523 526 585d764 524->526 527 585d769-585d778 524->527 525->524 526->527 528 585d7a0-585d7ae 527->528 529 585d77a-585d77c 527->529 537 585d7b0-585d7be 528->537 538 585d7e3-585d7ee 528->538 531 585d782-585d787 529->531 532 585d81b-585d840 529->532 533 585d791-585d79d 531->533 534 585d789-585d78b 531->534 536 585d847-585d86b 532->536 534->533 534->536 549 585d872-585d8c5 536->549 547 585d7d4-585d7d6 537->547 548 585d7c0-585d7d1 call 58571e0 537->548 545 585d7f0-585d814 538->545 546 585d7dc-585d7e0 538->546 545->532 547->546 547->549 562 585d8c7-585d8dd 549->562 563 585d920-585d952 549->563 568 585d8f5-585d90d 562->568 569 585d8df-585d8ea call 585d9a9 562->569 576 585d954-585d958 563->576 577 585d959-585d95a 563->577 573 585d90f 568->573 574 585d918-585d91d 568->574 572 585d8ed-585d8f2 569->572 573->574 576->577 578 585d961-585d972 577->578 579 585d95c-585d95f 577->579 581 585d974-585d97a 578->581 582 585d98a-585d9a2 578->582 579->578 583 585d97c 581->583 584 585d97e-585d980 581->584 583->582 584->582
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq$(aq$(aq$Haq
                                  • API String ID: 0-3649692834
                                  • Opcode ID: 959d964e37fe66ca86276e2f9b98269f2a51beae08463b3bc7c5124e727ba5ef
                                  • Instruction ID: 10d3a147369a191fb8e7249f361db79bd16431e33eec16c427f9f3d18b3a0f26
                                  • Opcode Fuzzy Hash: 959d964e37fe66ca86276e2f9b98269f2a51beae08463b3bc7c5124e727ba5ef
                                  • Instruction Fuzzy Hash: 9FA118313092448FDB16AB789850A6E7FE2EFC1720B5544AADC0ACF396DE35CD06C395

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 588 5850040-5850068 590 58500b6-58500c4 588->590 591 585006a-58500b1 588->591 592 58500c6-58500d1 590->592 593 58500d3 590->593 634 585050d-5850514 591->634 594 58500d5-58500dc 592->594 593->594 597 58501c5-58501c9 594->597 598 58500e2-58500e6 594->598 599 585021f-5850229 597->599 600 58501cb-58501da 597->600 601 5850515-585053d 598->601 602 58500ec-58500f0 598->602 606 5850262-5850288 599->606 607 585022b-585023a 599->607 614 58501de-58501e3 600->614 608 5850544-585056e 601->608 604 5850102-5850160 602->604 605 58500f2-58500fc 602->605 644 5850166-58501c0 604->644 645 58505d3-58505fd 604->645 605->604 605->608 625 5850295 606->625 626 585028a-5850293 606->626 618 5850576-585058c 607->618 619 5850240-585025d 607->619 608->618 620 58501e5-585021a 614->620 621 58501dc 614->621 642 5850594-58505cc 618->642 619->634 620->634 621->614 633 5850297-58502bf 625->633 626->633 648 58502c5-58502de 633->648 649 5850390-5850394 633->649 642->645 644->634 654 5850607-585060d 645->654 655 58505ff-5850605 645->655 648->649 674 58502e4-58502f3 648->674 652 5850396-58503af 649->652 653 585040e-5850418 649->653 652->653 679 58503b1-58503c0 652->679 658 5850475-585047e 653->658 659 585041a-5850424 653->659 655->654 657 585060e-585064b 655->657 663 58504b6-5850503 658->663 664 5850480-58504ae 658->664 672 5850426-5850428 659->672 673 585042a-585043c 659->673 684 585050b 663->684 664->663 680 585043e-5850440 672->680 673->680 692 58502f5-58502fb 674->692 693 585030b-5850320 674->693 700 58503c2-58503c8 679->700 701 58503d8-58503e3 679->701 682 5850442-5850446 680->682 683 585046e-5850473 680->683 688 5850464-5850467 682->688 689 5850448-5850461 682->689 683->658 683->659 684->634 688->683 689->688 694 58502fd 692->694 695 58502ff-5850301 692->695 698 5850354-585035d 693->698 699 5850322-585034e 693->699 694->693 695->693 698->645 705 5850363-585038a 698->705 699->642 699->698 706 58503cc-58503ce 700->706 707 58503ca 700->707 701->645 702 58503e9-585040c 701->702 702->653 702->679 705->649 705->674 706->701 707->701
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Haq$Haq$Haq
                                  • API String ID: 0-3013282719
                                  • Opcode ID: 02d6a48bbabd64b9a860fece78844994c1854f6a65f4b68fa35e2644cfcf80cc
                                  • Instruction ID: 0afc47558558f45f850b8a07c4edce8158cc375a6d70f552b78e871e1a2d1458
                                  • Opcode Fuzzy Hash: 02d6a48bbabd64b9a860fece78844994c1854f6a65f4b68fa35e2644cfcf80cc
                                  • Instruction Fuzzy Hash: 84125D31A00208CFCB15DFA5C499AAEBBF6FF88310F548569E9069B355DB31ED46CB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 804 585e088-585e094 806 585e124-585e149 804->806 807 585e09a-585e09e 804->807 809 585e150-585e158 806->809 808 585e0a4-585e0a6 807->808 807->809 810 585e0ac-585e0b1 808->810 811 585e15f-585e190 808->811 809->811 814 585e0b3-585e0c7 call 585dc80 810->814 815 585e0c8-585e0ee call 585dc80 810->815 830 585e1e1-585e1e7 811->830 831 585e192 811->831 826 585e0f0-585e0f2 815->826 827 585e0fa-585e123 815->827 826->827 833 585e194-585e198 831->833 834 585e199-585e19a 831->834 833->834 835 585e1e9-585e1f2 833->835 836 585e1a1-585e1a4 834->836 837 585e19c-585e19e 834->837 839 585e1f4-585e1f8 835->839 840 585e1f9-585e212 835->840 838 585e1a5-585e1c7 836->838 837->838 841 585e1a0 837->841 838->830 839->840 843 585e480-585e4a5 840->843 844 585e218-585e21f 840->844 841->836 846 585e4ac-585e4b5 843->846 845 585e225-585e230 844->845 844->846 847 585e236-585e242 845->847 848 585e4bc-585e4c5 845->848 846->848 851 585e255-585e25f 847->851 852 585e244-585e24d 847->852 858 585e4cc-585e4f0 848->858 854 585e287-585e28b 851->854 855 585e261-585e284 call 585dc80 851->855 852->851 857 585e291 854->857 854->858 860 585e2b7-585e2d8 857->860 861 585e350-585e360 857->861 862 585e298-585e2b2 857->862 874 585e4f7-585e502 858->874 860->874 875 585e2de-585e2e8 860->875 865 585e365-585e368 861->865 873 585e450-585e45f 862->873 867 585e362 865->867 868 585e36a-585e36e 865->868 867->865 871 585e370-585e379 868->871 872 585e38b-585e39d 868->872 871->874 879 585e37f-585e386 871->879 880 585e39f-585e3a2 872->880 881 585e3ab-585e3d3 872->881 877 585e476-585e47d 873->877 878 585e461-585e46b 873->878 875->874 882 585e2ee-585e2f5 875->882 878->877 884 585e46d-585e470 call 585e5b0 878->884 879->873 880->881 889 585e3d6-585e3eb 881->889 882->874 885 585e2fb-585e304 882->885 884->877 885->874 888 585e30a-585e313 885->888 888->874 890 585e319-585e323 888->890 889->874 891 585e3f1-585e3f8 889->891 890->874 892 585e329-585e333 890->892 891->889 893 585e3fa-585e402 891->893 892->874 894 585e339-585e341 892->894 893->874 895 585e408-585e422 893->895 894->874 896 585e347-585e34b 894->896 895->874 897 585e428-585e44d 895->897 896->873 897->873
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq$(aq$(aq
                                  • API String ID: 0-2593664646
                                  • Opcode ID: e2666471317005bf5829559a8cbd7dc9f605152f97b717618404fc56acf4e761
                                  • Instruction ID: 621b14a409f925cb6aa066fac30441134810eced362e6b8753e18417525ec216
                                  • Opcode Fuzzy Hash: e2666471317005bf5829559a8cbd7dc9f605152f97b717618404fc56acf4e761
                                  • Instruction Fuzzy Hash: E3D1E135B046568FCB05CB68C89487EBFF6BF89220B5481A9EC56DB352CB30ED41CB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 899 5851e88-5851ec5 901 5851ee7-5851efd call 5851c90 899->901 902 5851ec7-5851eca 899->902 908 5852273-5852287 901->908 909 5851f03-5851f0f 901->909 1016 5851ecc call 5852790 902->1016 1017 5851ecc call 58527a0 902->1017 1018 5851ecc call 58527f8 902->1018 904 5851ed2-5851ed4 904->901 906 5851ed6-5851ede 904->906 906->901 918 58522c7-58522d0 908->918 910 5851f15-5851f18 909->910 911 5852040-5852047 909->911 915 5851f1b-5851f24 910->915 913 5852176-58521b0 call 5851698 911->913 914 585204d-5852056 911->914 1012 58521b3 call 5853d68 913->1012 1013 58521b3 call 5853d78 913->1013 914->913 919 585205c-5852168 call 5851698 call 5851c28 call 5851698 914->919 916 5852368 915->916 917 5851f2a-5851f3e 915->917 924 585236d-5852371 916->924 933 5851f44-5851fd9 call 5851c90 * 2 call 5851698 call 5851c28 call 5851cd0 call 5851d78 call 5851de0 917->933 934 5852030-585203a 917->934 921 5852295-585229e 918->921 922 58522d2-58522d9 918->922 1010 5852173 919->1010 1011 585216a 919->1011 921->916 926 58522a4-58522b6 921->926 928 5852327-585232e 922->928 929 58522db-585231e call 5851698 922->929 930 5852373 924->930 931 585237c 924->931 945 58522c6 926->945 946 58522b8-58522bd 926->946 935 5852330-5852340 928->935 936 5852353-5852366 928->936 929->928 930->931 943 585237d 931->943 989 5851ff8-585202b call 5851de0 933->989 990 5851fdb-5851ff3 call 5851d78 call 5851698 call 5851948 933->990 934->911 934->915 935->936 949 5852342-585234a 935->949 936->924 943->943 945->918 1014 58522c0 call 5854509 946->1014 1015 58522c0 call 5854518 946->1015 949->936 958 58521b9-585226a call 5851698 958->908 989->934 990->989 1010->913 1011->1010 1012->958 1013->958 1014->945 1015->945 1016->904 1017->904 1018->904
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q$4']q$4']q
                                  • API String ID: 0-705557208
                                  • Opcode ID: d9801ada81e08100cf37721bc7e914ab33089ee2640eeb5a23bc80e131b38340
                                  • Instruction ID: 6ac11e3bb56e9e2260fa2339ca42bded2dfb5d36da110a4c4b226409e4e99a70
                                  • Opcode Fuzzy Hash: d9801ada81e08100cf37721bc7e914ab33089ee2640eeb5a23bc80e131b38340
                                  • Instruction Fuzzy Hash: 6DF1BA34A10218DFCB04EF64D998AADBBB2FF88310F558554E846AB365DF71EC42CB51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1019 58562b0-58562d0 1020 58562d6-58562da 1019->1020 1021 58563e9-585640e 1019->1021 1022 5856415-585643a 1020->1022 1023 58562e0-58562e9 1020->1023 1021->1022 1024 5856441-5856477 1022->1024 1023->1024 1025 58562ef-5856316 1023->1025 1041 585647e-58564d4 1024->1041 1035 585631c-585631e 1025->1035 1036 58563de-58563e8 1025->1036 1039 5856320-5856323 1035->1039 1040 585633f-5856341 1035->1040 1039->1041 1042 5856329-5856333 1039->1042 1043 5856344-5856348 1040->1043 1057 58564d6-58564ea call 5856792 1041->1057 1058 58564f8-585650f 1041->1058 1042->1041 1045 5856339-585633d 1042->1045 1046 58563a9-58563b5 1043->1046 1047 585634a-5856359 1043->1047 1045->1040 1045->1043 1046->1041 1048 58563bb-58563d8 1046->1048 1047->1041 1053 585635f-58563a6 1047->1053 1048->1035 1048->1036 1053->1046 1135 58564ed call 58569d0 1057->1135 1136 58564ed call 5856848 1057->1136 1137 58564ed call 5856aa8 1057->1137 1138 58564ed call 585683b 1057->1138 1067 5856515-58565fa call 5851c90 call 5851698 call 5855820 call 5851698 call 5851cd0 call 5854be0 call 5851698 call 5853d78 call 5852538 1058->1067 1068 58565ff-585660f 1058->1068 1063 58564f3 1065 5856721-585672c 1063->1065 1077 585672e-585673e 1065->1077 1078 585675b-585677c call 5851de0 1065->1078 1067->1068 1075 5856615-58566ee call 5851c90 * 2 call 5852448 call 5851698 call 5855820 call 5851698 call 5851948 call 5851de0 call 5851698 1068->1075 1076 58566fc-5856718 call 5851698 1068->1076 1132 58566f0 1075->1132 1133 58566f9 1075->1133 1076->1065 1090 5856740-5856746 1077->1090 1091 585674e-5856756 call 5852538 1077->1091 1090->1091 1091->1078 1132->1133 1133->1076 1135->1063 1136->1063 1137->1063 1138->1063
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq$(aq$Haq
                                  • API String ID: 0-2456560092
                                  • Opcode ID: b675b83964234d1cb1eba139d9a32d30cabcaa65f2a93d77c077961b28bf81ec
                                  • Instruction ID: f448458b77150b554558fec1237a5069c324e08ad0d008f260d124625066c293
                                  • Opcode Fuzzy Hash: b675b83964234d1cb1eba139d9a32d30cabcaa65f2a93d77c077961b28bf81ec
                                  • Instruction Fuzzy Hash: 32E1FE34A00209DFCB04EF68D5949AEBBB2FF89310F548569E806AB365DF30ED46CB51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1200 5858443-5858448 1201 585845a-585845c 1200->1201 1202 585844a 1200->1202 1205 5858462-5858466 1201->1205 1206 58584ea-585850f 1201->1206 1203 5858451-5858454 1202->1203 1204 585844c-585844e 1202->1204 1207 5858455-5858458 1203->1207 1204->1207 1208 5858450 1204->1208 1209 5858516-5858581 1205->1209 1210 585846c-5858481 1205->1210 1206->1209 1207->1201 1208->1203 1215 5858494-58584ba 1210->1215 1216 5858483-5858492 1210->1216 1222 58584c3-58584db 1215->1222 1227 58584bc-58584c0 1215->1227 1216->1215 1216->1222 1231 58584e3-58584e7 1222->1231
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq$(aq$PH]q
                                  • API String ID: 0-1991566364
                                  • Opcode ID: 3b4b6ba97e2f45c09f9a776fb56763b7c3b2c0957fdd7312747dde36483d7a94
                                  • Instruction ID: 989a1d65a24e4f744075b3dca05090383def55a87e595f6f703d7af6b2b2cd61
                                  • Opcode Fuzzy Hash: 3b4b6ba97e2f45c09f9a776fb56763b7c3b2c0957fdd7312747dde36483d7a94
                                  • Instruction Fuzzy Hash: 5041C2317041018FC709DF29D454A5ABBE6FF8932072581BAE809CB3A2DA35EC06CB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1233 5841973-584197d 1234 58419ef-58419fd 1233->1234 1235 584197f-5841992 1233->1235 1236 5841994-5841998 1235->1236 1237 5841999-584199a 1235->1237 1236->1237 1239 58419a1-58419c2 1237->1239 1240 584199c-584199d 1237->1240 1245 58419c4-58419c6 1239->1245 1246 58419c7-58419ee 1239->1246 1241 5841a0f-5841a23 1240->1241 1242 584199f 1240->1242 1243 5841a28-5841a30 1241->1243 1242->1239 1254 5841a35 call 5841c90 1243->1254 1255 5841a35 call 5841ca0 1243->1255 1246->1234 1247 5841a3b-5841aa8 1254->1247 1255->1247
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: fbq$ fbq$4']q
                                  • API String ID: 0-428188737
                                  • Opcode ID: e46b50adc9a18a3f625c5833c3ecf4e26c15d565660c08b92d1786d6d994988e
                                  • Instruction ID: 222c8a282d157a0d6f8248d9f25be71f7bc9022548f319a6902d289c5274a45c
                                  • Opcode Fuzzy Hash: e46b50adc9a18a3f625c5833c3ecf4e26c15d565660c08b92d1786d6d994988e
                                  • Instruction Fuzzy Hash: 5F214632A042588FCB05DBB4E5456AA3BF2EF85204F4480A6DD09CB381EF359C05CFD1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2554372059.0000000005520000.00000040.00000800.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5520000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q$4']q
                                  • API String ID: 0-3120983240
                                  • Opcode ID: 0a6ce07b0803c5d6259ba818679441b932a3db60c46c40428594f8df7f4f35ca
                                  • Instruction ID: 80aef9dd6f6936c675f60674684f12711d3215b39237989d0917378b9777906e
                                  • Opcode Fuzzy Hash: 0a6ce07b0803c5d6259ba818679441b932a3db60c46c40428594f8df7f4f35ca
                                  • Instruction Fuzzy Hash: B892BE31F086349B9F245A69446863F69EBBFCB740B1444AAE903D73D8EF348C45D7A2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1819 5841a03-5841a0a 1820 5841a11-5841a14 1819->1820 1821 5841a0c-5841a0e 1819->1821 1822 5841a15-5841a23 1820->1822 1821->1822 1823 5841a10 1821->1823 1824 5841a28-5841a30 1822->1824 1823->1820 1829 5841a35 call 5841c90 1824->1829 1830 5841a35 call 5841ca0 1824->1830 1825 5841a3b-5841aa8 1829->1825 1830->1825
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: fbq$ fbq$4']q
                                  • API String ID: 0-428188737
                                  • Opcode ID: 27e4640c256e7dd5bd1a79d8d2768256f6ae74e56e6fdb91b1b4d5e44dff7791
                                  • Instruction ID: 56c66fbf57144923e6718930dafa3c78af75cdf3977e9bd342225a56a546eacf
                                  • Opcode Fuzzy Hash: 27e4640c256e7dd5bd1a79d8d2768256f6ae74e56e6fdb91b1b4d5e44dff7791
                                  • Instruction Fuzzy Hash: 43F02D34A0425C9FCB04DBB4D8042AA7FB1DB4A214F50405ADE15D33C0DB351905CF51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1831 5841a10-5841a30 1839 5841a35 call 5841c90 1831->1839 1840 5841a35 call 5841ca0 1831->1840 1835 5841a3b-5841aa8 1839->1835 1840->1835
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: fbq$ fbq$4']q
                                  • API String ID: 0-428188737
                                  • Opcode ID: 185f670fd6aaffbc3749fbbaf44e1d66fe5e2bc4e4e1cb62a9138d78e85bf77e
                                  • Instruction ID: 0b0b3455ede29143dc5b2bc3f39bad3242bb5b232be39fb20af3bb97cd6ca053
                                  • Opcode Fuzzy Hash: 185f670fd6aaffbc3749fbbaf44e1d66fe5e2bc4e4e1cb62a9138d78e85bf77e
                                  • Instruction Fuzzy Hash: 58F01C34A00219DBCB04DAA4D5055AEBBB6EB88204F50806AEE1AD3380DF356916DF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1907 59c47f8-59c485c 1911 59c4867-59c489f KiUserCallbackDispatcher 1907->1911 1912 59c48a8-59c48ce 1911->1912 1913 59c48a1-59c48a7 1911->1913 1913->1912
                                  APIs
                                  • KiUserCallbackDispatcher.NTDLL(00000050), ref: 059C488B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2557143194.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_59c0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID: CallbackDispatcherUser
                                  • String ID: 4']q
                                  • API String ID: 2492992576-1259897404
                                  • Opcode ID: 75973e04f55ade6ff489ec22aa08caa98fb920f36c3eef6a128677d12d6e7235
                                  • Instruction ID: ba18ca076e5013a711a643780e82bd245a0092aed24434ee3bd864a744857251
                                  • Opcode Fuzzy Hash: 75973e04f55ade6ff489ec22aa08caa98fb920f36c3eef6a128677d12d6e7235
                                  • Instruction Fuzzy Hash: 0F213970D043998FCB10DFA9D945AEEBFF8BB08310F14855AE859B7281D7386944CFA6
                                  APIs
                                  • KiUserCallbackDispatcher.NTDLL(00000050), ref: 059C488B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2557143194.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_59c0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID: CallbackDispatcherUser
                                  • String ID: 4']q
                                  • API String ID: 2492992576-1259897404
                                  • Opcode ID: 9697165d7751d3190f0f4c6ca9066e41c2c6f8adc7522f0a9dab8164a2b9b605
                                  • Instruction ID: 2ae5c6419a0d34e1d112d0201cd7ea36b571dc32662b687f2cfad8097c0f8c39
                                  • Opcode Fuzzy Hash: 9697165d7751d3190f0f4c6ca9066e41c2c6f8adc7522f0a9dab8164a2b9b605
                                  • Instruction Fuzzy Hash: 122134B0D042498FDB14DFA9D9456EEBBF8FB08310F10855AE829B7280C7396944CFA1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q$4']q
                                  • API String ID: 0-3120983240
                                  • Opcode ID: e56dbe76613902b9eb5ceaa6c5d774f79eaa1da1cba04666a48d96abbfe16ebf
                                  • Instruction ID: 54443cbbc7275c827aa32b3c6131a2b114587dcab3f8da78ce8f9379bc57d830
                                  • Opcode Fuzzy Hash: e56dbe76613902b9eb5ceaa6c5d774f79eaa1da1cba04666a48d96abbfe16ebf
                                  • Instruction Fuzzy Hash: 77C1A874B00218DFCB04EFA8C994AADB7F6FF89310F504569E906AB365DB71AC42CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2554372059.0000000005520000.00000040.00000800.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5520000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q$4']q
                                  • API String ID: 0-3120983240
                                  • Opcode ID: 6758c9430044f8046776d26eb6c7a8ae7492ad5cb1a527336345c9db902c2591
                                  • Instruction ID: 0ce55b51b13852d83c182f0f85c87b397d353ff73cd0c680d7763c2c2591c468
                                  • Opcode Fuzzy Hash: 6758c9430044f8046776d26eb6c7a8ae7492ad5cb1a527336345c9db902c2591
                                  • Instruction Fuzzy Hash: 0591FE35F14A308B4F2A2764546A53E39E7BBCAA61315456AEC03D73C4DF348C06D7EA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q$4']q
                                  • API String ID: 0-3120983240
                                  • Opcode ID: c62645e98f294ca9230e577e4195eba417b5d2493ff11b32780b525fb53d1e0f
                                  • Instruction ID: 9e8baff91772ab56d26911af2dc7072939b6f8738b064709d7bf8a904e8fbe24
                                  • Opcode Fuzzy Hash: c62645e98f294ca9230e577e4195eba417b5d2493ff11b32780b525fb53d1e0f
                                  • Instruction Fuzzy Hash: 4EB1CA74B10218DFCB04EFA8C994AADB7B6FF89310F504168E906EB365DB71AC42CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq$(aq
                                  • API String ID: 0-3916115647
                                  • Opcode ID: 1af36a3cba96b354b090743b6e2388eb443bd3b028b5bcfee1571998cbf777e7
                                  • Instruction ID: 9a8be07e15426a267bb415c73619a401d5cca36219668aca2b258d2af277d38f
                                  • Opcode Fuzzy Hash: 1af36a3cba96b354b090743b6e2388eb443bd3b028b5bcfee1571998cbf777e7
                                  • Instruction Fuzzy Hash: 7671F031B056548FCB54DB28C884A6ABBF2FF89310B558569EC4ACB741DE30ED02CB95
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq$Haq
                                  • API String ID: 0-3785302501
                                  • Opcode ID: 0e0d0d3bf723a065a090fef4b9e7022f5008d00885078a11719eb0c124420f7b
                                  • Instruction ID: b8b4fd55d455cb5f9bcf5670d1717c3b12e0a8849933b05c6866abfe7918b142
                                  • Opcode Fuzzy Hash: 0e0d0d3bf723a065a090fef4b9e7022f5008d00885078a11719eb0c124420f7b
                                  • Instruction Fuzzy Hash: 5B41DE30206B008FD725DF2AD49075A7BF6EF90310F248A29D4468B7A6DF74D905CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q$paq
                                  • API String ID: 0-4101361271
                                  • Opcode ID: 683be97b38ebbb3a64bec26584604c00900488d51a881d74f45bc42c716a1a60
                                  • Instruction ID: 563c9999720afe026156fad163a830a277735605a1feabafbe54f6d1738b5a59
                                  • Opcode Fuzzy Hash: 683be97b38ebbb3a64bec26584604c00900488d51a881d74f45bc42c716a1a60
                                  • Instruction Fuzzy Hash: 3D4181306403059FC715DF69D980BAEBBEAFF84300F148938D44A9B259DB75ED06CBA1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq$Haq
                                  • API String ID: 0-3785302501
                                  • Opcode ID: ee534f536336a68d4dbb97e64ba2282974139e0cc18106c550a4f335f1fc18ab
                                  • Instruction ID: 398f2bd5805e1321dd0aa5f0fc8693d3df34f2e1bcff4a7c4183c4e417a07caa
                                  • Opcode Fuzzy Hash: ee534f536336a68d4dbb97e64ba2282974139e0cc18106c550a4f335f1fc18ab
                                  • Instruction Fuzzy Hash: 752106317041049FDB45AFA8D981AAE7FE6EFC5310B2445BAD805CB366DE35DD068391
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te]q
                                  • API String ID: 0-52440209
                                  • Opcode ID: f897f1bb6e569c3aaea318752129b2c6068fd6fa5c474756a14d6fed4c7e0676
                                  • Instruction ID: 19f22c05d5c3cf232e928d6895fe6578fadf5586b33db7eb06d8e8ec67b09a6a
                                  • Opcode Fuzzy Hash: f897f1bb6e569c3aaea318752129b2c6068fd6fa5c474756a14d6fed4c7e0676
                                  • Instruction Fuzzy Hash: 79D1F37B5072488BCA108E34DFC77993B71FB21629B98C419DA82D7325DE21F64BF644
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?), ref: 059CF85F
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2557143194.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_59c0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 441c9c0ebe89a87963f20484ac95a3d8aaabb0412d4db7f429bd611e19e1d767
                                  • Instruction ID: ccb139104bef947e15cfd301e62ce246637e595bf6efae39e7a44878b9d00d78
                                  • Opcode Fuzzy Hash: 441c9c0ebe89a87963f20484ac95a3d8aaabb0412d4db7f429bd611e19e1d767
                                  • Instruction Fuzzy Hash: BF9123B09013089FDB14DFAAD988A9EBBF5FF48310F14845AE919A7260C738A844CF61
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q
                                  • API String ID: 0-1007455737
                                  • Opcode ID: a4da0647f1cafd745e3d5d3698b9ef2a87f05ac2dfb807fab9c67a1d876336d6
                                  • Instruction ID: 9cbb5e87837335893b198464c7a85cdefa03fb876c124917d36fac837397b003
                                  • Opcode Fuzzy Hash: a4da0647f1cafd745e3d5d3698b9ef2a87f05ac2dfb807fab9c67a1d876336d6
                                  • Instruction Fuzzy Hash: 11F1B2717102018FDB15AF68C4457BE7BF2AF88310F29457AE982CB3A1EA34CD49E755
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2557143194.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_59c0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID: Clipboard
                                  • String ID:
                                  • API String ID: 220874293-0
                                  • Opcode ID: 50aee17839cb9c5da968f8890912826f50b01600ae82adc2b3b15f59d856dc57
                                  • Instruction ID: d9951d96be3c9152db8b5bf60d6d51ce97f6b1825487e14e40c5b6a6dffd8325
                                  • Opcode Fuzzy Hash: 50aee17839cb9c5da968f8890912826f50b01600ae82adc2b3b15f59d856dc57
                                  • Instruction Fuzzy Hash: D43102B0901248DFDB14DF99C994B9EBFF6AF48304F248059E408AB390DB756945CBA6
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?), ref: 059CF85F
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2557143194.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_59c0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: a03332eef788c23c011a9444257599413ad6e0fb746a2ebd36cb26075013220f
                                  • Instruction ID: 81f6a029d97e47917d15a1224e495d4af99af9aac2208ee1b781e5b5bc0e3d56
                                  • Opcode Fuzzy Hash: a03332eef788c23c011a9444257599413ad6e0fb746a2ebd36cb26075013220f
                                  • Instruction Fuzzy Hash: 142116B5900248DFDB10CFAAD484AEEBFF9FB48310F14845AE919A3350D378A950CFA1
                                  APIs
                                  • OleInitialize.OLE32(00000000), ref: 059CF94D
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2557143194.00000000059C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_59c0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID: Initialize
                                  • String ID:
                                  • API String ID: 2538663250-0
                                  • Opcode ID: 5c66532705be3bac801bafc009f73c2c3f48370dca947b299b19b6acc8e31a5f
                                  • Instruction ID: 45bc4cdc2804c2b15df5c4ce2bbeeb25c711e8dfb1bfef5e097532afb955c0a0
                                  • Opcode Fuzzy Hash: 5c66532705be3bac801bafc009f73c2c3f48370dca947b299b19b6acc8e31a5f
                                  • Instruction Fuzzy Hash: 511112B58047498FCB20DF9AD448BDEBFF9EB48324F208459E519A7310D379A984CFA5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Ddq
                                  • API String ID: 0-562783569
                                  • Opcode ID: b844ec68443fba575491d0b85d3118be500b934d4af2792f1f1ed8d4fe128385
                                  • Instruction ID: 4401fd5cbb5524c790f340f3737472241401725386f4d1554cc436e944d65144
                                  • Opcode Fuzzy Hash: b844ec68443fba575491d0b85d3118be500b934d4af2792f1f1ed8d4fe128385
                                  • Instruction Fuzzy Hash: DAA1AF75A006008FCB15EF68D594A9DBBF2FF88710F1585A9E409AF3A5DB30EC42CB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q
                                  • API String ID: 0-1259897404
                                  • Opcode ID: b6ffdad0be88276efa7d75b05814b80d36b81ff8e8d8fc47b86f3edf54f23129
                                  • Instruction ID: e166e8a3c93cd6d70f901321322d71ab8e06b1dd807c1c1e31a2f05d76280d02
                                  • Opcode Fuzzy Hash: b6ffdad0be88276efa7d75b05814b80d36b81ff8e8d8fc47b86f3edf54f23129
                                  • Instruction Fuzzy Hash: 7DA1DC34A10218DFCB04EFA8D898AADB7B6FF89310F558155E846AB361DF70AC46CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq
                                  • API String ID: 0-600464949
                                  • Opcode ID: 80de455dc4fdd5b9ddbc9043157c0416893e30288524a0f7addae81f81b9e073
                                  • Instruction ID: 801af843d76285531b93cba83da3d0108ca42fb25879e3688e8dd249eec7ef7b
                                  • Opcode Fuzzy Hash: 80de455dc4fdd5b9ddbc9043157c0416893e30288524a0f7addae81f81b9e073
                                  • Instruction Fuzzy Hash: C2715F70B002199FCB54DBA8C4546AEBBF6FF89700F148469D909E7394DE35AE02CB99
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Ddq
                                  • API String ID: 0-562783569
                                  • Opcode ID: 932c6b883ee5f94f39f5a6044f71944d913e9fe2eb9d270a46c58e94f3bce49f
                                  • Instruction ID: 01c667dc2d09326c9a722ce0552168b8da944f1e51105056c616482a03e736f9
                                  • Opcode Fuzzy Hash: 932c6b883ee5f94f39f5a6044f71944d913e9fe2eb9d270a46c58e94f3bce49f
                                  • Instruction Fuzzy Hash: 77618834A00614CFCB14EF29D584A59BBF2FF89310B5585A9E816EB365EB30EC46CF90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: paq
                                  • API String ID: 0-3273118895
                                  • Opcode ID: fc06fc68d3e29864c878197f0ac5e19fdee6e5f59d81851b2105b462f710a872
                                  • Instruction ID: 416918d928161e4ef999f6231c6b62c9c5e223fd6b6f8ac7c24a743d578d5918
                                  • Opcode Fuzzy Hash: fc06fc68d3e29864c878197f0ac5e19fdee6e5f59d81851b2105b462f710a872
                                  • Instruction Fuzzy Hash: 3B514A76600100AFCB459FA8C955D297BF7FF8D31471A84D8E2099B376DA36DC22EB50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq
                                  • API String ID: 0-600464949
                                  • Opcode ID: 602fc7a77df94d2ff188e42ddf14c9f2744bdab8158d72d56f7b29d2d93db101
                                  • Instruction ID: c13a8ea6b44fda4c51814984f4989e0b0652a28bc32e6d9a59097f0021362ccd
                                  • Opcode Fuzzy Hash: 602fc7a77df94d2ff188e42ddf14c9f2744bdab8158d72d56f7b29d2d93db101
                                  • Instruction Fuzzy Hash: 665183367042549FCB069F69D814E597FB2FF89720B1A80EAE505CF272DA32DC12DB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q
                                  • API String ID: 0-1259897404
                                  • Opcode ID: 3900a609f1535afd5d90b8cea6947eca6c0280320b8d11d023bfef45fcbd1ba2
                                  • Instruction ID: 60518ca170848bdd1f5cb44a10033383bf4ed21d5603df62328eb40cbefd58a5
                                  • Opcode Fuzzy Hash: 3900a609f1535afd5d90b8cea6947eca6c0280320b8d11d023bfef45fcbd1ba2
                                  • Instruction Fuzzy Hash: 36414134B106188FCB05AB68D898A6E77FBAF89610F544529D803EB394DF749C46CB92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (aq
                                  • API String ID: 0-600464949
                                  • Opcode ID: b1412f89fc616ce857e6df078e872a2ec197a780312fa0c6c896b4e0e7840fd2
                                  • Instruction ID: 825f570be1729b5bab700a5c677c70fdc7603621caf2b55c1dfc15aed39ca73e
                                  • Opcode Fuzzy Hash: b1412f89fc616ce857e6df078e872a2ec197a780312fa0c6c896b4e0e7840fd2
                                  • Instruction Fuzzy Hash: C9417B35A02616CFCB10CF68C484A6AFBB1FF89324F558659D9299B395C730EC52CBD0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: LR]q
                                  • API String ID: 0-3081347316
                                  • Opcode ID: 1c80231ac17cc998409408ccd6739d17f60da6d4fac6984762f35684449039dc
                                  • Instruction ID: 7023ad824237e220f579ca5856f1b9e7f93bb9aee9307c2051b9338c791f0178
                                  • Opcode Fuzzy Hash: 1c80231ac17cc998409408ccd6739d17f60da6d4fac6984762f35684449039dc
                                  • Instruction Fuzzy Hash: 4F411B36A150299BDF08DF68D8449AEB3B3EFC8209B568554EC46BB384CA347D01DB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q
                                  • API String ID: 0-1259897404
                                  • Opcode ID: bdb04151bbdd0f6c3b6fef09aa2deffb8a96606eae5e4611eb740f2e9c22cd51
                                  • Instruction ID: ca04ce1fcb5847808204af0be3b650fb22cc0e6bc24770f60f0db5581ef2b08d
                                  • Opcode Fuzzy Hash: bdb04151bbdd0f6c3b6fef09aa2deffb8a96606eae5e4611eb740f2e9c22cd51
                                  • Instruction Fuzzy Hash: 47318136B00204DFCF059FA4C958D59BBF6FF88320B4580A9FA069B3A5DA71DC16DB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: xaq
                                  • API String ID: 0-793007810
                                  • Opcode ID: e20d6820c28445e77cb68f51721bd886b12ff334baff5276cb6964a7dcf0232e
                                  • Instruction ID: 99ec8229382ac0da3bd8bc40331fa3ae371584cd0c080f2517ee89e8c3004b93
                                  • Opcode Fuzzy Hash: e20d6820c28445e77cb68f51721bd886b12ff334baff5276cb6964a7dcf0232e
                                  • Instruction Fuzzy Hash: DE315A74A042089FDB54DB68E842BB9BBF2FB89320F504169E90AE7654D734AC458F94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: xaq
                                  • API String ID: 0-793007810
                                  • Opcode ID: c732409a5fad4e6fd7b01b87a4b296d170371b49b4630cecbd3c6b85b47ac6e0
                                  • Instruction ID: 751eb7740dce0530770deb38ede8573709da8010dc5c263ab260c6eeabd8b8fb
                                  • Opcode Fuzzy Hash: c732409a5fad4e6fd7b01b87a4b296d170371b49b4630cecbd3c6b85b47ac6e0
                                  • Instruction Fuzzy Hash: 68314930A04208DFDB54DF69D845BAEBBF2FB88320F10416AE90AE7644DB34AC84CF50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: LR]q
                                  • API String ID: 0-3081347316
                                  • Opcode ID: 09ba9a30e262bdea84cee84c01c67d22fb16b9008cab26d964d1a152e43e94d1
                                  • Instruction ID: bf1d68644be724add040f12294d7c7a1387388ba9e4c4293d2ba5f8ecc2abb4e
                                  • Opcode Fuzzy Hash: 09ba9a30e262bdea84cee84c01c67d22fb16b9008cab26d964d1a152e43e94d1
                                  • Instruction Fuzzy Hash: 3C214A32E110359BDF089B69C8544BE73B3AFC420D71A8955EC467B384CA347D02D7D2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: o
                                  • API String ID: 0-252678980
                                  • Opcode ID: 9d73bc2b81dcd416877e4bbfc4aeac77ded78043a09229e6dc633df6e7ba8f47
                                  • Instruction ID: a744bcec3f5a3453bd5b63c67a5575792240bb5fac56d5cb6517983aa7979804
                                  • Opcode Fuzzy Hash: 9d73bc2b81dcd416877e4bbfc4aeac77ded78043a09229e6dc633df6e7ba8f47
                                  • Instruction Fuzzy Hash: B611A2313042019BD7249E29D8D4B7AB7A3FBC4710F58852CED468F391DA76EC81C781
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2554372059.0000000005520000.00000040.00000800.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5520000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4']q
                                  • API String ID: 0-1259897404
                                  • Opcode ID: 8fcd8507342308473d6c2e94207d661cfce1034061b710944d207afb8c1185b2
                                  • Instruction ID: 805ee1c82246e93d3837f1216ba1c2fddf750cbdd91ac4ef240309f4f6d0b5f5
                                  • Opcode Fuzzy Hash: 8fcd8507342308473d6c2e94207d661cfce1034061b710944d207afb8c1185b2
                                  • Instruction Fuzzy Hash: 02119D31E093688FDB268B6498146BEBBB2FB83714F0505AAD492E72E1DB345C45CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2557267056.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_59d0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: x
                                  • API String ID: 0-618964285
                                  • Opcode ID: 6d8d8a3dbf6c39cad158ed6b0b1318fdfe2dc07029e263e555389b2af348b556
                                  • Instruction ID: 1ecb19de705785988a18de6d3963acc07839469c439d7a6aa8ee24eb9c4d1394
                                  • Opcode Fuzzy Hash: 6d8d8a3dbf6c39cad158ed6b0b1318fdfe2dc07029e263e555389b2af348b556
                                  • Instruction Fuzzy Hash: 88E06535A041158BDB749F64C889B95B7B9BF44350F0085A4C88B93141EF359D42CB51
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ffa5ce315e548417173c3b3b04c9d9492e53cf73d8b7e75c3c66ba7aeae6c7ed
                                  • Instruction ID: f3579daa24b04f5c0c9b8c6bf62842f88f6d4780175e3202366d3241bd7e917d
                                  • Opcode Fuzzy Hash: ffa5ce315e548417173c3b3b04c9d9492e53cf73d8b7e75c3c66ba7aeae6c7ed
                                  • Instruction Fuzzy Hash: 5812EF34B102188FCB14EF68C894BADB7B2BF89310F5185A8D84AAB355DF70ED85CB51
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2554372059.0000000005520000.00000040.00000800.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5520000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b0fb18ce0821ad7132c396c8fda36e14f27e69cb68347d9de05136dc024bb8b3
                                  • Instruction ID: 42b39f86bab9a5d1c8ff45559168b1bc6b871f7e139f17de1dbd9ed4344bc5e3
                                  • Opcode Fuzzy Hash: b0fb18ce0821ad7132c396c8fda36e14f27e69cb68347d9de05136dc024bb8b3
                                  • Instruction Fuzzy Hash: B0B16370305312C7EF24599AC4D5B2AE1EABFE2750F90493E8D46C72D8DAF44E8587A3
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 02e02b9ad9e264ac53a38624f0f48721e29245350047e00e692c99f804711c88
                                  • Instruction ID: d65fb5103407f74d2bdd7781841a53974daf594ed1041de5e7cf540691f946cc
                                  • Opcode Fuzzy Hash: 02e02b9ad9e264ac53a38624f0f48721e29245350047e00e692c99f804711c88
                                  • Instruction Fuzzy Hash: A7A11C347006148FCB05EF68C498AAE7BF3AF89710F104659E906DB3A4DF75AD46CB92
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6d46caafaa82b5cf1c832f36f9db3cc01016e775f448321df02485e54edaf7e0
                                  • Instruction ID: 21079f9001e6e5d64a6b286d7adc085f8566925ae11950f5bf4c64ec4c55c2e9
                                  • Opcode Fuzzy Hash: 6d46caafaa82b5cf1c832f36f9db3cc01016e775f448321df02485e54edaf7e0
                                  • Instruction Fuzzy Hash: 52A1ED34B002148FDB14DF68C898BA9B7B2BF89310F5485A8E94AAB365DF70DD85CF41
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 01a7ce7163cfafd3b9da4c780c5b671bf4b167384f57adda5906ce5808ffaab5
                                  • Instruction ID: a1d638d38fa80a07a68f057948b65592c8595fb8942fea1e366f4d791fbf03e3
                                  • Opcode Fuzzy Hash: 01a7ce7163cfafd3b9da4c780c5b671bf4b167384f57adda5906ce5808ffaab5
                                  • Instruction Fuzzy Hash: 30913A34710214DFCB04DF69C498A6EBBB6BF89720F5481A9E806DB3A1DB75AC41CB91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 827befc4a1b7b50b0f4984950182f97550309032a1a985403a3c58f738aef38d
                                  • Instruction ID: dd8a30d6bf0034df79783525453463150a6a52dc232a217e112963b4a90b7cb9
                                  • Opcode Fuzzy Hash: 827befc4a1b7b50b0f4984950182f97550309032a1a985403a3c58f738aef38d
                                  • Instruction Fuzzy Hash: 88816835A133049FCB15DFA8D455AAEBBF2FF88711F14806AE802AB790CB35D941CB54
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3f3d5c38149c95ebe0e5a17062c47dfec1c881e72f678ca23f340fedc14bc1ed
                                  • Instruction ID: 567c2ad016815f8b299d9584762a28ebbe426595093f06a0e4beea94fdf75313
                                  • Opcode Fuzzy Hash: 3f3d5c38149c95ebe0e5a17062c47dfec1c881e72f678ca23f340fedc14bc1ed
                                  • Instruction Fuzzy Hash: 62811975A02218CFCB15DFA8C58499EBBF5FF48310B158169E806DB760DB31ED42CB90
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 163f4d27928acbf81efd46c1239b60bf7bedf8feb007a279d239bd0cc62f3203
                                  • Instruction ID: d1e2cd63a75cfafc1f9e7983e54c03b531d72f7b0de07377788e33cac9f7336c
                                  • Opcode Fuzzy Hash: 163f4d27928acbf81efd46c1239b60bf7bedf8feb007a279d239bd0cc62f3203
                                  • Instruction Fuzzy Hash: 8981A030708219CBEB94DB25DC49B6A77E7BB80364F1481A4DC0ACF6E8DB749E85CB51
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3d957a4431323f927dd9e4c94615e7077771adeea609c6dc85f9a7f6dd49fb27
                                  • Instruction ID: 485a87a0f370d70d4f3c72b1d74e6adac7cb5b954a99637ae69b24396fc66388
                                  • Opcode Fuzzy Hash: 3d957a4431323f927dd9e4c94615e7077771adeea609c6dc85f9a7f6dd49fb27
                                  • Instruction Fuzzy Hash: 7D814B347006088FCB15EF68C458AADB7F6BF89314F20456ADC42973A1CB75AD86CF82
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5a5c3b0ac8664247900735451cd7f41842c13a4203c5e563fcbbd142d497f54d
                                  • Instruction ID: 069cdbb921a638b65a4d006aed0b2d5c8f2b7c19be580096a70ccf878c1a58c7
                                  • Opcode Fuzzy Hash: 5a5c3b0ac8664247900735451cd7f41842c13a4203c5e563fcbbd142d497f54d
                                  • Instruction Fuzzy Hash: 5D61D374A09240CFD705EF68D894B99BBB6FF49300F2581EAD4458B3A6D734AC86DB11
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 90ee49e747b00f5dc93aa61bfc9c149307795ec844422597406b8ee18af05252
                                  • Instruction ID: 65dd1ac41a7414f6dec064f018845d55f8382fa1a2cb74a80107f0f7a234c5b1
                                  • Opcode Fuzzy Hash: 90ee49e747b00f5dc93aa61bfc9c149307795ec844422597406b8ee18af05252
                                  • Instruction Fuzzy Hash: BA11C431A113298BCB04DF68C8482EEFBB6FF85311F518766E911E7282D774A985CBD0
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: be34e238fb77633b7eaece74f192bc682740321f59954ac3de58b091ad9e9cfe
                                  • Instruction ID: c0ff72b401d0aa8a314974dcb1f4f1cbb3864895f3de66074f3127bab3283afb
                                  • Opcode Fuzzy Hash: be34e238fb77633b7eaece74f192bc682740321f59954ac3de58b091ad9e9cfe
                                  • Instruction Fuzzy Hash: FB610634B10214DFCB04DF69C898A6DB7B6BF89720F5481A9E806DB3A5DB71EC41CB91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3aef5dcc971dc38ea738dfef80a7936d1acdad8d7542267026b3e57c346d45bd
                                  • Instruction ID: 4e9d93e6731cc3898d2f9413199ef766cffbc9949826348241e4eddb37bfeef9
                                  • Opcode Fuzzy Hash: 3aef5dcc971dc38ea738dfef80a7936d1acdad8d7542267026b3e57c346d45bd
                                  • Instruction Fuzzy Hash: 6351E332B081168BDB557756D8103BB72DAEFC9720F294075E94ADB388DF788C41B791
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1e99599b73ffaaeb1e1a463ae82af050ec2b135bced09126d6e7633226a56421
                                  • Instruction ID: faa6a224d6be9d2a25bcd8fdbe5b0681bca30b3eacc0a7e8b2fdd453f0e6ff43
                                  • Opcode Fuzzy Hash: 1e99599b73ffaaeb1e1a463ae82af050ec2b135bced09126d6e7633226a56421
                                  • Instruction Fuzzy Hash: C4614C347006088FDB15EF68C458AADB7F6BF89310F10456AEC42973A1DB74AD96CF91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 894c2063e41a6ec15f022ab9da40ab8bb0f01ddd51cc0fcf27677f4b7fa4bc25
                                  • Instruction ID: 4f9c3a22809af5e8edf59ae2d3b8c83dab1498ad7d5cf088d2b41b0b426087aa
                                  • Opcode Fuzzy Hash: 894c2063e41a6ec15f022ab9da40ab8bb0f01ddd51cc0fcf27677f4b7fa4bc25
                                  • Instruction Fuzzy Hash: CB51A030A08208CFEB45DB65E859BAA77B3FB89304F1480A5E9069F799DB359C85CF50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eda55a7d6df5f92e4139449e74c3b09b96e70ff9cdfc815a8f5303448bfc2981
                                  • Instruction ID: c15f18c21490bced5ff4af1df6d89c43e658816ad1f50622a01bc1a7a34164ae
                                  • Opcode Fuzzy Hash: eda55a7d6df5f92e4139449e74c3b09b96e70ff9cdfc815a8f5303448bfc2981
                                  • Instruction Fuzzy Hash: 0451AD30A04208CFEB54CB58E845BB977B7BB88321F1480A5EC02AB795DB749E85CF51
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c766bce28533a1874a1d51404ac2ee3017ed8154cf01b903152da08e37ed45c7
                                  • Instruction ID: 4693126b519777cc403b28ba59db1055049993dec10fcdd6a3107813820abd9d
                                  • Opcode Fuzzy Hash: c766bce28533a1874a1d51404ac2ee3017ed8154cf01b903152da08e37ed45c7
                                  • Instruction Fuzzy Hash: 98517E30B08208CFEB54EB65E459BAA77B3FB88304F148465EA069F799DB359C85CF50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2db31e08efe5d79ad9ba2731aec03f97c26dac84952d5034d0bb8af0ce46b79f
                                  • Instruction ID: 7c2553ab26fd6b2db31e8d40cf1f7699a4015192487657c353c80eb53fd97b7b
                                  • Opcode Fuzzy Hash: 2db31e08efe5d79ad9ba2731aec03f97c26dac84952d5034d0bb8af0ce46b79f
                                  • Instruction Fuzzy Hash: 1A519C306082088BDB84EB15E445B6A73E3FB84315F188179D8078F79DDB38ADC68F80
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fe88fc1443ea1a8d78462944bf9314a69b7e4d98723538ecc0e1d0d8150af5b8
                                  • Instruction ID: 7651955d7769d183036f05715b42007df0d08c903e7be954bc9d179e77cdc5fc
                                  • Opcode Fuzzy Hash: fe88fc1443ea1a8d78462944bf9314a69b7e4d98723538ecc0e1d0d8150af5b8
                                  • Instruction Fuzzy Hash: 2F517030618304CFEB54CB69D449BADB7A7FB84325F1480A5EC06ABB99CB789C81CF41
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 901660e6bdccd3a5e2c91080ed484021fa48ba512251664594bf87f434a0ab5e
                                  • Instruction ID: 468060d8e077f71c2921eea606470fa8f4251433b5cfa4f58b2d0a77f1a76a98
                                  • Opcode Fuzzy Hash: 901660e6bdccd3a5e2c91080ed484021fa48ba512251664594bf87f434a0ab5e
                                  • Instruction Fuzzy Hash: 20515F30618208CFEB54DB69D445BADB3E7FB84325F1480A5EC06ABB99CB789C81CF41
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 58bd6954309743fa344920637afbc3777768fee37c55fff0639de8d9e0b506ca
                                  • Instruction ID: c45a89b9bc54c400e6c46aee22280999e7368d090262583bec5b8ea540471b55
                                  • Opcode Fuzzy Hash: 58bd6954309743fa344920637afbc3777768fee37c55fff0639de8d9e0b506ca
                                  • Instruction Fuzzy Hash: 14519D30A14208CFEB54DB58E849BB977B7BB88321F1480E5EC06AB799CB745E85CF45
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dcd2b7d7e26164813736591adafabae7dbb0d31c21aaa2e2441a9940263bf4a8
                                  • Instruction ID: c4c4ecd68923886484a286a4fedbb3f808feed5ab6eef57a118c9d82bb355bf4
                                  • Opcode Fuzzy Hash: dcd2b7d7e26164813736591adafabae7dbb0d31c21aaa2e2441a9940263bf4a8
                                  • Instruction Fuzzy Hash: C0516F78A05204CFD704EB59D484BEEB7FAFB88311F2582A9E4059B7A5D734EC82DB11
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aa443a1dd37027abdd63a933942bf3d945ac7ed9df0587110dfd7feaac43453d
                                  • Instruction ID: c8eb20d53caca93a80952081b9f061de57e9786071d56a83749ca0f33b11711f
                                  • Opcode Fuzzy Hash: aa443a1dd37027abdd63a933942bf3d945ac7ed9df0587110dfd7feaac43453d
                                  • Instruction Fuzzy Hash: 8951BE306082048BDB84EB29E84576A77E3FB85315F588179D8079F79DDB38ADC6CB80
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 18d9d7f956eda8ec8ef9ab24aeee7064164b9df836a6c09e5875125c3769247f
                                  • Instruction ID: c109f1ca088cf8b2db8945f42f36ff2708341212051416d7d99ae3c133ee850a
                                  • Opcode Fuzzy Hash: 18d9d7f956eda8ec8ef9ab24aeee7064164b9df836a6c09e5875125c3769247f
                                  • Instruction Fuzzy Hash: 4A514D34B10609DFCB04AF64E859AAEBBB6FFC8711F408119F902973A4DF749946DB81
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3ea7a7e69a17449f7a28e8373f1473a8564f5071b4064146769f7bed4530f111
                                  • Instruction ID: 20236b457096c9c25568c2799a8bf5f00203ec1ff943ae8cba8e5509df70a0ac
                                  • Opcode Fuzzy Hash: 3ea7a7e69a17449f7a28e8373f1473a8564f5071b4064146769f7bed4530f111
                                  • Instruction Fuzzy Hash: 1551C0B0B08504DFEB55DB29E045BA9B7E3BB88324F188065EE06DB395EB349D85CF41
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6173b270d37d13fa4f6ef611d601bb1081781aa43cf6b6b88abf4bea135f449d
                                  • Instruction ID: 51afb18065ac5825f8e232d13f280f05b1cdd0aa946b5686d09c0349d30e7878
                                  • Opcode Fuzzy Hash: 6173b270d37d13fa4f6ef611d601bb1081781aa43cf6b6b88abf4bea135f449d
                                  • Instruction Fuzzy Hash: BE418C303047019FD7299F25C898B3A7BA3AF85314F94856CD9468F6A1DF76EC82CB81
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 31bd47e7170070746f875901e2357915df3f5369f4d7d3f6031e06fb9e02c55f
                                  • Instruction ID: 0cc0e3fcc5f9d3355cfe34a752f7fd8e2960e85d8c9c4dada6ea21aa85848cb6
                                  • Opcode Fuzzy Hash: 31bd47e7170070746f875901e2357915df3f5369f4d7d3f6031e06fb9e02c55f
                                  • Instruction Fuzzy Hash: DC515030618304CFEB54DB68D445BAD73A3FB84325F1480A5EC06ABB99CB789D81CF45
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a486f43fcf074c3ca95e6f08c6414007f783f5766da6413ae53e6556e8ffb7b7
                                  • Instruction ID: 20d795764b6d0bb6ef1d48702f0e722d82a84ec3de74698486a6a6fe62259a8c
                                  • Opcode Fuzzy Hash: a486f43fcf074c3ca95e6f08c6414007f783f5766da6413ae53e6556e8ffb7b7
                                  • Instruction Fuzzy Hash: 62513C30B08208CFEB54EB65E459BAA77E3FB84714F148464EA069F7A9DB359C85CF40
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d0d02d05fbdac60e53ba70c9909fc9ab69a93a6ad279fa42141f7b8be4b7c455
                                  • Instruction ID: 97b816f3b92e13a77c700b3b58c84989fe0fccba273c739bae7aec41175a4734
                                  • Opcode Fuzzy Hash: d0d02d05fbdac60e53ba70c9909fc9ab69a93a6ad279fa42141f7b8be4b7c455
                                  • Instruction Fuzzy Hash: A941AD70A14208CFDB14DB65E849BAE7BE7BB88325F1880B6ED02D7294DB345D86CF05
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 43977f099e21523ae0623c226d68d58e729c0807a87a8f6dd66a45045b6d425d
                                  • Instruction ID: b567f63a2ad55a6d6ceedbbd92133eb26a9ba5992fb5ea799c3421ef1b72308b
                                  • Opcode Fuzzy Hash: 43977f099e21523ae0623c226d68d58e729c0807a87a8f6dd66a45045b6d425d
                                  • Instruction Fuzzy Hash: 4A419F70B04104DFEB54DB29D045BA9B7E3BB88324F188065EE06DB295EB749D85CF45
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4528d7ed785dc143472c823c198b37c700acc436d058b9fb9a3a090034448c80
                                  • Instruction ID: ceea4571af318f56f3630b956755587ab18c63ae6496b8aad312c42299a40bc4
                                  • Opcode Fuzzy Hash: 4528d7ed785dc143472c823c198b37c700acc436d058b9fb9a3a090034448c80
                                  • Instruction Fuzzy Hash: B941A230B16285CFDB94CF29D845B6A77B3FB85310F2480B5E0068B7A9DB74A886CF44
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d6f485892331a63400c370cb6d7e3c9b0ec4c989a9243c8d60ccfaf45a8a533
                                  • Instruction ID: 9a1d7cceaed8411e79f28794b88c741c95cd950e0c44afa3ab3775d86e9fb7a9
                                  • Opcode Fuzzy Hash: 8d6f485892331a63400c370cb6d7e3c9b0ec4c989a9243c8d60ccfaf45a8a533
                                  • Instruction Fuzzy Hash: 1A517830A046699BEB14DB68D184AAEBBF6BB49300F158069ED02EB351CF34EC45CF90
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 69d9d3ff204f0e645de8dd18c755fc4156461be07ecf163ae1feacb77cc70c69
                                  • Instruction ID: 0b7abc6b39b7b3d78c5e87033eb7d44a4c291d4955ce2a912d129a521d21fa5e
                                  • Opcode Fuzzy Hash: 69d9d3ff204f0e645de8dd18c755fc4156461be07ecf163ae1feacb77cc70c69
                                  • Instruction Fuzzy Hash: 9041D231A0422DCFC724DB69D444A7AFBE6FB85325B0482AAED1EC7691DB319D41CF81
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6a544de5b30e83940fad077f0b2724700b3d5a13e5935e82ccd73b6974a9bf13
                                  • Instruction ID: 05f9584ec524e890faa0ac92d36670fa3eb8e6a23c094b9468ba78c0e83bbcd9
                                  • Opcode Fuzzy Hash: 6a544de5b30e83940fad077f0b2724700b3d5a13e5935e82ccd73b6974a9bf13
                                  • Instruction Fuzzy Hash: C341B331B04714CFCB64CBA8D59429EBBF1FF84720B4488AEE85AD7684DA31ED45CB81
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5a7609455aa032412d43c0092c649df62745c530ebfff8d1c4a09b57a02e26b7
                                  • Instruction ID: 52292c54edac69aeb9df91c0edaa4ee46cb753cf589f40c84e97940a82781fbe
                                  • Opcode Fuzzy Hash: 5a7609455aa032412d43c0092c649df62745c530ebfff8d1c4a09b57a02e26b7
                                  • Instruction Fuzzy Hash: E3512878A00204CFD744EB59D485BEEB7BAFB48311F2582A9E4059B7A5C734EC82EB11
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b97d2c60c10209f520f1f03ebfb344fe6239d29fe8fd340fd133c2eba1a28a6b
                                  • Instruction ID: 7b957ac60399d4eede90a34740a838ab4e4d4cfdc3997df0ccfbf1052af0af4d
                                  • Opcode Fuzzy Hash: b97d2c60c10209f520f1f03ebfb344fe6239d29fe8fd340fd133c2eba1a28a6b
                                  • Instruction Fuzzy Hash: 92418F70A04208CBDB14DB65E849BAE7BE7FB88325F1980A6ED02D7294CF345D81CF44
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 66ab0d5bbcc9aac8fbc70b88dfab80433bb4f84e1e1876fa5182dcd4d3c4f7ef
                                  • Instruction ID: 97b9f6f08c541bb1575b59e02cef321139cfc78ac13a3ae8bf370b29581cb5df
                                  • Opcode Fuzzy Hash: 66ab0d5bbcc9aac8fbc70b88dfab80433bb4f84e1e1876fa5182dcd4d3c4f7ef
                                  • Instruction Fuzzy Hash: 16415A30A04308DFCB09EB68D459AADBBF2AF88215F049469ED06EB391CF749C05DF91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6d23af3045662eb2c68af93d690566b17e7d09fb62a09172250df78e6e85d7a2
                                  • Instruction ID: 623541b830480da462462842f88dbd16950f870ebf53fecb28bdfff46bb4fb63
                                  • Opcode Fuzzy Hash: 6d23af3045662eb2c68af93d690566b17e7d09fb62a09172250df78e6e85d7a2
                                  • Instruction Fuzzy Hash: 51416F35A102189FCB05DFA5D854AEEBBB5FF88320F158065EC05BB3A1DB71AD05CBA0
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 002e12abfe1c873a2616829fa25160c6704deacd7fc68f423891db05a632c2de
                                  • Instruction ID: ac965c8a85ebca0edd42ad7565d34d585806ae1f15de0bb3e2fa5b9f886d4fc9
                                  • Opcode Fuzzy Hash: 002e12abfe1c873a2616829fa25160c6704deacd7fc68f423891db05a632c2de
                                  • Instruction Fuzzy Hash: 5A418C30A18208CFEB54CB14D849BB97BB7BB48325F1480A5EC02AB799CB749E85CF05
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bcb64a379608e2f2524db3c8db221e86b6900bdcef9262658ca59da3d7c8aca0
                                  • Instruction ID: 52743edbcece09d5344da4598558aa66f5d1a2c316d72032e557ac1dc2f09108
                                  • Opcode Fuzzy Hash: bcb64a379608e2f2524db3c8db221e86b6900bdcef9262658ca59da3d7c8aca0
                                  • Instruction Fuzzy Hash: 7A31B5366101099FCB05DF58D998EA9BBB2FF48320B1684A9E9099B372CB31ED55DB40
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 68f5a5f4f4cc336e78eb7212637d36ac6d80e480787eb2da4e8b22fcd7490204
                                  • Instruction ID: 646f8654784c5f74aad2a3d7f4e4868a13bfe8fa519cbc03bca79a7eca06ec31
                                  • Opcode Fuzzy Hash: 68f5a5f4f4cc336e78eb7212637d36ac6d80e480787eb2da4e8b22fcd7490204
                                  • Instruction Fuzzy Hash: 80418B31A062158FCB15CFA5C988ABEBBF1FF88709F00842AE406D7351E735D945CB91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0745b1788f47098fa1680203771c559839a3efa0743e79a37664e94405df9520
                                  • Instruction ID: 27a4d12006fdda94a708d1b03e84fe8c03f75a6b7b6c44e8664868ebcd1de277
                                  • Opcode Fuzzy Hash: 0745b1788f47098fa1680203771c559839a3efa0743e79a37664e94405df9520
                                  • Instruction Fuzzy Hash: 42415DB9A04208CFD748CB99E094BA9B3F3BF84314F4581A5ED069F35ACB349D85CB81
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 17c57be223bec8fe64935565ad5466385008ef55cbae17ed85d1ef0322c0da3d
                                  • Instruction ID: b56304a24d246416d399da542d8cb5e0c4555254a02f4a2196c6d31c105696a8
                                  • Opcode Fuzzy Hash: 17c57be223bec8fe64935565ad5466385008ef55cbae17ed85d1ef0322c0da3d
                                  • Instruction Fuzzy Hash: D941DCB090124C9FCB14DFA9C484AEEBFB5BF48314F248029E809AB254DB75A945CF90
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f19570f74d143bf17a4807e0d2e6cdbbb91691c18ba0c327ab0c3a78f5afdb0
                                  • Instruction ID: a77e531b53e4697b8465b3a229038ef4828e316ac13d8684b4d7fe3700f35ea0
                                  • Opcode Fuzzy Hash: 1f19570f74d143bf17a4807e0d2e6cdbbb91691c18ba0c327ab0c3a78f5afdb0
                                  • Instruction Fuzzy Hash: 3F31D330A16148CFDB90CF18E945BAA77B3FB88310F148075E406ABB88CB75A886CF54
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9d13b3c7a9fe0607374f014bd892a16ec55de13f39c607244bb9a5101c86d2ed
                                  • Instruction ID: 85c7836ae3a9f31ce27f2fb2e0ad29f7df1223f7e27aafc5c590ca987596ef34
                                  • Opcode Fuzzy Hash: 9d13b3c7a9fe0607374f014bd892a16ec55de13f39c607244bb9a5101c86d2ed
                                  • Instruction Fuzzy Hash: F821F5367042005FD7249BA9E985A66BBE9FBC0361B59817ADC0FC7651CF31EC05C790
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 287566f915d855573bf8c594c2af60f71e1821e93d0a6a3435aa08135a34598b
                                  • Instruction ID: 38ac129d1a1859e5f1793e0cd33692de5d3d9dd8c70f435797e2bc9a5db3750e
                                  • Opcode Fuzzy Hash: 287566f915d855573bf8c594c2af60f71e1821e93d0a6a3435aa08135a34598b
                                  • Instruction Fuzzy Hash: E1217C7C91851ACFE708CB2AC840A6977B3FFC9305F44E665E847DF258DB3499428B90
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2554372059.0000000005520000.00000040.00000800.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5520000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e167c49335f0b2f547d6f2fac9ce99dba5336d493d3ca53739724c1dd08df857
                                  • Instruction ID: f17f1c5858aa8c4f68633626b321e8ff0b6ea7d0eb3d9bfd3f14b7bfbd8431b3
                                  • Opcode Fuzzy Hash: e167c49335f0b2f547d6f2fac9ce99dba5336d493d3ca53739724c1dd08df857
                                  • Instruction Fuzzy Hash: E821573570577203DB19A63AC895B3B929BBFC3520F08C53A8D06CF2C1EE68AD1183D5
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a67e457dcc2857ec9c1a19fa4cfc9de91ccf1b195587aa00965a01438f45c770
                                  • Instruction ID: f13fb1df8a8f347e348f55d4dbb75e92e404216bc81008d849d32c29aa0f3170
                                  • Opcode Fuzzy Hash: a67e457dcc2857ec9c1a19fa4cfc9de91ccf1b195587aa00965a01438f45c770
                                  • Instruction Fuzzy Hash: 93319F30A16249CFEB90CB19D449BAA77B3FB98310F148075E506AB798CB756886CF54
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2554372059.0000000005520000.00000040.00000800.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5520000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b0ef47115d787c2f79ac9fbc6990e3446a5abdf1157ac8d038a03af53e4d9529
                                  • Instruction ID: 23182cd0a619270d2e10cbfd0ca94c590012caa8d4c6fce8abc8adea9c24249b
                                  • Opcode Fuzzy Hash: b0ef47115d787c2f79ac9fbc6990e3446a5abdf1157ac8d038a03af53e4d9529
                                  • Instruction Fuzzy Hash: BD21D23070573213D719A53E84A8B3B929BBFD2620E18C5398D0A8F2C4EE69AD4183D5
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: edd7ab1cc2fe1dffb31caa936d2e26ef9531363d33e96051c140c189af7d18cb
                                  • Instruction ID: 3c76b36c9b4787df633ccedf8773c80f81bba2fadcb0d3290536b9cbae334d91
                                  • Opcode Fuzzy Hash: edd7ab1cc2fe1dffb31caa936d2e26ef9531363d33e96051c140c189af7d18cb
                                  • Instruction Fuzzy Hash: C1215574B10A09CFCB04EF68C54896EB7B5EF89610B104229D946D7320EF70AE46CBA2
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9cc6790092fd507f4160d36de19eb9e806d81363c20653b5043c1ec190bd2f56
                                  • Instruction ID: 36bc54c9c97ad0b676e044ddc8d44cd7dc6278f1d38765f45c61eec48366771e
                                  • Opcode Fuzzy Hash: 9cc6790092fd507f4160d36de19eb9e806d81363c20653b5043c1ec190bd2f56
                                  • Instruction Fuzzy Hash: BC218C32B062158B8F118BA9E8854BEB7EAFF852617104876E819D7760EA30D805CBA0
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b0fae366f116a61cc3873c83868245bbf43bffd8dd191e4d3eebe7e549291b9
                                  • Instruction ID: 34eef62fc88ea782b4b95df5bbeb30f7a5b75f0baa413f4ad71dc025eacb9764
                                  • Opcode Fuzzy Hash: 0b0fae366f116a61cc3873c83868245bbf43bffd8dd191e4d3eebe7e549291b9
                                  • Instruction Fuzzy Hash: B9210732A043548FCB018F68D8445E9BB76FF86320F1682A6E941EB293D7319C45CBD0
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f3432b7fe53d55931a9ed1f41e2e5efd6ef20473cd83135384f1a05317c4a92
                                  • Instruction ID: 0550f39cfbc871a25df1838ef1c45d31e0c9e1f9dd8ccdb6f9a10acbeb71405c
                                  • Opcode Fuzzy Hash: 1f3432b7fe53d55931a9ed1f41e2e5efd6ef20473cd83135384f1a05317c4a92
                                  • Instruction Fuzzy Hash: CA210E36600118AFCB05DFA9D998E99BBB6FF48324F0544A9FA059B372DB31EC15DB40
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 54fd95ba255b45b044c47a05cf99403ed8dc660288339297b69a9aa5110cc4bf
                                  • Instruction ID: 297802635d80d91816dded3dc5290d1ebec33c4f545b68828e692b7e26d21910
                                  • Opcode Fuzzy Hash: 54fd95ba255b45b044c47a05cf99403ed8dc660288339297b69a9aa5110cc4bf
                                  • Instruction Fuzzy Hash: 5F3109B9A04108DFD748CF99D084B99B7F3BB88324F4581A5ED059B36AC734ED85CB80
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b0ffbb39fbe956087a8ec316a5fe286779c2d4ebff6fbbf1e84c493784a3c103
                                  • Instruction ID: 411ffa5bf1086f54b9396f406fb9b2e22057c0765e12f4d760bc53247d1af7a4
                                  • Opcode Fuzzy Hash: b0ffbb39fbe956087a8ec316a5fe286779c2d4ebff6fbbf1e84c493784a3c103
                                  • Instruction Fuzzy Hash: 60214871E02219DFDB10DEB8C504BAEBBF5AB04340F108066E91AD73A0E634CA45CF92
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 975deba86994e80656d46811054b28f13fe406079c8a96315a753c04676ae346
                                  • Instruction ID: 04424d1e1b32514a0050d7ab376e8272588d4a054e7f481f58939a3634ab147e
                                  • Opcode Fuzzy Hash: 975deba86994e80656d46811054b28f13fe406079c8a96315a753c04676ae346
                                  • Instruction Fuzzy Hash: C5215E35A012189FCF058F68D8549DEBFB6FB8C320F14812AE811B7394DE719845DF54
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 28b5923851cf9fae60aeddaa9b314598a53292c14961de4b16090399f6ca91aa
                                  • Instruction ID: 0b5d4aebc33f1ca33014c766281d7affe56a9e753d28d5981e2d417d71bfb94c
                                  • Opcode Fuzzy Hash: 28b5923851cf9fae60aeddaa9b314598a53292c14961de4b16090399f6ca91aa
                                  • Instruction Fuzzy Hash: 7F311CB9A04208CFD748CF99D144B99B7F3BB88324F4581A5ED059B759D734ED85CB80
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9e7c28444e9de0a70d3418949ee492f503c270ac99e882a1977da835b0f4e194
                                  • Instruction ID: 51988130e2e2d45b611a224da9c84a1df3ad0cbe0f8b0774f6839fcb6558ed10
                                  • Opcode Fuzzy Hash: 9e7c28444e9de0a70d3418949ee492f503c270ac99e882a1977da835b0f4e194
                                  • Instruction Fuzzy Hash: EE21C671A0AB44AFCB16CB64C4459A9BFF1EF56330B0580DADC4ADB253D2359E07CB92
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6d9ec18da298e77f3863f522189b35111a80e88072c8701b97c1bdb8298c266b
                                  • Instruction ID: 91a07fd9f979def3504ab3cfe4f2974a3122f6422c399478fe264485e4f85429
                                  • Opcode Fuzzy Hash: 6d9ec18da298e77f3863f522189b35111a80e88072c8701b97c1bdb8298c266b
                                  • Instruction Fuzzy Hash: 04215375B00A09CFCB00EF68D559AAEB7F5EF89310F104129E905D7360DB70AE46CBA2
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 58e823799120c805c98dfed05fb31bec7852ceaa8c5b49650f0f7740d0bd14f9
                                  • Instruction ID: ec4b5c5dd951b94f93d23daa2b5e5715e8aa3cedd3fb1d3b5c49553f59d9daf1
                                  • Opcode Fuzzy Hash: 58e823799120c805c98dfed05fb31bec7852ceaa8c5b49650f0f7740d0bd14f9
                                  • Instruction Fuzzy Hash: 772192306113015FD704EB68E94676EBFFAEF89300F448539E40AD7A45DF759A0987D4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2554372059.0000000005520000.00000040.00000800.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5520000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 832cdacb6d7234a5ff499cc2e7461cb2a97f39c7fd7d7ea9dd0d7a0efe1dfe26
                                  • Instruction ID: ab66731796a59ec583b27c8d26bf85298c655132cb63967e8aec3f9b8d07fe07
                                  • Opcode Fuzzy Hash: 832cdacb6d7234a5ff499cc2e7461cb2a97f39c7fd7d7ea9dd0d7a0efe1dfe26
                                  • Instruction Fuzzy Hash: D2113631B093604BCB1696399C54A3FBBF7BFC3611F08847E9846CB291DA209D058791
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2554372059.0000000005520000.00000040.00000800.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5520000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4a62f47e1512935999aca6e18db97a0172400835a7d879d7ef8d060857ab8993
                                  • Instruction ID: 093cb800cf7a1d69c41e6edd989807fd02ea6c42f39642a42990e9d1ce2bcd66
                                  • Opcode Fuzzy Hash: 4a62f47e1512935999aca6e18db97a0172400835a7d879d7ef8d060857ab8993
                                  • Instruction Fuzzy Hash: 9321B834A15225CBEF28CB14C964FA9B3B2BB55604F0145D9990AAB2D1DB70AE80CF92
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 01d68bfbb3a947062b37e773b278888c616fa3e5f4e7b2f9f5e7a0465f486fb2
                                  • Instruction ID: bdcfb20c40ae2270b4332f077661c9126d8782d3554b2c2a32deeaee27af443d
                                  • Opcode Fuzzy Hash: 01d68bfbb3a947062b37e773b278888c616fa3e5f4e7b2f9f5e7a0465f486fb2
                                  • Instruction Fuzzy Hash: 141108713402145FD308EEB98C95B6B6ADEBFC8704F14446DA10ADB3AACD28DC0243A0
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 880b7f9363e4ba29718c184f0ae2f3f6f27bfab944576f57ef2864e13154be11
                                  • Instruction ID: 5691072a87acdbf8073fcc34ec200d3fc52e3b0cea7babfe73046a83add2270f
                                  • Opcode Fuzzy Hash: 880b7f9363e4ba29718c184f0ae2f3f6f27bfab944576f57ef2864e13154be11
                                  • Instruction Fuzzy Hash: 65217C30A04309CFDB44DB69E446BBE77A2FB88324F548465DC1ADB648DB385D86CF81
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 029d9c445bde925ccfecd269d0c96f470cb8888dcb9e4798e2f4a805bc3a4c17
                                  • Instruction ID: b6f2ed9edd84cebbfaf8f00ba85665d721a9a1c4ccf613f8dc10ea5844f632c3
                                  • Opcode Fuzzy Hash: 029d9c445bde925ccfecd269d0c96f470cb8888dcb9e4798e2f4a805bc3a4c17
                                  • Instruction Fuzzy Hash: 96212932A150355BDF089B69C8545BE73A3EFC420DB1A8995E8467B385CA387D02D7D2
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 92ca4cea9cedf0cccdba99037539f44bdcd6081b044ea9b3020ba88c0c6d6953
                                  • Instruction ID: 7632669680d48e221fe4e64e586131749cd8a172b7c6e47073c60ecf17199b62
                                  • Opcode Fuzzy Hash: 92ca4cea9cedf0cccdba99037539f44bdcd6081b044ea9b3020ba88c0c6d6953
                                  • Instruction Fuzzy Hash: F8213A35A00218AFCF159FA8C4549DEBFB6FB8C320F14812AE811B7394DE719845DFA4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c71c671cc1041c81bb12c7d8ed2b45983d2895c632383c34b86a7132067171b5
                                  • Instruction ID: 31a6860e1a28772f7d8450ae68378cd0340b97e03e70969b8aa45ee491fbeda5
                                  • Opcode Fuzzy Hash: c71c671cc1041c81bb12c7d8ed2b45983d2895c632383c34b86a7132067171b5
                                  • Instruction Fuzzy Hash: D421F0312083018FE7519B50D808B3A77A3FBC5324F4540B9EC029BB89EA349D86CF80
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d6d6169fedaa2b46b40bf0cb10077c80c5f800b4bd4cdbaa62058cf67f5796a8
                                  • Instruction ID: 613be84f0b96b97cf3663c6fa521730c892a9f7649a2f11b0adb215019faff38
                                  • Opcode Fuzzy Hash: d6d6169fedaa2b46b40bf0cb10077c80c5f800b4bd4cdbaa62058cf67f5796a8
                                  • Instruction Fuzzy Hash: 56212BB9A04208DFD758CF99E084BA9B7F3BB88324F4581A6ED019B369C734DD85CB41
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b5c283c1d4c4e655a1a6da1805fe7d9af2d1cbc5bf73ec1ac030fd822d3b659d
                                  • Instruction ID: 916687d106755c5d7f9fa19a77074eeafd3020fd0a0008429816af7cc47952ab
                                  • Opcode Fuzzy Hash: b5c283c1d4c4e655a1a6da1805fe7d9af2d1cbc5bf73ec1ac030fd822d3b659d
                                  • Instruction Fuzzy Hash: 5721C970904A19EFCB05DF58C9889BABBB5FF41310B5182A9D805AB242D331EC99CBD9
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b009bfbea62c7e72592725bede9ff3d6efdee45f4256f5b854ffcbadbfebb96b
                                  • Instruction ID: 22e7828504d0ee040ea8c990c67e0ccc0de6ebd3a05ee360fc3d7a6e940a2c5f
                                  • Opcode Fuzzy Hash: b009bfbea62c7e72592725bede9ff3d6efdee45f4256f5b854ffcbadbfebb96b
                                  • Instruction Fuzzy Hash: 1711C8317013145FD714EEBA9C54B2A7AEEBF88B10F100468F50AD7399DD799C058B60
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2554372059.0000000005520000.00000040.00000800.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5520000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 075a53b5010ae99f46c1c45bcba2feab482fd3bf5fe50fa7ef94fcdb75d1fcfc
                                  • Instruction ID: 6c07d22f91486c892e238bdbe4480810d83f8e328bd6d2cc49505f9655468a5d
                                  • Opcode Fuzzy Hash: 075a53b5010ae99f46c1c45bcba2feab482fd3bf5fe50fa7ef94fcdb75d1fcfc
                                  • Instruction Fuzzy Hash: C5113631F1032047CB289629D884B3FF6EBFFC2620F04843D9C069B284EE30AD019790
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 47cd3778d429363fe8344e37a17631a05bc5295ac1cd3bb6d8f856c490726c80
                                  • Instruction ID: bfcf025b6d274196380c1abe57cfb4745835de868afcca9306c10c2aa65229ae
                                  • Opcode Fuzzy Hash: 47cd3778d429363fe8344e37a17631a05bc5295ac1cd3bb6d8f856c490726c80
                                  • Instruction Fuzzy Hash: D411A33120A1049FE754CA5AE845B9777E7FBC5701F258069E1068B7A9DF70DC82CF94
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 01fb8e015fce945b2474744cd8d657af999f93c6618825247e7f4282bfe299be
                                  • Instruction ID: 43b2a18a34823c3da04fa8acf52c71ac32f27a724106e02dab4dcfb5ed2afc24
                                  • Opcode Fuzzy Hash: 01fb8e015fce945b2474744cd8d657af999f93c6618825247e7f4282bfe299be
                                  • Instruction Fuzzy Hash: 08117C34B106048FCB14EF29D999A6AB7F6FF88310F544569E902D7360DB70ED05CBA1
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e80a69ac4c97ea50386050a4d91efae122007ae613992d497ce7761814064e3b
                                  • Instruction ID: 651037e6882c5c67ddb4b5043be8490f1ef1c854a87692172e02be095a1e6f3e
                                  • Opcode Fuzzy Hash: e80a69ac4c97ea50386050a4d91efae122007ae613992d497ce7761814064e3b
                                  • Instruction Fuzzy Hash: F2116A3120A1449FD744CF69E849B9677A3FB85711F248065E5068BBA9DF31EC82DF84
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 04361c1d90ed75b501e69fab7d5b4f43fbe631e481f45cd08756ce0af4f88c02
                                  • Instruction ID: b7968d19a2efeddd94dfe4c3c78aa6f2dd7bb01a23763a5dab63c9f21c25eacf
                                  • Opcode Fuzzy Hash: 04361c1d90ed75b501e69fab7d5b4f43fbe631e481f45cd08756ce0af4f88c02
                                  • Instruction Fuzzy Hash: 4511A374D4830FDFDF14DBA5D8499AC7BB19B01348B1066A6DC02D6241EE321D85DF52
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 71872e391d0a2f36a7316e4d185709907aa0659251a12ab78f5965622ad92f95
                                  • Instruction ID: ee4297eb1e41b0338f086a0d84d6d4202bd3b534f777cc6dcd036e979b5850ea
                                  • Opcode Fuzzy Hash: 71872e391d0a2f36a7316e4d185709907aa0659251a12ab78f5965622ad92f95
                                  • Instruction Fuzzy Hash: 72216A30A04309CFDB40EF69E845BAE77E2FB88724F148469D80ADB648DB385D85CF81
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fe614eff2c3bf9baf8dc3633f3b169495c299347aa82aaec81ca88fb135c1924
                                  • Instruction ID: a75eb745ccc8ee4410ce288fcf18f62ee0e7329d01f1091c24470d6808f4698f
                                  • Opcode Fuzzy Hash: fe614eff2c3bf9baf8dc3633f3b169495c299347aa82aaec81ca88fb135c1924
                                  • Instruction Fuzzy Hash: AE0196307402185FD708EE7A8C95B6B66DFBFC8B50F104469A10ADB3A9DD68DC0183A5
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0ba2e90e5061af7239ff6ea24a7552f39c6544ffac674eb13732b7b487a77d85
                                  • Instruction ID: da2d84b085b133bfafeed916842e2faf166fd5504962c04e99e1d6bc07098913
                                  • Opcode Fuzzy Hash: 0ba2e90e5061af7239ff6ea24a7552f39c6544ffac674eb13732b7b487a77d85
                                  • Instruction Fuzzy Hash: AF215630A04209CFDB40EB68E945BAE77A2FB88324F548469D80ADB648DB385D85CF81
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8b9081df0d77b412dfd08b274138aa69dc6687c04a462fd252efa04325d7ab7d
                                  • Instruction ID: d006cea3fcc97bcfeea487cfbd03eb200d8f537d3d881d313f4b8fe0a190a948
                                  • Opcode Fuzzy Hash: 8b9081df0d77b412dfd08b274138aa69dc6687c04a462fd252efa04325d7ab7d
                                  • Instruction Fuzzy Hash: 5E11517C51841A8BE308CB5BC840A7572B3BBC8355F44FA64E847CF258DB349A028B80
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fd2aecd5a2bbf968c732cc6d9e496ea9c64ed2fc70f69f839c1aca830a216f77
                                  • Instruction ID: 08365848a7823f9e93dda729b24490e2cec5fd7d613270fca375f80417135367
                                  • Opcode Fuzzy Hash: fd2aecd5a2bbf968c732cc6d9e496ea9c64ed2fc70f69f839c1aca830a216f77
                                  • Instruction Fuzzy Hash: 68116D356083058BE750DA55D409B2A72E7FBC4724F5581B5ED029BB8CEB349EC6CF81
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2557267056.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_59d0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fa91311a2310aa413c377b92d4e8dfdf83388a045471ca3f75b8ebf1947098d5
                                  • Instruction ID: bfefbf661d0c20cab8080c0eafebd3ff56046fc69da49907bbfaedbdd2a9fcae
                                  • Opcode Fuzzy Hash: fa91311a2310aa413c377b92d4e8dfdf83388a045471ca3f75b8ebf1947098d5
                                  • Instruction Fuzzy Hash: D9113C353102198FCB167B68E459A7E7BAAFFC5351754802AE80BCB360DF35C812CBA4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a628a7352eeb933f5274601c3f6a0e1a769eec920a2d06388e0379b99e4fb1ef
                                  • Instruction ID: 77fb6ddadcc9dde62d65628d0b5057cce314b0e6ce01df37fbda8f62cbc060de
                                  • Opcode Fuzzy Hash: a628a7352eeb933f5274601c3f6a0e1a769eec920a2d06388e0379b99e4fb1ef
                                  • Instruction Fuzzy Hash: 62114772800209DFDB10DF9AC845BEFBBF5EF48324F248419D918A7250C739A945CFA5
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c4c6a8a308c3da990072b9c64f0e4e276b2db8dc4ed729c911e6ca4bdcf5c620
                                  • Instruction ID: 04172a20c2c8a04794e92d204f9b924d0effa5428c6d4c456d4396d0a04ac196
                                  • Opcode Fuzzy Hash: c4c6a8a308c3da990072b9c64f0e4e276b2db8dc4ed729c911e6ca4bdcf5c620
                                  • Instruction Fuzzy Hash: F501D6303002285FD308DA7E8C90B6B66DEBFC8B10F10446DA509DB3A9DE659C0183A0
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 40649574bcd00f1ebe4c9ae58ee1bd7ecd7d453c23c692ca1f5a7cf2c1ee5832
                                  • Instruction ID: 7191336748f7ac2e1c13ff28edfc9de466c5d4b030ef8cce75b023390fae2073
                                  • Opcode Fuzzy Hash: 40649574bcd00f1ebe4c9ae58ee1bd7ecd7d453c23c692ca1f5a7cf2c1ee5832
                                  • Instruction Fuzzy Hash: 5D11C236A01204DBCB189B54D819AAE7FF6EB88361F41846DFC02A7351DF754E0ADBA4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 80ae426fd2f3dfd53d633ffb13d62d1a36a97d8daf67a94999ba3fd8eaeb25ed
                                  • Instruction ID: 6e23209ccc9e0d296eea6c57d0238a5b6f3405f71c5ca918089dd4890429225e
                                  • Opcode Fuzzy Hash: 80ae426fd2f3dfd53d633ffb13d62d1a36a97d8daf67a94999ba3fd8eaeb25ed
                                  • Instruction Fuzzy Hash: 11113776800209CFDB10DF9AC845BEEFBF5EF88324F148419D529A7250C7399984DFA5
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c066cf4cd4cab579ba14a570078e1b239b59a49515980bb3262cbd134d93ccd7
                                  • Instruction ID: ac714edd5704b4228382c06554abfa0be79f178b8180c830fa9c85ca4761a4b4
                                  • Opcode Fuzzy Hash: c066cf4cd4cab579ba14a570078e1b239b59a49515980bb3262cbd134d93ccd7
                                  • Instruction Fuzzy Hash: 9811C130C08209DFEB00EF65D4497ADBBF2EF45300F6080A6D505DB655DB384A86AB01
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a4de9e4b937f0a57003fde27da20deedbaa50fb44f7d9bb0b1045a372e51f320
                                  • Instruction ID: 9943b16ef894d54b056bebd2c9e1fee217ca16249a54c59439ca29e0ce03b087
                                  • Opcode Fuzzy Hash: a4de9e4b937f0a57003fde27da20deedbaa50fb44f7d9bb0b1045a372e51f320
                                  • Instruction Fuzzy Hash: B5118E3030A1858FEB54CE2E9444F527BE3EF86614F29C0B9E006CB7A9DA708C82CB00
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ae59a914c8e008f3d55f14dfa59b2fe09f442c67030a783eff18a4da263f3708
                                  • Instruction ID: 14c6ea3889c10e8b873447e03409a56466c4b30262801e4f139afcd823c8259d
                                  • Opcode Fuzzy Hash: ae59a914c8e008f3d55f14dfa59b2fe09f442c67030a783eff18a4da263f3708
                                  • Instruction Fuzzy Hash: 7E01F97190DB809FC726C764D490586BFB0EB0332471985EFD88BC7493D226E90BC752
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1a0cdf4dbf8a8913ac8902529b13d4089286fe10f767c88ae3691c7018fca86a
                                  • Instruction ID: 0523ce6f72e13908ba6d1ea42f308ee029f274e9e3acc13bc7705c9756eea5d7
                                  • Opcode Fuzzy Hash: 1a0cdf4dbf8a8913ac8902529b13d4089286fe10f767c88ae3691c7018fca86a
                                  • Instruction Fuzzy Hash: EA015278D4430FEBDF14DBA5E4499ACBBF1AB00344B1065A6DC07D6244DE315E80DF52
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7e86dce14ff39602b39caa6eedef069086c8750037805ddb1d0c6c231218c437
                                  • Instruction ID: 515689c00efd2f4c65bc76d2c9abf8d0eaa95d444a293736f577a8d00852e45e
                                  • Opcode Fuzzy Hash: 7e86dce14ff39602b39caa6eedef069086c8750037805ddb1d0c6c231218c437
                                  • Instruction Fuzzy Hash: 0C113634619209CFEB94CA06E04DB7B36A3FB81309F148164EE02CF699DB35AD81CF02
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2554372059.0000000005520000.00000040.00000800.00020000.00000000.sdmp, Offset: 05520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5520000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5e79509b017c4b8cf327b06e56f33fbc7da335abbc3a9204d4502fd472b4651d
                                  • Instruction ID: d3e1b4a9bf8c7b7c409b9f152b3ce5fa790fe6db5f5a931b0911ccd609f5a1e5
                                  • Opcode Fuzzy Hash: 5e79509b017c4b8cf327b06e56f33fbc7da335abbc3a9204d4502fd472b4651d
                                  • Instruction Fuzzy Hash: AE110734A51229CBEF24DB10C954FADB3B2BB45604F5145D5C809A72D0DB706E84CF92
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 53e18c24ba42b72b2a866062068ea3fa7111322bbef2d771d9178cee762e1b49
                                  • Instruction ID: c48ac1af60e221a57c561a6018e95da8d68d6def62015b3e616861e1e89c40b5
                                  • Opcode Fuzzy Hash: 53e18c24ba42b72b2a866062068ea3fa7111322bbef2d771d9178cee762e1b49
                                  • Instruction Fuzzy Hash: 9811C431E047189FCB06DFA9C54859DBFB4FF89311B1481AAD845E7311EB349A09CB91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 394867d40883bd0420325a1b6096faa37b34da5db05c18a574b2fb29d1be41ad
                                  • Instruction ID: ae37c3b1c50802f60f5b3d11da96f6ea15930874e6c73a411709a66b79e55f42
                                  • Opcode Fuzzy Hash: 394867d40883bd0420325a1b6096faa37b34da5db05c18a574b2fb29d1be41ad
                                  • Instruction Fuzzy Hash: F401AD317003009FC7259A24C844B7A3BE2EB893A0F548568ED06CB790CB76EC42C781
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96c2970af202fc891bb504e26d7b6b016e0a523d7becb6f483832fa7871c3991
                                  • Instruction ID: 4f2e931d88e956789b5ff27182421bef37902c02c187ee0f975629f5d492b68b
                                  • Opcode Fuzzy Hash: 96c2970af202fc891bb504e26d7b6b016e0a523d7becb6f483832fa7871c3991
                                  • Instruction Fuzzy Hash: 4E11323090C205CFE705AF65E4083A87BF3EF81344F5480EAC1469B696DF798982EB40
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 284f89d8c001660e6728e04c82da242d1a14c24afddd108394c2c14a62cabba5
                                  • Instruction ID: 867ded3ff087c4e17eb5000368e7c338099134a28f0d5b84bb4a4b38b2e04fc4
                                  • Opcode Fuzzy Hash: 284f89d8c001660e6728e04c82da242d1a14c24afddd108394c2c14a62cabba5
                                  • Instruction Fuzzy Hash: 8C018F39300A10DFC705AB64D969A2ABBE6EBC9711B50C129E90687794CF71EC02DB91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2557267056.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_59d0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 24f660fcc62877d62feb705b71021fee5bf8417ba404483e79b6c55d3fe37967
                                  • Instruction ID: c6b3fa9adc4375f9ed35f63d03a290094fbec9ee550256c08ee6720627a2e85a
                                  • Opcode Fuzzy Hash: 24f660fcc62877d62feb705b71021fee5bf8417ba404483e79b6c55d3fe37967
                                  • Instruction Fuzzy Hash: A421D874A002198FC754DF68C880E99BBF5EF88314F1580E5E818AB755D631ED81CF60
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0548d080c4bdcc17aa042ba886138d7de03326394e32f72037d4ea91727c7437
                                  • Instruction ID: 13dc13284bff933e14bd57b36115adf3ddc7692eec0b28a787e73ad78038715f
                                  • Opcode Fuzzy Hash: 0548d080c4bdcc17aa042ba886138d7de03326394e32f72037d4ea91727c7437
                                  • Instruction Fuzzy Hash: FA116530D08209DFEB00EF65D5447ADBBF7EF44344F6080A5D506A7745EB754A86AF41
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f6a7a2c0380233a002173cc918990e36fb1f683e22de83f6c1d3f131a5305062
                                  • Instruction ID: 6174895e7fc4a16a52c877766dc8d28f1aacd8ce64d04bb296d220fdb608bc1c
                                  • Opcode Fuzzy Hash: f6a7a2c0380233a002173cc918990e36fb1f683e22de83f6c1d3f131a5305062
                                  • Instruction Fuzzy Hash: 1A11237D914119CFD704CF69D880AA8B7B2FB89315F11E569E807EB248CB30AD81CF40
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1661f81afa279d554f0626bce7525c58ddd4bc3a3dbc1c352c7d49993a93361d
                                  • Instruction ID: 8610afa05fd93889bdc614634d32466ec8a8a509511e09b695c304763425a672
                                  • Opcode Fuzzy Hash: 1661f81afa279d554f0626bce7525c58ddd4bc3a3dbc1c352c7d49993a93361d
                                  • Instruction Fuzzy Hash: 09F08B32B0A6101FE3144618E86076ABBF9FBC9320F154039E80A9B344CF71EC43C384
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f325920051f9e2880c59b22bcbd89ab9d0175f461d2c53184e9dff590b080b9f
                                  • Instruction ID: 59e484bf3304858fd76b9ef3806db8295e9df54c0a4a2d848643403c1e4da1f7
                                  • Opcode Fuzzy Hash: f325920051f9e2880c59b22bcbd89ab9d0175f461d2c53184e9dff590b080b9f
                                  • Instruction Fuzzy Hash: 4C015E31A11208DBCB189F64D8196AEBFF6EB88710F10802DF902A7351CF755E05DBA1
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9ec9df53b36110d97e3ee7262690b8900f3ff52ef43044ddfa46fcd21e4621e9
                                  • Instruction ID: 8c15ced18b83322437bf144221a474e65d46c2b00c863c8417482da9b60f12b2
                                  • Opcode Fuzzy Hash: 9ec9df53b36110d97e3ee7262690b8900f3ff52ef43044ddfa46fcd21e4621e9
                                  • Instruction Fuzzy Hash: EC0152317007049FC7159A24D454B3B77E3EBC93A0F148968ED568B794CBB5EC42DB91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d70a9dde4d556609fd936d2e33c49acdd5387ea69d7936fc38a442c9100879d4
                                  • Instruction ID: 4c87d3d44991fc80785dff08159595f6ec1cef53ffefbc6ff707d3ebe83c142d
                                  • Opcode Fuzzy Hash: d70a9dde4d556609fd936d2e33c49acdd5387ea69d7936fc38a442c9100879d4
                                  • Instruction Fuzzy Hash: CE01573461920CCBEBA0DA06E44DB2B36A3FB81305F148065EF028F699CA35ADC1CF02
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fd2940ec96dc7122e355a6c0fc9cce734eba1795015190b5619a900dd612159a
                                  • Instruction ID: e5e8832993c5d69716bbfad2811a038c441be5db8318acb1076d25cc5ef27ee5
                                  • Opcode Fuzzy Hash: fd2940ec96dc7122e355a6c0fc9cce734eba1795015190b5619a900dd612159a
                                  • Instruction Fuzzy Hash: C8F02B32B0010C6BC7049A19D858A7AB7AAEBC8260F048136ED15D7360DE709D07C790
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3eaed1e765b9e7f4109a6137f56f58e729ec311734c46fd541e547a31d1decc9
                                  • Instruction ID: a072318e856b945b8e3fe691df02b0c2236d86ea6863702ba942dcf05342db52
                                  • Opcode Fuzzy Hash: 3eaed1e765b9e7f4109a6137f56f58e729ec311734c46fd541e547a31d1decc9
                                  • Instruction Fuzzy Hash: A8F04F353006009FC304DA29D859E2A77BAFBC9721F458069F946CB360CA31DC42DB50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b973f884cfe78a048ab73d5a62369c86480879940090bdb6f860ed9317b464c3
                                  • Instruction ID: 842c765f8d283ec413f9d09d2b05dca13092013d2a1bedb99c86b46b5c6bff73
                                  • Opcode Fuzzy Hash: b973f884cfe78a048ab73d5a62369c86480879940090bdb6f860ed9317b464c3
                                  • Instruction Fuzzy Hash: EF018139300610DFC705AB24D41992ABBE6EFCD711710C529E9068B750CF71EC02CB91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cb843c218395553bab8a17fce980f58c2efa9a71929bf72de5039a3d60c33696
                                  • Instruction ID: 508dfb596a96959b40806375f96214ee5c412ea0333667c5058c0077728f8f2b
                                  • Opcode Fuzzy Hash: cb843c218395553bab8a17fce980f58c2efa9a71929bf72de5039a3d60c33696
                                  • Instruction Fuzzy Hash: DAF0623221020087CA1AB778F456A7E76EFCEC0750B48493DE00ADB394DF64AE0E9392
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3cdbd727ea17775b123950f8a1660e5b67280b2194f6788afa67854f6dc8cf53
                                  • Instruction ID: fbca4029e1af5222d76fe2e7f2e2ed3255e2b4f680c0667a5843c2299a7f00ab
                                  • Opcode Fuzzy Hash: 3cdbd727ea17775b123950f8a1660e5b67280b2194f6788afa67854f6dc8cf53
                                  • Instruction Fuzzy Hash: A5F0F662B0F2904FE3120768AC203256FA1AB96200F1904AAD0868F3A6DD56DC03C351
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2e72a5f1c06a1fd4bb102a0f93a4bbcfa580dd3fab8fb66ada50649982c0b92e
                                  • Instruction ID: 0145a4a5aad850b5a6ed5ec02e9cc404195c06db38130f75b8dc3ee64d700e1a
                                  • Opcode Fuzzy Hash: 2e72a5f1c06a1fd4bb102a0f93a4bbcfa580dd3fab8fb66ada50649982c0b92e
                                  • Instruction Fuzzy Hash: 9F01AD30646500CFC755AB78C429AAE37F6EF4A300F1140AAE803CB362DE398D02CF12
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d054318650fd2543747a6d5d5b9c9986e5661df579d7333afb51072f83bb2888
                                  • Instruction ID: 6394eb26ef839bc36df1f8a3e366e5b4a3c3e49c046fc17d50e1c7e519886de0
                                  • Opcode Fuzzy Hash: d054318650fd2543747a6d5d5b9c9986e5661df579d7333afb51072f83bb2888
                                  • Instruction Fuzzy Hash: 1CF027A270D250CBD721051D1C9C63A9BE5EBDB7B47C401BEEC82D7294DD449D02A391
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 91047bb59c4f63358e4a82d2585a648065f794eb25329bfca47cdef450a7442e
                                  • Instruction ID: 65dedae57f8e5c4bef9e9c332e4c6d013056e8256298e7cd4f2e82deb466454e
                                  • Opcode Fuzzy Hash: 91047bb59c4f63358e4a82d2585a648065f794eb25329bfca47cdef450a7442e
                                  • Instruction Fuzzy Hash: F3F0A77150C3848FC74686789811C347BB19E9717836580EBDC9DDFA63E7269D0B8BA1
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5b57ca4ac8ad1d3e27151396fd448c071496caca58b419c47675a89c937d6f41
                                  • Instruction ID: d4a075b9bdf8e6b3815cb0c0e414a8f4b428e681106925570c4da4f5e5a5a26f
                                  • Opcode Fuzzy Hash: 5b57ca4ac8ad1d3e27151396fd448c071496caca58b419c47675a89c937d6f41
                                  • Instruction Fuzzy Hash: 7CF096313401055BC314EE59DD85EAE7BE6FF88360F444135E909CB321DEB5EC469750
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2557267056.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_59d0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 093bfadf22104a9dfcc872311971016be6606692041eecdfcc948e82473e5ede
                                  • Instruction ID: 83e18a6f1fbb317bd7df944aa9939a4cd044d889fa94082d7e8c9cc3c0972001
                                  • Opcode Fuzzy Hash: 093bfadf22104a9dfcc872311971016be6606692041eecdfcc948e82473e5ede
                                  • Instruction Fuzzy Hash: 17016934E00309ABCB08AFB9D45959EBBB2AF88300F10882AD402A7340DB7559418FA6
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4175033cd1a471496f56b368e7d55e8de368fd14d5f8daffdea8f9d76dc5f85e
                                  • Instruction ID: c01bbdff8a090e403d32c9c5a785b747abf7b8e8ce3db7628c61bda2de420941
                                  • Opcode Fuzzy Hash: 4175033cd1a471496f56b368e7d55e8de368fd14d5f8daffdea8f9d76dc5f85e
                                  • Instruction Fuzzy Hash: 1C011634B10104CFCB04EF68C484A5A7BF2EF8C204B5150BAE90ADB3A6DE309D408F42
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 858107b6341fb68a164033583e72bb3f381e3702d5f3b680b0837d6dac369e23
                                  • Instruction ID: d98f61ceca5d72ff590bb0ca34e9fc193e51c224e74fbec7c4eee8d51c987906
                                  • Opcode Fuzzy Hash: 858107b6341fb68a164033583e72bb3f381e3702d5f3b680b0837d6dac369e23
                                  • Instruction Fuzzy Hash: CDF0967170B2106BDF209B19D849B663BE9AB85721F068965D405D7B01CB20F881C799
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aad1e7c8a0ad9e91b3b5b75920db6d562189b881cbecce8d04133becb3c093f5
                                  • Instruction ID: 31cb2b8e19552bbf7ab4e29c2b843bde4831d3e3a849206fbcb661cc4cc849fd
                                  • Opcode Fuzzy Hash: aad1e7c8a0ad9e91b3b5b75920db6d562189b881cbecce8d04133becb3c093f5
                                  • Instruction Fuzzy Hash: 5EF090325087008FC3258B25C854F12BBFDEF86630B5581EEE849C7662E170F805C750
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2557267056.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_59d0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b98a561654a33d9d58e47e4caf8663bd5e420d693ca8d5f1df20add0b1ccd62
                                  • Instruction ID: 4231f48f60c5fdda702c055d80903c4a0a5511aa32f78396e2ed940b99aaf1c8
                                  • Opcode Fuzzy Hash: 7b98a561654a33d9d58e47e4caf8663bd5e420d693ca8d5f1df20add0b1ccd62
                                  • Instruction Fuzzy Hash: C901E9B8A051158FDB60EF14D845AADB7B5FB89300F0041F5D859E7345DB349E818F51
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c8ceee99d31e8dbc4b835238121e2ffcaf06119ed4cd5802b27870eeb233beb7
                                  • Instruction ID: 22082101116722fcf623ccad27f1e490cf720a4c7ddf27c5ddc581ffe585ad8f
                                  • Opcode Fuzzy Hash: c8ceee99d31e8dbc4b835238121e2ffcaf06119ed4cd5802b27870eeb233beb7
                                  • Instruction Fuzzy Hash: 5CF06D31B062108FCB54EB38D55976D3BE2AF8A701B4640A8E84BEB3A0DE34EC01CB51
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 41e5f1303beda9b291070ab3b44768250c51e5258eddf122fd4a1faeb42356cc
                                  • Instruction ID: b3ed57b6ef03809a23bae17b6f4eef8281a01f63feccee2a7caae099d1f73e28
                                  • Opcode Fuzzy Hash: 41e5f1303beda9b291070ab3b44768250c51e5258eddf122fd4a1faeb42356cc
                                  • Instruction Fuzzy Hash: 79F03A353102009FC705DB19D858E2A77AAEFC8721B118069F9468B360CE71EC42DB90
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 709ef2a3c6a24cc4e247a026fcb2bffa50601c53b13dfea39dd907b03cd743fa
                                  • Instruction ID: 2c1ff17289cc4446eb69d9e09a09385df6303d2fdbc3571b5e506f8af6be85a8
                                  • Opcode Fuzzy Hash: 709ef2a3c6a24cc4e247a026fcb2bffa50601c53b13dfea39dd907b03cd743fa
                                  • Instruction Fuzzy Hash: 75F0823515D7445FC706DB68CC50C667B795F9A934395C0EAEC88CB223E262EE05C771
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: da24da27dfe6964246b3fd1c4d5303177173f68cbaf25639a2e6a93459e8f222
                                  • Instruction ID: de25bd66b73c59c14a7b663088d53686db5c081087c272205b5ee0c73386eb0e
                                  • Opcode Fuzzy Hash: da24da27dfe6964246b3fd1c4d5303177173f68cbaf25639a2e6a93459e8f222
                                  • Instruction Fuzzy Hash: E201E43890911DCBDB64DFA0DC98BAABBB1BF04209F044255E807E7160DB749D89CF14
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d4f56a85ded8bdf6b89c959c3b1cd1c8576db06d0bcfa7041788f737e453bca
                                  • Instruction ID: 3e6ea4d59266a3dc6fa6b1cd63c5f84dc0bd4a5275443dd654de19cea8a4a4e9
                                  • Opcode Fuzzy Hash: 8d4f56a85ded8bdf6b89c959c3b1cd1c8576db06d0bcfa7041788f737e453bca
                                  • Instruction Fuzzy Hash: 43E0DFA2749921C7D620141DAC9972B86E6EBC6BB1FD4113ABC45D73C0CD508E026290
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c21227ed45243b9206055bd0a9c30a100397d9a5e7f856c95ce6d2877f32d72e
                                  • Instruction ID: 986920263c6e53762730ddc304c744c2c3da4a3b8f984aed2020bb03293c1849
                                  • Opcode Fuzzy Hash: c21227ed45243b9206055bd0a9c30a100397d9a5e7f856c95ce6d2877f32d72e
                                  • Instruction Fuzzy Hash: D3E092613002281BD708296F6855B2B99CEEBC5F50F14847EA509C73A6CC658C0203E4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ffe85c9e667586b8368c44ec64dd9ab661ea4c21afc5c65f1093d1274fd43d2c
                                  • Instruction ID: 5ca919385fc028a01faf7252b86cff48602ed431be9941b250929aa3c437ca8c
                                  • Opcode Fuzzy Hash: ffe85c9e667586b8368c44ec64dd9ab661ea4c21afc5c65f1093d1274fd43d2c
                                  • Instruction Fuzzy Hash: C4F0823981C2989FD724E7A49408A717FE4EB56320FC68096FC46D7152C620AC44CBA1
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: da71812ba066b554e8e8d4b46d00fc6324a27661050549507c204f1f3f64beca
                                  • Instruction ID: 7e316bebc935b46a936e47da5417ac208d6396b1295ced523af4400105f97083
                                  • Opcode Fuzzy Hash: da71812ba066b554e8e8d4b46d00fc6324a27661050549507c204f1f3f64beca
                                  • Instruction Fuzzy Hash: C5E09232B0821CDF8704DAA8A8046DABBEDD748261B10406ADC09C3640EE32AD40CB90
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0ab42b2816590f382ef097956e93442c346742f4e01d38fe2366cc7f6d6fa904
                                  • Instruction ID: 1bc6ee6b032c256060e8ee1791ca7e42166d64fecbbfe08b9921a373dc0ffb80
                                  • Opcode Fuzzy Hash: 0ab42b2816590f382ef097956e93442c346742f4e01d38fe2366cc7f6d6fa904
                                  • Instruction Fuzzy Hash: 58F01F39D18118DBDB44DFA9D884BACB6F2FB88304F458069E80AA7389CB746D458F91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1e9c2d083ed7d41e3eb999fb4168afe685a21626e4378e76f4611bc243c454a7
                                  • Instruction ID: c4348ac4dcbfb403dd9f1b9e0bc6220695b1af6a5fb12ba953bcf57bf03c9dad
                                  • Opcode Fuzzy Hash: 1e9c2d083ed7d41e3eb999fb4168afe685a21626e4378e76f4611bc243c454a7
                                  • Instruction Fuzzy Hash: 68E012B06482449FDB06CBA9D8558247F64AF5A13434880EBEE08DB263E672CC068B52
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 81e1c809712145d8c95c8f0c28657e666a288a37732f90393d3901b81ce4a3d8
                                  • Instruction ID: be9be4b1cfd03e0dfb8c24b5ac1fdaadababb10a4ea1e835b6626825efe3daa5
                                  • Opcode Fuzzy Hash: 81e1c809712145d8c95c8f0c28657e666a288a37732f90393d3901b81ce4a3d8
                                  • Instruction Fuzzy Hash: F3E0A0316052458FCB058F28FC5484AFBAAEF80311304C97AE0098B236CE789C0DC780
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f3ef1c9378047aa2da4c04bac3d8785f08ecd63d751fa56d8aba14d01cccb6b1
                                  • Instruction ID: c77649421ef9aaf6b675aae20de6a56680178d0ebb50a8f34b1b99fc8c2dc215
                                  • Opcode Fuzzy Hash: f3ef1c9378047aa2da4c04bac3d8785f08ecd63d751fa56d8aba14d01cccb6b1
                                  • Instruction Fuzzy Hash: D8E012312002059BCB159E1AFC84C4BFB9EEEC4364714D639E10A87225DE74ED09C690
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ac5a21edfae0476839cb64b7bdcbf2770d98873e66a0a2d066e56b5a195d357f
                                  • Instruction ID: 4d94f7bfc53d5898dfa646ad5b929cf41e5f9dfa760316a78db08e5a86d89cff
                                  • Opcode Fuzzy Hash: ac5a21edfae0476839cb64b7bdcbf2770d98873e66a0a2d066e56b5a195d357f
                                  • Instruction Fuzzy Hash: 87E02631B1135C538B08E57D441546F7ADF4BCC640B000839DC03EB344ECA05C0547E2
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 83626f3b95090f1e1778e077f400b6105d896c8122c6140620e56f8a53fb8c28
                                  • Instruction ID: def5fa341abaacff7c0f453829eaf2ad3e6434d2ca30a7422ab3c342e35f5db3
                                  • Opcode Fuzzy Hash: 83626f3b95090f1e1778e077f400b6105d896c8122c6140620e56f8a53fb8c28
                                  • Instruction Fuzzy Hash: 86E0E535915308DBC740DF68EA5275D77F1EF88300F108669E8189B281DA319E01E701
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1cb9dd50f17b17b92d6395853ee3596c0547609b43897edf2f4f176a5003082c
                                  • Instruction ID: a12dee5622925d8d69d91fc81b512a0add4011cfcfd105f003b93ffead44140b
                                  • Opcode Fuzzy Hash: 1cb9dd50f17b17b92d6395853ee3596c0547609b43897edf2f4f176a5003082c
                                  • Instruction Fuzzy Hash: 88E0CD317433049FEA21A6AD9801BA533DDFF45750F5104699A055F781DD61DC41C79E
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5fad1f58f1e952e0f714352ecbe02413166d4149c7047f1cf4940c780bd1b5ff
                                  • Instruction ID: 584dde50bc9b1293f1114dd50932fe086eea099c4e817ca2b026b12315380985
                                  • Opcode Fuzzy Hash: 5fad1f58f1e952e0f714352ecbe02413166d4149c7047f1cf4940c780bd1b5ff
                                  • Instruction Fuzzy Hash: 87E026B26097406FC305C738DC92931BBB6EFA723035880AADC44CB252E522EC07C760
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5c3ac01b4f200127413c9116bd8e1212652c6b3f2b99afc5580116105532db13
                                  • Instruction ID: 3f4c46cf2863803b0f1f86821c09200b1df678db57fcfdb75c9f9aff4398a1db
                                  • Opcode Fuzzy Hash: 5c3ac01b4f200127413c9116bd8e1212652c6b3f2b99afc5580116105532db13
                                  • Instruction Fuzzy Hash: 63E04F31501208AFDB00DFA4EA5275E7BF9EB45300F1485A5EC09D7741DA365F459754
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 928bb26331a2e67d3fd67dad2de707b33db60f399d509f284c41d550b315d215
                                  • Instruction ID: 37382f7f3539464bcc965874bdec0d6f5a0cd249489a3e63734f94d1122be546
                                  • Opcode Fuzzy Hash: 928bb26331a2e67d3fd67dad2de707b33db60f399d509f284c41d550b315d215
                                  • Instruction Fuzzy Hash: 6DE026B290F2A05BC30602206415B612B319BA3234B6A80D7EC01DE057DA108D0B8390
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5344e5b608bad39ca35586419d65c5819d4ef1d041397d29629dab7be9c7b2f8
                                  • Instruction ID: c0ebe7ec6e42407627666f4f87ce38d7be197d72b52e258922e8029c6784be88
                                  • Opcode Fuzzy Hash: 5344e5b608bad39ca35586419d65c5819d4ef1d041397d29629dab7be9c7b2f8
                                  • Instruction Fuzzy Hash: 0BE0D8720493896FCF034E90CC0089E3F269B0627078440A9F944A9132D232C8259BB1
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9b29d66a9f4b8a021f9e7eecd6dd2d1a35c74409853594505a3386cae0e5cbee
                                  • Instruction ID: c650a7f457c8c034c946c785af8b4af42184cc602fc642923f2cffabefe0c128
                                  • Opcode Fuzzy Hash: 9b29d66a9f4b8a021f9e7eecd6dd2d1a35c74409853594505a3386cae0e5cbee
                                  • Instruction Fuzzy Hash: 35E0463000C00CCAEA8C5AA4A40E77C7FA6974260ABD05090FC0ED41A1EE15EED5ED22
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4d1f91f376035a5da8cb1c139a4282229578aa8ec74884ac49c6ef3f9eb2427b
                                  • Instruction ID: 7f194f6432cb4d3bd365eb633bd0503dcd316b2b46c489be0de57dbba849ce87
                                  • Opcode Fuzzy Hash: 4d1f91f376035a5da8cb1c139a4282229578aa8ec74884ac49c6ef3f9eb2427b
                                  • Instruction Fuzzy Hash: 72E09230708208CFDB54D628D90AB2B3793BB86318F104269DF56CF2A5D7309C828E42
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0e475bd57f41d05b53207da64121b63137a73059a48eb7920e8afce6e94f42d6
                                  • Instruction ID: bc94a3f109dfecbd00ee24e35bad59d9224c68c237ebe2e17737ba144da3333e
                                  • Opcode Fuzzy Hash: 0e475bd57f41d05b53207da64121b63137a73059a48eb7920e8afce6e94f42d6
                                  • Instruction Fuzzy Hash: 2EE08CB06082006FC705C698CC11871BBF8AFA6230320C0AEEC0CC7222F2619D0AC760
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d4c46f58c953327dd6e2f0d02d3b342f8cb5f9b4c0cbcc069a31e10eb57b3130
                                  • Instruction ID: 38d42d0a5405b71865463316bd8fb550eaac601a5be6954defe477fa56a02c45
                                  • Opcode Fuzzy Hash: d4c46f58c953327dd6e2f0d02d3b342f8cb5f9b4c0cbcc069a31e10eb57b3130
                                  • Instruction Fuzzy Hash: 9FD05EDB94DAC02FD706873078247856F129F7B209F2743DFC4888B59BE22488128306
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 684f923650a594a8c8b5b8de915d7f78ae96a9c94d2ae3d5ece023dd0a240dde
                                  • Instruction ID: 1b522e454d5923ff90af37225e5e29fd54fb2f639312ed9541b2d0fc0682d974
                                  • Opcode Fuzzy Hash: 684f923650a594a8c8b5b8de915d7f78ae96a9c94d2ae3d5ece023dd0a240dde
                                  • Instruction Fuzzy Hash: 69E0123A705105DFDB55FB64D888AACB7B2EB89324B148074E906AB3B1DE34AC41AB10
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 210679dc681dcb64af4313ec0260f57b3d9a843deef9e4c6f796c58e58fa2c98
                                  • Instruction ID: 42170703e9142d3dd2ca1087307b17736ccc29a41772f73f763abe151d77f03d
                                  • Opcode Fuzzy Hash: 210679dc681dcb64af4313ec0260f57b3d9a843deef9e4c6f796c58e58fa2c98
                                  • Instruction Fuzzy Hash: 87E0462200E3C88FD7032770592069A7FB45B03219B9B50DBC8C8EF2A3D2694C0E8B72
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4878e6337a546aa3c0c49e67721d128fe7b8f7650b2bd7376d5ce105b7722a0d
                                  • Instruction ID: 1a9e84d2139daaff0accecf9f1f54b1542faf3fd8d26c02d1729d054bb41866f
                                  • Opcode Fuzzy Hash: 4878e6337a546aa3c0c49e67721d128fe7b8f7650b2bd7376d5ce105b7722a0d
                                  • Instruction Fuzzy Hash: DDD0A7318083404FC7458694D849D60BB656B4A23438481DADC0CCF613D5239C0686B1
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e4a16b01802a1a367286f6f1e3aaefee327011ae23ba0e1ae65251c4216299ea
                                  • Instruction ID: b506a9912746c00bb3123d661565ca820b8bb28a3890cccbaaaba762204da6b6
                                  • Opcode Fuzzy Hash: e4a16b01802a1a367286f6f1e3aaefee327011ae23ba0e1ae65251c4216299ea
                                  • Instruction Fuzzy Hash: 78D05E353059110BDB158639FB62B9626EABB88210B48813AAC0AC3708EE24EC064AC8
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e489f0d79061d557186ec8f226f23e05eaa2828631e96381bc1f17b5f40ef910
                                  • Instruction ID: 0a65649cd03db6a1978499bd9852576c353a5e793c03e95cce55c94fbeacdcba
                                  • Opcode Fuzzy Hash: e489f0d79061d557186ec8f226f23e05eaa2828631e96381bc1f17b5f40ef910
                                  • Instruction Fuzzy Hash: C3E01230A50308EFDB04DFB8E941BAD7BF9EB89700F5045A9E8059B245EE316F049785
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 97962746eed54e789a1c82a1ab1efc98933d9cb054f6bdde2a7cf0174adeb779
                                  • Instruction ID: 2048a4d9ff10c5617ecd4e8e346c84debb5eed6db69965f0eec8c7033e53264d
                                  • Opcode Fuzzy Hash: 97962746eed54e789a1c82a1ab1efc98933d9cb054f6bdde2a7cf0174adeb779
                                  • Instruction Fuzzy Hash: 64D05E752192441F8305DA98DC508757BB98FAA534354C0EAEC88CB353E622DE0687B1
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4f9355ec06b78587e287286d915459d54e8ca26546d91473f4698cb951b9c43f
                                  • Instruction ID: f75296e3df18ee514de120311d6cb772e48fb51ea89bacaf35469ff29c7e29cd
                                  • Opcode Fuzzy Hash: 4f9355ec06b78587e287286d915459d54e8ca26546d91473f4698cb951b9c43f
                                  • Instruction Fuzzy Hash: 17D0A7F11083442FD7059690DC01C717F6C89C323435580DAFC08DB112D522FD0A8272
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e1346eea4c86d46105111d12555e16d5e0207614450c89dc23ef4411e9b203c1
                                  • Instruction ID: ad690c3a5c78a782d0eef4ea5ae8aa00095dd1706271cf60295c22ed835e9534
                                  • Opcode Fuzzy Hash: e1346eea4c86d46105111d12555e16d5e0207614450c89dc23ef4411e9b203c1
                                  • Instruction Fuzzy Hash: A3D0A5311592400FC687C3D0F851C74B758C97713535584EEDC05D7113C551DC078250
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 60d8ed09d0980857c471df5498f27ab081153100c02dc94fd05b2fac83b28b91
                                  • Instruction ID: dfb1134f57c26a6b1f4b5d2fdf25cb7a048383b7e2bde8eacf32632fae303aa0
                                  • Opcode Fuzzy Hash: 60d8ed09d0980857c471df5498f27ab081153100c02dc94fd05b2fac83b28b91
                                  • Instruction Fuzzy Hash: 47D0A7325092589FC706C2E8E851C357FEC998B23C354C0DADE08CF113C662AC07DA63
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f588be21028d0426fb44fc28a09aa011cc7c015c2ccbea7d6f159e6bafe2d946
                                  • Instruction ID: fc389085903a6c6675c8ff00658860231c34323c742de33f87956c76898e464c
                                  • Opcode Fuzzy Hash: f588be21028d0426fb44fc28a09aa011cc7c015c2ccbea7d6f159e6bafe2d946
                                  • Instruction Fuzzy Hash: 9EE01270A01208EFCB00DFA4E54165DBBF9EF45304F2081A9E809D7745DE355F449795
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dedeb8e08ffa21a9fc961c8d702f715e7910eee5b4d607d757d35fab6db0f6ee
                                  • Instruction ID: d3ff3a98d5beda4496c9b969f52d451c9a663c0216ef6e3738240bed673a99b7
                                  • Opcode Fuzzy Hash: dedeb8e08ffa21a9fc961c8d702f715e7910eee5b4d607d757d35fab6db0f6ee
                                  • Instruction Fuzzy Hash: C3E04671A0B215CBEF649B25EC1A7F87776BB00302F000578C8466B6A4CF78AC86CB85
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a768c4c604d0b3b3ca8285fd9a8fccf7cabfd23c7e640133f254aaebfc72bf2a
                                  • Instruction ID: c3503ac2fbd480124f2d52c4a8c3dc3c3706f89fa80a08748b22aa52796ba6fd
                                  • Opcode Fuzzy Hash: a768c4c604d0b3b3ca8285fd9a8fccf7cabfd23c7e640133f254aaebfc72bf2a
                                  • Instruction Fuzzy Hash: 1FD0A7304083808FC78A867894118747B618A5313831581EBDC49DBA53D7234D0B8F20
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e6bb64dd143e43011eb8f5c89154ce763955899c5be9dfe27b29106c0699bc16
                                  • Instruction ID: 4460fbe2cfeafc29f06079a2d6c185e14c24303c8a7fd779fbd73bc7a7138a57
                                  • Opcode Fuzzy Hash: e6bb64dd143e43011eb8f5c89154ce763955899c5be9dfe27b29106c0699bc16
                                  • Instruction Fuzzy Hash: 43D05E7080C3841FDB07865488128687FA08A9622074480FEDC89DB223D5628C0B8A93
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 57ae9268584258105a498ba1530908dd170bd9b93871c67ee7fbf52285e7546b
                                  • Instruction ID: 979df8ca36d79bedd47463d4417e44ae73de977ae4b8a6a3ba0a1689888c99c8
                                  • Opcode Fuzzy Hash: 57ae9268584258105a498ba1530908dd170bd9b93871c67ee7fbf52285e7546b
                                  • Instruction Fuzzy Hash: 6FD0A97200A2884FC3068BA0D8008607B64DA4222838880DADC1CCF222FA23BE078B70
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3ffb6d344da74ac7584351c954ce9c7977dcf22f6999f607b6a83c91b331e00c
                                  • Instruction ID: f6f220e8334f897fe3dcc0561b22ce0a05000082e8ef0e55b9bed3f263fa3031
                                  • Opcode Fuzzy Hash: 3ffb6d344da74ac7584351c954ce9c7977dcf22f6999f607b6a83c91b331e00c
                                  • Instruction Fuzzy Hash: A3D05E7610C289AFCF075B90AD10C6D3F225A61220B94C0A7FE0CEA122F132882AD370
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61cb6eb0c2bb6e897218618b6b5390077a8f722db0d7936c049c9ac793e91f32
                                  • Instruction ID: bb559cd9e63285f842ffa59cec69cfb130f4eb354ed15726ef19bdad66fad4c8
                                  • Opcode Fuzzy Hash: 61cb6eb0c2bb6e897218618b6b5390077a8f722db0d7936c049c9ac793e91f32
                                  • Instruction Fuzzy Hash: 63D05E322041686F8300CA89C810CB6BBEC9A8D120708C05BB958C7241C976ED0287A0
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3638db9e817d616fa5d98b75e73e8dff0329196f1e56a6bfd395bc1f20a9dfb3
                                  • Instruction ID: eab6953ddfcc818c699fe0b0ff00912447a4038bb0993329d2f54db7433e1c65
                                  • Opcode Fuzzy Hash: 3638db9e817d616fa5d98b75e73e8dff0329196f1e56a6bfd395bc1f20a9dfb3
                                  • Instruction Fuzzy Hash: D8E0C2B1A0938DDFDB12DF90D06069A3BB5FB59718B610192CC42C7389D7249C0EC341
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ea318588269f38226b8d4ba74e0271318642a8d0ae55f90c26a4e3775aded08c
                                  • Instruction ID: 125a2754bc2d4b6fb0cb0fc7f8ff93b0590a2dc8fffb525b3b7d8db6f7424d28
                                  • Opcode Fuzzy Hash: ea318588269f38226b8d4ba74e0271318642a8d0ae55f90c26a4e3775aded08c
                                  • Instruction Fuzzy Hash: 59C012AA59D7844EC607627026A14313F1C454302939404E7DA4CEA622E065CC6A4671
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 27eba000d7aafd633be2e4ea76ad508722bdc78f3ab37a841f23b09b0dba3071
                                  • Instruction ID: f9c19c6e5559528aae408242fd6ef7d69784899bfd5ef2948ff1ce79dda5ebb9
                                  • Opcode Fuzzy Hash: 27eba000d7aafd633be2e4ea76ad508722bdc78f3ab37a841f23b09b0dba3071
                                  • Instruction Fuzzy Hash: F5D0123430F2198BCE589A39DC54AB5366BBB94602724862594024A718CF355C87CB41
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e059ec4bbeb8834709c48df017e09e91155ec6582ebb9175a1668347cc7f533c
                                  • Instruction ID: bf570a788bcc090f8e4db7e6d234dab1ee246506c70bfbb3b768e43034916fe4
                                  • Opcode Fuzzy Hash: e059ec4bbeb8834709c48df017e09e91155ec6582ebb9175a1668347cc7f533c
                                  • Instruction Fuzzy Hash: 06D0127434671DCFC7199E1DE595635279BFB81200714D52484014A658DF358847DF81
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61987b402e54c08492efd0398786a68ee8c362b7497861667284628957b97635
                                  • Instruction ID: 929317d695b111f18d7f4bceb56f3204e86f65b770e7484b1bbf0026d343175c
                                  • Opcode Fuzzy Hash: 61987b402e54c08492efd0398786a68ee8c362b7497861667284628957b97635
                                  • Instruction Fuzzy Hash: 31D05EB200A3818ED7160B3458054A87F209A2322131040FADD418A163C6728C0AC6B2
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9a83eeba3644a54268395c833dcf960ba1f801761485765308c9942f5da416b6
                                  • Instruction ID: 9bdbbc0b53a9729c287714903abe6d75a813713456a94ec1670997762e443df4
                                  • Opcode Fuzzy Hash: 9a83eeba3644a54268395c833dcf960ba1f801761485765308c9942f5da416b6
                                  • Instruction Fuzzy Hash: D8D012770C09049FC3009B68EA66F847BB8FB15625F098160F90487731C722DD119544
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0829cf31a3a3c332974895ce1ed078d028496df98d162700349fb40f5f03e69d
                                  • Instruction ID: 4b189481dcd23166e5db37b9b2de030e4869734f7b6981a5254d5b9ad6b19e4f
                                  • Opcode Fuzzy Hash: 0829cf31a3a3c332974895ce1ed078d028496df98d162700349fb40f5f03e69d
                                  • Instruction Fuzzy Hash: 1AD022098493808FC1420E680210526F76A4E620217C840C3EC0CDE523E9849C0DC238
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: db4f8152748b3399ca93f7666bdcd28110ac589f9db38b07e243b144bdbab051
                                  • Instruction ID: 997093a9d13c3498b723689ee05b24121d7bec8af9880ab0364ec902a184b124
                                  • Opcode Fuzzy Hash: db4f8152748b3399ca93f7666bdcd28110ac589f9db38b07e243b144bdbab051
                                  • Instruction Fuzzy Hash: 31C080614D87405FCB0F57546C544713F3C549313135140E7FC44E5553BA710D08C271
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1bdeb93c588865a1876259d4ebc2f6bd6fee95acb53aaa2f3d037b7c407a60b0
                                  • Instruction ID: e3e677b1bc9306a482e8f201e55f5df3fefb9e1103d124765456a657127b235f
                                  • Opcode Fuzzy Hash: 1bdeb93c588865a1876259d4ebc2f6bd6fee95acb53aaa2f3d037b7c407a60b0
                                  • Instruction Fuzzy Hash: C3D09E70D0920D9F4744EFB9450527EBBF4EA04604B5149A9CC19D3200F6754A118F91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1fc093ea00dc5c0dac0ee0aae55c8695a65880991aabfdd4a17c873578d70ecb
                                  • Instruction ID: cc0560b51e4f3cc83cb4465788cbb5244fb1b6f681ea5d90ca0a3a6b7044e0e6
                                  • Opcode Fuzzy Hash: 1fc093ea00dc5c0dac0ee0aae55c8695a65880991aabfdd4a17c873578d70ecb
                                  • Instruction Fuzzy Hash: 2FD0C720A0D3C08FCB22C370882A2987EA26B43308F0808EEC0819B0D3EA5828488327
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4b0b98d40cf3573383ade2d3d6ad03462111b2245a15caeda808001eafb9b554
                                  • Instruction ID: f0574b0018b8b50eab2b6de62c4373cae44f916fde319213bf105ba86cac73fd
                                  • Opcode Fuzzy Hash: 4b0b98d40cf3573383ade2d3d6ad03462111b2245a15caeda808001eafb9b554
                                  • Instruction Fuzzy Hash: 33D0023001C14DCBE9CCAB95740E53DBFB6E54260E7C19050FD0BC41509F14ADD4ED66
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7736f90fa413b559669a6c825a64fdf68499338160d85efd077d6d8240c34a56
                                  • Instruction ID: 9da1b65c051e6da2eb541f05f8016d3d0aafd7a65dabefa752128117db770b7c
                                  • Opcode Fuzzy Hash: 7736f90fa413b559669a6c825a64fdf68499338160d85efd077d6d8240c34a56
                                  • Instruction Fuzzy Hash: 2AD09E35814298DFE3249759D909B22BFD9E745714F85D055EC45D32418B60AC40DBE1
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6f6d7909c3cb6484214594633c4bf0480c0190bce1f940b031f0bcb406fedccc
                                  • Instruction ID: d641165992b98963a738138fb889dfef22ea86dd1a2e9e860a2ed7d403ad7e48
                                  • Opcode Fuzzy Hash: 6f6d7909c3cb6484214594633c4bf0480c0190bce1f940b031f0bcb406fedccc
                                  • Instruction Fuzzy Hash: 2FC012329545494AE750DE368C057763E9A9F00335F1843A12C35C50E1C6AD86815611
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0f101b99c018e194de391276042a4409d2287f03f09b359383dc3c4f5e0418ab
                                  • Instruction ID: d0cb0e485a317aa8c7007519b198b69b11b0c88b3752a8ed0882c18b46611baa
                                  • Opcode Fuzzy Hash: 0f101b99c018e194de391276042a4409d2287f03f09b359383dc3c4f5e0418ab
                                  • Instruction Fuzzy Hash: 12D01232A555494AE7609E36CC057B53B969B04331F1847612835C50E2C6AD87816A10
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a04ab398bc52766f2e4d8be601feae78e38df0c2555a4c4179965e74e104a4b4
                                  • Instruction ID: da934bd7bb044ce893750ce4ffbce0a93b0c16fa1134dbe5deb438bdcb4323c6
                                  • Opcode Fuzzy Hash: a04ab398bc52766f2e4d8be601feae78e38df0c2555a4c4179965e74e104a4b4
                                  • Instruction Fuzzy Hash: 93C0127295560946EF90CE358D05775399A9B04335F1403657C21D50E1C6A98F845221
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16c2c938eb2e81493a82745c4e1d869ca24451d558d05aa8ebf1567866946310
                                  • Instruction ID: 4b8113ddc06dd10a0546148e5bf9f8776f93b6ad658f89f4af1ee18497edd9e4
                                  • Opcode Fuzzy Hash: 16c2c938eb2e81493a82745c4e1d869ca24451d558d05aa8ebf1567866946310
                                  • Instruction Fuzzy Hash: 16D01272A566094AEB608E35CD067B53A969B04331F1803657825D50E2C6AD8F846621
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5e6817082ecbc1a31c9a5f4183cad97f8b7590e00072eb336bbc0fd2830019cc
                                  • Instruction ID: 823baf0a49ed13db2bf275581618ec82f5a7c5d617ec81f29106f69558abc816
                                  • Opcode Fuzzy Hash: 5e6817082ecbc1a31c9a5f4183cad97f8b7590e00072eb336bbc0fd2830019cc
                                  • Instruction Fuzzy Hash: 64D0C93494C3949FC75787A8E852455BBB1AB92214B5480EF980ACB256D76A4807C746
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dbcef5c395f5c673d87ed76c55c2f1c93d814102d17bdb09fc090918b690f88a
                                  • Instruction ID: 58c7e918dc9fc6e739d0296992eb27fcb8a7bf4254ad48f247067e0340e6a738
                                  • Opcode Fuzzy Hash: dbcef5c395f5c673d87ed76c55c2f1c93d814102d17bdb09fc090918b690f88a
                                  • Instruction Fuzzy Hash: A6C012313402095BD304CA88C842A22B3AADBC8614B14C079A808C7746DE36EC028694
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: daebc8bd49a86390c9c70d0daf52a922fc73c5f2d85c8d424d556fb40ca5eb91
                                  • Instruction ID: 496bfc31b915bb33c35a36c691a6fa5b4d959cc7e4419c82f6b81d093ed7b478
                                  • Opcode Fuzzy Hash: daebc8bd49a86390c9c70d0daf52a922fc73c5f2d85c8d424d556fb40ca5eb91
                                  • Instruction Fuzzy Hash: 76D01734600208CFDB04EB64E448B987BB2AF44308F118165A802CB270DB349C84CF41
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5667771b9590968ada38ed3c6f3cec57dfce3e2ff567746b0a91649736217876
                                  • Instruction ID: fe82fc59056d271c96bb6c729d37f40757e2370b7bda2526e33067edb868abec
                                  • Opcode Fuzzy Hash: 5667771b9590968ada38ed3c6f3cec57dfce3e2ff567746b0a91649736217876
                                  • Instruction Fuzzy Hash: 93C0123540C7485BC301C7A8E8519107BA49B4620872840DDD80CCB352E652F802A655
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c7c030a94f815e8480bc3220b5226025c7b2043a2667baaf4595dd2f0596ae55
                                  • Instruction ID: f561111655e4d6bd6a9058c52c298c85226ba072fa1b08691520b5c5b8aa9256
                                  • Opcode Fuzzy Hash: c7c030a94f815e8480bc3220b5226025c7b2043a2667baaf4595dd2f0596ae55
                                  • Instruction Fuzzy Hash: D8D01276211025DF8B199B54C545D6837E3AB8C35075A51D4FD0597352CE30DC015B51
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                  • Instruction ID: 89f7625bcd3042e5662e2b0f59687678129b36ffb3fe7dec0c562e4284fda470
                                  • Opcode Fuzzy Hash: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                  • Instruction Fuzzy Hash: 05C04C753042085F9344DA9DD851C26F7E9DBD8614714C06DA90DC7351EA72FD13C694
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4d92844018c8fb28c51dc78530d23bde0fb907a27750348409b702563a9b7c82
                                  • Instruction ID: 35d36f0b06204cbe742189895640e21185acabce4355678f358f0c9ea86b3019
                                  • Opcode Fuzzy Hash: 4d92844018c8fb28c51dc78530d23bde0fb907a27750348409b702563a9b7c82
                                  • Instruction Fuzzy Hash: 93C012321EC3848FC3059A29D851C817FE8AE46B0230600D2E9088B673D610EC588B91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                  • Instruction ID: 89f7625bcd3042e5662e2b0f59687678129b36ffb3fe7dec0c562e4284fda470
                                  • Opcode Fuzzy Hash: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                  • Instruction Fuzzy Hash: 05C04C753042085F9344DA9DD851C26F7E9DBD8614714C06DA90DC7351EA72FD13C694
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2557267056.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_59d0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                  • Instruction ID: 89f7625bcd3042e5662e2b0f59687678129b36ffb3fe7dec0c562e4284fda470
                                  • Opcode Fuzzy Hash: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                  • Instruction Fuzzy Hash: 05C04C753042085F9344DA9DD851C26F7E9DBD8614714C06DA90DC7351EA72FD13C694
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7e728cfb64e3cab516813445200425e70fa671aeb831871d3ee8d91c3aa6901e
                                  • Instruction ID: e7333314ca7f6455053bbf224bbc75b211bdf993d2c3ae9bf9f8fce8639b00ec
                                  • Opcode Fuzzy Hash: 7e728cfb64e3cab516813445200425e70fa671aeb831871d3ee8d91c3aa6901e
                                  • Instruction Fuzzy Hash: 4ED02236905610CBEBE0BF18D488398B3B4BB113E5FC20154C90367210CB30EE06EBD1
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                  • Instruction ID: 89f7625bcd3042e5662e2b0f59687678129b36ffb3fe7dec0c562e4284fda470
                                  • Opcode Fuzzy Hash: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                  • Instruction Fuzzy Hash: 05C04C753042085F9344DA9DD851C26F7E9DBD8614714C06DA90DC7351EA72FD13C694
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d99279f3f86a914958862f05ef3794e94258c71bdc8f2877fdb2f05c763698fb
                                  • Instruction ID: 562b96375fe34b886ce085b00418f0578df12331cd3494b6dd555eb1ab19de8b
                                  • Opcode Fuzzy Hash: d99279f3f86a914958862f05ef3794e94258c71bdc8f2877fdb2f05c763698fb
                                  • Instruction Fuzzy Hash: 72C0803D311A04DBC7012644CC051DF7B719749331F554711D50123BB4CB355C519F11
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9360f6c3753071abd6b5a8e86689413885372535260cb3c19a445abdef9116e5
                                  • Instruction ID: 740b9759760942d22b17a3cca9430a66c5404184698edbd653c299f37843b55b
                                  • Opcode Fuzzy Hash: 9360f6c3753071abd6b5a8e86689413885372535260cb3c19a445abdef9116e5
                                  • Instruction Fuzzy Hash: ECC04C39140108EFCB419F55D844C45BBA9FF19770741C051F9494B632C732E960DB50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 60385f833bc490190c6d793985699399508e646fe071bb09d156aee9762bd135
                                  • Instruction ID: 0a702508d927641af75cda166a91d5f8ac64f797ee2762e4db75deb8140e12f2
                                  • Opcode Fuzzy Hash: 60385f833bc490190c6d793985699399508e646fe071bb09d156aee9762bd135
                                  • Instruction Fuzzy Hash: 6AC04C35640109ABDB00CB80DD5EF9E7BF7EB48714F218091EA05BB2A5C672DE05DB50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d423fc3712ff66c739af9e50fb11b7a9308db28a910a33fae82b0c96f8ba2ed5
                                  • Instruction ID: 9550768ae10205e61f2818e7f1ff77376a9f150caac72e1acd3300e4cb75030f
                                  • Opcode Fuzzy Hash: d423fc3712ff66c739af9e50fb11b7a9308db28a910a33fae82b0c96f8ba2ed5
                                  • Instruction Fuzzy Hash: 39B0923200904497DB6212A0E69EBDA7B299B48122F988049F05CA6B18E629841A4B23
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                  • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                  • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                  • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fe83dad43ecfedb2ab22e259dcfb517d1d5821d2f7bf2b07797eaae7242b4754
                                  • Instruction ID: 530588d9013f8ef4c0e1556bdc89f0a9012248a23d9053f64fe231f775fb31bb
                                  • Opcode Fuzzy Hash: fe83dad43ecfedb2ab22e259dcfb517d1d5821d2f7bf2b07797eaae7242b4754
                                  • Instruction Fuzzy Hash: 93B0024655684106F9426260DF773D49660F753111FDD8851881185755C64D51431056
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                  • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                  • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                  • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                  • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                  • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                  • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                  • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                  • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                  • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                  • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                  • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                  • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b398149f8749002df585bc8cf77be9f7f11a81803118d54166173998ade23da1
                                  • Instruction ID: f8fcf30c364bffcab6dea2bd514b502f29419910a6bcec4090f2357f58ac44e1
                                  • Opcode Fuzzy Hash: b398149f8749002df585bc8cf77be9f7f11a81803118d54166173998ade23da1
                                  • Instruction Fuzzy Hash: 96B0923200820CFBCF025FC1EC01C9EBF2AAF14260F40C015FA1C18020D633A970ABA4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                  • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                  • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                  • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                  • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                  • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                  • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 38f0df0cbe41f8d664865c7cd0913f9059316a95da595a5cf1fdef1b9d67d236
                                  • Instruction ID: 760c54f9470c372b6427bcb9d646a7e8c8415482e4cdf25df9530a1a1276da16
                                  • Opcode Fuzzy Hash: 38f0df0cbe41f8d664865c7cd0913f9059316a95da595a5cf1fdef1b9d67d236
                                  • Instruction Fuzzy Hash: EAC09B34444255DFC38507D85C654D17BF1DD0513574501519C4155117D55859579620
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9645e64a96567620c9a96228470688c6440d0745c59d4baa42111baec8507aa9
                                  • Instruction ID: f7ba9db850efa64d1a3fe34d1dc23de0edf51c349b21b40af7edc514cb9f7e82
                                  • Opcode Fuzzy Hash: 9645e64a96567620c9a96228470688c6440d0745c59d4baa42111baec8507aa9
                                  • Instruction Fuzzy Hash: 6CC09B5140D6845FDB03076469350357F119B9610734541CFD84D86D67D534487D4F56
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 00fb257517fa66d8d82df2fc559de156622b6f4f3f56d113648c417e124a9b6c
                                  • Instruction ID: bde584bcc0a20163e1d20aefd562f14664055d751c7398f878511897cdc0a054
                                  • Opcode Fuzzy Hash: 00fb257517fa66d8d82df2fc559de156622b6f4f3f56d113648c417e124a9b6c
                                  • Instruction Fuzzy Hash: DFB012301042084B8100D6C8D841810F39CDB84518314C099980C47302CA23FC038580
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f4e2839fb080d70fd9d5ab266c8ff45246f4c7246a28781672dbb782ec4b6ef3
                                  • Instruction ID: cfd3c94acb28e12ede7e7a80c62375d018fe088f1f186957f4485c32e65079b3
                                  • Opcode Fuzzy Hash: f4e2839fb080d70fd9d5ab266c8ff45246f4c7246a28781672dbb782ec4b6ef3
                                  • Instruction Fuzzy Hash: 6CB092301602088F82009A59E448C0137ACAF08A0434100D0E1088B632C621F8008A51
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0ac2a0b8dd5efbac637dfe0e9304a1ebeee010c733052a918aaa461c2dd59c72
                                  • Instruction ID: c7f12192a262fdda0bcaddf001db0436b24bc0c0e925d56b253b85818bb3547c
                                  • Opcode Fuzzy Hash: 0ac2a0b8dd5efbac637dfe0e9304a1ebeee010c733052a918aaa461c2dd59c72
                                  • Instruction Fuzzy Hash: 6DC0923020A205ABDB88EB35FD56AA83B37EB41701F10866490064B1A9CF756E8ACB80
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1a5ca561d3df3dc7e0ed1f303d5d96e8a3316f9b5e03ef72b1f30c2e25292c4d
                                  • Instruction ID: c760f43e905130754be0ef3f2d01e6533433dddc39bba2742b72b0b4196346b0
                                  • Opcode Fuzzy Hash: 1a5ca561d3df3dc7e0ed1f303d5d96e8a3316f9b5e03ef72b1f30c2e25292c4d
                                  • Instruction Fuzzy Hash: B7A0223200020CCB00C03380F80B20CFBECC0E80083C02020B00C80200CE00A000208F
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5c36ab07a52d7c9644f283e21fb9d4ee5c24673dd4307e31463ccac1e075f021
                                  • Instruction ID: 0167329885b836d6a7ed9953d34cb0656f563e65dec1fd014f16f1a699e0ee50
                                  • Opcode Fuzzy Hash: 5c36ab07a52d7c9644f283e21fb9d4ee5c24673dd4307e31463ccac1e075f021
                                  • Instruction Fuzzy Hash: EA90027104460C8B55412B99780A559B75C96455157804152A50D439135E6564514599
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2555060820.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_56e0000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9b9fa95bf75f47907e1d119e89d77a7340a1e7c51a3ef565c20d6b0ade8b42a2
                                  • Instruction ID: f1d80a593b311090ee39346b3fba4acf31f6fb30ddb1cc10e34f648d3766e5bd
                                  • Opcode Fuzzy Hash: 9b9fa95bf75f47907e1d119e89d77a7340a1e7c51a3ef565c20d6b0ade8b42a2
                                  • Instruction Fuzzy Hash: BF90023104560C8B499027957449595B75CA544526B804051B54D815099A5A64544795
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7f7eee4e10b9534131c5d1fd4ce4e2acba93c62f1a82445b679baed56601a38c
                                  • Instruction ID: 485a2fa46cd5d60d5723dfdc616bc88964a28b37492062dbc5907382bc022948
                                  • Opcode Fuzzy Hash: 7f7eee4e10b9534131c5d1fd4ce4e2acba93c62f1a82445b679baed56601a38c
                                  • Instruction Fuzzy Hash:
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556620516.0000000005850000.00000040.00000800.00020000.00000000.sdmp, Offset: 05850000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5850000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 07e53d7e0922ae6498323bdd82215928c4fb39f95bf04051f7f463306041f694
                                  • Instruction ID: 25e080a55438660d22aadd53ddd5ddadcfae5b58663029ae16647b15ead2af36
                                  • Opcode Fuzzy Hash: 07e53d7e0922ae6498323bdd82215928c4fb39f95bf04051f7f463306041f694
                                  • Instruction Fuzzy Hash: 3990023149460D8B454837997949566775C95446197800151B50D625115EA568104595
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2536515159.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_f80000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 743defe21878df77622fd47d86eade013ac8e01f1930f7f908c6d1bb6fbb9a35
                                  • Instruction ID: d90cbd9ee8cc673f017eb7ac71f3ce451754cd52eadec461b6152c635ef551d7
                                  • Opcode Fuzzy Hash: 743defe21878df77622fd47d86eade013ac8e01f1930f7f908c6d1bb6fbb9a35
                                  • Instruction Fuzzy Hash: 26900231444A0C9B45542795780A695775DA5555267800051E90D425115E5565904595
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1c56ea9933f2c747c162e9d1fe7a00d7da9b06c61df48f42f0b1f7764cfd6326
                                  • Instruction ID: 906dc1b2dbee05c61732f643c353cdd9e0ca7d78be601fb3462ba17de5bb048f
                                  • Opcode Fuzzy Hash: 1c56ea9933f2c747c162e9d1fe7a00d7da9b06c61df48f42f0b1f7764cfd6326
                                  • Instruction Fuzzy Hash: 9F90023204460CDF495027A66849A99B76CA5446167904051B60D875125E65761085E5
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2556523066.0000000005840000.00000040.00000800.00020000.00000000.sdmp, Offset: 05840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5840000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a94c927fadb1763ae85303b06bac010738990169e69d580248c0cf0de922cf97
                                  • Instruction ID: a7bfcd3b51b5eb321ff720f37e0abe5be7282ca8bd4cad8cf0a97dfeb368aeae
                                  • Opcode Fuzzy Hash: a94c927fadb1763ae85303b06bac010738990169e69d580248c0cf0de922cf97
                                  • Instruction Fuzzy Hash: 5C90023105560CCB45803795B50A559BB9C95945557805055B50D415015E556410559A