Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe

Overview

General Information

Sample name:SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
Analysis ID:1472426
MD5:17f0a21c1b5f9bdf2b8a9e9df9a84a2d
SHA1:a6f6c20c424c83e760cc881d4689bfe19dfee983
SHA256:d80327695eebee6940b7a55704b4c712e22c37f5bc95f2d5d6fc83e90f87bf55
Tags:exe
Infos:

Detection

PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe (PID: 1008 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe" MD5: 17F0A21C1B5F9BDF2B8A9E9DF9A84A2D)
    • InstallUtil.exe (PID: 7600 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • powershell.exe (PID: 7776 cmdline: "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -Force MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1612352212.00000000073B0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    0000000C.00000002.1790212475.0000000005900000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000000.00000002.1604268602.00000000064C3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        0000000C.00000002.1794424955.0000000006130000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
          0000000C.00000002.1794424955.0000000006130000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            Click to see the 10 entries
            SourceRuleDescriptionAuthorStrings
            12.2.InstallUtil.exe.5900000.5.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              12.2.InstallUtil.exe.56a0000.4.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                12.2.InstallUtil.exe.6130000.6.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                  12.2.InstallUtil.exe.6130000.6.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    12.2.InstallUtil.exe.6130000.6.raw.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
                    • 0x3d14e:$s1: file:///
                    • 0x3d05c:$s2: {11111-22222-10009-11112}
                    • 0x3d0de:$s3: {11111-22222-50001-00000}
                    • 0x3b325:$s4: get_Module
                    • 0x3b63f:$s5: Reverse
                    • 0x36352:$s6: BlockCopy
                    • 0x3632c:$s7: ReadByte
                    • 0x3d160:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
                    Click to see the 6 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -Force, CommandLine: "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -Force, CommandLine|base64offset|contains: Jy, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ParentProcessId: 7600, ParentProcessName: InstallUtil.exe, ProcessCommandLine: "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -Force, ProcessId: 7776, ProcessName: powershell.exe
                    Timestamp:07/12/24-19:27:48.846342
                    SID:2856255
                    Source Port:49707
                    Destination Port:7702
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeReversingLabs: Detection: 36%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeJoe Sandbox ML: detected
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: costura.dotnetzip.pdb.compressed source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.000000000387E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1615492159.0000000007B20000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: Donexctvbl.pdb source: InstallUtil.exe, 0000000C.00000002.1779330798.0000000003C63000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1786971726.0000000005030000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.000000000387E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1615492159.0000000007B20000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: q costura.dotnetzip.pdb.compressed source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: q costura.dotnetzip.pdb.compressedlB source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdbSHA256}Lq source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: C:\projects\dotnetzip-semverd\src\Zip\obj\Release\DotNetZip.pdb source: InstallUtil.exe, 0000000C.00000002.1796341344.00000000066A0000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_01B3A164
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_01B30560
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 4x nop then jmp 034AEFDFh0_2_034AEF70
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 4x nop then jmp 034AEFDFh0_2_034AF2AB
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 4x nop then jmp 034AEFDFh0_2_034AF127
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 4x nop then jmp 034A8B64h0_2_034A89A0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_034AE8C8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_034AE8C0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 4x nop then jmp 034AEFDFh0_2_034AEF60

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2856255 ETPRO TROJAN Win32/zgRAT CnC Checkin 192.168.2.7:49707 -> 185.125.50.121:7702
                    Source: global trafficTCP traffic: 192.168.2.7:49707 -> 185.125.50.121:7702
                    Source: Joe Sandbox ViewIP Address: 185.125.50.121 185.125.50.121
                    Source: Joe Sandbox ViewASN Name: INPLATLABS-ASRU INPLATLABS-ASRU
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                    Source: powershell.exe, 0000000E.00000002.1900468046.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                    Source: powershell.exe, 0000000E.00000002.1919442840.00000000059D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 0000000E.00000002.1902619475.0000000004AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.0000000003746000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1902619475.0000000004971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 0000000E.00000002.1902619475.0000000004AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: InstallUtil.exe, 0000000C.00000002.1796341344.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003C63000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.codeplex.com/DotNetZip
                    Source: powershell.exe, 0000000E.00000002.1926776516.00000000074DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
                    Source: InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: powershell.exe, 0000000E.00000002.1902619475.0000000004971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                    Source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://archive.torproject.org/tor-package-archive/torbrowser/13.0.9/tor-expert-bundle-windows-i686-
                    Source: InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: powershell.exe, 0000000E.00000002.1919442840.00000000059D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 0000000E.00000002.1919442840.00000000059D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 0000000E.00000002.1919442840.00000000059D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: powershell.exe, 0000000E.00000002.1902619475.0000000004AC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                    Source: powershell.exe, 0000000E.00000002.1902619475.0000000004C59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                    Source: powershell.exe, 0000000E.00000002.1919442840.00000000059D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.000000000387E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                    Source: Wzxjovmfmgo.tmpdb.12.drString found in binary or memory: https://support.mozilla.org
                    Source: Wzxjovmfmgo.tmpdb.12.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                    Source: Wzxjovmfmgo.tmpdb.12.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
                    Source: InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: Wzxjovmfmgo.tmpdb.12.drString found in binary or memory: https://www.mozilla.org
                    Source: Wzxjovmfmgo.tmpdb.12.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.jXqaKJMO4ZEP
                    Source: Wzxjovmfmgo.tmpdb.12.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.NYz0wxyUaYSW
                    Source: Wzxjovmfmgo.tmpdb.12.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/gro.allizom.www.d
                    Source: Wzxjovmfmgo.tmpdb.12.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                    Source: Wzxjovmfmgo.tmpdb.12.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary

                    barindex
                    Source: 12.2.InstallUtil.exe.6130000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 12.2.InstallUtil.exe.6130000.6.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0000000C.00000002.1794424955.0000000006130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B3F0AC0_2_01B3F0AC
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B310480_2_01B31048
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B332800_2_01B33280
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B327D80_2_01B327D8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B317000_2_01B31700
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B3DCC00_2_01B3DCC0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B332700_2_01B33270
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B344980_2_01B34498
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B3A4C80_2_01B3A4C8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B387B90_2_01B387B9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B387FC0_2_01B387FC
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B387400_2_01B38740
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B386F90_2_01B386F9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B3C6200_2_01B3C620
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B3C6100_2_01B3C610
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B3690D0_2_01B3690D
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B369690_2_01B36969
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B348700_2_01B34870
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B348600_2_01B34860
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B3DCB00_2_01B3DCB0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B3DCB70_2_01B3DCB7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B34C180_2_01B34C18
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B34C080_2_01B34C08
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B33FD80_2_01B33FD8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B32E280_2_01B32E28
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_034AEF700_2_034AEF70
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_034AF2AB0_2_034AF2AB
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_034AF1270_2_034AF127
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_034AEF600_2_034AEF60
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_034A54D80_2_034A54D8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_05B691800_2_05B69180
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_05B6A3780_2_05B6A378
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_05B6962A0_2_05B6962A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_05B691710_2_05B69171
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_05B6933B0_2_05B6933B
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_05B63C800_2_05B63C80
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_05B63C5D0_2_05B63C5D
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_05B61EF80_2_05B61EF8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_05B61EE80_2_05B61EE8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_05B68A600_2_05B68A60
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_05B68A500_2_05B68A50
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_074E83380_2_074E8338
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_074EC2E00_2_074EC2E0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_074E8DA80_2_074E8DA8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_074EC6070_2_074EC607
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_074E8D9A0_2_074E8D9A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_074ED8D80_2_074ED8D8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_07558F900_2_07558F90
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_075516780_2_07551678
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_075588C80_2_075588C8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_0755BF590_2_0755BF59
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_0755BF680_2_0755BF68
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_075527FF0_2_075527FF
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_07558F800_2_07558F80
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_075516680_2_07551668
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_0755297D0_2_0755297D
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_075588B70_2_075588B7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_075BEAB80_2_075BEAB8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_075B00400_2_075B0040
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_075B00060_2_075B0006
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_0784D6E00_2_0784D6E0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_078300070_2_07830007
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_078300400_2_07830040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D7E00012_2_00D7E000
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D71AE812_2_00D71AE8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D720D812_2_00D720D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D720C812_2_00D720C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D7907012_2_00D79070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D7906112_2_00D79061
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D7201612_2_00D72016
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D726E812_2_00D726E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D7278C12_2_00D7278C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D7275E12_2_00D7275E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D7277612_2_00D72776
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D7270B12_2_00D7270B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D7273F12_2_00D7273F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D7272C12_2_00D7272C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D74B8812_2_00D74B88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D74B7812_2_00D74B78
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_00D71AE812_2_00D71AE8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_05482B4212_2_05482B42
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_05482B6012_2_05482B60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0564A9F012_2_0564A9F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_05646BAA12_2_05646BAA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0564BA2012_2_0564BA20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0568F50812_2_0568F508
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0568809812_2_05688098
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0568ED2812_2_0568ED28
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_057AF42012_2_057AF420
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_057A70A812_2_057A70A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_057A99F812_2_057A99F8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_057A70A812_2_057A70A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_057AF76812_2_057AF768
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_057A6E1812_2_057A6E18
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_057A6E1312_2_057A6E13
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_057BA55812_2_057BA558
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_057BFB5012_2_057BFB50
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_057BFB4112_2_057BFB41
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_059202C812_2_059202C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0592B45012_2_0592B450
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0592B44012_2_0592B440
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_059250D012_2_059250D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_059250C112_2_059250C1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_05AB5EA812_2_05AB5EA8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_05AB500012_2_05AB5000
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.000000000387E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.0000000003621000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000000.1240514130.00000000011CA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameavailableresearch.exeD vs SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.0000000003A55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMmndfmbaiif.exe" vs SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1615492159.0000000007B20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1610166899.00000000070A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameOzbxlxj.dll" vs SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1599814605.000000000169E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.0000000003746000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMmndfmbaiif.exe" vs SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeBinary or memory string: OriginalFilenameavailableresearch.exeD vs SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 12.2.InstallUtil.exe.6130000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 12.2.InstallUtil.exe.6130000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0000000C.00000002.1794424955.0000000006130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, -.csBase64 encoded string: 'YyB4GRwaHgtuCxUSUy1iAhdZcSp4CBQVXCAwKhwDdTd/HwA2QypuABsbSWJsCA0odixnATcWXTwwAgkoeTduHAwWXDB/FEIQVS1UIRwZVy1jVj4SRA1yHRwxQjZmJRgZVDVuVh4SRAZFDBQSCxBlCRwPfz8wPxwWVAp/HxAZV2JKCR1MVzx/MikYQzB/BBYZCz5uGSY0RSt5CBcDdDZmDBAZCwpuGT0WRDgwX0lGBG4wLAoEVTRpAQAkVSt9CAtMYzBmHRUScSp4CBQVXCBOFQkbXytuH0IVUTtuAQ8aCypmAhISRDx4GQ=='
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/25@0/1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.logJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\ff47b2f48f5e179d
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7788:120:WilError_03
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Temp\Wkycddrbzhk.tmpdbJump to behavior
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Xkynwquufkr.tmpdb.12.dr, Oyyrsh.tmpdb.12.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeReversingLabs: Detection: 36%
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -Force
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -ForceJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: napinsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: pnrpnsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wshbth.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: nlaapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winrnr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeStatic file information: File size 2519040 > 1048576
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x266600
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: costura.dotnetzip.pdb.compressed source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.000000000387E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1615492159.0000000007B20000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: Donexctvbl.pdb source: InstallUtil.exe, 0000000C.00000002.1779330798.0000000003C63000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1786971726.0000000005030000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.000000000387E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1615492159.0000000007B20000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: q costura.dotnetzip.pdb.compressed source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: q costura.dotnetzip.pdb.compressedlB source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdbSHA256}Lq source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: C:\projects\dotnetzip-semverd\src\Zip\obj\Release\DotNetZip.pdb source: InstallUtil.exe, 0000000C.00000002.1796341344.00000000066A0000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, -.cs.Net Code: _E000 System.Reflection.Assembly.Load(byte[])
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, JSONParser.cs.Net Code: _E002
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.7b20000.10.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.74f0000.9.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.74f0000.9.raw.unpack, ListDecorator.cs.Net Code: Read
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.74f0000.9.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.74f0000.9.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.74f0000.9.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.663e310.3.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.663e310.3.raw.unpack, ListDecorator.cs.Net Code: Read
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.663e310.3.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.663e310.3.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.663e310.3.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.65ee2f0.6.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.65ee2f0.6.raw.unpack, ListDecorator.cs.Net Code: Read
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.65ee2f0.6.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.65ee2f0.6.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                    Source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.65ee2f0.6.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                    Source: Yara matchFile source: 12.2.InstallUtil.exe.5900000.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.InstallUtil.exe.56a0000.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.73b0000.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.63836b0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe.64c36d0.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1612352212.00000000073B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1790212475.0000000005900000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1604268602.00000000064C3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1789052547.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1604268602.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1600699497.0000000003746000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe PID: 1008, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7600, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B389A9 push 05D0F717h; iretd 0_2_01B389AE
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_01B3689E push ecx; retf 0_2_01B3689F
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_034AB213 push eax; iretd 0_2_034AB235
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_034AB62E push esp; retf 0_2_034AB631
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_05B80D13 push eax; iretd 0_2_05B80D1D
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_07559E58 push E8FFFFFEh; ret 0_2_07559E5D
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeCode function: 0_2_07553884 pushfd ; retf 0_2_07553885
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_05647560 pushfd ; iretd 12_2_05647569
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_05642E0E push esp; retf 12_2_05642E1D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_059289C8 pushfd ; retf 12_2_059289F1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0593353F push ss; retf 12_2_05933559
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe PID: 1008, type: MEMORYSTR
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.0000000003746000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL0SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory allocated: 1B30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory allocated: 3620000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory allocated: 3490000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory allocated: 5F70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory allocated: 6F70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: D70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2860000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 4860000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 3497Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 6492Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3978Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5823Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe TID: 5256Thread sleep count: 33 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe TID: 5256Thread sleep time: -33000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe TID: 6220Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7604Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7852Thread sleep count: 3978 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7904Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7856Thread sleep count: 5823 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: outlook.office.comVMware20,11696492231s
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: AMC password management pageVMware20,11696492231
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: interactivebrokers.comVMware20,11696492231
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: outlook.office365.comVMware20,11696492231t
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: discord.comVMware20,11696492231f
                    Source: InstallUtil.exe, 0000000C.00000002.1790925499.0000000005970000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: global block list test formVMware20,11696492231
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: dev.azure.comVMware20,11696492231j
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: bankofamerica.comVMware20,11696492231x
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: tasks.office.comVMware20,11696492231o
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.0000000003746000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                    Source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: ms.portal.azure.comVMware20,11696492231
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                    Source: Mjjvrfo.tmpdb.12.drBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_05AB2DA0 LdrInitializeThunk,12_2_05AB2DA0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 4E4000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 4E6000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 6F2008Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -ForceJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 12.2.InstallUtil.exe.6130000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.InstallUtil.exe.6130000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.1794424955.0000000006130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 12.2.InstallUtil.exe.6130000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.InstallUtil.exe.6130000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.1794424955.0000000006130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumLO
                    Source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
                    Source: InstallUtil.exe, 0000000C.00000002.1790925499.00000000059BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                    Source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus Web3
                    Source: InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: EthereumLO
                    Source: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1610166899.00000000070A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: set_UseMachineKeyStore
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\monero-project\monero-coreJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Yara matchFile source: 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7600, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 12.2.InstallUtil.exe.6130000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.InstallUtil.exe.6130000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.1794424955.0000000006130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 12.2.InstallUtil.exe.6130000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.InstallUtil.exe.6130000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.1794424955.0000000006130000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts41
                    Windows Management Instrumentation
                    1
                    Scheduled Task/Job
                    311
                    Process Injection
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    131
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    1
                    Disable or Modify Tools
                    1
                    Credentials in Registry
                    1
                    Process Discovery
                    Remote Desktop Protocol1
                    Archive Collected Data
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    51
                    Virtualization/Sandbox Evasion
                    Security Account Manager51
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares2
                    Data from Local System
                    SteganographyAutomated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object Model1
                    Clipboard Data
                    Protocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
                    Obfuscated Files or Information
                    LSA Secrets34
                    System Information Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Software Packing
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    File Deletion
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe37%ReversingLabsByteCode-MSIL.Trojan.ZgRAT
                    SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://nuget.org/NuGet.exe0%URL Reputationsafe
                    https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
                    http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                    http://crl.microsoft0%URL Reputationsafe
                    http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                    https://go.micro0%URL Reputationsafe
                    https://contoso.com/License0%URL Reputationsafe
                    https://contoso.com/Icon0%URL Reputationsafe
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                    https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                    https://aka.ms/pscore6lB0%URL Reputationsafe
                    https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
                    https://stackoverflow.com/q/2152978/233540%URL Reputationsafe
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                    https://contoso.com/0%URL Reputationsafe
                    https://nuget.org/nuget.exe0%URL Reputationsafe
                    https://support.mozilla.org0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                    http://www.microsoft.0%Avira URL Cloudsafe
                    https://github.com/mgravell/protobuf-neti0%Avira URL Cloudsafe
                    https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                    http://www.codeplex.com/DotNetZip0%Avira URL Cloudsafe
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                    https://github.com/mgravell/protobuf-net0%Avira URL Cloudsafe
                    https://github.com/mgravell/protobuf-netJ0%Avira URL Cloudsafe
                    https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                    https://github.com/Pester/Pester0%Avira URL Cloudsafe
                    https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK0%Avira URL Cloudsafe
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://duckduckgo.com/chrome_newtabInstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://nuget.org/NuGet.exepowershell.exe, 0000000E.00000002.1919442840.00000000059D6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/ac/?q=InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://stackoverflow.com/q/14436606/23354SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.000000000387E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/mgravell/protobuf-netJSecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoInstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000E.00000002.1902619475.0000000004AC5000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://crl.microsoftpowershell.exe, 0000000E.00000002.1900468046.0000000002EF4000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000E.00000002.1902619475.0000000004AC5000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://go.micropowershell.exe, 0000000E.00000002.1902619475.0000000004C59000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://contoso.com/Licensepowershell.exe, 0000000E.00000002.1919442840.00000000059D6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://contoso.com/Iconpowershell.exe, 0000000E.00000002.1919442840.00000000059D6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/mgravell/protobuf-netSecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.microsoft.powershell.exe, 0000000E.00000002.1926776516.00000000074DA000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drfalse
                    • URL Reputation: safe
                    unknown
                    https://www.ecosia.org/newtab/InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drfalse
                    • URL Reputation: safe
                    unknown
                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brWzxjovmfmgo.tmpdb.12.drfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/Pester/Pesterpowershell.exe, 0000000E.00000002.1902619475.0000000004AC5000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ac.ecosia.org/autocomplete?q=InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/mgravell/protobuf-netiSecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://aka.ms/pscore6lBpowershell.exe, 0000000E.00000002.1902619475.0000000004971000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://stackoverflow.com/q/11564914/23354;SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://stackoverflow.com/q/2152978/23354SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1613456572.00000000074F0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchInstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drfalse
                    • URL Reputation: safe
                    unknown
                    https://contoso.com/powershell.exe, 0000000E.00000002.1919442840.00000000059D6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://nuget.org/nuget.exepowershell.exe, 0000000E.00000002.1919442840.00000000059D6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.codeplex.com/DotNetZipInstallUtil.exe, 0000000C.00000002.1796341344.00000000066A0000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003C63000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://support.mozilla.orgWzxjovmfmgo.tmpdb.12.drfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe, 00000000.00000002.1600699497.0000000003746000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1902619475.0000000004971000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003B09000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.1779330798.0000000003A73000.00000004.00000800.00020000.00000000.sdmp, Fgnpkry.tmpdb.12.dr, Drwspg.tmpdb.12.dr, Wkycddrbzhk.tmpdb.12.drfalse
                    • URL Reputation: safe
                    unknown
                    https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLKWzxjovmfmgo.tmpdb.12.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.125.50.121
                    unknownRussian Federation
                    207064INPLATLABS-ASRUtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1472426
                    Start date and time:2024-07-12 19:26:11 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 10m 20s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:20
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@6/25@0/1
                    EGA Information:
                    • Successful, ratio: 66.7%
                    HCA Information:
                    • Successful, ratio: 88%
                    • Number of executed functions: 413
                    • Number of non-executed functions: 32
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240s for sample based on specific behavior
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target powershell.exe, PID 7776 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenFile calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                    TimeTypeDescription
                    14:40:57API Interceptor3x Sleep call for process: SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe modified
                    14:41:17API Interceptor45x Sleep call for process: powershell.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    185.125.50.1214FkYkTt9dE.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                      SecuriteInfo.com.Trojan.DownLoaderNET.987.29728.6216.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                        SecuriteInfo.com.Win32.RATX-gen.24946.23294.exeGet hashmaliciousPureLog StealerBrowse
                          SecuriteInfo.com.Trojan.DownLoad4.16337.3540.9873.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                            SecuriteInfo.com.Win32.CrypterX-gen.8664.12357.exeGet hashmaliciousPureLog StealerBrowse
                              SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                ka0UKl7202.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  INPLATLABS-ASRU4FkYkTt9dE.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  • 185.125.50.121
                                  SecuriteInfo.com.Trojan.DownLoaderNET.987.29728.6216.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  • 185.125.50.121
                                  SecuriteInfo.com.Win32.RATX-gen.24946.23294.exeGet hashmaliciousPureLog StealerBrowse
                                  • 185.125.50.121
                                  SecuriteInfo.com.Trojan.DownLoad4.16337.3540.9873.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  • 185.125.50.121
                                  SecuriteInfo.com.Win32.CrypterX-gen.8664.12357.exeGet hashmaliciousPureLog StealerBrowse
                                  • 185.125.50.121
                                  SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  • 185.125.50.121
                                  ka0UKl7202.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                                  • 185.125.50.121
                                  https://steamcommunlty.duckdns.org/br-redeemSteamGiftCard=481928385858/IP:Get hashmaliciousUnknownBrowse
                                  • 185.125.50.1
                                  El7TD9RYMH.exeGet hashmaliciousRedLineBrowse
                                  • 185.125.50.19
                                  xqj4nAXq60.exeGet hashmaliciousRedLineBrowse
                                  • 185.125.50.19
                                  No context
                                  No context
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1338
                                  Entropy (8bit):5.3406586469525745
                                  Encrypted:false
                                  SSDEEP:24:ML9E4KlKDE4KhKiKhRAE4KzecKIE4oKNzKoZsXE4qdKqE4Kx1qE4DJE4j:MxHKlYHKh3oRAHKzectHo60H8HKx1qH1
                                  MD5:50DC251CABD311F53342E0B618D1E70B
                                  SHA1:4FA5983202E63C4D169712B21DE3963BA7F0E3EE
                                  SHA-256:6CEFB5DF8EFEBE9C1DC57D8F5BD3455839E05FA5E8A30D35FFA455D4F0263276
                                  SHA-512:3722C0EACA565AD70EC48801F628174C8E7D92E600ACC744BB2E4C3A52DB1AD378ED177C79234AD210C4CA836C21CC257B5A510EBEEAEF5C0ED1A1B1C5B3073D
                                  Malicious:false
                                  Reputation:low
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Managemen
                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):958
                                  Entropy (8bit):5.354692878444033
                                  Encrypted:false
                                  SSDEEP:24:ML9E4KlKDE4KhKiKh1E4KhZAE4KzeRE4Ks:MxHKlYHKh3o1HKPAHKzeRHKs
                                  MD5:B5989F5DD240EF83C0BFEB26FF7BB802
                                  SHA1:E90F8945BB8D603FF83B3F8AB769E00F609ABD57
                                  SHA-256:AA47F6379933C421912C1F004E3D9BBF93C0CE385494918BEBCB2B3127CF7956
                                  SHA-512:AB3307D6601A5CCD9BA77BFFDA6168D539058A8928F0EB2AA98EDFD151FF84EA8AC8836528BD8E97B158427418D6638444845386B5E085E9908CC05AB5F639A6
                                  Malicious:true
                                  Reputation:low
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\a3127677749631df61e96a8400ddcb87\System.Runtime.Serialization.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):1328
                                  Entropy (8bit):5.410015041068215
                                  Encrypted:false
                                  SSDEEP:24:3KIWSKco4KmBs4RPT6BmFoUvjKTIl+mZ9t7J0gt/NK3R8UHr+sW:xWSU4y4RQmFoULr+mZ9tK8NWR8Wa
                                  MD5:DD5BDA4BF4A160E3CA88EC7EDD9B5BAD
                                  SHA1:A9FD6BB40EF6128D6D46D33EDCF4FDCA2CC5709D
                                  SHA-256:FD2CF6E36E58F0DF2C4945AC19A9BD98D72BFB2ED7304B176577A23688775E6B
                                  SHA-512:CB49486D1AB83660ACEF8A2508F0A7BA887FB067BBD858ED34792495B5CAE51D48F20A70D83B55191F394E6DE5D7FFCA9B59AC500B71C138586D3175876C6B76
                                  Malicious:false
                                  Reputation:low
                                  Preview:@...e................................................@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.<...............i..VdqF...|...........System.Configuration4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                  Category:dropped
                                  Size (bytes):155648
                                  Entropy (8bit):0.5407252242845243
                                  Encrypted:false
                                  SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                  MD5:7B955D976803304F2C0505431A0CF1CF
                                  SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                  SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                  SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                  Category:dropped
                                  Size (bytes):98304
                                  Entropy (8bit):0.08235737944063153
                                  Encrypted:false
                                  SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                  MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                  SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                  SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                  SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):0.6732424250451717
                                  Encrypted:false
                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                  Malicious:false
                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                  Category:dropped
                                  Size (bytes):106496
                                  Entropy (8bit):1.137181696973627
                                  Encrypted:false
                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cR/k4:MnlyfnGtxnfVuSVumEHRM4
                                  MD5:2D903A087A0C793BDB82F6426B1E8EFB
                                  SHA1:E7872CC094C598B104DA25AC6C8BEB82DAB3F08F
                                  SHA-256:AD67ADF2D572EF49DC95FD1A879F3AD3E0F4103DD563E713C466A1F02D57ED9A
                                  SHA-512:90080A361F04158C4E1CCBB3DE653FFF742C29A49523B6143B0047930FC34DC0F1D043D3C1B2B759933E1685A4CB382FD9E41B7ACDD362A2217C3810AEF95E65
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                  Category:dropped
                                  Size (bytes):106496
                                  Entropy (8bit):1.137181696973627
                                  Encrypted:false
                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cR/k4:MnlyfnGtxnfVuSVumEHRM4
                                  MD5:2D903A087A0C793BDB82F6426B1E8EFB
                                  SHA1:E7872CC094C598B104DA25AC6C8BEB82DAB3F08F
                                  SHA-256:AD67ADF2D572EF49DC95FD1A879F3AD3E0F4103DD563E713C466A1F02D57ED9A
                                  SHA-512:90080A361F04158C4E1CCBB3DE653FFF742C29A49523B6143B0047930FC34DC0F1D043D3C1B2B759933E1685A4CB382FD9E41B7ACDD362A2217C3810AEF95E65
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):0.848598812124929
                                  Encrypted:false
                                  SSDEEP:24:TLVF1kwNbXYFpFNYcw+6UwcQVXH5fBODYfOg1ZAJFF0DiUhQ5de5SjhXE1:ThFawNLopFgU10XJBODqzqFF0DYde5P
                                  MD5:9664DAA86F8917816B588C715D97BE07
                                  SHA1:FAD9771763CD861ED8F3A57004C4B371422B7761
                                  SHA-256:8FED359D88F0588829BA60D236269B2528742F7F66DF3ACF22B32B8F883FE785
                                  SHA-512:E551D5CC3D5709EE00F85BB92A25DDC96112A4357DFEA3D859559D47DB30FEBD2FD36BDFA2BEC6DCA63D3E233996E9FCD2237F92CEE5B32BA8D7F2E1913B2DA9
                                  Malicious:false
                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                  Category:dropped
                                  Size (bytes):159744
                                  Entropy (8bit):0.5394293526345721
                                  Encrypted:false
                                  SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                  MD5:52701A76A821CDDBC23FB25C3FCA4968
                                  SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                  SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                  SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                  Category:dropped
                                  Size (bytes):159744
                                  Entropy (8bit):0.5394293526345721
                                  Encrypted:false
                                  SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                  MD5:52701A76A821CDDBC23FB25C3FCA4968
                                  SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                  SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                  SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                  Category:dropped
                                  Size (bytes):155648
                                  Entropy (8bit):0.5407252242845243
                                  Encrypted:false
                                  SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                  MD5:7B955D976803304F2C0505431A0CF1CF
                                  SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                  SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                  SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                  Category:dropped
                                  Size (bytes):196608
                                  Entropy (8bit):1.1215420383712111
                                  Encrypted:false
                                  SSDEEP:384:r2qOB1nxCkvSAELyKOMq+8HKkjucswRv8p3:aq+n0E9ELyKOMq+8HKkjuczRv89
                                  MD5:9A809AD8B1FDDA60760BB6253358A1DB
                                  SHA1:D7BBC6B5EF1ACF8875B36DEA141C9911BADF9F66
                                  SHA-256:95756B4CE2E462117AF93FE5E35AD0810993D31CC6666B399BEE3B336A63219A
                                  SHA-512:2680CEAA75837E374C4FB28B7A0CD1F699F2DAAE7BFB895A57FDB8D9727A83EF821F2B75B91CB53E00B75468F37DC3009582FC54F5D07B2B62F3026B0185FF73
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                  Category:dropped
                                  Size (bytes):196608
                                  Entropy (8bit):1.1215420383712111
                                  Encrypted:false
                                  SSDEEP:384:r2qOB1nxCkvSAELyKOMq+8HKkjucswRv8p3:aq+n0E9ELyKOMq+8HKkjuczRv89
                                  MD5:9A809AD8B1FDDA60760BB6253358A1DB
                                  SHA1:D7BBC6B5EF1ACF8875B36DEA141C9911BADF9F66
                                  SHA-256:95756B4CE2E462117AF93FE5E35AD0810993D31CC6666B399BEE3B336A63219A
                                  SHA-512:2680CEAA75837E374C4FB28B7A0CD1F699F2DAAE7BFB895A57FDB8D9727A83EF821F2B75B91CB53E00B75468F37DC3009582FC54F5D07B2B62F3026B0185FF73
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                  Category:dropped
                                  Size (bytes):159744
                                  Entropy (8bit):0.5394293526345721
                                  Encrypted:false
                                  SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                  MD5:52701A76A821CDDBC23FB25C3FCA4968
                                  SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                  SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                  SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                  Category:dropped
                                  Size (bytes):51200
                                  Entropy (8bit):0.8746135976761988
                                  Encrypted:false
                                  SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                  MD5:9E68EA772705B5EC0C83C2A97BB26324
                                  SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                  SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                  SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                  Malicious:false
                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):0.6732424250451717
                                  Encrypted:false
                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                  Malicious:false
                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                  Category:dropped
                                  Size (bytes):196608
                                  Entropy (8bit):1.1215420383712111
                                  Encrypted:false
                                  SSDEEP:384:r2qOB1nxCkvSAELyKOMq+8HKkjucswRv8p3:aq+n0E9ELyKOMq+8HKkjuczRv89
                                  MD5:9A809AD8B1FDDA60760BB6253358A1DB
                                  SHA1:D7BBC6B5EF1ACF8875B36DEA141C9911BADF9F66
                                  SHA-256:95756B4CE2E462117AF93FE5E35AD0810993D31CC6666B399BEE3B336A63219A
                                  SHA-512:2680CEAA75837E374C4FB28B7A0CD1F699F2DAAE7BFB895A57FDB8D9727A83EF821F2B75B91CB53E00B75468F37DC3009582FC54F5D07B2B62F3026B0185FF73
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                  Category:dropped
                                  Size (bytes):155648
                                  Entropy (8bit):0.5407252242845243
                                  Encrypted:false
                                  SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                  MD5:7B955D976803304F2C0505431A0CF1CF
                                  SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                  SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                  SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                  Category:dropped
                                  Size (bytes):106496
                                  Entropy (8bit):1.137181696973627
                                  Encrypted:false
                                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cR/k4:MnlyfnGtxnfVuSVumEHRM4
                                  MD5:2D903A087A0C793BDB82F6426B1E8EFB
                                  SHA1:E7872CC094C598B104DA25AC6C8BEB82DAB3F08F
                                  SHA-256:AD67ADF2D572EF49DC95FD1A879F3AD3E0F4103DD563E713C466A1F02D57ED9A
                                  SHA-512:90080A361F04158C4E1CCBB3DE653FFF742C29A49523B6143B0047930FC34DC0F1D043D3C1B2B759933E1685A4CB382FD9E41B7ACDD362A2217C3810AEF95E65
                                  Malicious:false
                                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):0.848598812124929
                                  Encrypted:false
                                  SSDEEP:24:TLVF1kwNbXYFpFNYcw+6UwcQVXH5fBODYfOg1ZAJFF0DiUhQ5de5SjhXE1:ThFawNLopFgU10XJBODqzqFF0DYde5P
                                  MD5:9664DAA86F8917816B588C715D97BE07
                                  SHA1:FAD9771763CD861ED8F3A57004C4B371422B7761
                                  SHA-256:8FED359D88F0588829BA60D236269B2528742F7F66DF3ACF22B32B8F883FE785
                                  SHA-512:E551D5CC3D5709EE00F85BB92A25DDC96112A4357DFEA3D859559D47DB30FEBD2FD36BDFA2BEC6DCA63D3E233996E9FCD2237F92CEE5B32BA8D7F2E1913B2DA9
                                  Malicious:false
                                  Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                  Category:dropped
                                  Size (bytes):5242880
                                  Entropy (8bit):0.03786218306281921
                                  Encrypted:false
                                  SSDEEP:192:58rJQaXoMXp0VW9FxWB2IGKhNbxrO3Dpvu2HI:58r54w0VW3xWB2ohFQ3Y2
                                  MD5:4BB4A37B8E93E9B0F5D3DF275799D45E
                                  SHA1:E27DF7CC49B0D145140C119A99C1BBAA9ECCE8F7
                                  SHA-256:89BC0F21671C244C40A9EA42893B508858AD6E1E26AC16F2BD507C3E8CBB3CF7
                                  SHA-512:F2FC9067EF11DC3B719507B97C76A19B9E976D143A2FD11474B8D2A2848A706AFCA316A95FEEBA644099497A95E1C426CDAB923D5A70619018E1543FEF3182DB
                                  Malicious:false
                                  Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                  Category:dropped
                                  Size (bytes):40960
                                  Entropy (8bit):0.8553638852307782
                                  Encrypted:false
                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                  Malicious:false
                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.9946716796175865
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                                  File size:2'519'040 bytes
                                  MD5:17f0a21c1b5f9bdf2b8a9e9df9a84a2d
                                  SHA1:a6f6c20c424c83e760cc881d4689bfe19dfee983
                                  SHA256:d80327695eebee6940b7a55704b4c712e22c37f5bc95f2d5d6fc83e90f87bf55
                                  SHA512:4cc0bf50d21d2163a6267153f6d140d4a7c8181d026bfe64600a0934ce02df68be0a70a49f0f5f02b8a47766652040dfedc86ab2e912d11a198d53ffad6ccd5a
                                  SSDEEP:49152:B8HJt7IakaekGdTCraWHyewqy2VdgWp1mh6MJTkbe3zEHVe8Zc:+E91CraWHy5m+TkIw1
                                  TLSH:5EC53316D2CD2B30DBE803F88AB59480137166AFAD23CCD22DC535267626BD58367E77
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.................f&...........&.. ........@.. ........................&...........`................................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x6685de
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x668EBADC [Wed Jul 10 16:46:20 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x2685900x4b.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x26a0000x600.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x26c0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x2665e40x266600a38e39f3229ba8ae5e915b4501c4b70bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x26a0000x6000x6002a4232e564dae63d69cbbcd9f8bb2718False0.4205729166666667data4.167208850699858IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x26c0000xc0x2008751057ba894039341c73eac855a4249False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0x26a0900x35cdata0.40232558139534885
                                  RT_MANIFEST0x26a3fc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  07/12/24-19:27:48.846342TCP2856255ETPRO TROJAN Win32/zgRAT CnC Checkin497077702192.168.2.7185.125.50.121
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 12, 2024 19:27:43.810522079 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:43.820980072 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:43.821063042 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:48.841346979 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:48.846278906 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:48.846342087 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:48.851250887 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.118328094 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.118405104 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.118442059 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.118475914 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.118513107 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.118536949 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.118546963 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.118565083 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.118599892 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.118612051 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.118648052 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.118691921 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.118700981 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.118731022 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.118773937 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.123661041 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.173094034 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.200061083 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.200102091 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.200267076 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.204392910 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.204521894 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.204555988 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.204577923 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.204710960 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.204761028 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.204763889 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.208985090 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.209036112 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.209100962 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.209204912 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.209255934 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.214297056 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.214354992 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.214389086 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.214402914 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.220037937 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.220072985 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.220099926 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.220108032 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.220160961 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.225718975 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.225754023 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.225786924 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.225796938 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.231390953 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.231446981 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.231447935 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.231482029 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.231533051 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.237035990 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.237066984 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.237118959 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.237124920 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.237154961 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.237196922 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.242958069 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.242991924 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.243029118 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.243053913 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.248625040 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.248672009 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.251792908 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.286879063 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.286910057 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.286920071 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.286933899 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.286964893 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.291254997 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.291318893 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.291328907 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.291356087 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.291472912 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.291520119 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.291587114 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.291771889 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.291809082 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.291816950 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.296119928 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.296163082 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.296190977 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.296201944 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.296252012 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.301975965 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.302058935 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.302069902 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.302098989 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.307667017 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.307707071 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.307719946 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.307730913 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.307768106 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.313998938 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.314023018 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.314034939 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.314070940 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.319087982 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.319134951 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.319140911 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.319153070 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.319190979 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.340548038 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.340584040 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.340595961 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.340606928 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.340636969 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.340667963 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.340768099 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.340780020 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.340792894 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.340801954 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.340832949 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.340859890 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.342123985 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.342178106 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.342190981 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.342219114 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.346474886 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.346520901 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.346532106 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.346544027 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.346584082 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.349941969 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.350035906 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.350047112 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.350094080 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.354597092 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.354615927 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.354625940 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.354650974 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.354667902 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.359232903 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.359244108 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.359250069 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.359308958 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.364553928 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.364573956 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.364583015 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.364628077 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.364660025 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.368489981 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.368906021 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.368957996 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.373640060 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.373701096 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.373712063 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.373749018 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.373790979 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.373836040 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.377892971 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.378101110 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.378154993 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.378987074 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.379075050 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.379122019 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.380110979 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.380167961 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.380179882 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.380206108 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.382983923 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.382997990 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.383008957 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.383035898 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.383068085 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.385271072 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.385328054 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.385339975 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.385379076 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.387936115 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.387984991 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.388020992 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.388031006 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.388067007 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.388070107 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.391098022 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.391108990 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.391118050 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.391148090 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.391169071 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.393503904 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.393568039 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.393578053 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.393611908 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.396246910 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.396264076 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.396272898 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.396296978 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.396310091 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.399149895 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.399161100 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.399169922 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.399199009 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.401664019 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.401710987 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.401721001 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.401731968 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.401767969 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.406017065 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.406047106 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.406055927 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.406090021 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.411633968 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.411681890 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.411696911 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.411708117 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.411742926 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.411778927 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.412000895 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.412014008 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.412046909 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.417366028 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.417418957 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.417470932 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.417484045 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.417527914 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.417553902 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.417788982 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.417831898 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.422841072 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.422909975 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.422919035 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.422954082 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.423978090 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.424021959 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.424048901 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.424058914 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.424096107 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.428395033 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.428446054 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.428456068 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.428491116 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.429302931 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.429347992 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.429361105 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.429372072 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.429409981 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.432389975 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.442219019 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:49.447604895 CEST770249707185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:49.447674036 CEST497077702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:51.995807886 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:52.001827955 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:52.001924992 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.024111986 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.024111986 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.031244040 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.031282902 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.031292915 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.031300068 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.031305075 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.031316042 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.031333923 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.031338930 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.031358004 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.031380892 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.031852961 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.031871080 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.031878948 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.031898022 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.031913996 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.031932116 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.032305956 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.032378912 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.037504911 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.037553072 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.037561893 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.037570000 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.037600994 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.037600994 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.037643909 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.037656069 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.037695885 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.037699938 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.037734985 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.039006948 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.039084911 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:57.042702913 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.042998075 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.044173002 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:57.044514894 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.034445047 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:58.044037104 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.044207096 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:58.052536011 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.297636032 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:58.297816992 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:58.297888994 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:58.302829981 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.302845001 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.302853107 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.302861929 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.302870989 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.302918911 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:58.302957058 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:58.303057909 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303097010 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303105116 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303112984 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303121090 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303129911 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303139925 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303148031 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303154945 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303164005 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303172112 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303179979 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303352118 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303359985 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303369045 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303376913 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303533077 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303540945 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303550959 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303559065 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303566933 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303575993 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.303582907 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.304529905 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.304538965 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.307979107 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.307986975 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.307993889 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.307997942 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.308542967 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.308551073 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.360491991 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:58.538759947 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.538800955 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.538935900 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:58.539983034 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.539997101 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.540009975 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.540021896 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.540035963 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.540047884 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.540548086 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.540555954 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.540565014 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.540572882 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.540580988 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.540590048 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.540596962 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.541131020 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.541171074 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.541178942 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.541187048 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.541193962 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.541202068 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.541210890 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.541218042 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.541659117 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.541667938 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.541675091 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:58.544574022 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:59.590142012 CEST770249708185.125.50.121192.168.2.7
                                  Jul 12, 2024 19:27:59.590337038 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:59.596548080 CEST497087702192.168.2.7185.125.50.121
                                  Jul 12, 2024 19:27:59.601463079 CEST770249708185.125.50.121192.168.2.7

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:13:27:06
                                  Start date:12/07/2024
                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.MSILHeracles.172068.27755.23666.exe"
                                  Imagebase:0xf60000
                                  File size:2'519'040 bytes
                                  MD5 hash:17F0A21C1B5F9BDF2B8A9E9DF9A84A2D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1612352212.00000000073B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1604268602.00000000064C3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1604268602.0000000005F71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1600699497.0000000003746000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:12
                                  Start time:14:41:00
                                  Start date:12/07/2024
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                  Imagebase:0x510000
                                  File size:42'064 bytes
                                  MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000C.00000002.1790212475.0000000005900000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: 0000000C.00000002.1794424955.0000000006130000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000C.00000002.1794424955.0000000006130000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 0000000C.00000002.1794424955.0000000006130000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000C.00000002.1789052547.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.1771632786.0000000002861000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:14
                                  Start time:14:41:16
                                  Start date:12/07/2024
                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):true
                                  Commandline:"powershell" Start-Sleep -Seconds 10; Remove-Item -Path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' -Force
                                  Imagebase:0x220000
                                  File size:433'152 bytes
                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:15
                                  Start time:14:41:16
                                  Start date:12/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff75da10000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:11.5%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:6.3%
                                    Total number of Nodes:413
                                    Total number of Limit Nodes:46
                                    execution_graph 55890 74e7b8e 55891 74e7b98 55890->55891 55895 75571f1 55891->55895 55901 7557200 55891->55901 55892 74e7bd6 55896 7557200 55895->55896 55907 7557231 55896->55907 55911 7557363 55896->55911 55915 7557240 55896->55915 55897 755722b 55897->55892 55902 7557215 55901->55902 55904 7557231 10 API calls 55902->55904 55905 7557240 10 API calls 55902->55905 55906 7557363 10 API calls 55902->55906 55903 755722b 55903->55892 55904->55903 55905->55903 55906->55903 55909 7557240 55907->55909 55908 75572ac 55908->55897 55909->55908 55919 7558868 55909->55919 55913 7557297 55911->55913 55912 75572ac 55912->55897 55913->55912 55914 7558868 10 API calls 55913->55914 55914->55913 55917 755726a 55915->55917 55916 75572ac 55916->55897 55917->55916 55918 7558868 10 API calls 55917->55918 55918->55917 55920 755888d 55919->55920 55924 75588b7 55920->55924 55928 75588c8 55920->55928 55921 75588af 55921->55909 55926 75588c8 55924->55926 55925 7558942 55925->55921 55926->55925 55932 7558f31 55926->55932 55930 75588f5 55928->55930 55929 7558942 55929->55921 55930->55929 55931 7558f31 10 API calls 55930->55931 55931->55930 55933 7558f55 55932->55933 55971 7559a14 55933->55971 55975 7559354 55933->55975 55979 75598ea 55933->55979 55983 75595ea 55933->55983 55988 7559169 55933->55988 55992 75597e9 55933->55992 55996 7559929 55933->55996 56003 7559a6e 55933->56003 56010 75596af 55933->56010 56015 75591a3 55933->56015 56024 7559960 55933->56024 56031 75595a1 55933->56031 56035 7559538 55933->56035 56039 7559ef9 55933->56039 56043 75591bd 55933->56043 56047 7559771 55933->56047 56051 7559f34 55933->56051 56055 7559d8a 55933->56055 56059 755948a 55933->56059 56064 75594cb 55933->56064 56069 7559b0f 55933->56069 56073 7559acd 55933->56073 56077 755918d 55933->56077 56081 7559c02 55933->56081 56085 7558f80 55933->56085 56089 7559240 55933->56089 56097 7559484 55933->56097 56102 755989b 55933->56102 56106 7559398 55933->56106 56110 755925e 55933->56110 56116 7558f90 55933->56116 56120 7559a91 55933->56120 56124 7559ed6 55933->56124 56128 7559cd6 55933->56128 56133 7559b57 55933->56133 56140 75599d4 55933->56140 55934 7558f77 55934->55926 55973 755901d 55971->55973 55972 7559111 55972->55934 55973->55972 56144 755b699 55973->56144 55977 755901d 55975->55977 55976 7559111 55976->55934 55977->55976 55978 755b699 2 API calls 55977->55978 55978->55977 55981 755901d 55979->55981 55980 7559111 55980->55934 55981->55980 55982 755b699 2 API calls 55981->55982 55982->55981 55984 75595f7 55983->55984 55985 7559489 55983->55985 55985->55983 56157 755b878 55985->56157 56162 755b888 55985->56162 55990 755901d 55988->55990 55989 7559111 55989->55934 55990->55989 55991 755b699 2 API calls 55990->55991 55991->55990 55994 755901d 55992->55994 55993 7559111 55993->55934 55994->55993 55995 755b699 2 API calls 55994->55995 55995->55994 55997 7559b7d 55996->55997 56167 755b6f8 55997->56167 56172 755b6e8 55997->56172 55998 7559111 55998->55934 55999 755901d 55999->55998 56002 755b699 2 API calls 55999->56002 56002->55999 56004 7559a78 56003->56004 56007 755b6f8 2 API calls 56004->56007 56008 755b6e8 2 API calls 56004->56008 56005 7559111 56005->55934 56006 755901d 56006->56005 56009 755b699 2 API calls 56006->56009 56007->56006 56008->56006 56009->56006 56011 75596b1 56010->56011 56185 755a440 56011->56185 56191 755a430 56011->56191 56012 75596e9 56016 75594f1 56015->56016 56017 75591b0 56015->56017 56220 755b750 56016->56220 56225 755b740 56016->56225 56017->56016 56020 755901d 56017->56020 56018 755950f 56018->55934 56019 7559111 56019->55934 56020->56019 56023 755b699 2 API calls 56020->56023 56023->56020 56025 7559970 56024->56025 56027 755901d 56024->56027 56028 755b750 2 API calls 56025->56028 56029 755b740 2 API calls 56025->56029 56026 7559111 56026->55934 56027->56026 56030 755b699 2 API calls 56027->56030 56028->56027 56029->56027 56030->56027 56032 755901d 56031->56032 56033 7559111 56032->56033 56034 755b699 2 API calls 56032->56034 56033->55934 56034->56032 56037 755901d 56035->56037 56036 7559111 56036->55934 56037->56036 56038 755b699 2 API calls 56037->56038 56038->56037 56041 755901d 56039->56041 56040 7559111 56040->55934 56041->56040 56042 755b699 2 API calls 56041->56042 56042->56041 56045 755901d 56043->56045 56044 7559111 56044->55934 56045->56044 56046 755b699 2 API calls 56045->56046 56046->56045 56048 755901d 56047->56048 56049 7559111 56048->56049 56050 755b699 2 API calls 56048->56050 56049->55934 56050->56048 56053 755901d 56051->56053 56052 7559111 56052->55934 56053->56052 56054 755b699 2 API calls 56053->56054 56054->56053 56056 755901d 56055->56056 56057 7559111 56056->56057 56058 755b699 2 API calls 56056->56058 56057->55934 56058->56056 56062 755b878 2 API calls 56059->56062 56063 755b888 2 API calls 56059->56063 56060 7559489 56060->56059 56061 75595f7 56060->56061 56062->56060 56063->56060 56065 75594d5 56064->56065 56067 755b750 2 API calls 56065->56067 56068 755b740 2 API calls 56065->56068 56066 755950f 56066->55934 56067->56066 56068->56066 56071 755901d 56069->56071 56070 7559111 56070->55934 56071->56070 56072 755b699 2 API calls 56071->56072 56072->56071 56075 755901d 56073->56075 56074 7559111 56074->55934 56075->56074 56076 755b699 2 API calls 56075->56076 56076->56075 56079 755901d 56077->56079 56078 7559111 56078->55934 56079->56078 56080 755b699 2 API calls 56079->56080 56080->56079 56082 755901d 56081->56082 56083 7559111 56082->56083 56084 755b699 2 API calls 56082->56084 56083->55934 56084->56082 56087 7558f90 56085->56087 56086 7559111 56086->55934 56087->56086 56088 755b699 2 API calls 56087->56088 56088->56087 56090 7559cfc 56089->56090 56093 755901d 56089->56093 56238 34ad599 56090->56238 56242 34ad5a0 56090->56242 56091 7559d11 56091->55934 56092 7559111 56092->55934 56093->56092 56096 755b699 2 API calls 56093->56096 56096->56093 56098 7559cfd 56097->56098 56100 34ad599 ResumeThread 56098->56100 56101 34ad5a0 ResumeThread 56098->56101 56099 7559d11 56099->55934 56100->56099 56101->56099 56104 755901d 56102->56104 56103 7559111 56103->55934 56104->56103 56105 755b699 2 API calls 56104->56105 56105->56104 56108 755901d 56106->56108 56107 7559111 56107->55934 56108->56107 56109 755b699 2 API calls 56108->56109 56109->56108 56113 755b750 2 API calls 56110->56113 56114 755b740 2 API calls 56110->56114 56111 7559111 56111->55934 56112 755901d 56112->56111 56115 755b699 2 API calls 56112->56115 56113->56112 56114->56112 56115->56112 56117 7558fc3 56116->56117 56118 7559111 56117->56118 56119 755b699 2 API calls 56117->56119 56118->55934 56119->56117 56122 755901d 56120->56122 56121 7559111 56121->55934 56122->56121 56123 755b699 2 API calls 56122->56123 56123->56122 56125 755901d 56124->56125 56126 7559111 56125->56126 56127 755b699 2 API calls 56125->56127 56126->55934 56127->56125 56129 7559ce0 56128->56129 56131 34ad599 ResumeThread 56129->56131 56132 34ad5a0 ResumeThread 56129->56132 56130 7559d11 56130->55934 56131->56130 56132->56130 56134 7559b61 56133->56134 56137 755b6f8 2 API calls 56134->56137 56138 755b6e8 2 API calls 56134->56138 56135 7559111 56135->55934 56136 755901d 56136->56135 56139 755b699 2 API calls 56136->56139 56137->56136 56138->56136 56139->56136 56141 755901d 56140->56141 56142 7559111 56141->56142 56143 755b699 2 API calls 56141->56143 56142->55934 56143->56141 56145 755b6a5 56144->56145 56149 34ac8c8 56145->56149 56153 34ac8c1 56145->56153 56146 755b6d6 56146->55973 56150 34ac911 Wow64SetThreadContext 56149->56150 56152 34ac989 56150->56152 56152->56146 56154 34ac911 Wow64SetThreadContext 56153->56154 56156 34ac989 56154->56156 56156->56146 56158 755b89d 56157->56158 56160 34ac8c8 Wow64SetThreadContext 56158->56160 56161 34ac8c1 Wow64SetThreadContext 56158->56161 56159 755b8b6 56159->55985 56160->56159 56161->56159 56163 755b89d 56162->56163 56165 34ac8c8 Wow64SetThreadContext 56163->56165 56166 34ac8c1 Wow64SetThreadContext 56163->56166 56164 755b8b6 56164->55985 56165->56164 56166->56164 56168 755b70d 56167->56168 56177 34acf48 56168->56177 56181 34acf40 56168->56181 56169 755b72f 56169->55999 56173 755b70d 56172->56173 56175 34acf48 VirtualAllocEx 56173->56175 56176 34acf40 VirtualAllocEx 56173->56176 56174 755b72f 56174->55999 56175->56174 56176->56174 56178 34acf8c VirtualAllocEx 56177->56178 56180 34ad004 56178->56180 56180->56169 56182 34acf8c VirtualAllocEx 56181->56182 56184 34ad004 56182->56184 56184->56169 56186 755a457 56185->56186 56187 755a479 56186->56187 56197 755a617 56186->56197 56202 755a70f 56186->56202 56207 755a673 56186->56207 56187->56012 56192 755a457 56191->56192 56193 755a479 56192->56193 56194 755a617 2 API calls 56192->56194 56195 755a673 2 API calls 56192->56195 56196 755a70f 2 API calls 56192->56196 56193->56012 56194->56193 56195->56193 56196->56193 56198 755a620 56197->56198 56212 34ac518 56198->56212 56216 34ac50d 56198->56216 56203 755a69b 56202->56203 56205 34ac518 CreateProcessA 56203->56205 56206 34ac50d CreateProcessA 56203->56206 56204 755ad6b 56205->56204 56206->56204 56208 755a69b 56207->56208 56210 34ac518 CreateProcessA 56208->56210 56211 34ac50d CreateProcessA 56208->56211 56209 755ad6b 56210->56209 56211->56209 56214 34ac598 CreateProcessA 56212->56214 56215 34ac794 56214->56215 56217 34ac598 CreateProcessA 56216->56217 56219 34ac794 56217->56219 56221 755b765 56220->56221 56230 34ad201 56221->56230 56234 34ad208 56221->56234 56222 755b787 56222->56018 56226 755b765 56225->56226 56228 34ad208 WriteProcessMemory 56226->56228 56229 34ad201 WriteProcessMemory 56226->56229 56227 755b787 56227->56018 56228->56227 56229->56227 56231 34ad251 WriteProcessMemory 56230->56231 56233 34ad2ea 56231->56233 56233->56222 56235 34ad251 WriteProcessMemory 56234->56235 56237 34ad2ea 56235->56237 56237->56222 56239 34ad5e4 ResumeThread 56238->56239 56241 34ad630 56239->56241 56241->56091 56243 34ad5e4 ResumeThread 56242->56243 56245 34ad630 56243->56245 56245->56091 55718 74e76cf 55719 74e76d9 55718->55719 55723 34aeb18 55719->55723 55729 34aeb28 55719->55729 55720 74e71f9 55724 34aeb28 55723->55724 55735 34af127 55724->55735 55739 34aef70 55724->55739 55743 34aef60 55724->55743 55725 34aeb53 55725->55720 55730 34aeb3d 55729->55730 55732 34aef60 10 API calls 55730->55732 55733 34aef70 10 API calls 55730->55733 55734 34af127 10 API calls 55730->55734 55731 34aeb53 55731->55720 55732->55731 55733->55731 55734->55731 55737 34aefca 55735->55737 55736 34aefdf 55736->55725 55737->55736 55747 34af432 55737->55747 55741 34aef9a 55739->55741 55740 34aefdf 55740->55725 55741->55740 55742 34af432 10 API calls 55741->55742 55742->55741 55744 34aef65 55743->55744 55745 34aefdf 55744->55745 55746 34af432 10 API calls 55744->55746 55745->55725 55746->55744 55748 34af44d 55747->55748 55755 34af466 55748->55755 55757 75504c4 55748->55757 55761 7550bdb 55748->55761 55766 7550d39 55748->55766 55771 755035e 55748->55771 55777 75508bf 55748->55777 55785 755014f 55748->55785 55789 755078d 55748->55789 55755->55737 55795 34ae395 55757->55795 55799 34ae3a0 55757->55799 55762 7550bf2 55761->55762 55803 34adc48 55762->55803 55807 34adc50 55762->55807 55763 7550c18 55767 75508c7 55766->55767 55768 7550136 55766->55768 55767->55766 55811 34ae150 55767->55811 55815 34ae145 55767->55815 55772 755045a 55771->55772 55774 7550136 55771->55774 55819 75513cf 55772->55819 55824 75513e0 55772->55824 55773 755046d 55773->55755 55778 75508c5 55777->55778 55779 75508c7 55778->55779 55783 34ae150 CreateFileA 55778->55783 55784 34ae145 CreateFileA 55778->55784 55780 7550136 55779->55780 55781 34ae150 CreateFileA 55779->55781 55782 34ae145 CreateFileA 55779->55782 55781->55779 55782->55779 55783->55779 55784->55779 55837 75511f2 55785->55837 55842 75511f8 55785->55842 55786 7550136 55790 7550797 55789->55790 55791 755045b 55789->55791 55793 75513e0 2 API calls 55791->55793 55794 75513cf 2 API calls 55791->55794 55792 755046d 55792->55755 55793->55792 55794->55792 55796 34ae402 CreateFileMappingA 55795->55796 55798 34ae4e8 55796->55798 55801 34ae402 55799->55801 55800 34ae4a6 CreateFileMappingA 55802 34ae4e8 55800->55802 55801->55800 55801->55801 55804 34adc99 K32GetModuleInformation 55803->55804 55806 34add06 55804->55806 55806->55763 55808 34adc99 K32GetModuleInformation 55807->55808 55810 34add06 55808->55810 55810->55763 55813 34ae1b2 55811->55813 55812 34ae25e CreateFileA 55814 34ae2a6 55812->55814 55813->55812 55813->55813 55817 34ae1b2 CreateFileA 55815->55817 55818 34ae2a6 55817->55818 55820 75513f5 55819->55820 55829 34ac108 55820->55829 55833 34ac110 55820->55833 55821 755140b 55821->55773 55825 75513f5 55824->55825 55827 34ac108 FindCloseChangeNotification 55825->55827 55828 34ac110 FindCloseChangeNotification 55825->55828 55826 755140b 55826->55773 55827->55826 55828->55826 55830 34ac154 FindCloseChangeNotification 55829->55830 55832 34ac1a0 55830->55832 55832->55821 55834 34ac154 FindCloseChangeNotification 55833->55834 55836 34ac1a0 55834->55836 55836->55821 55838 755120d 55837->55838 55847 34ae5d8 55838->55847 55851 34ae5e0 55838->55851 55839 755122f 55839->55786 55843 755120d 55842->55843 55845 34ae5d8 MapViewOfFile 55843->55845 55846 34ae5e0 MapViewOfFile 55843->55846 55844 755122f 55844->55786 55845->55844 55846->55844 55848 34ae624 MapViewOfFile 55847->55848 55850 34ae69c 55848->55850 55850->55839 55852 34ae624 MapViewOfFile 55851->55852 55854 34ae69c 55852->55854 55854->55839 55859 1b30a00 55860 1b30a22 55859->55860 55865 1b3056c 55860->55865 55863 1b3056c VirtualProtect 55864 1b30d10 55863->55864 55866 1b3a328 VirtualProtect 55865->55866 55868 1b30ca5 55866->55868 55868->55863 55869 1aad01c 55870 1aad034 55869->55870 55871 1aad08f 55870->55871 55873 75bdbe0 55870->55873 55874 75bdc39 55873->55874 55877 75be170 55874->55877 55875 75bdc6e 55878 75be19d 55877->55878 55881 75be333 55878->55881 55882 75bd370 55878->55882 55881->55875 55884 75bd397 55882->55884 55886 75bd4f8 55884->55886 55887 75bd541 VirtualProtect 55886->55887 55889 75bd454 55887->55889 55889->55875 55855 75be6c0 55856 75be704 VirtualAlloc 55855->55856 55858 75be771 55856->55858 56246 1b3c4f8 56247 1b3c515 56246->56247 56249 1b3c525 56247->56249 56251 75b1b4b 56247->56251 56254 75b3572 56247->56254 56253 75bd370 VirtualProtect 56251->56253 56252 75b1b69 56253->56252 56257 75bd370 VirtualProtect 56254->56257 56255 75b359d 56256 75b2fc6 56256->56254 56256->56255 56257->56256
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,q$4$$q$$q$$q$$q$$q$$q$$q$$q$$q$$q
                                    • API String ID: 0-2072453518
                                    • Opcode ID: d7c40057673f3b8a2e2aef6ac17b62137c52589094bec9ede15c6c91861cf26b
                                    • Instruction ID: 2984dd3297988c0a4624f84392de6566cece3f01ed84c41a1f0ec119e1312a65
                                    • Opcode Fuzzy Hash: d7c40057673f3b8a2e2aef6ac17b62137c52589094bec9ede15c6c91861cf26b
                                    • Instruction Fuzzy Hash: 0EB20874A00219DFDB14CFA4C994BAEB7B6BF48311F14859AE505AB3A4DB71EC81CF60
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,q$4$$q$$q$$q$$q
                                    • API String ID: 0-3956183810
                                    • Opcode ID: d88fa47d336d4a2e8c342d17b142e8e7d5ba0fad089bc14df529b56065fd1533
                                    • Instruction ID: 315e931a40ce5780e3d1625469e88b1e064e89f8034ab7718ab637b5e23b1165
                                    • Opcode Fuzzy Hash: d88fa47d336d4a2e8c342d17b142e8e7d5ba0fad089bc14df529b56065fd1533
                                    • Instruction Fuzzy Hash: 0222EBB4A00219CFDB24CF64C994BADB7B5BF48311F14819AD509AB3A5DB31ED81CF60

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 628 75beab8-75bead9 629 75beadb 628->629 630 75beae0-75bebc7 628->630 629->630 632 75bf2c9-75bf2f1 630->632 633 75bebcd-75bed0e 630->633 636 75bf96d-75bf976 632->636 677 75bf292-75bf2bc 633->677 678 75bed14-75bed6f 633->678 638 75bf2ff-75bf309 636->638 639 75bf97c-75bf993 636->639 640 75bf30b 638->640 641 75bf310-75bf404 638->641 640->641 660 75bf42e 641->660 661 75bf406-75bf412 641->661 662 75bf434-75bf454 660->662 663 75bf41c-75bf422 661->663 664 75bf414-75bf41a 661->664 668 75bf456-75bf4af 662->668 669 75bf4b4-75bf534 662->669 666 75bf42c 663->666 664->666 666->662 683 75bf96a 668->683 691 75bf58b-75bf5ce 669->691 692 75bf536-75bf589 669->692 688 75bf2be 677->688 689 75bf2c6 677->689 685 75bed71 678->685 686 75bed74-75bed7f 678->686 683->636 685->686 690 75bf1a7-75bf1ad 686->690 688->689 689->632 693 75bf1b3-75bf22f call 75bce40 690->693 694 75bed84-75beda2 690->694 714 75bf5d9-75bf5e2 691->714 692->714 735 75bf27c-75bf282 693->735 695 75bedf9-75bee0e 694->695 696 75beda4-75beda8 694->696 699 75bee10 695->699 700 75bee15-75bee2b 695->700 696->695 701 75bedaa-75bedb5 696->701 699->700 704 75bee2d 700->704 705 75bee32-75bee49 700->705 706 75bedeb-75bedf1 701->706 704->705 708 75bee4b 705->708 709 75bee50-75bee66 705->709 710 75bedf3-75bedf4 706->710 711 75bedb7-75bedbb 706->711 708->709 717 75bee68 709->717 718 75bee6d-75bee74 709->718 713 75bee77-75beee2 710->713 715 75bedbd 711->715 716 75bedc1-75bedd9 711->716 724 75beef6-75bf0ab 713->724 725 75beee4-75beef0 713->725 721 75bf642-75bf651 714->721 715->716 722 75beddb 716->722 723 75bede0-75bede8 716->723 717->718 718->713 727 75bf653-75bf6db 721->727 728 75bf5e4-75bf60c 721->728 722->723 723->706 733 75bf10f-75bf124 724->733 734 75bf0ad-75bf0b1 724->734 725->724 765 75bf806-75bf812 727->765 731 75bf60e 728->731 732 75bf613-75bf63c 728->732 731->732 732->721 741 75bf12b-75bf14c 733->741 742 75bf126 733->742 734->733 737 75bf0b3-75bf0c2 734->737 739 75bf231-75bf279 call 75bd2f0 * 2 735->739 740 75bf284-75bf28a 735->740 746 75bf101-75bf107 737->746 739->735 740->677 743 75bf14e 741->743 744 75bf153-75bf172 741->744 742->741 743->744 748 75bf179-75bf199 744->748 749 75bf174 744->749 751 75bf109-75bf10a 746->751 752 75bf0c4-75bf0c8 746->752 757 75bf19b 748->757 758 75bf1a0 748->758 749->748 760 75bf1a4 751->760 755 75bf0ca-75bf0ce 752->755 756 75bf0d2-75bf0f3 752->756 755->756 761 75bf0fa-75bf0fe 756->761 762 75bf0f5 756->762 757->758 758->760 760->690 761->746 762->761 767 75bf818-75bf864 765->767 768 75bf6e0-75bf6e9 765->768 777 75bf88c-75bf8a7 767->777 778 75bf866-75bf88a 767->778 769 75bf6eb 768->769 770 75bf6f2-75bf7fa 768->770 769->770 771 75bf6f8-75bf729 769->771 772 75bf72e-75bf75f 769->772 773 75bf797-75bf7c8 769->773 774 75bf764-75bf795 769->774 781 75bf800 770->781 771->781 772->781 773->781 774->781 783 75bf8b0-75bf934 777->783 778->783 781->765 787 75bf93b-75bf95b 783->787 787->683
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614145123.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_75b0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q$TJq$Teq$pq$xbq
                                    • API String ID: 0-4142780942
                                    • Opcode ID: 5e7a3b11a2df0890d39b445ec1a97f0b5e6740930b48a0ff9a8764a5ba9a558b
                                    • Instruction ID: 2082d746481889dd0e40aa0f8588129270e18b7fefb9724671ea7b23953892c4
                                    • Opcode Fuzzy Hash: 5e7a3b11a2df0890d39b445ec1a97f0b5e6740930b48a0ff9a8764a5ba9a558b
                                    • Instruction Fuzzy Hash: ACA2A175A00628DFDB65CF69C984AD9BBB2FF89300F1581E9D509AB361DB319E81CF40

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 789 1b3690d-1b36991 791 1b36993 789->791 792 1b36998-1b369b6 789->792 791->792 793 1b369b8 792->793 794 1b369bd-1b36c62 792->794 793->794 800 1b36c64 794->800 801 1b36c69-1b36c8b 794->801 800->801 803 1b36cc7-1b36cda 801->803 804 1b36c8d-1b36cbe 801->804 803->804 805 1b36cdc-1b36db0 803->805 804->803 806 1b36cc0 804->806 805->804 806->805 807 1b36df6-1b37040 806->807 808 1b36db5-1b36df1 806->808 839 1b37042 807->839 840 1b37047 807->840 808->804 839->840 841 1b37050-1b37379 840->841 863 1b37380-1b37532 841->863 864 1b3737b 841->864 877 1b37534 863->877 878 1b37539-1b37733 863->878 864->863 877->878 891 1b37735 878->891 892 1b3773a-1b378fd 878->892 891->892 905 1b37904-1b386d1 892->905 906 1b378ff 892->906 905->804 906->905
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: TJq$XZbi$$q$$q
                                    • API String ID: 0-1732113240
                                    • Opcode ID: d2fbf48de5b712c897142653f4a935fd3b4b0c40a8eb964bb3f5bf9db27c874b
                                    • Instruction ID: 1ef71c1fa8b6efc0ba813653f5f90a22accf302a3c8b83baf3dcf199d5ec10d2
                                    • Opcode Fuzzy Hash: d2fbf48de5b712c897142653f4a935fd3b4b0c40a8eb964bb3f5bf9db27c874b
                                    • Instruction Fuzzy Hash: 0813C27A600114EFDB168F94C944E95BBB2FF8C314F1A81D4E6099B276C736E9A1EF10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1012 1b36969-1b36c62 1018 1b36c64 1012->1018 1019 1b36c69-1b36c8b 1012->1019 1018->1019 1021 1b36cc7-1b36cda 1019->1021 1022 1b36c8d-1b36cbe 1019->1022 1021->1022 1023 1b36cdc-1b36db0 1021->1023 1022->1021 1024 1b36cc0 1022->1024 1023->1022 1024->1023 1025 1b36df6-1b37040 1024->1025 1026 1b36db5-1b36df1 1024->1026 1057 1b37042 1025->1057 1058 1b37047 1025->1058 1026->1022 1057->1058 1059 1b37050-1b37379 1058->1059 1081 1b37380-1b37532 1059->1081 1082 1b3737b 1059->1082 1095 1b37534 1081->1095 1096 1b37539-1b37733 1081->1096 1082->1081 1095->1096 1109 1b37735 1096->1109 1110 1b3773a-1b378fd 1096->1110 1109->1110 1123 1b37904-1b386d1 1110->1123 1124 1b378ff 1110->1124 1123->1022 1124->1123
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: TJq$XZbi$$q$$q
                                    • API String ID: 0-1732113240
                                    • Opcode ID: 3096411caa339e69872a58688d78754104002436de3368e3ce096415175ea5d7
                                    • Instruction ID: c7501df3c3437d3e7c2a28ef1f5449b2394719794bd238c593a0ecd4bb3098e2
                                    • Opcode Fuzzy Hash: 3096411caa339e69872a58688d78754104002436de3368e3ce096415175ea5d7
                                    • Instruction Fuzzy Hash: 8113C27A600504EFDB168F94C944E95BBB2FF8C314F1A81D4E6099B276C736E9A1EF10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1230 1b386f9-1b38701 1231 1b38703-1b38709 1230->1231 1232 1b3868e-1b386d1 1230->1232 1233 1b3877b-1b387b2 1231->1233 1234 1b3870b-1b3873b 1231->1234 1236 1b36c8d-1b36cbe 1232->1236 1233->1236 1234->1233 1234->1236 1238 1b36cc0 1236->1238 1239 1b36cc7-1b36cda 1236->1239 1240 1b36df6-1b37040 1238->1240 1241 1b36db5-1b36df1 1238->1241 1242 1b36cdc-1b36db0 1238->1242 1239->1236 1239->1242 1274 1b37042 1240->1274 1275 1b37047 1240->1275 1241->1236 1242->1236 1274->1275 1276 1b37050-1b37379 1275->1276 1298 1b37380-1b37532 1276->1298 1299 1b3737b 1276->1299 1312 1b37534 1298->1312 1313 1b37539-1b37733 1298->1313 1299->1298 1312->1313 1326 1b37735 1313->1326 1327 1b3773a-1b378fd 1313->1327 1326->1327 1340 1b37904-1b3868b 1327->1340 1341 1b378ff 1327->1341 1340->1232 1341->1340
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: TJq$XZbi$$q$$q
                                    • API String ID: 0-1732113240
                                    • Opcode ID: f1417dab5b5d740be4668bdf7248fffed8f662bb8d476b5d64f982df0965d7c9
                                    • Instruction ID: 2d99760d040278087e5c454fa27d7ea96731ff164f0bedcfdefc7de0515332ce
                                    • Opcode Fuzzy Hash: f1417dab5b5d740be4668bdf7248fffed8f662bb8d476b5d64f982df0965d7c9
                                    • Instruction Fuzzy Hash: 8313C27A600514EFDB168F94C944E95BBB2FF8D314F0A81D4E6099B276C736E9A1EF00

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1445 1b38740-1b387b2 1449 1b36c8d-1b36cbe 1445->1449 1450 1b36cc0 1449->1450 1451 1b36cc7-1b36cda 1449->1451 1452 1b36df6-1b37040 1450->1452 1453 1b36db5-1b36df1 1450->1453 1454 1b36cdc-1b36db0 1450->1454 1451->1449 1451->1454 1485 1b37042 1452->1485 1486 1b37047 1452->1486 1453->1449 1454->1449 1485->1486 1487 1b37050-1b37379 1486->1487 1509 1b37380-1b37532 1487->1509 1510 1b3737b 1487->1510 1523 1b37534 1509->1523 1524 1b37539-1b37733 1509->1524 1510->1509 1523->1524 1537 1b37735 1524->1537 1538 1b3773a-1b378fd 1524->1538 1537->1538 1551 1b37904-1b386d1 1538->1551 1552 1b378ff 1538->1552 1551->1449 1552->1551
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: TJq$XZbi$$q$$q
                                    • API String ID: 0-1732113240
                                    • Opcode ID: 10f20ee75a243bf522e618e1140c7444bd1d035505bfccbc34514cd509208578
                                    • Instruction ID: 0875a910da5db78226204a2348df28d6721fee0addd9677ac08fb4d27c272ca4
                                    • Opcode Fuzzy Hash: 10f20ee75a243bf522e618e1140c7444bd1d035505bfccbc34514cd509208578
                                    • Instruction Fuzzy Hash: 8D13C27A600514EFDB168F94C944E95BBB2FF8C314F0A81D4E6099B276C736E9A1EF10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1658 1b387fc-1b38804 1659 1b38791-1b387b2 1658->1659 1660 1b38806-1b38818 1658->1660 1662 1b36c8d-1b36cbe 1659->1662 1663 1b36cc0 1662->1663 1664 1b36cc7-1b36cda 1662->1664 1665 1b36df6-1b37040 1663->1665 1666 1b36db5-1b36df1 1663->1666 1667 1b36cdc-1b36db0 1663->1667 1664->1662 1664->1667 1698 1b37042 1665->1698 1699 1b37047 1665->1699 1666->1662 1667->1662 1698->1699 1700 1b37050-1b37379 1699->1700 1722 1b37380-1b37532 1700->1722 1723 1b3737b 1700->1723 1736 1b37534 1722->1736 1737 1b37539-1b37733 1722->1737 1723->1722 1736->1737 1750 1b37735 1737->1750 1751 1b3773a-1b378fd 1737->1751 1750->1751 1764 1b37904-1b386d1 1751->1764 1765 1b378ff 1751->1765 1764->1662 1765->1764
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: TJq$XZbi$$q$$q
                                    • API String ID: 0-1732113240
                                    • Opcode ID: 1e7360c330502d1fdc47de9742a47f63391a5615d0e312058e4c483f6cb3e8e8
                                    • Instruction ID: d92e6ac07bc1037a9a9b828a2e3ad4d180d05f75020054e9158a2add10b5d2ca
                                    • Opcode Fuzzy Hash: 1e7360c330502d1fdc47de9742a47f63391a5615d0e312058e4c483f6cb3e8e8
                                    • Instruction Fuzzy Hash: 8413C27A600514EFDB168F94C944E95BBB2FF8C314F0A81D4E6099B276C736E9A1EF10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1871 1b387b9-1b387bb 1872 1b387a5-1b387b2 1871->1872 1873 1b387bd 1871->1873 1874 1b36c8d-1b36cbe 1872->1874 1875 1b36cc0 1874->1875 1876 1b36cc7-1b36cda 1874->1876 1877 1b36df6-1b37040 1875->1877 1878 1b36db5-1b36df1 1875->1878 1879 1b36cdc-1b36db0 1875->1879 1876->1874 1876->1879 1910 1b37042 1877->1910 1911 1b37047 1877->1911 1878->1874 1879->1874 1910->1911 1912 1b37050-1b37379 1911->1912 1934 1b37380-1b37532 1912->1934 1935 1b3737b 1912->1935 1948 1b37534 1934->1948 1949 1b37539-1b37733 1934->1949 1935->1934 1948->1949 1962 1b37735 1949->1962 1963 1b3773a-1b378fd 1949->1963 1962->1963 1976 1b37904-1b386d1 1963->1976 1977 1b378ff 1963->1977 1976->1874 1977->1976
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: TJq$XZbi$$q$$q
                                    • API String ID: 0-1732113240
                                    • Opcode ID: 78363735a951c0e99db5cf87032b709933f44e06ccee956c6aeec724cb67fa45
                                    • Instruction ID: 37f81422e0fbf79d3310ca7be0cd8da942f32beb3120f75ec9c002395857ec65
                                    • Opcode Fuzzy Hash: 78363735a951c0e99db5cf87032b709933f44e06ccee956c6aeec724cb67fa45
                                    • Instruction Fuzzy Hash: 6E13B27A600514EFDB168F94C944E95BBB2FF8C314F0A81D4E6099B276C736E9A1EF10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2083 1b31700-1b3173b 2084 1b31742-1b317ea 2083->2084 2085 1b3173d 2083->2085 2088 1b317fb-1b31810 2084->2088 2085->2084 2090 1b317ec-1b317f2 2088->2090 2090->2088 2091 1b317f4 2090->2091 2091->2088 2092 1b31812-1b31839 2091->2092 2093 1b31872-1b31897 2091->2093 2094 1b31860-1b3186d 2091->2094 2095 1b318e6-1b318f2 2091->2095 2096 1b319a5 2091->2096 2097 1b3183b-1b3185e 2091->2097 2098 1b31978-1b319a0 2091->2098 2099 1b318cf-1b318d3 2091->2099 2100 1b3189c-1b318ca 2091->2100 2101 1b3194c-1b31973 2091->2101 2092->2090 2093->2090 2094->2090 2104 1b318f4 2095->2104 2105 1b318f9-1b3190e 2095->2105 2103 1b319a8-1b319ae 2096->2103 2097->2090 2098->2090 2102 1b318d9-1b318e1 2099->2102 2099->2103 2100->2090 2101->2090 2102->2090 2103->2095 2113 1b319b4-1b31ac4 call 1b30188 2103->2113 2104->2105 2106 1b31910 2105->2106 2107 1b31915-1b3192e 2105->2107 2106->2107 2115 1b31930 2107->2115 2116 1b31935-1b31947 2107->2116 2129 1b31af1-1b31b3b 2113->2129 2130 1b31ac6-1b31aec 2113->2130 2115->2116 2116->2090 2138 1b31b58-1b31b6f 2129->2138 2139 1b31b3d-1b31b56 2129->2139 2133 1b31bd2 2130->2133 2178 1b31bd5 call 1b320f8 2133->2178 2179 1b31bd5 call 1b320e8 2133->2179 2135 1b31bdb-1b31bee 2136 1b31bff-1b31c14 2135->2136 2144 1b31bf0-1b31bf6 2136->2144 2140 1b31b71-1b31b87 2138->2140 2139->2140 2142 1b31bb0-1b31bcf 2140->2142 2143 1b31b89-1b31ba5 2140->2143 2142->2133 2143->2142 2144->2136 2145 1b31bf8 2144->2145 2145->2136 2146 1b31e62-1b31e68 2145->2146 2147 1b31c50-1b31c6d 2145->2147 2148 1b31c16-1b31c24 2145->2148 2149 1b31c34-1b31c4e 2145->2149 2150 1b31e94-1b31f0b 2145->2150 2151 1b31e1b-1b31e4a call 1b30198 2145->2151 2152 1b31e4c-1b31e60 2145->2152 2175 1b31e6e call 1b323b0 2146->2175 2176 1b31e6e call 1b323a0 2146->2176 2177 1b31e6e call 1b324b0 2146->2177 2164 1b31c7a-1b31c85 2147->2164 2165 1b31c6f-1b31c78 2147->2165 2160 1b31c2a-1b31c32 2148->2160 2149->2144 2157 1b31df5-1b31dfb 2151->2157 2152->2157 2158 1b31e04-1b31e19 2157->2158 2159 1b31dfd 2157->2159 2158->2157 2159->2146 2159->2150 2159->2151 2159->2152 2159->2158 2160->2144 2169 1b31c87-1b31c8e 2164->2169 2165->2169 2166 1b31e74-1b31e8f 2166->2157 2173 1b31c90 2169->2173 2174 1b31c9c 2169->2174 2173->2174 2174->2157 2175->2166 2176->2166 2177->2166 2178->2135 2179->2135
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @$TJq$TJq$Teq
                                    • API String ID: 0-3015017616
                                    • Opcode ID: 92237bb59f7972315ee4d00b9ff07422f23776e172ba2aabe85644594f481b2a
                                    • Instruction ID: 7cab5c0f95039d56b1f4dfd07f0d643ad83a6b50b9ce7d69f81ac919e149952b
                                    • Opcode Fuzzy Hash: 92237bb59f7972315ee4d00b9ff07422f23776e172ba2aabe85644594f481b2a
                                    • Instruction Fuzzy Hash: FC128F78E05218CFDB68CF69D984B9DBBB6BF89310F1481E9E509AB361DB305985CF10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2661 1b3dcc0-1b3dcee 2662 1b3dcf0 2661->2662 2663 1b3dcf5-1b3de01 2661->2663 2662->2663 2668 1b3de03-1b3de1f call 1b3fed0 2663->2668 2669 1b3de25-1b3de31 2663->2669 2668->2669 2670 1b3de33 2669->2670 2671 1b3de38-1b3de3d 2669->2671 2670->2671 2672 1b3de75-1b3de95 2671->2672 2673 1b3de3f-1b3de4b 2671->2673 2681 1b3de97 2672->2681 2682 1b3de9c-1b3dec1 2672->2682 2675 1b3de52-1b3de70 2673->2675 2676 1b3de4d 2673->2676 2677 1b3f099-1b3f09f 2675->2677 2676->2675 2679 1b3f0a1 2677->2679 2680 1b3f0a9 2677->2680 2679->2680 2683 1b3f0aa 2680->2683 2681->2682 2686 1b3decd-1b3e0c5 2682->2686 2683->2683 2703 1b3e732-1b3e73e 2686->2703 2704 1b3e744-1b3e77c 2703->2704 2705 1b3e0ca-1b3e0d6 2703->2705 2713 1b3e856-1b3e85c 2704->2713 2706 1b3e0d8 2705->2706 2707 1b3e0dd-1b3e19a 2705->2707 2706->2707 2724 1b3e1bb-1b3e20d 2707->2724 2725 1b3e19c-1b3e1b5 2707->2725 2715 1b3e862-1b3e89a 2713->2715 2716 1b3e781-1b3e7fe 2713->2716 2728 1b3ebe4-1b3ebea 2715->2728 2734 1b3e831-1b3e853 2716->2734 2735 1b3e800-1b3e804 2716->2735 2747 1b3e20f-1b3e217 2724->2747 2748 1b3e21c-1b3e269 2724->2748 2725->2724 2730 1b3ebf0-1b3ec38 2728->2730 2731 1b3e89f-1b3eaa1 2728->2731 2741 1b3ecb3-1b3ecfe 2730->2741 2742 1b3ec3a-1b3ecad 2730->2742 2827 1b3eaa7-1b3eb27 2731->2827 2828 1b3eb2c-1b3eb30 2731->2828 2734->2713 2735->2734 2736 1b3e806-1b3e82e 2735->2736 2736->2734 2765 1b3f063-1b3f069 2741->2765 2742->2741 2750 1b3e723-1b3e72f 2747->2750 2762 1b3e26b-1b3e273 2748->2762 2763 1b3e278-1b3e2c5 2748->2763 2750->2703 2762->2750 2779 1b3e2c7-1b3e2cf 2763->2779 2780 1b3e2d4-1b3e321 2763->2780 2767 1b3ed03-1b3ed5c 2765->2767 2768 1b3f06f-1b3f097 2765->2768 2782 1b3ed84-1b3ed90 2767->2782 2783 1b3ed5e-1b3ed79 2767->2783 2768->2677 2779->2750 2807 1b3e323-1b3e32b 2780->2807 2808 1b3e330-1b3e37d 2780->2808 2784 1b3ed92 2782->2784 2785 1b3ed97-1b3eda3 2782->2785 2783->2782 2784->2785 2789 1b3edb6-1b3edc5 2785->2789 2790 1b3eda5-1b3edb1 2785->2790 2793 1b3edc7 2789->2793 2794 1b3edce-1b3f02b 2789->2794 2792 1b3f04a-1b3f060 2790->2792 2792->2765 2793->2794 2797 1b3ee42-1b3ee91 2793->2797 2798 1b3ef20-1b3ef88 2793->2798 2799 1b3ee96-1b3eed6 2793->2799 2800 1b3edd4-1b3ee3d 2793->2800 2801 1b3eedb-1b3ef1b 2793->2801 2822 1b3f036-1b3f042 2794->2822 2797->2822 2829 1b3effc-1b3f002 2798->2829 2799->2822 2800->2822 2801->2822 2807->2750 2835 1b3e37f-1b3e387 2808->2835 2836 1b3e38c-1b3e3d9 2808->2836 2822->2792 2850 1b3ebcb-1b3ebe1 2827->2850 2830 1b3eb32-1b3eb8b 2828->2830 2831 1b3eb8d-1b3ebca 2828->2831 2832 1b3f004-1b3f00e 2829->2832 2833 1b3ef8a-1b3efe8 2829->2833 2830->2850 2831->2850 2832->2822 2847 1b3efea 2833->2847 2848 1b3efef-1b3eff9 2833->2848 2835->2750 2854 1b3e3db-1b3e3e3 2836->2854 2855 1b3e3e8-1b3e435 2836->2855 2847->2848 2848->2829 2850->2728 2854->2750 2859 1b3e437-1b3e43f 2855->2859 2860 1b3e444-1b3e491 2855->2860 2859->2750 2864 1b3e493-1b3e49b 2860->2864 2865 1b3e4a0-1b3e4ed 2860->2865 2864->2750 2869 1b3e4ef-1b3e4f7 2865->2869 2870 1b3e4fc-1b3e549 2865->2870 2869->2750 2874 1b3e54b-1b3e553 2870->2874 2875 1b3e558-1b3e5a5 2870->2875 2874->2750 2879 1b3e5a7-1b3e5af 2875->2879 2880 1b3e5b4-1b3e601 2875->2880 2879->2750 2884 1b3e603-1b3e60b 2880->2884 2885 1b3e610-1b3e65d 2880->2885 2884->2750 2889 1b3e65f-1b3e667 2885->2889 2890 1b3e66c-1b3e6b9 2885->2890 2889->2750 2894 1b3e6c5-1b3e712 2890->2894 2895 1b3e6bb-1b3e6c3 2890->2895 2899 1b3e714-1b3e71c 2894->2899 2900 1b3e71e-1b3e720 2894->2900 2895->2750 2899->2750 2900->2750
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2$$q
                                    • API String ID: 0-2017333547
                                    • Opcode ID: cea7bdc0d885edf70fbfbc909371df602386b44c0e1c10e6d7ed533241c1c1f9
                                    • Instruction ID: bc1754d3acd4b0b084842e46bfc49d5e671cdb8918e8fb327f9323c314f3c440
                                    • Opcode Fuzzy Hash: cea7bdc0d885edf70fbfbc909371df602386b44c0e1c10e6d7ed533241c1c1f9
                                    • Instruction Fuzzy Hash: 36C2AFB4E012288FDB65DF69C984BD9BBB5FB88300F1081EAD509AB355DB309E85CF54
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Plq$$q
                                    • API String ID: 0-181920578
                                    • Opcode ID: e019f60a66cc14556d51d0fffe85c396de6f3b66e547c85b0478fd5752384a21
                                    • Instruction ID: a5c382ce0b3d1d601585f1944231636407e56b3eb4f5c12360a22ab5924a26cf
                                    • Opcode Fuzzy Hash: e019f60a66cc14556d51d0fffe85c396de6f3b66e547c85b0478fd5752384a21
                                    • Instruction Fuzzy Hash: DC323A34B00609CFDB14DF69C584A6AB7F2FF89710B2584A9E506DB3A1DB35EC42CB61
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Teq
                                    • API String ID: 0-1098410595
                                    • Opcode ID: 1dacb545f6aa5d773067f7142bcb021be767ba21c918b96fcfed641d841085d5
                                    • Instruction ID: d50c22ebbbd9adde898bdb83cf65145fa68bc726d286ddf0aa71c728e9943eeb
                                    • Opcode Fuzzy Hash: 1dacb545f6aa5d773067f7142bcb021be767ba21c918b96fcfed641d841085d5
                                    • Instruction Fuzzy Hash: C9F1E1B0D05219CFDB64CF69C984BE9BBFAFB4A311F10A4AAD409A7251DB749D85CF00
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: QE
                                    • API String ID: 0-2452714473
                                    • Opcode ID: 0d5abbdf67682f466acb3e18ebe3610b737d9e0c3a176ae407adc27e987b92f9
                                    • Instruction ID: 58e320f84d59605544fd215ba067d3b2b491aaae81071198afff3c54d08ae109
                                    • Opcode Fuzzy Hash: 0d5abbdf67682f466acb3e18ebe3610b737d9e0c3a176ae407adc27e987b92f9
                                    • Instruction Fuzzy Hash: 5DD12878E04209CFDB18CFA9C4809ADBBB5FF99310F5492A5E415EB355E734E952CB80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Teq
                                    • API String ID: 0-1098410595
                                    • Opcode ID: 2a92027defab91c5288449936b5dadafbc011b07390bf67080fc7fc988a281e4
                                    • Instruction ID: 499500ecc2befba8b120abcd6a41f470939b3a3e496b9fb4326db03a87612744
                                    • Opcode Fuzzy Hash: 2a92027defab91c5288449936b5dadafbc011b07390bf67080fc7fc988a281e4
                                    • Instruction Fuzzy Hash: 2DC1E2B0E00219CFEB64CFA9D984BDDBBF6BF89325F1094AAD408A7251DB745981CF01
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Teq
                                    • API String ID: 0-1098410595
                                    • Opcode ID: 27da218faf3ea146534e7d333008c7664dd5543b0846e19d878908a746709d78
                                    • Instruction ID: a788381b233242871fb9254e61e4973f8b690547c5bd6181fec0ad864a3dd14d
                                    • Opcode Fuzzy Hash: 27da218faf3ea146534e7d333008c7664dd5543b0846e19d878908a746709d78
                                    • Instruction Fuzzy Hash: B8B1E3B0E04219CFEB64CF69C944BADBBFABF8A315F1094AAD40DA7251D7745981CF01
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: !
                                    • API String ID: 0-2657877971
                                    • Opcode ID: 97620ffe6e63572f1f5c4895daa91a506c040f9812060cc0fa907ca3ca81f81c
                                    • Instruction ID: b0519f31593a5455ccf834b310510cf13bae6dbdc49012a4f593adf97d65f494
                                    • Opcode Fuzzy Hash: 97620ffe6e63572f1f5c4895daa91a506c040f9812060cc0fa907ca3ca81f81c
                                    • Instruction Fuzzy Hash: 7B51F3B0D05229CFEB64CF56C958BD9BBF6BB89300F04D8AAC809B7250D7785A85DF50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ac629a4a0471c4ef8d088651c1d15cbdcfc68a868268f6e21cb3e79be5a9393a
                                    • Instruction ID: a6b219f24fa3671b97ba60d4491e744eaec26fb09635bad88f1ee4f084dd9bde
                                    • Opcode Fuzzy Hash: ac629a4a0471c4ef8d088651c1d15cbdcfc68a868268f6e21cb3e79be5a9393a
                                    • Instruction Fuzzy Hash: 21522570A00646DFE324CF68C288A4ABBF2FB44315F59D198D5485F2A2D7BADC84CF95
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ca0adffddb2f7290bff2321a60c634b1992dc65ac72fd22bfdd1b48ec50cabf9
                                    • Instruction ID: df20d5354ca22232dfaaea7bfa62474fb5783b912f7db1b805cab8851e6706f0
                                    • Opcode Fuzzy Hash: ca0adffddb2f7290bff2321a60c634b1992dc65ac72fd22bfdd1b48ec50cabf9
                                    • Instruction Fuzzy Hash: 01321570A00746DFE324DF68D288A4ABBE1FB40315F49D198C5485F2A2DBBADC84DF56
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9ce72875f638154a7fb3833d17228613afa63d5c97aa05b362b3da25f78b7652
                                    • Instruction ID: 571fe368636e271b55856915746f65243fe3c3f619aeccb5039c54f7e7d7331f
                                    • Opcode Fuzzy Hash: 9ce72875f638154a7fb3833d17228613afa63d5c97aa05b362b3da25f78b7652
                                    • Instruction Fuzzy Hash: 85329074E002298FCB65DF28C984AA9B7B6FF88310F1181DAD54DAB355DB30AE81CF55
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8caf32bf03458ff44d0c0eff73e14fea06c30a552bdcca20d185295eb844cfc7
                                    • Instruction ID: 776d0f9c88c4e7d4af1009241d74c6d84117953cc440514888f996103d6ba500
                                    • Opcode Fuzzy Hash: 8caf32bf03458ff44d0c0eff73e14fea06c30a552bdcca20d185295eb844cfc7
                                    • Instruction Fuzzy Hash: 89F1D2B4D05218CFEB64CFA9D994BDDBBF2BB49300F1484AAD809AB250DB749D85CF41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3eb11fe238cf09d784c3c6ce7f71177a6bfebc30e2fac44ae457caa942f84858
                                    • Instruction ID: 44a128204ed553e246aa53b9a516a669add8c42a0a8be9462b93355e93e25dbc
                                    • Opcode Fuzzy Hash: 3eb11fe238cf09d784c3c6ce7f71177a6bfebc30e2fac44ae457caa942f84858
                                    • Instruction Fuzzy Hash: CFF1D2B4D05218CFEB64CFA9D994BEDBBF2BB49300F1084AAD809AB250DB345D85CF41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 67d072ccc9f3401ba0ae90341aff029aad7f4f79d8935e1ac6d2bb9b51be60e6
                                    • Instruction ID: 2125904c9b6c40346ea2eaf6450a18dc4a8debbcb27d1e752ca6881874c79703
                                    • Opcode Fuzzy Hash: 67d072ccc9f3401ba0ae90341aff029aad7f4f79d8935e1ac6d2bb9b51be60e6
                                    • Instruction Fuzzy Hash: B6D1E2B4905218CFDB54CFA9D864BEDBBF2FB49300F10846AD809AB354DB38A985CF55
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: beb8b764cdadc227d6044e5c146a25e8d99e7d8582f84783b28991d5be3b7f62
                                    • Instruction ID: b877ed51d244f033db8d0116a06f5b53ff4a3958eabd2694557c577e00baff9a
                                    • Opcode Fuzzy Hash: beb8b764cdadc227d6044e5c146a25e8d99e7d8582f84783b28991d5be3b7f62
                                    • Instruction Fuzzy Hash: 11D1E1B4905218CFDB54CFA9D864BEDBBF2FB49300F10842AD809AB354DB38A985CF55
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 057570cd04a44457272c109d4e2fb68fb4abc51bb13c4406050e2d7e703a74d0
                                    • Instruction ID: 88fec21c439e8ce26ebabd9100779777a0895f738049aa8f73c490069ae12bc3
                                    • Opcode Fuzzy Hash: 057570cd04a44457272c109d4e2fb68fb4abc51bb13c4406050e2d7e703a74d0
                                    • Instruction Fuzzy Hash: 39D1BDB4A01218CFDB54DFA9D994B9DBBB2FF89300F1081A9D409AB365DB35AD81CF50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5b44f17e4b306128e1a3e29b54d0f26950c0531c05f2c983603da0998c721cd0
                                    • Instruction ID: de2f003ab513d8bf4ea21d5bddc991cfbe22f71efedb323a71e5847640d18e99
                                    • Opcode Fuzzy Hash: 5b44f17e4b306128e1a3e29b54d0f26950c0531c05f2c983603da0998c721cd0
                                    • Instruction Fuzzy Hash: 29B1F475E04209DFDB08CF99D980AEEFBB6FF89300F148169D809BB245D774A996CB50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: af5f9ebaed7d06ce0553e786487522d98c13a86e68951b2feb36ffadfc5d9c02
                                    • Instruction ID: a78483e3ac99e9e6f03e732b9c7f759832949ad1fc31a5c5c55dfc44bcff3608
                                    • Opcode Fuzzy Hash: af5f9ebaed7d06ce0553e786487522d98c13a86e68951b2feb36ffadfc5d9c02
                                    • Instruction Fuzzy Hash: 11C10874D45318CFEB64CF69D898BADBBF2FB49300F1080A9D419A7255DB786985CF01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1369bebaf3354007fcbd2e88586a8203eb4b27639331fb23c5fcdad41efe932b
                                    • Instruction ID: a5fdfb258761e16b9661a99d84b63d9a893f7c496b5b5b8099387d734cc30442
                                    • Opcode Fuzzy Hash: 1369bebaf3354007fcbd2e88586a8203eb4b27639331fb23c5fcdad41efe932b
                                    • Instruction Fuzzy Hash: 25B10674D45218CFEB64CF69D898BADBBF2FF89300F2480A9D409A7255DB786985CF01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: deb786311d731deb83110145ebe25ce89d0774d03eb3b5f0f2b995f40a3187db
                                    • Instruction ID: 982ab762b4c5e4fe4402a4fbc600213b362399299baabe30df57ea9fe3ee1c2e
                                    • Opcode Fuzzy Hash: deb786311d731deb83110145ebe25ce89d0774d03eb3b5f0f2b995f40a3187db
                                    • Instruction Fuzzy Hash: 56B11874D44208CFEB64CFA9D898BADBBF2FF49304F1080A9D419A7251DB78A985CF01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 77eb01650d52d26742448a28233819fc1dc7f8072a9779565fef4528cb4fa9dd
                                    • Instruction ID: 8817fc59ef3ff705fc9b03eff6e0fb2cdf5c36ae641b2a8fbd595bee3a3254ae
                                    • Opcode Fuzzy Hash: 77eb01650d52d26742448a28233819fc1dc7f8072a9779565fef4528cb4fa9dd
                                    • Instruction Fuzzy Hash: D7A1F774D45308CFEB64CFA5D498BADBBF2FB49304F1480A9D409A7255DB78A985CF01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 79267ca14ceedd37813572ab09daebcf528209224336b026e1a7378040b0c725
                                    • Instruction ID: 821edc6cf3e7e334509ffe28b18612c5037896f07ffdb69b50134aac0f8f6a9b
                                    • Opcode Fuzzy Hash: 79267ca14ceedd37813572ab09daebcf528209224336b026e1a7378040b0c725
                                    • Instruction Fuzzy Hash: 0581F474D05608CFDB54CFA9D884BADBBF6EB99301F14806AE419AB351DB349986CF08
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 01561fbeca13bd0df0e9a3e22f0afa5bd24e745a1621b62add7f2848d4d67932
                                    • Instruction ID: e8bd3194c500924120c16a4fe42ba0b243c0930c1b7796b0203b4140f18d7989
                                    • Opcode Fuzzy Hash: 01561fbeca13bd0df0e9a3e22f0afa5bd24e745a1621b62add7f2848d4d67932
                                    • Instruction Fuzzy Hash: F381F474D04608CFDB54CFA9D884BADBBF6FB99301F14806AE419AB351DB349986CF08
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: af7335e41ad6db2b249c6c6f9e0d41162e4d737bf42748bb6860eb379a2c5969
                                    • Instruction ID: bad8cebc735fef4b2df3b80432976a9ecb5170968a96a3d62c02dd898d16b309
                                    • Opcode Fuzzy Hash: af7335e41ad6db2b249c6c6f9e0d41162e4d737bf42748bb6860eb379a2c5969
                                    • Instruction Fuzzy Hash: 7B813470E05608CFDB28CFAAD9447EDBBBAFB89304F1492A9D405AB294D7745896CF10
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5de907f913efa61178e626069f293b84a32ccae8f11715daeeb3eb6f32bc2d27
                                    • Instruction ID: 0348de7e878b55ae1495773e071cceafdb84cdaba41af75e6c4932125de9cafc
                                    • Opcode Fuzzy Hash: 5de907f913efa61178e626069f293b84a32ccae8f11715daeeb3eb6f32bc2d27
                                    • Instruction Fuzzy Hash: 8F81E3B4E04608CFDB14CFA9D884BADBBF6EB99301F14806AD419AB351D7349D86CF08
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 562eb1aa2021f9061f2554bbb08e32582c49e024f3ce76040bfdaefc14498460
                                    • Instruction ID: 5fb1dec47937e72381673a07e18518e4ff50258380241d8241f8334d8b19c450
                                    • Opcode Fuzzy Hash: 562eb1aa2021f9061f2554bbb08e32582c49e024f3ce76040bfdaefc14498460
                                    • Instruction Fuzzy Hash: 4871D374904608CFDB54CFA9D898BADBBF5EB59301F14806AE019AB251DB349D86CF08
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dcc62a57d14435b4bdf9b3c55d274d85159e3a16350fa71d9962ca93c838b596
                                    • Instruction ID: 39c0d2a6b2f27542bf61faaf9b38bca8796d183dfc65b2ff75198dbe18255ecc
                                    • Opcode Fuzzy Hash: dcc62a57d14435b4bdf9b3c55d274d85159e3a16350fa71d9962ca93c838b596
                                    • Instruction Fuzzy Hash: 56611CB1D056588BEB19CF6AD8846A9BFB3BFC9300F14C0FAD5486B215CB311A85CF55
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 35536390cb8da11578ee53ebc37c86ab3636708d62ed6045774fe586433c90f4
                                    • Instruction ID: 02cd782520d29e0544cf61a6b87189c2858fbcf3907673283fcc3fa2b8406d0b
                                    • Opcode Fuzzy Hash: 35536390cb8da11578ee53ebc37c86ab3636708d62ed6045774fe586433c90f4
                                    • Instruction Fuzzy Hash: 83417AB1E016198BEB18CF6BD94469EFAF3BFC8300F14C1AAD548AB259DB3459818F54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2180 5b6c848-5b6c870 2182 5b6c872-5b6c8b9 2180->2182 2183 5b6c8be-5b6c8cc 2180->2183 2228 5b6cd15-5b6cd1c 2182->2228 2184 5b6c8ce-5b6c8d9 call 5b6a638 2183->2184 2185 5b6c8db 2183->2185 2187 5b6c8dd-5b6c8e4 2184->2187 2185->2187 2190 5b6c9cd-5b6c9d1 2187->2190 2191 5b6c8ea-5b6c8ee 2187->2191 2194 5b6ca27-5b6ca31 2190->2194 2195 5b6c9d3-5b6c9e2 2190->2195 2192 5b6c8f4-5b6c8f8 2191->2192 2193 5b6cd1d-5b6cd45 2191->2193 2197 5b6c90a-5b6c968 call 5b6a378 call 5b6ade0 2192->2197 2198 5b6c8fa-5b6c904 2192->2198 2202 5b6cd4c-5b6cd76 2193->2202 2199 5b6ca33-5b6ca42 2194->2199 2200 5b6ca6a-5b6ca90 2194->2200 2209 5b6c9e6-5b6c9eb 2195->2209 2238 5b6c96e-5b6c9c8 2197->2238 2239 5b6cddb-5b6cdf3 2197->2239 2198->2197 2198->2202 2215 5b6cd7e-5b6cd94 2199->2215 2216 5b6ca48-5b6ca65 2199->2216 2222 5b6ca92-5b6ca9b 2200->2222 2223 5b6ca9d 2200->2223 2202->2215 2211 5b6c9e4 2209->2211 2212 5b6c9ed-5b6ca22 call 5b6c310 2209->2212 2211->2209 2212->2228 2241 5b6cd9c-5b6cdd4 2215->2241 2216->2228 2230 5b6ca9f-5b6cac7 2222->2230 2223->2230 2246 5b6cacd-5b6cae6 2230->2246 2247 5b6cb98-5b6cb9c 2230->2247 2238->2228 2241->2239 2246->2247 2264 5b6caec-5b6cafb 2246->2264 2248 5b6cc16-5b6cc20 2247->2248 2249 5b6cb9e-5b6cbb7 2247->2249 2252 5b6cc22-5b6cc2c 2248->2252 2253 5b6cc7d-5b6cc86 2248->2253 2249->2248 2271 5b6cbb9-5b6cbc8 2249->2271 2262 5b6cc32-5b6cc44 2252->2262 2263 5b6cc2e-5b6cc30 2252->2263 2255 5b6ccbe-5b6cd0b 2253->2255 2256 5b6cc88-5b6ccb6 2253->2256 2277 5b6cd13 2255->2277 2256->2255 2268 5b6cc46-5b6cc48 2262->2268 2263->2268 2279 5b6cb13-5b6cb28 2264->2279 2280 5b6cafd-5b6cb03 2264->2280 2275 5b6cc76-5b6cc7b 2268->2275 2276 5b6cc4a-5b6cc4e 2268->2276 2284 5b6cbe0-5b6cbeb 2271->2284 2285 5b6cbca-5b6cbd0 2271->2285 2275->2252 2275->2253 2281 5b6cc50-5b6cc69 2276->2281 2282 5b6cc6c-5b6cc6f 2276->2282 2277->2228 2290 5b6cb5c-5b6cb65 2279->2290 2291 5b6cb2a-5b6cb56 2279->2291 2286 5b6cb07-5b6cb09 2280->2286 2287 5b6cb05 2280->2287 2281->2282 2282->2275 2284->2239 2295 5b6cbf1-5b6cc14 2284->2295 2293 5b6cbd4-5b6cbd6 2285->2293 2294 5b6cbd2 2285->2294 2286->2279 2287->2279 2290->2239 2292 5b6cb6b-5b6cb92 2290->2292 2291->2241 2291->2290 2292->2247 2292->2264 2293->2284 2294->2284 2295->2248 2295->2271
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Hq$Hq$Hq
                                    • API String ID: 0-2505839570
                                    • Opcode ID: fda4db6f63071c5905c2d1f5728f0bf5f4375bf21c1c617bef08783a4d3dc494
                                    • Instruction ID: 4125996acd48fca855e5357af96bf9d178fedacf22fbaacc1536a06c44ea4fa2
                                    • Opcode Fuzzy Hash: fda4db6f63071c5905c2d1f5728f0bf5f4375bf21c1c617bef08783a4d3dc494
                                    • Instruction Fuzzy Hash: BA025D70A00209DFDB24DFA5C595AAEBBF2FF88300F14856DD446AB794DB35AC46CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2307 5b6e500-5b6e53d 2309 5b6e55f-5b6e575 call 5b6e308 2307->2309 2310 5b6e53f-5b6e542 2307->2310 2316 5b6e8eb-5b6e8ff 2309->2316 2317 5b6e57b-5b6e587 2309->2317 2421 5b6e544 call 5b6ee70 2310->2421 2422 5b6e544 call 5b6ee08 2310->2422 2312 5b6e54a-5b6e54c 2312->2309 2314 5b6e54e-5b6e556 2312->2314 2314->2309 2324 5b6e93f-5b6e948 2316->2324 2318 5b6e58d-5b6e590 2317->2318 2319 5b6e6b8-5b6e6bf 2317->2319 2322 5b6e593-5b6e59c 2318->2322 2320 5b6e6c5-5b6e6ce 2319->2320 2321 5b6e7ee-5b6e82b call 5b6dd10 call 784f938 2319->2321 2320->2321 2325 5b6e6d4-5b6e7e0 call 5b6dd10 call 5b6e2a0 call 5b6dd10 2320->2325 2365 5b6e831-5b6e8e2 call 5b6dd10 2321->2365 2327 5b6e5a2-5b6e5b6 2322->2327 2328 5b6e9e0 2322->2328 2329 5b6e90d-5b6e916 2324->2329 2330 5b6e94a-5b6e951 2324->2330 2418 5b6e7e2 2325->2418 2419 5b6e7eb 2325->2419 2338 5b6e5bc-5b6e651 call 5b6e308 * 2 call 5b6dd10 call 5b6e2a0 call 5b6e348 call 5b6e3f0 call 5b6e458 2327->2338 2339 5b6e6a8-5b6e6b2 2327->2339 2337 5b6e9e5-5b6e9e9 2328->2337 2329->2328 2333 5b6e91c-5b6e92e 2329->2333 2335 5b6e953-5b6e996 call 5b6dd10 2330->2335 2336 5b6e99f-5b6e9a6 2330->2336 2353 5b6e930-5b6e935 2333->2353 2354 5b6e93e 2333->2354 2335->2336 2340 5b6e9cb-5b6e9de 2336->2340 2341 5b6e9a8-5b6e9b8 2336->2341 2344 5b6e9f4 2337->2344 2345 5b6e9eb 2337->2345 2397 5b6e653-5b6e66b call 5b6e3f0 call 5b6dd10 call 5b6dfc0 2338->2397 2398 5b6e670-5b6e6a3 call 5b6e458 2338->2398 2339->2319 2339->2322 2340->2337 2341->2340 2357 5b6e9ba-5b6e9c2 2341->2357 2352 5b6e9f5 2344->2352 2345->2344 2352->2352 2423 5b6e938 call 5b6ffa0 2353->2423 2424 5b6e938 call 5b6ff91 2353->2424 2354->2324 2357->2340 2365->2316 2397->2398 2398->2339 2418->2419 2419->2321 2421->2312 2422->2312 2423->2354 2424->2354
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q$4'q$4'q
                                    • API String ID: 0-3126650252
                                    • Opcode ID: 939cdcc25913bec43217720fcbfd06c626a09c43ba03279e9ad5e1577b329f42
                                    • Instruction ID: 3479dc3ce854b21aca837e6a68b5723fbef9b29768136b97277d192850d3722f
                                    • Opcode Fuzzy Hash: 939cdcc25913bec43217720fcbfd06c626a09c43ba03279e9ad5e1577b329f42
                                    • Instruction Fuzzy Hash: ADF1CC38B00218DFDB14EF64D998A9EB7B2FF89300F118595E406AB3A5DB75EC42CB50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2596 7559960-755996e 2597 7559970-755997a 2596->2597 2598 755990c 2596->2598 2626 755997d call 755b750 2597->2626 2627 755997d call 755b740 2597->2627 2599 7559175-755917e 2598->2599 2600 7559912-755991d 2598->2600 2601 7559187-7559fd2 call 755b699 2599->2601 2602 7559180 2599->2602 2600->2599 2621 7559fd8-755a010 2601->2621 2602->2601 2604 7559035-7559036 2602->2604 2605 75590d5-75590f8 2602->2605 2606 75590a1-75590c1 2602->2606 2607 7559111-7559118 2602->2607 2608 7559060-7559067 2602->2608 2609 755904d-755905e 2602->2609 2610 755910e-755910f 2602->2610 2611 755903b-755904b 2602->2611 2612 755913b-7559167 2602->2612 2613 755911b-7559136 2602->2613 2603 7559983-75599be 2603->2599 2615 75599c4-75599cf 2603->2615 2604->2613 2618 755901d-7559026 2605->2618 2619 75590fe-7559109 2605->2619 2617 75590c7-75590d0 2606->2617 2606->2618 2608->2607 2616 755906d-755908f 2608->2616 2609->2618 2610->2605 2611->2618 2612->2599 2613->2618 2615->2599 2616->2618 2620 7559091-755909c 2616->2620 2617->2618 2622 755902f-7559030 2618->2622 2623 7559028 2618->2623 2619->2618 2620->2618 2621->2599 2625 755a016-755a021 2621->2625 2622->2613 2623->2604 2623->2605 2623->2606 2623->2607 2623->2608 2623->2609 2623->2610 2623->2611 2623->2612 2623->2613 2623->2622 2625->2599 2626->2603 2627->2603
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: )$0$H
                                    • API String ID: 0-2284277653
                                    • Opcode ID: 1dcee292236111e53752fac0095ae0f87e74ffde8274f891b118d7bb2b3952a1
                                    • Instruction ID: 32f351fe732fd01c6452ef25d768580fee3f52a3b1639852d8cf58107de49680
                                    • Opcode Fuzzy Hash: 1dcee292236111e53752fac0095ae0f87e74ffde8274f891b118d7bb2b3952a1
                                    • Instruction Fuzzy Hash: EC4113B4905269CFEB20CF55C868BD9BBB1BB45301F0098E7C809B7250C3796AC6DF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2629 7559a6e-7559a72 2630 7559b7d-7559b90 2629->2630 2631 7559a78-7559a82 2629->2631 2658 7559b93 call 755b6f8 2630->2658 2659 7559b93 call 755b6e8 2630->2659 2631->2630 2632 7559b99-7559bc7 2633 7559175-755917e 2632->2633 2634 7559bcd-7559bd8 2632->2634 2635 7559187-7559fd2 call 755b699 2633->2635 2636 7559180 2633->2636 2634->2633 2653 7559fd8-755a010 2635->2653 2636->2635 2637 7559035-7559036 2636->2637 2638 75590d5-75590f8 2636->2638 2639 75590a1-75590c1 2636->2639 2640 7559111-7559118 2636->2640 2641 7559060-7559067 2636->2641 2642 755904d-755905e 2636->2642 2643 755910e-755910f 2636->2643 2644 755903b-755904b 2636->2644 2645 755913b-7559167 2636->2645 2646 755911b-7559136 2636->2646 2637->2646 2650 755901d-7559026 2638->2650 2651 75590fe-7559109 2638->2651 2649 75590c7-75590d0 2639->2649 2639->2650 2641->2640 2648 755906d-755908f 2641->2648 2642->2650 2643->2638 2644->2650 2645->2633 2646->2650 2648->2650 2652 7559091-755909c 2648->2652 2649->2650 2654 755902f-7559030 2650->2654 2655 7559028 2650->2655 2651->2650 2652->2650 2653->2633 2657 755a016-755a021 2653->2657 2654->2646 2655->2637 2655->2638 2655->2639 2655->2640 2655->2641 2655->2642 2655->2643 2655->2644 2655->2645 2655->2646 2655->2654 2657->2633 2658->2632 2659->2632
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: %$.$H
                                    • API String ID: 0-1534012654
                                    • Opcode ID: a3235d65d587065ce67ee5db825a2bd06a070fb7e9984baab29044fb338c54c3
                                    • Instruction ID: 8b33135c7e83035c760b712dfe54fb6ec0def48b371a8130e1efd9f72fc8205a
                                    • Opcode Fuzzy Hash: a3235d65d587065ce67ee5db825a2bd06a070fb7e9984baab29044fb338c54c3
                                    • Instruction Fuzzy Hash: 0141E0B4904269CFEB20CF59C958BD9BBB1BB49301F0098E7C909B7260C3796AC5DF64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603142085.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b80000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q$4'q
                                    • API String ID: 0-1467158625
                                    • Opcode ID: 2d808038fa170d213de23818c90439aa908d32bbe46770e86cc6be98b8aac7f7
                                    • Instruction ID: 52c364e8a8d5bb6a0f61bedfb676f61ca1a67d8e2cd3b0584709bc2997b9865e
                                    • Opcode Fuzzy Hash: 2d808038fa170d213de23818c90439aa908d32bbe46770e86cc6be98b8aac7f7
                                    • Instruction Fuzzy Hash: FE428274E0520ECFDB14EFA9D448ABEBBB2FF48341F149096E5126B254CB34A946CF61
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $q$$q
                                    • API String ID: 0-3126353813
                                    • Opcode ID: 8e606831bbed0f808780999e96a5ac0cf14d343ac7d8a96aaef858e89e0cd062
                                    • Instruction ID: 53015319b50ab80285753bbe14c4490e5562374e4ee6e33bb1a94172b2a372d9
                                    • Opcode Fuzzy Hash: 8e606831bbed0f808780999e96a5ac0cf14d343ac7d8a96aaef858e89e0cd062
                                    • Instruction Fuzzy Hash: A4227DB0A0061ADFDB14CFA5C950AEEBBB5FF48311F14805AE801AB394EB35AD46CB55
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (q$d
                                    • API String ID: 0-1617062230
                                    • Opcode ID: 3ca46d766b2492c89c9ebfd828ba421f50c18ee4ea5a5255fc24744dcac59e0c
                                    • Instruction ID: 8d6b46616f1d2fc353778aba2ecc4df599a0c8180ca09769dd861bb2d0bfd4f9
                                    • Opcode Fuzzy Hash: 3ca46d766b2492c89c9ebfd828ba421f50c18ee4ea5a5255fc24744dcac59e0c
                                    • Instruction Fuzzy Hash: B9D15D35600606DFCB24DF68C48496ABBF2FF88710B25859AD49A9B761DB34FC46CF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603142085.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b80000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q$4'q
                                    • API String ID: 0-1467158625
                                    • Opcode ID: 755c2d365479a1b7c7ee7d8bc8f9c6ed12bcef348abcb2f5fe7738c386520c05
                                    • Instruction ID: 84ceaf38897cefd2ce3b24203897a9b75f8c1c6bfde8c6cdcb56eae53773fc0a
                                    • Opcode Fuzzy Hash: 755c2d365479a1b7c7ee7d8bc8f9c6ed12bcef348abcb2f5fe7738c386520c05
                                    • Instruction Fuzzy Hash: 5FE1C474D15218DFCB54EFA8E498AADBBB2FF49311F1090A9E416BB350DB316886CF10
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603142085.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b80000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q$4'q
                                    • API String ID: 0-1467158625
                                    • Opcode ID: 56a4bbca733306faa3976b33151436c78311f78631c3692335e5c5a2fba5e9bb
                                    • Instruction ID: 0c1616fb1d6bb8d2c300766c5383a4f992be6bd4df9aa51f7860e1db322003cb
                                    • Opcode Fuzzy Hash: 56a4bbca733306faa3976b33151436c78311f78631c3692335e5c5a2fba5e9bb
                                    • Instruction Fuzzy Hash: 91A1A374E01609CFDB14EFA9D445AFDBBB6FF49301F5490A9E4126B290CB346986CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (q$Hq
                                    • API String ID: 0-1154169777
                                    • Opcode ID: 2c57cea4b40edc924a75468a3abf203e2f1bed21163ea7eb35061e4bd1978ed8
                                    • Instruction ID: 93128ea64f88fd13aa6f35bb129b6fa2891bb271f0f7bd4d0a8be6a416a963e5
                                    • Opcode Fuzzy Hash: 2c57cea4b40edc924a75468a3abf203e2f1bed21163ea7eb35061e4bd1978ed8
                                    • Instruction Fuzzy Hash: FD61CE707003158FEB25AF74D85466E7BB6EFC6221B5448AEE4069B3A1CF31EC46CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (q$(q
                                    • API String ID: 0-2485164810
                                    • Opcode ID: 872d6bcb31456dfc3b50c5e03ac870dac74a13e30d833f6b1e9fcbf1467665c2
                                    • Instruction ID: fd3327f9ee806a98a3c711de7ab3132095c7b355c15db39003ca5a1aadaf9c35
                                    • Opcode Fuzzy Hash: 872d6bcb31456dfc3b50c5e03ac870dac74a13e30d833f6b1e9fcbf1467665c2
                                    • Instruction Fuzzy Hash: 60517A317042058FEF159F64E8557AE3BA6FFC8211F5445AAE806DB3A1CB38EC858B91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: %$H
                                    • API String ID: 0-1210610973
                                    • Opcode ID: aef6c50a6d16bf67151ea72fa55f99036cfe7d96c3f4d6867f086cf2cf10e836
                                    • Instruction ID: 2470b7e9c1121abf4bd0ebfcc032cb25431e4612ff83195bfd760f6384ed0275
                                    • Opcode Fuzzy Hash: aef6c50a6d16bf67151ea72fa55f99036cfe7d96c3f4d6867f086cf2cf10e836
                                    • Instruction Fuzzy Hash: 8E41E0B0904269CFEB20CF55D958BDDBBB1BB49301F0098EAC509B7260C7796AC5DF64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 7$H
                                    • API String ID: 0-1468662275
                                    • Opcode ID: 57b8c885445281795a7c095f8b1e1189723e979dea0df492fffd0e2a0333f870
                                    • Instruction ID: a01b8fe37db5bcd073c895bd194b9ed261f68f9f3db9c3bf33bcf089d7b20bc6
                                    • Opcode Fuzzy Hash: 57b8c885445281795a7c095f8b1e1189723e979dea0df492fffd0e2a0333f870
                                    • Instruction Fuzzy Hash: F44101B4905269CFEB20CF55C958BD8BBB1BB49300F0098E7C909B7260C379AAC5DF64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: /$H
                                    • API String ID: 0-1170206923
                                    • Opcode ID: 4e92a47c365bbcf83661ae7c40b97e296455964939cfeee9c8a9e695e294cf8c
                                    • Instruction ID: eb50691ee6f7fa8a90b8b2b580231163e83ed62958ff1f8c306209343fb9bee3
                                    • Opcode Fuzzy Hash: 4e92a47c365bbcf83661ae7c40b97e296455964939cfeee9c8a9e695e294cf8c
                                    • Instruction Fuzzy Hash: 714113B4804269CEEB20CF55C958BEDBBB1BB45300F0098E7C909B7250C7796AC5EF64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: %$H
                                    • API String ID: 0-1210610973
                                    • Opcode ID: b7ce7dae3b8ee83d344cb72d0426eca8122f2dead45d1b66e6add7dc97c9a086
                                    • Instruction ID: 488bc90f42e4c152257d4750b43bb23a4bac1996fe8145b2c7dd25330cd971af
                                    • Opcode Fuzzy Hash: b7ce7dae3b8ee83d344cb72d0426eca8122f2dead45d1b66e6add7dc97c9a086
                                    • Instruction Fuzzy Hash: 8041F1B4904269CFEB20CF55C958BD9BBB1BB49301F0098E7C909B7250C379AAC5DF64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 9$H
                                    • API String ID: 0-1561603849
                                    • Opcode ID: f35d135b7912d1e36897cc542b003919bcc574fb8da6e1a255e62ab11356a2c0
                                    • Instruction ID: 93efe5e95def740be7d17e3d33d0cdf8604912b3bd61128f3486fe3b960dce53
                                    • Opcode Fuzzy Hash: f35d135b7912d1e36897cc542b003919bcc574fb8da6e1a255e62ab11356a2c0
                                    • Instruction Fuzzy Hash: 6F41D2B4904269CFEB60CF55C958BD9B7B1BB46304F0098D7C809B7260C779AAC6DF64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: a$~
                                    • API String ID: 0-4026647960
                                    • Opcode ID: d6b298bbc16cd83659a13744e06d69c41f18e81e0559d4424f82754c8c9d24d5
                                    • Instruction ID: 761b7189609783a92308f11fa32d0a9783abb0b6d016c2699bdceade96f23a17
                                    • Opcode Fuzzy Hash: d6b298bbc16cd83659a13744e06d69c41f18e81e0559d4424f82754c8c9d24d5
                                    • Instruction Fuzzy Hash: C241E5B4A1422E9FDB64DF68C898B99B7B1FF89305F1084DAA409A7350DB346F81CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: F$I
                                    • API String ID: 0-1975398642
                                    • Opcode ID: 985ad44f5083b19b180b041571679040fbd12bbabab4ea5c02eb26825392a451
                                    • Instruction ID: e1e1f95c356b3c12ffea977eb44f67a2e08d0676e5cb3f4c51dd8cdbc9601194
                                    • Opcode Fuzzy Hash: 985ad44f5083b19b180b041571679040fbd12bbabab4ea5c02eb26825392a451
                                    • Instruction Fuzzy Hash: 48114974945228CFDBA1DF68C884BD9BBF1BF09311F5011EAD109A72A0DB76AA80DF44
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 6$l
                                    • API String ID: 0-1783336165
                                    • Opcode ID: 93eb04a34829a80ecce7151914c624c0076c15d46595b10cc4df0e68c1c6971e
                                    • Instruction ID: 070fe56fedf9624efa4560a2bc795ea396c1c5c6515a2833cc6803641387c6f0
                                    • Opcode Fuzzy Hash: 93eb04a34829a80ecce7151914c624c0076c15d46595b10cc4df0e68c1c6971e
                                    • Instruction Fuzzy Hash: 62F04FF0905758CFDB61CF64EC843EEB7B9BB0A322F10499AC009AB251D7755D858F01
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: )$,
                                    • API String ID: 0-200091960
                                    • Opcode ID: 6df58b6fe60ea1f1038bac883a05820843205bc9311aa950c23c3ada3b1e7674
                                    • Instruction ID: d34b3cffe767418fa5894e899686625e5824fb069cab374974964931ead1955c
                                    • Opcode Fuzzy Hash: 6df58b6fe60ea1f1038bac883a05820843205bc9311aa950c23c3ada3b1e7674
                                    • Instruction Fuzzy Hash: 24F0AFB4A01218CFDB60CF24D968BDAB7B2BB46305F00549AD949A7290D3B46E84CF46
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,q
                                    • API String ID: 0-196045463
                                    • Opcode ID: ba7d7d66989df968a8e0dd517cdcf77b88768c91c037e700496ca6708ca8ae5e
                                    • Instruction ID: 82bb2c8f3e6c7f007adc6a5f6f8d3167443961773330430792a754bb901036b7
                                    • Opcode Fuzzy Hash: ba7d7d66989df968a8e0dd517cdcf77b88768c91c037e700496ca6708ca8ae5e
                                    • Instruction Fuzzy Hash: 45520775A002288FDB64DF69C981BEDBBF2BF88300F1541D9E509AB355DA30AD81CF61
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (_q
                                    • API String ID: 0-3590916094
                                    • Opcode ID: 0da3e9e24a1ecbe8c59b34d6fff415bf5b352e72b3fea859567faa2e37ee7875
                                    • Instruction ID: 4c6e0c763cf9edc4da644a39451a7e2324f7c7b78818001489e2439bad1b743c
                                    • Opcode Fuzzy Hash: 0da3e9e24a1ecbe8c59b34d6fff415bf5b352e72b3fea859567faa2e37ee7875
                                    • Instruction Fuzzy Hash: 51229D75A002059FDB54DF64C491AAEBBF6FF88321F14845AE905AF3A5CB31EC85CB90
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 034AC77F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 4ec807fdb5c01ead8e5cb23e3ded86564d8b10b65c9c0b3017f256839fba1f0d
                                    • Instruction ID: 87067887064ebf520d4c167725f2e0885dcf2ebd4ff7677da5e787fc1d55a082
                                    • Opcode Fuzzy Hash: 4ec807fdb5c01ead8e5cb23e3ded86564d8b10b65c9c0b3017f256839fba1f0d
                                    • Instruction Fuzzy Hash: FFA104B0D00618CFDB54CFA9C9857EEBBF1BB19300F14916AE858EB290DB749985CF49
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 034AC77F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 875ba53958b6b8f9f286f413e2f3304dde3e3729f0c294d9f4facd94f159046c
                                    • Instruction ID: 44edc61b9416448969f8530736588594cc08d4d44cde94117cbceab923d899e9
                                    • Opcode Fuzzy Hash: 875ba53958b6b8f9f286f413e2f3304dde3e3729f0c294d9f4facd94f159046c
                                    • Instruction Fuzzy Hash: D5A10370D006188FDB54CFA9C9857EEBBF1BB19300F14916AE858EB290DB749985CF89
                                    APIs
                                    • CreateFileA.KERNELBASE(?,?,?,?,?,?,?), ref: 034AE294
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: b8c870b57115d22a5ef928f0659655a22dbe92dc293b0993b61f0c1d31b07b64
                                    • Instruction ID: a46225f6f0b54d394613d1e3da6e0356699f6127ea603ecdbb94a6bc652f614a
                                    • Opcode Fuzzy Hash: b8c870b57115d22a5ef928f0659655a22dbe92dc293b0993b61f0c1d31b07b64
                                    • Instruction Fuzzy Hash: 1E51D1B5D002189FDF10DFA9D884B9EBBB1BB19304F24912AE824AB240D7749985CF58
                                    APIs
                                    • CreateFileA.KERNELBASE(?,?,?,?,?,?,?), ref: 034AE294
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 06478f6a6114439952362e021892902afaf230052f8d33dc13ebec7b8e1490da
                                    • Instruction ID: b751689acaed974b12bb135a63d040ea5d836ef48ab29da779bda9353d5d7767
                                    • Opcode Fuzzy Hash: 06478f6a6114439952362e021892902afaf230052f8d33dc13ebec7b8e1490da
                                    • Instruction Fuzzy Hash: 8E51B1B5D002189FDF14DFA9D884B9EFBB1BB19304F24942AE825AB240D7749985CF58
                                    APIs
                                    • CreateFileMappingA.KERNEL32(?,?,?,?,?,?), ref: 034AE4D6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: CreateFileMapping
                                    • String ID:
                                    • API String ID: 524692379-0
                                    • Opcode ID: 1c6a3206881d632a448751d179d46c8c6cb4bdd1451bc0128e9e36609e966737
                                    • Instruction ID: 6c57eb49540c22527d014fa5a2ee45661177204b96655a2b48a1a0ea5e6f89e6
                                    • Opcode Fuzzy Hash: 1c6a3206881d632a448751d179d46c8c6cb4bdd1451bc0128e9e36609e966737
                                    • Instruction Fuzzy Hash: 6E51C1B4D003189FDF24DFA9D885BAEBBB1FB19300F14902AE825AB350D7749985CF59
                                    APIs
                                    • CreateFileMappingA.KERNEL32(?,?,?,?,?,?), ref: 034AE4D6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: CreateFileMapping
                                    • String ID:
                                    • API String ID: 524692379-0
                                    • Opcode ID: 54d770d07a16fcceea5f34f9d5e0a3f88891a0825f102d0be418f1fb4ccb1949
                                    • Instruction ID: e2ba3b48e5ecbe4e94c84939430bc8c4a761983b8e68c7fa643abb656de2bd82
                                    • Opcode Fuzzy Hash: 54d770d07a16fcceea5f34f9d5e0a3f88891a0825f102d0be418f1fb4ccb1949
                                    • Instruction Fuzzy Hash: E351D2B4D003189FDF20DFA9D884B9EBBB5BB19300F14902AE825AB350DB749985CF59
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 034AD2D8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 8e835230097cdbafcb5f4392905ba144e997a57964341b0cf5cb98c44fe20f3c
                                    • Instruction ID: c894dd4d9b62105eb2a3d2effc09a8558d5e5c2420e4a279527a382e6c879cf6
                                    • Opcode Fuzzy Hash: 8e835230097cdbafcb5f4392905ba144e997a57964341b0cf5cb98c44fe20f3c
                                    • Instruction Fuzzy Hash: DD41BEB5D012589FCF14CFA9D984ADEFBF1BB49310F14902AE415BB240C735A941CF58
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 034AD2D8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 3f6a12ae527fa608a85e845440d2a4caec31da1e4d1d951b84515436778c63d0
                                    • Instruction ID: 2d6fd0c026e6294ff92cc99e899a17f8ee6290aaa21e249aa21c4a0b6d3dfd29
                                    • Opcode Fuzzy Hash: 3f6a12ae527fa608a85e845440d2a4caec31da1e4d1d951b84515436778c63d0
                                    • Instruction Fuzzy Hash: 6341CCB5D012589FCF04CFA9D984ADEFBF1BB09310F14902AE814BB240C735AA41CF68
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 034ACFF2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 7b916c0cdae9414dcccd287bd4bd651f56fc1b866a6a642fb6179c711c044ba4
                                    • Instruction ID: 7fa841ceaf1a1f972133bf37ed1629bdf31c9d987ca97bcb4149f4b118ab7394
                                    • Opcode Fuzzy Hash: 7b916c0cdae9414dcccd287bd4bd651f56fc1b866a6a642fb6179c711c044ba4
                                    • Instruction Fuzzy Hash: BD4198B9D042589FCF14CFA9D880ADEFBB1BB59310F10942AE815BB350D735A942CF68
                                    APIs
                                    • MapViewOfFile.KERNELBASE(?,?,?,?,?), ref: 034AE68A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: FileView
                                    • String ID:
                                    • API String ID: 3314676101-0
                                    • Opcode ID: 0780cd2b76c33796f1c1dabc26daaef34a903672297e05247aa6c4fd54f4bad2
                                    • Instruction ID: fd47037c5c5abb9680eb9cc9742efb069573c1ef7d5d1c5058e6ee2e55db02dd
                                    • Opcode Fuzzy Hash: 0780cd2b76c33796f1c1dabc26daaef34a903672297e05247aa6c4fd54f4bad2
                                    • Instruction Fuzzy Hash: E53198B9D002589FCF14CFA9D880ADEFBB1BB59310F10942AE815BB310D735A942CF68
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 034ACFF2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: aed74184921e317d177b6d4e8f4c6079eff495a3f1b306d00b178ca2967616f8
                                    • Instruction ID: b07b4314738f542ab13eeddb38dcf71092f0c8d31d29410d1b2aa3fc64be5d14
                                    • Opcode Fuzzy Hash: aed74184921e317d177b6d4e8f4c6079eff495a3f1b306d00b178ca2967616f8
                                    • Instruction Fuzzy Hash: 4A31A8B9D042589FCF10CFA9D880ADEFBB1BB49310F10942AE815BB350D735A942CF68
                                    APIs
                                    • MapViewOfFile.KERNELBASE(?,?,?,?,?), ref: 034AE68A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: FileView
                                    • String ID:
                                    • API String ID: 3314676101-0
                                    • Opcode ID: 222c92f781bc1b2e8478b722e95d3c3a4d0e5cacd40eaaa9e4ab06ce9f562e76
                                    • Instruction ID: fc41ab3c95edfd22d5ce95038f924df01fe8d50936aac1ca004d7ec6811ff8c9
                                    • Opcode Fuzzy Hash: 222c92f781bc1b2e8478b722e95d3c3a4d0e5cacd40eaaa9e4ab06ce9f562e76
                                    • Instruction Fuzzy Hash: 463188B9D042589FCF14CFA9D980ADEFBB1BB59310F10942AE815BB310D735A942CF69
                                    APIs
                                    • K32GetModuleInformation.KERNEL32(?,?,?,?), ref: 034ADCF4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: InformationModule
                                    • String ID:
                                    • API String ID: 3425974696-0
                                    • Opcode ID: e5ee56b01e812cf6a6afc6c4ee72e1d1128d28869041334dd319a8231d6355ee
                                    • Instruction ID: e9dbf9fe193267860e54befc9b0d5691e1db41db4ef1cd6f1d067b4ea86ee1f7
                                    • Opcode Fuzzy Hash: e5ee56b01e812cf6a6afc6c4ee72e1d1128d28869041334dd319a8231d6355ee
                                    • Instruction Fuzzy Hash: A531CAB5D01258DFCF14CFAAD880AEEFBB1BB49310F14902AE815B7240D739A945CF68
                                    APIs
                                    • K32GetModuleInformation.KERNEL32(?,?,?,?), ref: 034ADCF4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: InformationModule
                                    • String ID:
                                    • API String ID: 3425974696-0
                                    • Opcode ID: 18d96ab0622153919440e2115a10ae485243ab136f7409d976a42f480ccbbabb
                                    • Instruction ID: 22d97c18b1ec0929c570a7b5d3aa9bde743e3e7fcab3c88b866d7bf2b7c146f8
                                    • Opcode Fuzzy Hash: 18d96ab0622153919440e2115a10ae485243ab136f7409d976a42f480ccbbabb
                                    • Instruction Fuzzy Hash: 5531CAB5D00258DFCF14CFAAD880AEEFBB1BB49310F14902AE815B7250C739A945CF68
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,00000000,?,00000000), ref: 01B3A3CF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: d242b3c7a71d1bb69b156a1a993b8878a60cf59eea2b4470d993b0dedc6eecb0
                                    • Instruction ID: 5697d3f441a6a779933b7e79256999bf1fc19f9a45b085a6f2b91c35a7536e7a
                                    • Opcode Fuzzy Hash: d242b3c7a71d1bb69b156a1a993b8878a60cf59eea2b4470d993b0dedc6eecb0
                                    • Instruction Fuzzy Hash: 7B3197B9D002589FCF14CFA9D484AEEFBF1BB59310F24902AE854B7210D375A945CF64
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,00000000,?,00000000), ref: 01B3A3CF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: e98458c169edbe8b5285782780eb1c2114dcb8883507e301a150f8273ff1a13b
                                    • Instruction ID: dc35ed1573354052302e515888de73e9e480b570cbf93396ad87bff65d168242
                                    • Opcode Fuzzy Hash: e98458c169edbe8b5285782780eb1c2114dcb8883507e301a150f8273ff1a13b
                                    • Instruction Fuzzy Hash: EE31A8B9D042589FCB14CFAAD484ADEFBF0BB49310F24906AE814B7210D375A944CFA8
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 075BD59C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614145123.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_75b0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 3fda30c3efb9d9c9c2a8960e7603faac357e2f4e7cc5c0a25067d7e0e1a0f1b5
                                    • Instruction ID: a9aa9cffead64b4559c1ab814e1d6ac9aaed089f7e7b56d71593747e2b55126e
                                    • Opcode Fuzzy Hash: 3fda30c3efb9d9c9c2a8960e7603faac357e2f4e7cc5c0a25067d7e0e1a0f1b5
                                    • Instruction Fuzzy Hash: 0731A8B5D012189FCF24CFA9D880AEEFBF1BB09310F10942AE815B7250D735A945CF68
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 034AC977
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 535e72ff811580c8a978fca37836431de13db57578c0c5fe9b77fdd2b24edaeb
                                    • Instruction ID: 03f2ec3bd9271b9b523df4dab1a21834956b3ac8ad62b6735739290d97a99ffe
                                    • Opcode Fuzzy Hash: 535e72ff811580c8a978fca37836431de13db57578c0c5fe9b77fdd2b24edaeb
                                    • Instruction Fuzzy Hash: 2F41CCB5D01218DFDB14CFAAD884AEEBBF1BF49310F14802AE415B7240C739A945CF58
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 034AC977
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 6b9f549efbcbab9bee3a08ecd398c024bbc1823d00be1af0dff261c03e95dee1
                                    • Instruction ID: c69ea29a80dc1b388be37639a47abc5920d992ff1d235b9208320e1385b01e3e
                                    • Opcode Fuzzy Hash: 6b9f549efbcbab9bee3a08ecd398c024bbc1823d00be1af0dff261c03e95dee1
                                    • Instruction Fuzzy Hash: 6431BCB5D052589FDB14DFAAD884AEEFBF5BF49310F14802AE414B7250C738A945CF68
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 034AC18E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: b553746f0754855623788fb523d882179506647d8503e7eaaf9f17bba890a0b4
                                    • Instruction ID: 9b441eb94a67dd475ec0e4fe8302de4790406c3373f1746ed3cfbb7c542aac9a
                                    • Opcode Fuzzy Hash: b553746f0754855623788fb523d882179506647d8503e7eaaf9f17bba890a0b4
                                    • Instruction Fuzzy Hash: C031BEB5D012189FDB14CFAAD885AEEFBF1AB48310F14942AE415B7240C7399941CF69
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 034AC18E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 7cded4ca2f414c4452b560d8280c0b7ba88bf3ae8b3775f781f878df9099dc14
                                    • Instruction ID: d4945de3b68f01b6ba921b60619eb9bb19bf484d405db090d37677cce22faa77
                                    • Opcode Fuzzy Hash: 7cded4ca2f414c4452b560d8280c0b7ba88bf3ae8b3775f781f878df9099dc14
                                    • Instruction Fuzzy Hash: 5C31CEB5D012189FDF14DFAAD884AEEFBF5AF49310F14842AE815B7240C739A941CF68
                                    APIs
                                    • ResumeThread.KERNELBASE(?), ref: 034AD61E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: a1f1a037bb46ab288aeba13311b3a3922710095e0e9321c407651d5bcac67f82
                                    • Instruction ID: a67f08922402f14035b723c1f4f6b1ed190b8e8b7b9b2a6c176c7b30ecef490e
                                    • Opcode Fuzzy Hash: a1f1a037bb46ab288aeba13311b3a3922710095e0e9321c407651d5bcac67f82
                                    • Instruction Fuzzy Hash: 0331BCB4D012189FDB14DFA9D981AEEFBB1BB49310F14902AE819B7350C735A901CF68
                                    APIs
                                    • ResumeThread.KERNELBASE(?), ref: 034AD61E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: b535994f7e06a8042e5265a1b46fe1a910484005b15c71296b5e34b5b4cbfe98
                                    • Instruction ID: 257e82e0082be3035c93dd7c845f46afe8b307b9d225701db48d9bca8be39fb6
                                    • Opcode Fuzzy Hash: b535994f7e06a8042e5265a1b46fe1a910484005b15c71296b5e34b5b4cbfe98
                                    • Instruction Fuzzy Hash: A431CBB4D012189FCB14DFAAD880ADEFBF4AB49310F14902AE819B7310C735A901CF68
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q
                                    • API String ID: 0-1807707664
                                    • Opcode ID: bf3820afeedfe465597fb2e5aac0d7cd1a877cfd71e23114231ae1d00dc5e69b
                                    • Instruction ID: 8db050cc3c1bbcf24115051e4c6a3479566440c50b53bf3f26aa93d2916d15f0
                                    • Opcode Fuzzy Hash: bf3820afeedfe465597fb2e5aac0d7cd1a877cfd71e23114231ae1d00dc5e69b
                                    • Instruction Fuzzy Hash: 04A1CB38A10218DFCB14EFA4D89899EB7B6FF89310F158559E406AB365DB34FC46CB50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (q
                                    • API String ID: 0-2414175341
                                    • Opcode ID: 0a3dd9a97469ac620b890c512ebee8599575f78a4ec331614a1bdc85367589a8
                                    • Instruction ID: cdcfc21de13283f64f009eac53d3a5c058cae44a26b3c51ed15101ef64267083
                                    • Opcode Fuzzy Hash: 0a3dd9a97469ac620b890c512ebee8599575f78a4ec331614a1bdc85367589a8
                                    • Instruction Fuzzy Hash: 5B51CF71B006168FCB10CF68D484AAAFBB9FF85321B15C65AE5299B341D730F895CBD0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: pq
                                    • API String ID: 0-153521182
                                    • Opcode ID: a5ca278c18d820ed0578a48d307330c20649b697d046a550ea25e93b9adc30c0
                                    • Instruction ID: 7885a65c78b985ad50661955aaf5e93e65673f233d400e5baa2de4d731543d25
                                    • Opcode Fuzzy Hash: a5ca278c18d820ed0578a48d307330c20649b697d046a550ea25e93b9adc30c0
                                    • Instruction Fuzzy Hash: FB515B76600104AFCB559FA8D905D69BBF3FF8D31471A8098E2099B372DB32DC22DB51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: !
                                    • API String ID: 0-2657877971
                                    • Opcode ID: 2f3e5dfa2991044d16d6d930b9badf86b6787e564630bede4747b39ea5b234c2
                                    • Instruction ID: 368bfa9feb9c44109ce7b90ce90ecc80749ea8963c58eab155d3c33f834c06ff
                                    • Opcode Fuzzy Hash: 2f3e5dfa2991044d16d6d930b9badf86b6787e564630bede4747b39ea5b234c2
                                    • Instruction Fuzzy Hash: 3151DEB4905269CFEB60CF55C958BD8BBB1BB45305F0098EBC809B7260C379AAC5DF64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (q
                                    • API String ID: 0-2414175341
                                    • Opcode ID: 55a672fcfda2021605c3a16d8ec72752433142ff3f21fac32fa794b9c142d3fd
                                    • Instruction ID: 8876a31367f2423f314bd83dce0bfae4ddee7c88c26c26f107510bb696c9c72b
                                    • Opcode Fuzzy Hash: 55a672fcfda2021605c3a16d8ec72752433142ff3f21fac32fa794b9c142d3fd
                                    • Instruction Fuzzy Hash: A531F2323052555FEB145E79E844AEF7B6AEFCA320B54807AF908CB350CE719C06C3A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q
                                    • API String ID: 0-1807707664
                                    • Opcode ID: 30fc01cef5d0722b157c317ba2c0051100362bc8e43253d00b47ac19e69e90d2
                                    • Instruction ID: 2f1feb4a9428dc765dfaa2b86d07708d57543875f7bb6ca01652b768c32e8e42
                                    • Opcode Fuzzy Hash: 30fc01cef5d0722b157c317ba2c0051100362bc8e43253d00b47ac19e69e90d2
                                    • Instruction Fuzzy Hash: 1E3172357042149FCF15DF64D894AA9BFB2FF89310B0940AAE9059F366DA31EC16CB51
                                    APIs
                                    • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 075BE75F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614145123.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_75b0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 7a74495601de41b4d64f2da93b754f579853d2b6d796d072b15c52bde2f83ae0
                                    • Instruction ID: 0d6d25db81f0bed477eac7812878f0c37b0b2925247a12eda64c9a227a275864
                                    • Opcode Fuzzy Hash: 7a74495601de41b4d64f2da93b754f579853d2b6d796d072b15c52bde2f83ae0
                                    • Instruction Fuzzy Hash: B231A7B9D002589FDF14CFA9D880AEEFBF1BF49310F24942AE814B7210C735A9418F68
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: p<q
                                    • API String ID: 0-3896934649
                                    • Opcode ID: 9dba28975076d620e5d9dfe418d0e03ca9c96daa27dd087f6598ed723d682ef4
                                    • Instruction ID: 3f1cdb637a27859c2f4f603b71e7760cd62094e066c64c5998ffca4c1221eec6
                                    • Opcode Fuzzy Hash: 9dba28975076d620e5d9dfe418d0e03ca9c96daa27dd087f6598ed723d682ef4
                                    • Instruction Fuzzy Hash: CC2191B03041559FDB01CF2AD840AEB7BEAAF8A211B054096FD54CB361C731DC90CB70
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603142085.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b80000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q
                                    • API String ID: 0-1807707664
                                    • Opcode ID: 69572c723768d871bb90805d62cf925fee0f298f15f8b8956d812f287423491b
                                    • Instruction ID: f4b436e7783764178694f982f4ae72eed20d5b5685ca7d68e2d9272fd2e12be1
                                    • Opcode Fuzzy Hash: 69572c723768d871bb90805d62cf925fee0f298f15f8b8956d812f287423491b
                                    • Instruction Fuzzy Hash: 44315834E08249CFDB15EFA9D4096FEBBB2FF45301F1090AAD412A7290DB34694ACF91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603142085.0000000005B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B80000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b80000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q
                                    • API String ID: 0-1807707664
                                    • Opcode ID: 2601a822a57251d1f7fe3174276ee748afe08ddacb5db8bfe8bfc23c635a59a4
                                    • Instruction ID: f98006265c1e78048b5b13d9bed82f1ad78853af4e0c0cfdf892ae23823558c4
                                    • Opcode Fuzzy Hash: 2601a822a57251d1f7fe3174276ee748afe08ddacb5db8bfe8bfc23c635a59a4
                                    • Instruction Fuzzy Hash: 66318974D09249CFDB09EFA8C4596FDBBB2FF05341F1490AAD012AB291C734698ACF51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 1
                                    • API String ID: 0-2212294583
                                    • Opcode ID: 0b479c74ea2976fc484533954e2a5af7ff12916df55d50d1537883b19628293e
                                    • Instruction ID: 7445ae1aae1be7375915a9cf4913ac3c08be2723915b78029c29c0637b7b858b
                                    • Opcode Fuzzy Hash: 0b479c74ea2976fc484533954e2a5af7ff12916df55d50d1537883b19628293e
                                    • Instruction Fuzzy Hash: A221A2B4A04629CFCB64DF28D998B9AB7F5BF49312F1015EA9409AB350DB709E81CF41
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: +
                                    • API String ID: 0-2126386893
                                    • Opcode ID: 30dd2f88b6c50d9179e20a71356d14963b856374e999e73a825c437aedad122d
                                    • Instruction ID: 21b749219d9c83a8c47f82ade2c4f2cb15885bf52846569ea0d35f63436761a8
                                    • Opcode Fuzzy Hash: 30dd2f88b6c50d9179e20a71356d14963b856374e999e73a825c437aedad122d
                                    • Instruction Fuzzy Hash: FB21B9B4A11229CFCB64DF24D9A9B99B7B1FB49300F5045DAD80DA7351D7749E80CF01
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: *
                                    • API String ID: 0-163128923
                                    • Opcode ID: a628214974cc3e25d795d910e502db26b0d675dd98d122d14a279740dd19bc63
                                    • Instruction ID: 80b7ef6d5ae4df86ac32c582038f7773d5aef68149a170df76b6b63422f30274
                                    • Opcode Fuzzy Hash: a628214974cc3e25d795d910e502db26b0d675dd98d122d14a279740dd19bc63
                                    • Instruction Fuzzy Hash: 6A011AB0A00218DFD764CB18DD94BD9B3B1BB49300F148496E90CA6290D7B05981CF41
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -
                                    • API String ID: 0-2547889144
                                    • Opcode ID: 3051cae99e68da4aa9d6f319ba5be97d87ca8ea003767e707e089ad3c79bacd2
                                    • Instruction ID: 4b2bfda854a4a061a9cadc97d1b0bfef2ab451fd11ede32e6a5ac67994bb2ec9
                                    • Opcode Fuzzy Hash: 3051cae99e68da4aa9d6f319ba5be97d87ca8ea003767e707e089ad3c79bacd2
                                    • Instruction Fuzzy Hash: EFF07F74805258CFDB60DFA4D489B9CBBF1BB08314F205496C009A7290DB786988CF15
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: :
                                    • API String ID: 0-336475711
                                    • Opcode ID: be394a90b3bff6222536a30ada8403900233aa5d4b1f71d576147c77f085b96e
                                    • Instruction ID: c2b6004b8045747b46f6c233b516ee709ab6997a7e53fa634522bb921208f09b
                                    • Opcode Fuzzy Hash: be394a90b3bff6222536a30ada8403900233aa5d4b1f71d576147c77f085b96e
                                    • Instruction Fuzzy Hash: 40F0BE3080064ADBCF018F64C8245C9BB34FF56314F108686E85937250CB346A85CFC0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: /
                                    • API String ID: 0-2043925204
                                    • Opcode ID: 586e62ff47c0fba5eed478d316dce3c68325aa30ee2e5713d6f650eb9070fbe6
                                    • Instruction ID: 574904d9b67a0c3892f06d48244d5f94c723b5c4e46b1892ca701fbd1b99e08e
                                    • Opcode Fuzzy Hash: 586e62ff47c0fba5eed478d316dce3c68325aa30ee2e5713d6f650eb9070fbe6
                                    • Instruction Fuzzy Hash: DDF0347180022ADFDF28DF60D818BECBBB2BF54300F0044E9954A66290CB741EC4DF10
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Teq
                                    • API String ID: 0-1098410595
                                    • Opcode ID: e3b000e8c9f6c60dd08eb58b8bbb7483f247d5f527cb627364f37f12d8afe02f
                                    • Instruction ID: 8d9ecb5944ad8f2de05005126cbb90c9d3c333d003a33596ded609bf9b0ebea8
                                    • Opcode Fuzzy Hash: e3b000e8c9f6c60dd08eb58b8bbb7483f247d5f527cb627364f37f12d8afe02f
                                    • Instruction Fuzzy Hash: 22F0BCB4A121588BCB24DF28C9847DDBBB6BB88300F10849A950AB7344DB306E818F00
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: *
                                    • API String ID: 0-163128923
                                    • Opcode ID: c69dceebd3a2d7ae3c5d9dcb1e0c5935c27b0d45b174b161b19270422d61fa6a
                                    • Instruction ID: 9824e8160ceec1ff187407b8663a821c1703bac024da333ce6b847c3e4a87b99
                                    • Opcode Fuzzy Hash: c69dceebd3a2d7ae3c5d9dcb1e0c5935c27b0d45b174b161b19270422d61fa6a
                                    • Instruction Fuzzy Hash: 6FF0C97481422ECFDB20CF11C958BD8BAB1BB05304F0094D6C80A62250D7786AC5CF51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: *
                                    • API String ID: 0-163128923
                                    • Opcode ID: 5cb38e35074ad857e1d5bd40359c6771daf45c6282c3d6fe910498d103602164
                                    • Instruction ID: e131f391ab2bfe0519402d71403190c2fddc5a592b126aaa0b5e907926a425a1
                                    • Opcode Fuzzy Hash: 5cb38e35074ad857e1d5bd40359c6771daf45c6282c3d6fe910498d103602164
                                    • Instruction Fuzzy Hash: B6E0ED74A082449FD750CB64D898B98FFB2EF46304F1886D9E44C9B282DBB19985CB42
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: k
                                    • API String ID: 0-140662621
                                    • Opcode ID: 5f1d066cb9826c513fee6734cdd0fc4321e1af0fbe63a8f9014c0b62c2ceb6cc
                                    • Instruction ID: b043b7749555bf828cecf682d19d01bc352c4b56c4781ee511dbbccf4e788918
                                    • Opcode Fuzzy Hash: 5f1d066cb9826c513fee6734cdd0fc4321e1af0fbe63a8f9014c0b62c2ceb6cc
                                    • Instruction Fuzzy Hash: 91E075F4815368CFDB609F54D9887DEB7F5BB15326F1004D9D449AA290D7B54ED0CE01
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: F
                                    • API String ID: 0-1304234792
                                    • Opcode ID: f7af9f8966270a0b65b2e8aa5b76bf6922a0358349bb07b9ea29391655cc13ad
                                    • Instruction ID: 6d4577af2613552d50031f5d45d6f17afd6af042ee713259c1c1d5c68d3e1174
                                    • Opcode Fuzzy Hash: f7af9f8966270a0b65b2e8aa5b76bf6922a0358349bb07b9ea29391655cc13ad
                                    • Instruction Fuzzy Hash: 79E0EC78C05318CFCFA0CF24C484B9ABBB2BF05301F6051D5C84967254DB369A818F45
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: F
                                    • API String ID: 0-1304234792
                                    • Opcode ID: 8f04310187fee1ff8f0226e17bd014b4d643484277f89ab43c94986af7222e04
                                    • Instruction ID: b8b398dbf8e42ebe224a9c6645c0faef58197ed9280cc4c8ce1f5892ff5ce44f
                                    • Opcode Fuzzy Hash: 8f04310187fee1ff8f0226e17bd014b4d643484277f89ab43c94986af7222e04
                                    • Instruction Fuzzy Hash: 9FD06C74945218CBDBA0CF64C4C4A9ABBB2AB05310F6050E9C00867250DA36AA818F05
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -
                                    • API String ID: 0-2547889144
                                    • Opcode ID: 2dc036007f1c0d107f63eabde14f15c4e2ec72e0d56e36cdf544d5c8327b2304
                                    • Instruction ID: 469d54612ba0229c1754c5589a410bf045a2cf2586188fc64bd2d5382b7e5140
                                    • Opcode Fuzzy Hash: 2dc036007f1c0d107f63eabde14f15c4e2ec72e0d56e36cdf544d5c8327b2304
                                    • Instruction Fuzzy Hash: 3ED092B490112CCBEB20DF54D889B99BBF1BB18304F1055D6C408B7201E730AE84CF15
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a96af6520f48f4818ebc3014fede49998e448f5426185ac26dac27f31bc55511
                                    • Instruction ID: d724c2e2a63a8fa6848c92102a51bbd7c2fd89343096395ad035f3905dbf6d5f
                                    • Opcode Fuzzy Hash: a96af6520f48f4818ebc3014fede49998e448f5426185ac26dac27f31bc55511
                                    • Instruction Fuzzy Hash: 50C1F8B4E05218CFDB54DFA9D498BADBBB6FB89305F10846AD809A7354CB345D85CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cf5e55a2e2c9533bdac907db0145742c0f4e943025abf1e0ec5b984ca3912ad2
                                    • Instruction ID: 34121dbb38a58790a4d70d79d14eac08384adaf015287eb8560644c3db652c10
                                    • Opcode Fuzzy Hash: cf5e55a2e2c9533bdac907db0145742c0f4e943025abf1e0ec5b984ca3912ad2
                                    • Instruction Fuzzy Hash: 69C138B4E05218CFDB54DFA9D898BADBBB6FB89305F10846AD409AB354CB349D85CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e81eb57302f0d0f274c7d9d33f2e2d23774061f891caca086d42b6d19978e836
                                    • Instruction ID: 67fc1f3a0aa76c6cc6cb1563dedb7f4990b9a34bc2579b1f808deaf672aba8bb
                                    • Opcode Fuzzy Hash: e81eb57302f0d0f274c7d9d33f2e2d23774061f891caca086d42b6d19978e836
                                    • Instruction Fuzzy Hash: F2B11AB4E05218CFDB54DFA9D894BADBBB6FB49305F10886AD809AB354CB349D85CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b77047ba6ffa1b787fada0fd11dd21c734a8f23ee319eda420417ba9d4cb7c5b
                                    • Instruction ID: 71ef83165fea42f02803ef5b921cad7e917f4e96b19c38148eb78feba08517d8
                                    • Opcode Fuzzy Hash: b77047ba6ffa1b787fada0fd11dd21c734a8f23ee319eda420417ba9d4cb7c5b
                                    • Instruction Fuzzy Hash: 6CB1E5B4D05208CFDB54DFA9D864BADBBF6BB89301F1094AAD809A7351DB346D85CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 12772918d4140840c6ed415acc96cd526557b014e5aecb833efe12803e02f124
                                    • Instruction ID: c189286b7fbbad143ef2a25a7166bb7fbd340237023c85036c0abfdbc0af3147
                                    • Opcode Fuzzy Hash: 12772918d4140840c6ed415acc96cd526557b014e5aecb833efe12803e02f124
                                    • Instruction Fuzzy Hash: 4FB1E5B4D05208CFDB54DFA9D864BADBBF6BB89301F10946AD809AB351DB345D85CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f9146a27f44ceed5589b38b00b96c738fc6115bc93245f4d1ee53a099cb1153f
                                    • Instruction ID: 05e3022bfc6bd26fc842e759d6242cbefe62fc26505351cc5a3a667b086188cb
                                    • Opcode Fuzzy Hash: f9146a27f44ceed5589b38b00b96c738fc6115bc93245f4d1ee53a099cb1153f
                                    • Instruction Fuzzy Hash: C3A1D3B4D05208CFDB54DFA9D9A4BADBBF2BB49301F1094AAD409A7351DB346D85CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1735859f6ba3493b9c9983c5837c8dd601b33285af7942834096802d9ae894a9
                                    • Instruction ID: fbc53e8ad686cfc5e3568cc8dc4677b2475f5012c02841c462ae74757031ba9a
                                    • Opcode Fuzzy Hash: 1735859f6ba3493b9c9983c5837c8dd601b33285af7942834096802d9ae894a9
                                    • Instruction Fuzzy Hash: 4C817CB5A112099FCB05DFA5D955AEEBBF6FF88322F10406AE4019B390DB35DD41CB50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f9fb8ec9170c6c62fefd6d6ffb21f415eae450b8c5bbe3b54cf3b6b42d7c4aa2
                                    • Instruction ID: a4b68cf11a7a0a73734f6cd462ae6a7a225531ff462750f7cedcc6ef8ccea279
                                    • Opcode Fuzzy Hash: f9fb8ec9170c6c62fefd6d6ffb21f415eae450b8c5bbe3b54cf3b6b42d7c4aa2
                                    • Instruction Fuzzy Hash: 49B1D3B4D05219CFEB64CFA5C894BEDBBF2BB49304F1084AAD81DAB251CB749984CF11
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c4a4aed1d6e8d6ab3da53d91013b793c81c91899ab2911af6b94aa862ed2dda7
                                    • Instruction ID: ce0b831edc277dd0939bdd9728c29c545bc5f5325191e91e8f272b35bb0ba69e
                                    • Opcode Fuzzy Hash: c4a4aed1d6e8d6ab3da53d91013b793c81c91899ab2911af6b94aa862ed2dda7
                                    • Instruction Fuzzy Hash: A7B1D3B4D05219CFEB64CFA5C894BEDBBF2BB49304F1084AAD81DAB251CB749984CF11
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a7c29aa59db81f4878b3c6801aa104e645fe1febbec7252b70319dfb25fc7fb4
                                    • Instruction ID: 23ede3e4131cafaf1ea8d166eabfc9feeb022aaa5c3731e43c6b950e20a15368
                                    • Opcode Fuzzy Hash: a7c29aa59db81f4878b3c6801aa104e645fe1febbec7252b70319dfb25fc7fb4
                                    • Instruction Fuzzy Hash: FE81E535A40618DFCB24DF69C484A9EB7F6FF88710B1581A9E856DB360DB34ED42CB90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c9faf1c490c43028fa1c70afe9a5cb49eeb519eee717edf3066ebec97420f460
                                    • Instruction ID: ff1a64b7bc307476fcf7a318ff2c459d516a1e03d8e89669d48bd2582b24fe46
                                    • Opcode Fuzzy Hash: c9faf1c490c43028fa1c70afe9a5cb49eeb519eee717edf3066ebec97420f460
                                    • Instruction Fuzzy Hash: 508190B4E0520DCFDB44DFA9D548AAEBBF2FB48311F108069D409BB254E7786A85CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dcb9144f4e40a5ea2e7c88045a6d2ae49870f1ae419c94452b28c20c11c8a82a
                                    • Instruction ID: d3e29c06115d4a56adc4207136173b19b72fd0a2ea30501f1c16fda334be384a
                                    • Opcode Fuzzy Hash: dcb9144f4e40a5ea2e7c88045a6d2ae49870f1ae419c94452b28c20c11c8a82a
                                    • Instruction Fuzzy Hash: FE71C2B4E0520DCFDB04CFA9D588AADBBF2FF48311F14806AD409AB254D7786986CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cf084a6220adccf2005765f8506ef5d1440b3ea2261906ff98196bf18508b884
                                    • Instruction ID: fc120011185687e9c57b80f0bab7e638c2f5de4f3781e6fefacd964065571485
                                    • Opcode Fuzzy Hash: cf084a6220adccf2005765f8506ef5d1440b3ea2261906ff98196bf18508b884
                                    • Instruction Fuzzy Hash: E1F0B4B28193949FC752CBB4D8612E87F70EF4A221F1D44DBC844973A2D6355E46C752
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e7a0089e289a3eb2aa99871112c71eb352a0b03dafc0acf85d834137765f2b92
                                    • Instruction ID: 1d47e5d0e0d8fa68444e4e708a3909d8142ff9265d5fa30df4baa261d7f1be16
                                    • Opcode Fuzzy Hash: e7a0089e289a3eb2aa99871112c71eb352a0b03dafc0acf85d834137765f2b92
                                    • Instruction Fuzzy Hash: BB610474D05248DFDB19CFB9D594AADBFF2BF89300F2481AAD406AB265DB349941CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 29eb638a16c1ec81469c35b80ba8c047449536082775e8980adb1c433cf51158
                                    • Instruction ID: e7ab4e528e775bf66becda6f8d98098153e91632a5a8405e4f3090dd0e7984a6
                                    • Opcode Fuzzy Hash: 29eb638a16c1ec81469c35b80ba8c047449536082775e8980adb1c433cf51158
                                    • Instruction Fuzzy Hash: E2518138B006099FCB15EF64E458AAEB7B6FF89711F10411AF502AB364DF34AD06CB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 87c5ce247b68c5dac009ce22fe72369509fd432e450991ccc742809d04b8134c
                                    • Instruction ID: e1eb585d5f668af0d0ba8a308fcd9afd647b325b8f69b6064673d856aa7813b1
                                    • Opcode Fuzzy Hash: 87c5ce247b68c5dac009ce22fe72369509fd432e450991ccc742809d04b8134c
                                    • Instruction Fuzzy Hash: 664111F25182869FC7139774B900AF9BFBCAB02172B1844DBC560CF263D3218986DBC1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7064edc0e11b2be703f0814e524c3aa546753c7c679f7e9903317a18ca9678ee
                                    • Instruction ID: 6c337c43c8e9b6965c94b98e7150425cad18351f1cc2a1581619c688f3fa750e
                                    • Opcode Fuzzy Hash: 7064edc0e11b2be703f0814e524c3aa546753c7c679f7e9903317a18ca9678ee
                                    • Instruction Fuzzy Hash: FA6108B4D05269DFDBA1CF29C994BD9BBF1BB49300F4085EAA90DA7210E7319E84CF50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b1e901902470fe0e29db80e12cc0a438c26b21c7ca3d39091f077b666dbbcc71
                                    • Instruction ID: 2842d80a3fa7fd632f992b4eb6865204a8efd60a92c428bb3e0afe2ee604e6c0
                                    • Opcode Fuzzy Hash: b1e901902470fe0e29db80e12cc0a438c26b21c7ca3d39091f077b666dbbcc71
                                    • Instruction Fuzzy Hash: 0E511AB5D05269DFDB61CF68CD94BD9BBB1BB49300F1086DAA90DA7300EB319E858F50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6999b287e624af8f13dd38e4ac5909a01f63bcb0cd03dd5594bc5739aed81b25
                                    • Instruction ID: 50965b74de2d6a8fa919cd9a2470ff9269c9ceaeb0b98e90d204920353b62c58
                                    • Opcode Fuzzy Hash: 6999b287e624af8f13dd38e4ac5909a01f63bcb0cd03dd5594bc5739aed81b25
                                    • Instruction Fuzzy Hash: C04142B4E11209CFDB04CFA9D644AEEBBF6FB99311F11842AD408B7211D3344A41CF92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0f1bfe5c3f21bb38dbf2ced4147d4c75d1ee54c50e749c0435617fac012e8038
                                    • Instruction ID: 4a2a1eea861e16c7c5d52d84b0256b70d254e4e394db8b1776824cda920c0142
                                    • Opcode Fuzzy Hash: 0f1bfe5c3f21bb38dbf2ced4147d4c75d1ee54c50e749c0435617fac012e8038
                                    • Instruction Fuzzy Hash: 2C31D376600109AFCB05DF58D988EA9BBB2FF49320F1680A8E609DB372C771ED55DB40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5c2b945e917b5dca691730f7c5b03dea36c53a077fbe12451db2f5b9322a82e6
                                    • Instruction ID: 57df0115283577a468cd6ee61996079df8827919c36c70369aa0e274d9f452b7
                                    • Opcode Fuzzy Hash: 5c2b945e917b5dca691730f7c5b03dea36c53a077fbe12451db2f5b9322a82e6
                                    • Instruction Fuzzy Hash: 0E419CB1A006168FDB14CFA5C944ABFBBB5FF88361F00846AD445E7360D735E945CB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1069bfeabb2937301c8baa79d3a004a8f3404ca59bff808eed396cae60daa46e
                                    • Instruction ID: 7e11481ab292cde426ef87fb16179f1fdcf0aef44bbdb6c5d302d8111d264109
                                    • Opcode Fuzzy Hash: 1069bfeabb2937301c8baa79d3a004a8f3404ca59bff808eed396cae60daa46e
                                    • Instruction Fuzzy Hash: 5041F3B4E21209DFDB04CFAAD544AEEBBFAFB99311F11842AD408B7251D7345941CF91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6d8cd05bf261f2fb9d3f2308072dc01c341954f3066a4135a886e01e03a429a4
                                    • Instruction ID: a12a86beb381eab7c1ff47453c68a54dd49687f7b7a8d0b1067b3ddaee6160f9
                                    • Opcode Fuzzy Hash: 6d8cd05bf261f2fb9d3f2308072dc01c341954f3066a4135a886e01e03a429a4
                                    • Instruction Fuzzy Hash: B43147B4D012099FCB05DFA5D8556EEBFF6FF89210F14806AE805A73A4DB305941CBA5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cae5e3c006e96ea826e6c40d99b9fc0aa18eac7b487f973795b6640f7b3723e5
                                    • Instruction ID: 9d6b0e343b87a04315dc57552c6eab8f898b3995559b87e09ba3b2194310ec18
                                    • Opcode Fuzzy Hash: cae5e3c006e96ea826e6c40d99b9fc0aa18eac7b487f973795b6640f7b3723e5
                                    • Instruction Fuzzy Hash: 3241E5B4A512188FEB24CB24C891FDAB7B5FB49721F1041DAE905AB391D631AD81CF61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 335f32bf45e4ecafd0db584bff7dc1b7868b95d4e6e312ce7e422a5633932c06
                                    • Instruction ID: ddf9902a62f737334e47f2b04c02484dcd056d70ebe48e905d3af772019f4661
                                    • Opcode Fuzzy Hash: 335f32bf45e4ecafd0db584bff7dc1b7868b95d4e6e312ce7e422a5633932c06
                                    • Instruction Fuzzy Hash: 91510AB5D05268DFDBA1CF29C994BD9BBF1BB49300F1085EAA90DA7210DB319E858F50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3bc76771c0ac216c707d94f2dd7230a9eee6df3198ea2d3f0c6df8b8947f33cb
                                    • Instruction ID: e97ad10452fc9ac6178052ad65a4c6e41483c5fb90f7809e93aa84326f5091c0
                                    • Opcode Fuzzy Hash: 3bc76771c0ac216c707d94f2dd7230a9eee6df3198ea2d3f0c6df8b8947f33cb
                                    • Instruction Fuzzy Hash: 334123B4E04209DFDB05CFAAD444AEEBBF6FB89321F10846AD418A7354D7389942CF90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 82a44cf34e30faf34bdb2256b73edf4f2d534f78b970521744788c0104455a95
                                    • Instruction ID: c037357d03f69c700e6f247800c0f102b2d055185dfca8b0fc66bffade0ff3cc
                                    • Opcode Fuzzy Hash: 82a44cf34e30faf34bdb2256b73edf4f2d534f78b970521744788c0104455a95
                                    • Instruction Fuzzy Hash: 294107B4A04119CFDB60DF68D994BACB7B5FB89205F1185EAD80DAB354DB309E81CF50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0cc1c201f9ade073cf33d281700450ca2cabf769accbf3c034ff4781b502fd6e
                                    • Instruction ID: ed0ba63070951aba1ebbd708a17084ac94354289bf60f195d0e1fee2150ed5f7
                                    • Opcode Fuzzy Hash: 0cc1c201f9ade073cf33d281700450ca2cabf769accbf3c034ff4781b502fd6e
                                    • Instruction Fuzzy Hash: 473117B4E04209CFDB05CFAAD444AEEBBF6FB89321F10846AD419A7354D7349942CF90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 927e6c174be524a2e14249d24a755ed856c382db33b019003c1363f472507dc1
                                    • Instruction ID: 0d31e5f46de27902db6e5185be8ead42822b26b8634db1fc3f681cf56424c6c5
                                    • Opcode Fuzzy Hash: 927e6c174be524a2e14249d24a755ed856c382db33b019003c1363f472507dc1
                                    • Instruction Fuzzy Hash: 552138353082458FD724CB69E984A57BBE8EFC122071984BBE10DCF152CB25FC02C751
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 65c38932da9c5b39f8fc4bce68eeaf92887f18ffeb8dedd7a4ea340aee444afd
                                    • Instruction ID: 1e704fc489f8731bc272d8cebff5791c42d796be810a6f70c8bfb9c03eee1be7
                                    • Opcode Fuzzy Hash: 65c38932da9c5b39f8fc4bce68eeaf92887f18ffeb8dedd7a4ea340aee444afd
                                    • Instruction Fuzzy Hash: 2D3124B0945109CFDB15CF69D588BEDBBFAFB49336F20946AE009A7654D774A882CF00
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7c8b7135368ce8bccc692dc65d0b7336c603060c7ee7763ab048c47321a9fd32
                                    • Instruction ID: 650afc366d6682411acaf67544f290efd5e7428420d9efa94103fc440b823d05
                                    • Opcode Fuzzy Hash: 7c8b7135368ce8bccc692dc65d0b7336c603060c7ee7763ab048c47321a9fd32
                                    • Instruction Fuzzy Hash: 863142B4D0620ACFDB04CFAAD8486EEBBFABF99321F05846AD414B7250D7349945CB52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 99e89d71cbe2dc0a01eb48b832ee860b4f9f2bfccf046a34f9e4f1f380632332
                                    • Instruction ID: 1dd93356eafd6e4e87e532659b655deef25b8711dad939b3d0a9c03d2b7d9dd9
                                    • Opcode Fuzzy Hash: 99e89d71cbe2dc0a01eb48b832ee860b4f9f2bfccf046a34f9e4f1f380632332
                                    • Instruction Fuzzy Hash: 6821C472A0924C9FCB16CF94D850CDEBFB9FF4A310F1541A7E505DB262E634A905CBA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f91bc2710517e33f7935f88ff85539032b0a8ae9554403f8db10c94c1f30dc54
                                    • Instruction ID: 5d06b620c1f7e3d829d3786dc928461379b3f4c6557dbc49d1db2c95b20e0ed6
                                    • Opcode Fuzzy Hash: f91bc2710517e33f7935f88ff85539032b0a8ae9554403f8db10c94c1f30dc54
                                    • Instruction Fuzzy Hash: DD3122B0D0120ACBDB04CFAAD4487EEBBFABF99322F05852AD424B7250D7749945CF52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0f5980fbbdf9f3c45808b17bd4ff76db9aeac31d4db3007f0a5f75e2793c9378
                                    • Instruction ID: eebc7591b0360f892066e78419faa291525abcec441a77c520b37ba3ae6017ed
                                    • Opcode Fuzzy Hash: 0f5980fbbdf9f3c45808b17bd4ff76db9aeac31d4db3007f0a5f75e2793c9378
                                    • Instruction Fuzzy Hash: 7C318931200205DFDF24CF25D884BAE7BA6FF88355F1481A9F8059B2A0CB79E891CB90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 302ef536957d4caaba9661fa66bf651b6579a43ea9f3b860ad4b8c1dad71b822
                                    • Instruction ID: 7fc5ff7a5eb820e2b4f4876b75c3145a70e83eeca63d531b4be44d4a6721c43a
                                    • Opcode Fuzzy Hash: 302ef536957d4caaba9661fa66bf651b6579a43ea9f3b860ad4b8c1dad71b822
                                    • Instruction Fuzzy Hash: 192139B1F002099FDB14DBA8C908BEFBBB8AB05361F108466D515DB290E734CA51CF91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600145688.0000000001AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 01AAD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1aad000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 58b5568339f2a92fdf531428492d35a8bc664f42a7b77ad92c350aff40aaff07
                                    • Instruction ID: a5ae5e54213b53d3462bb71ce10b8a0bf6704e8e04014125e3b196e2d5a45909
                                    • Opcode Fuzzy Hash: 58b5568339f2a92fdf531428492d35a8bc664f42a7b77ad92c350aff40aaff07
                                    • Instruction Fuzzy Hash: 02214271544200EFDB21DF54D9C4B26BBA5FB88324F648569E98A0BA42C336C407CAA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 19265d5321fee475b35659fb22f8edb6bac490784db5e1dc5c231ddcfd716d9e
                                    • Instruction ID: 2b388a1477f0ad202c935fc557a3c2985dd26428d96a2f3324e4a8ddddd3757d
                                    • Opcode Fuzzy Hash: 19265d5321fee475b35659fb22f8edb6bac490784db5e1dc5c231ddcfd716d9e
                                    • Instruction Fuzzy Hash: 54215B72A0420CAFCB19DFA4D8448DEBBF9FF89310F01456AE545EB251EA30AD05CBA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7ee608af3b05e74664f4eb6702bb61e41d1383b58953a8b3953d3f4035e90707
                                    • Instruction ID: f34ae681ccf119da8fed09bb739ba8509d0328ae2db0266b0110424d344930b7
                                    • Opcode Fuzzy Hash: 7ee608af3b05e74664f4eb6702bb61e41d1383b58953a8b3953d3f4035e90707
                                    • Instruction Fuzzy Hash: CD211D75A00209DFCB159FA8C4549EE7FB6EF8D321F14856AF416A7390CB319941CFA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b7e10d6503d5e3111dc42e09fcf5b6e731e6997ff775c3a3b4faa0581ec73b56
                                    • Instruction ID: 754b61c7876755106a7a720665407a91eba4f713c4364b5d6d51ed742ef46de3
                                    • Opcode Fuzzy Hash: b7e10d6503d5e3111dc42e09fcf5b6e731e6997ff775c3a3b4faa0581ec73b56
                                    • Instruction Fuzzy Hash: 68218BB0A002168FCB14CF65C940ABFBBF5FF89661F00856AD805A7314E7349945CB90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6002008053101a8629951e99c875fbc03264378140ef679ea7a1e8a9b8a04175
                                    • Instruction ID: c54810c926b884e5094e252b89439cb85c280199eb6972a03eec9d41721ba53e
                                    • Opcode Fuzzy Hash: 6002008053101a8629951e99c875fbc03264378140ef679ea7a1e8a9b8a04175
                                    • Instruction Fuzzy Hash: 9B2151B5604B018FE730CF3AC584396BBF5BF84321F14CA6ED49A8A790E774E5858B51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d4383feecd85c0972605fa9e643bdce64cf8163ae6f290a559307eb6d87eabab
                                    • Instruction ID: 096a36a80fa5d9ca54b755bb1e9a2c5cb6f084939e020cab0452b52dbdad3606
                                    • Opcode Fuzzy Hash: d4383feecd85c0972605fa9e643bdce64cf8163ae6f290a559307eb6d87eabab
                                    • Instruction Fuzzy Hash: C8217874D0521ACFDB48DFA9D4496EEBBF6FF89301F1480AAD405B3240D7782A85CBA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ead1d9c253c2dac1e6cc809ef0e64d90b9674755d200da69bdfa9395e3c9bff2
                                    • Instruction ID: aa6a117f84ab30f41a05addda7e8b9082d5b6c1d931eb35b154fa0bca377309a
                                    • Opcode Fuzzy Hash: ead1d9c253c2dac1e6cc809ef0e64d90b9674755d200da69bdfa9395e3c9bff2
                                    • Instruction Fuzzy Hash: 53217F71A102099FDB14DB68E8467EEBBF6FF84310F508529E00ADB684DF756D068BE1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5a9832d8f89da4e0e8f8f017af70e7fe5c776f1ebf89e58ba80bbc0e5ae5441c
                                    • Instruction ID: 85bba11925ff9f619ec9d3222d491c2f1a9d806cd61278574ffdb74f21601765
                                    • Opcode Fuzzy Hash: 5a9832d8f89da4e0e8f8f017af70e7fe5c776f1ebf89e58ba80bbc0e5ae5441c
                                    • Instruction Fuzzy Hash: 4521E675A00209CFDB04DFA4C584ADDB7F2FB88311F1045A9E545AB2A1CB75AD45CBA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 222347da3ecd13dabb4bbc670e5d547973dadda4bfe89070d61968795079f611
                                    • Instruction ID: b41055023dfd5fd6eeec6d2127fb9a3883f9d535e7fb2a5b274d91fb07ccd01b
                                    • Opcode Fuzzy Hash: 222347da3ecd13dabb4bbc670e5d547973dadda4bfe89070d61968795079f611
                                    • Instruction Fuzzy Hash: 9921E9B4E4520ADFCB44DFA9C0846AEFBF6FB49300F1485A9C415B7255D739A981CF90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e19240414cad33690fe0f457b8b4f7208efbeac22aa7a17289c57eeff42bfafa
                                    • Instruction ID: 63457daf86855e7de0b49bdae0cd80781fde7e6f30fd3655ffe8ffa023a38c51
                                    • Opcode Fuzzy Hash: e19240414cad33690fe0f457b8b4f7208efbeac22aa7a17289c57eeff42bfafa
                                    • Instruction Fuzzy Hash: 702177B4D04619CFDB48DFADD4096EEBBFAFB88301F10806AD505B3240DB786A44CBA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1e3184a2c2ada755c027c9b179cd445c35b40d3490aea8573f53432570fc6397
                                    • Instruction ID: 5217a2c34e4ea5039c21f3094157d3dc1d1238c3bb43ad30164cafa444d29b24
                                    • Opcode Fuzzy Hash: 1e3184a2c2ada755c027c9b179cd445c35b40d3490aea8573f53432570fc6397
                                    • Instruction Fuzzy Hash: 2B11C8B5B102059FDB509F6998057FE7BF5FB88322F14842AF515DB380EB71C9428BA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8fdc69775696f6f2a5c8b03ab86cd05a97475dd53db62912eb2b643d873037f9
                                    • Instruction ID: 4b12e6a034155757c71f3e35504503dce926f74f998bce466ce4e3f136c51182
                                    • Opcode Fuzzy Hash: 8fdc69775696f6f2a5c8b03ab86cd05a97475dd53db62912eb2b643d873037f9
                                    • Instruction Fuzzy Hash: 6C2133B4D0420ACFCB40CFA8D8A97EEBBF1FB4A321F10486AD815A7280D7795A44CF51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e3aecdba664d0b6876f89c8c96e2db3d475aa19e65bb7ff7b1c40a18ea2bc5d1
                                    • Instruction ID: e3314901060e6588bfa393644cfdba8e13c1f8949daee528f874797f1ab779d2
                                    • Opcode Fuzzy Hash: e3aecdba664d0b6876f89c8c96e2db3d475aa19e65bb7ff7b1c40a18ea2bc5d1
                                    • Instruction Fuzzy Hash: D21182F4A05308DFCB51DFA8D5449EDBBF8EF4A222F1042DAE84497361D3369A51CB41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6921d9a71ae1c77f7c8452588ca04942c39d673faadfde6bfda336b403e48558
                                    • Instruction ID: efd4d0eeec01bcf3dd792cf23e3dfad552834a7c01f7bbc4cbb047015fd01cda
                                    • Opcode Fuzzy Hash: 6921d9a71ae1c77f7c8452588ca04942c39d673faadfde6bfda336b403e48558
                                    • Instruction Fuzzy Hash: F5214A70E49349DFCB15DFB984402AEFFF2BB8A301F2485E9C444A7215D7359A81DB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fd842b0104db0624cdac0bc209597fd82d1498e534f8917d79ee791ad1ce283a
                                    • Instruction ID: e49c57503b6c4d740af497e94beb9d266ca85f91f6ca3d6883afd01df940b2d6
                                    • Opcode Fuzzy Hash: fd842b0104db0624cdac0bc209597fd82d1498e534f8917d79ee791ad1ce283a
                                    • Instruction Fuzzy Hash: E82106B4D0420ACBDB40CFA8D4997EEBBF5FB4E311F104866D815A7240C7795A44CF51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600145688.0000000001AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 01AAD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1aad000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c17b92067f9f392c36d9c2df8838e5273bef87ad497ca21dd9e73911e0fdf5c2
                                    • Instruction ID: a847d446ef76db94bf2af578a4e9ca1a46e749525b36e441cf7ba58369de8470
                                    • Opcode Fuzzy Hash: c17b92067f9f392c36d9c2df8838e5273bef87ad497ca21dd9e73911e0fdf5c2
                                    • Instruction Fuzzy Hash: BD11D376544280CFCB12CF54D5C4B16BF71FB84324F24C5A9DD494BA56C336D41ACBA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 30f5fc17e504874a6e1c4e41acb8d3f70530f2170357ba8e872cf3c9002451f4
                                    • Instruction ID: 7286f6bbd99e76bafe0996c236dfeddcaa49ded6c6cda2a87b5a994ab2377f30
                                    • Opcode Fuzzy Hash: 30f5fc17e504874a6e1c4e41acb8d3f70530f2170357ba8e872cf3c9002451f4
                                    • Instruction Fuzzy Hash: 9D11CC76A0011CAF8B15DF99D840CDEBBBDFF98350B058167E515E7211E630EA15CBE0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a124b54b604ad79912dafe999fd1180768b3221b5c4311b93f86a7ffd270a0a2
                                    • Instruction ID: d9dbd9f0e06967f40e3d9336a4d188a98a36d51df6c09404d4cd844b6d449faa
                                    • Opcode Fuzzy Hash: a124b54b604ad79912dafe999fd1180768b3221b5c4311b93f86a7ffd270a0a2
                                    • Instruction Fuzzy Hash: C9216278B02219AFDB04DF68D594AADBBF2BF49311F204059F805AB3A1DB34AD41CB54
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9db1d19259f816638f8a71fea970de893ccefee054f488118a138c158758be09
                                    • Instruction ID: 34749b658892b5b6e837fbc0e84b834c565cb96171ba8e2dca45d7d730519924
                                    • Opcode Fuzzy Hash: 9db1d19259f816638f8a71fea970de893ccefee054f488118a138c158758be09
                                    • Instruction Fuzzy Hash: AF21C0B4904229CFDF61CF29D854BD8BBB1FB49311F0086DAE94DA3251DB749A85CF90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d99097f6ed1a181be64b07ebc959b460fb5642307830555fc1bce719e188b60f
                                    • Instruction ID: 0d09946acddcfc5d27409b3a72cf729434c9919771dd26327ad68b458f3df9a0
                                    • Opcode Fuzzy Hash: d99097f6ed1a181be64b07ebc959b460fb5642307830555fc1bce719e188b60f
                                    • Instruction Fuzzy Hash: 2F115E75A002059FDB20DF68D845BAABBF0FF46314F14866ED5199B341C772B90ACB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 657bff8fa6250c7e23f432c3f7dc60822917b13c38b7b7efb0ca2d90f6915254
                                    • Instruction ID: 46ef2079db61d05233e33e68d9607aa31c491e2a7b3bca126de2c61d4a625035
                                    • Opcode Fuzzy Hash: 657bff8fa6250c7e23f432c3f7dc60822917b13c38b7b7efb0ca2d90f6915254
                                    • Instruction Fuzzy Hash: 8E014476340215AFDB149E59EC85FAA7BA9FB89721F108067FA15CB390DAB1D8108B60
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b3027422d8c93bceb8bce3e10def85422e13a65620309c2173673f6b20aff6c9
                                    • Instruction ID: 593437d4f7cbe1899012089b47b4d27867939133a668a3b1c5b66325afdf6593
                                    • Opcode Fuzzy Hash: b3027422d8c93bceb8bce3e10def85422e13a65620309c2173673f6b20aff6c9
                                    • Instruction Fuzzy Hash: 62219EB4A15218CFDB51DF68D954B9DBBFAFB48326F1041AAE449A7384CB349E81CF10
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8088b5bed7c34690fedcdac539ca81829119c4921bf135761354ed23efe9609b
                                    • Instruction ID: b303e6b134056d3eb1401f4ef87c78e7ed9f57a21b25707aab9fc98441e0caa1
                                    • Opcode Fuzzy Hash: 8088b5bed7c34690fedcdac539ca81829119c4921bf135761354ed23efe9609b
                                    • Instruction Fuzzy Hash: 1B016174A00205AFDB10DF68D845B9ABBF5FF45324F10856ED519AB341C772B90ACBE1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d8cfe599b69c36236ae6e479679405ff705fb5f7d7e98969d5803dd35d4c065c
                                    • Instruction ID: 007049fdf2d7ede1e8be444978fd6d872cca4f036d16b89ea3fe87ff6c20aa10
                                    • Opcode Fuzzy Hash: d8cfe599b69c36236ae6e479679405ff705fb5f7d7e98969d5803dd35d4c065c
                                    • Instruction Fuzzy Hash: 941145B0D142088BDB15CF6AD8447DDBBBAFB8A322F00C46AD40AA3350DB7459858F41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b94085d2fe25db848bb59d501c16952b8ddcc6db52bd3d45f8273e30cab9b6fe
                                    • Instruction ID: cfb5fdb58c9bc7e5f0a7dfeee698bb11cd85002773bea417cd3e95f9dcd51a81
                                    • Opcode Fuzzy Hash: b94085d2fe25db848bb59d501c16952b8ddcc6db52bd3d45f8273e30cab9b6fe
                                    • Instruction Fuzzy Hash: 7B0125B4A09248DFCB51CFA8C4906EDBBF4EF4A215F2581EAC84897311D6318A52CB42
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 24387ddf87a43f0f6253ac6724a076b117d77da7fef107e3827b8786af1d9c16
                                    • Instruction ID: 6b54decea3710a3ca877c158678956fbac534db6b74f703f3f1476e739eba5f5
                                    • Opcode Fuzzy Hash: 24387ddf87a43f0f6253ac6724a076b117d77da7fef107e3827b8786af1d9c16
                                    • Instruction Fuzzy Hash: 2C01D1B4604308EFD752DAA4EC85BFA7BB8AB01226F1800A6D90C9B3D1D6749D81CB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1907163d3186687e949c54abbca382b919d882c1378e899ad54e21de60559711
                                    • Instruction ID: 528aed4e6a619b7b02bc40a85383d92401c247bd34f97017cc884726f00e2704
                                    • Opcode Fuzzy Hash: 1907163d3186687e949c54abbca382b919d882c1378e899ad54e21de60559711
                                    • Instruction Fuzzy Hash: 8701D1B180520ADFC721EBB8D4592EEB7B4FF95201F1501A5C04AA7280DB3A8D51CB52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9d076a0d8805493399d5b5a06bf1d6ac7e122d09be76cbed9a0987802f0acc68
                                    • Instruction ID: 1c213db5bfb12ce6121f805ba1755b59b77a35725c832333600bbfc42a107b0f
                                    • Opcode Fuzzy Hash: 9d076a0d8805493399d5b5a06bf1d6ac7e122d09be76cbed9a0987802f0acc68
                                    • Instruction Fuzzy Hash: D801F2B0E082885FCF51CBB495946ECBFB8AB56211F2884DBC858C7212D2394A02CB40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b7552f520f1a184db77d7c25849b06fdeed39dbc4d8e5993cd3cb055d28016f5
                                    • Instruction ID: eb95ec22d465516f07a05dc245ac1b7173d23184d85f42a2ae8ea826d629ec06
                                    • Opcode Fuzzy Hash: b7552f520f1a184db77d7c25849b06fdeed39dbc4d8e5993cd3cb055d28016f5
                                    • Instruction Fuzzy Hash: 77F04C71F093115FE7108618AC157DBFBA8EFC9320F0444ABE5489B381DB66FC418791
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e41aa3c70dcb47fa5e69bb598338ea026dd592a57d210ffa7de63b14d82c8e00
                                    • Instruction ID: 1f65c3ebdc4d103b59fcffebe18d0d442b59b391f3f62feac6972445bdaf3edb
                                    • Opcode Fuzzy Hash: e41aa3c70dcb47fa5e69bb598338ea026dd592a57d210ffa7de63b14d82c8e00
                                    • Instruction Fuzzy Hash: D101A2B054A349CFCB65CBA4D4446E97FF8EF07226F2412DAD44457361C7354992C701
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 03aab343f69d36b8cc0609ab491fdc196275ace607902661f696b8df20c28e66
                                    • Instruction ID: a60545074203b080759d4bc92fc0e94c9adb18cb24799bfcd1724d7869b423f1
                                    • Opcode Fuzzy Hash: 03aab343f69d36b8cc0609ab491fdc196275ace607902661f696b8df20c28e66
                                    • Instruction Fuzzy Hash: DFF02836710048AFDB14DB18C8448EAB76AEF88360B098065FC099B321CA34AD0AC780
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f4f919f16899526f5a7d06ef1a800d4f911a908927b50ccd3889f4ffe6f679fd
                                    • Instruction ID: 76aaa0f357f929e307bf2b845a627b18f0dcf22c73e4bcb9c72b53712d6e38c0
                                    • Opcode Fuzzy Hash: f4f919f16899526f5a7d06ef1a800d4f911a908927b50ccd3889f4ffe6f679fd
                                    • Instruction Fuzzy Hash: AD113AB4A4011ECFCB64CF28C888BADB7B9FB46314F0144D99149A3740DB705E84CF56
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 13da52fd33551551c3bba906fb666781e5a1b89294bba3c4dff450ed71a06a1a
                                    • Instruction ID: 9ba10fb641795654b1641c1ecbd3f733229dd53ccd3bb8f89143c8682bdbf3eb
                                    • Opcode Fuzzy Hash: 13da52fd33551551c3bba906fb666781e5a1b89294bba3c4dff450ed71a06a1a
                                    • Instruction Fuzzy Hash: 2FF02BE2B0D3815FE712463418603A56BA59F86225F0444DBD0818F3D2DA46E8038352
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0e464249bf2f0cb3798867da107bba4b95eff0bcdb4d0968ab1234921534af9e
                                    • Instruction ID: 8271950521a06aff01fc97934123de9d70b6dc6800bd16ade2bb852bda9cc836
                                    • Opcode Fuzzy Hash: 0e464249bf2f0cb3798867da107bba4b95eff0bcdb4d0968ab1234921534af9e
                                    • Instruction Fuzzy Hash: 52F090763003409F87058F69E884CAA7BFDFF8A62230180ABF904C7321DA70DC04CBA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 056068e0fe04d3f10781cd94411bfc2ee115191b95558e06496eca185d9a68af
                                    • Instruction ID: 86134b8c12c184f7c85d358c3782b87c489c042a5b9afc2f0564ce8007a57b04
                                    • Opcode Fuzzy Hash: 056068e0fe04d3f10781cd94411bfc2ee115191b95558e06496eca185d9a68af
                                    • Instruction Fuzzy Hash: 5A01783180424AEBCF01DF98CC109EABBB4FF4A310F08C50AE95867251D336A5A1DBA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d101909dd490deb7e99b856c05d476b3d565789f3fe89920fa5a09f328cbbfeb
                                    • Instruction ID: 3141ef8ca877a7786eb62c1802927838e368d45c4526cc93e3e2e4edaa2f5292
                                    • Opcode Fuzzy Hash: d101909dd490deb7e99b856c05d476b3d565789f3fe89920fa5a09f328cbbfeb
                                    • Instruction Fuzzy Hash: 48F0E971F043115FE7148619A8147ABF7EDEBC8720F14446AE5099B380DF62FC4187D4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 783d03b30b046d386889b7013545e7f75d841080c0e9f80bd4a5ad99aa7c9093
                                    • Instruction ID: 68eb769caa30834e4f30ebf3a009a153ac3349129ec183f6561990b1475c4854
                                    • Opcode Fuzzy Hash: 783d03b30b046d386889b7013545e7f75d841080c0e9f80bd4a5ad99aa7c9093
                                    • Instruction Fuzzy Hash: 210124B0D09248DFCB51DFB8C9852EDBFB1FF09204F2445AAC445A3245D7345A41CB51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 058823c7dd2bd99d052b20f763c572ee3f1f226edb94d36052010dde3a42a80c
                                    • Instruction ID: 87d02fdad5db5813425f9ff9085fe7d018f3a8a67b87bf36466b964bc23e92c5
                                    • Opcode Fuzzy Hash: 058823c7dd2bd99d052b20f763c572ee3f1f226edb94d36052010dde3a42a80c
                                    • Instruction Fuzzy Hash: 84F0E23662DB864FC3618728EC155E33BF1DE86620B184BD6A884CB662D520FD1EA785
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 66863e6ac353f0d535fa5b9ca4d840a68253df12ee66bf9f48f1177b700054f0
                                    • Instruction ID: 58a0a1a91f8d79269d37b10b55ba27a8f2772f1fbb1bb24fa3f302a380d6cb3a
                                    • Opcode Fuzzy Hash: 66863e6ac353f0d535fa5b9ca4d840a68253df12ee66bf9f48f1177b700054f0
                                    • Instruction Fuzzy Hash: EAF0A0306086855FC71ACB38D8609A53BF1EF46100309819BE889CF766D634FD0FCB51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ea87dcdabdc948f1156486b9ef4c9dd7d4f7d1d6436ab86b9ead94004ab8d66b
                                    • Instruction ID: c30f0dcee86f3f9028796ccd9a6bf8f578707d737d99935bcfc0a0bbca622a68
                                    • Opcode Fuzzy Hash: ea87dcdabdc948f1156486b9ef4c9dd7d4f7d1d6436ab86b9ead94004ab8d66b
                                    • Instruction Fuzzy Hash: 08F0E971A04318AFC707CBA4D4887DD7FB69F46520F1880ABE00597350EB741F84CB95
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0ea360e6066cf1e9a43846130f65f4cfa46bdfaafaa897ee6c5b00998c930ab4
                                    • Instruction ID: e1020459430ddfb9f32db58bbea1da51a15e379df6403763d141b81fa443b503
                                    • Opcode Fuzzy Hash: 0ea360e6066cf1e9a43846130f65f4cfa46bdfaafaa897ee6c5b00998c930ab4
                                    • Instruction Fuzzy Hash: F3F0F0B49082089FCB51CFA4C8809DCBFB4FF1A322F2281DAE88857311C3315A62DB02
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2131621354471ae649c3a949d3b59f37c5281e9463190fb378455c519d36777b
                                    • Instruction ID: 5a560714fae3f1170c23b18c3ac9a649cca3f7c4fb53da78c5f6e7b1136659f7
                                    • Opcode Fuzzy Hash: 2131621354471ae649c3a949d3b59f37c5281e9463190fb378455c519d36777b
                                    • Instruction Fuzzy Hash: 32F0E7B0D05209DFCB84DFA8D5456AEBBF8FB48301F2045AAD809E3244E7359A40CB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9ed15007eaa27ee8fed813dce31a55d0705dec024704379f4eb7c3876a2b945c
                                    • Instruction ID: 8ade65a67abca8116f6f620d98090de00ab3b93674296b5e60047ce158fb69e6
                                    • Opcode Fuzzy Hash: 9ed15007eaa27ee8fed813dce31a55d0705dec024704379f4eb7c3876a2b945c
                                    • Instruction Fuzzy Hash: 0D117574A04619CFCB64EF28D998A9AB7F5FF49301F1141EA940EAB360DB309E81CF41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d98b78d164fdd64904a7d72ecdd7321fccf69cca3cf0ce94a093b11cfa495362
                                    • Instruction ID: 970b575c33d2874615f1bc19c8d4ca3eab1a64cc55a8b58113b293ae0323a4e3
                                    • Opcode Fuzzy Hash: d98b78d164fdd64904a7d72ecdd7321fccf69cca3cf0ce94a093b11cfa495362
                                    • Instruction Fuzzy Hash: 9301EEB49002198FDB45CF58E898B9CBBF6FB49322F1045A6E449A7660C7349881CB00
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4f86c95e97e35bec5ab93ef3f130800a5fed699c632e921507c2e5e96357a9a2
                                    • Instruction ID: 4d045f49f6092084f9f9c6045856ae27eefba18e8d051963b37a80e664be0f98
                                    • Opcode Fuzzy Hash: 4f86c95e97e35bec5ab93ef3f130800a5fed699c632e921507c2e5e96357a9a2
                                    • Instruction Fuzzy Hash: 9EF0E9B2E01285DFEB50CBB09D915E977B0FF11210B1499DBD448EF241E6306E46DB92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0bb12f521941db0451f6f57138019f4e05fa796d443e6d6ae30d3c5bddafe5b5
                                    • Instruction ID: 917e3c18deadf0368f698b73e6242a5ace81184e543ad17ddc71f65106bff7c8
                                    • Opcode Fuzzy Hash: 0bb12f521941db0451f6f57138019f4e05fa796d443e6d6ae30d3c5bddafe5b5
                                    • Instruction Fuzzy Hash: 4C1172B4A42228CFDBA0CF24D998BDAB7B1BB49305F1041DAD94DA7290D7745EC4CF42
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 14b8b49cb0ca87892f2daa41b9aea9359aecb0cf96621c93389ab664fade9750
                                    • Instruction ID: c0802c7af0ae05567cb1d73e744fbbb4fac9b76cb5e289df220ef40357eaf702
                                    • Opcode Fuzzy Hash: 14b8b49cb0ca87892f2daa41b9aea9359aecb0cf96621c93389ab664fade9750
                                    • Instruction Fuzzy Hash: 36F0E2356043857BCB229B36E894CDBBBE69FD1220314C637E0498F126CA709D0ACBB1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7036720d498d6627a9edec28d212204b1c94141efa8398c06b1b1c2c23caed05
                                    • Instruction ID: cc4e732b92c1d94a5686a074a2cf5ea4ed3616201ca9dbe0508269ca4bb86ea0
                                    • Opcode Fuzzy Hash: 7036720d498d6627a9edec28d212204b1c94141efa8398c06b1b1c2c23caed05
                                    • Instruction Fuzzy Hash: 79F0BEB1D0620CAFCB52DBE4D9416EEB7F4FF49201F5480DBC80897340EA329A018B82
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d3236b73159fbc22f77955c3d55d55eec4cf72d32c45654abf1aceb90a576f69
                                    • Instruction ID: d70f6568fa2ebb3eb44dbcae5a52b93677f09d78d7aea27a58ed7a5f80e06464
                                    • Opcode Fuzzy Hash: d3236b73159fbc22f77955c3d55d55eec4cf72d32c45654abf1aceb90a576f69
                                    • Instruction Fuzzy Hash: 4AF05E70E1420C9FDB84EFA8D8996ECBBF1FB8A241F1485AACC08D3351DA355A56DF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5cb2ca751a4deaf5c3f72b1d3021c5c3861e66fec9cdf3dbb3c02a0b7cf2da58
                                    • Instruction ID: 63535101fa6e09d9b9b867cf827a4fae2e2c4c7b746b12192c183505890f53c1
                                    • Opcode Fuzzy Hash: 5cb2ca751a4deaf5c3f72b1d3021c5c3861e66fec9cdf3dbb3c02a0b7cf2da58
                                    • Instruction Fuzzy Hash: 12F02B6230F2553FDB614A5C6C61664BB91FBC552078405BBD849CF305E694FD0543D5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8e6ebf50ad260c94fa7c322dc1146ed37ff06c17d4b8b11401615a5a7bed03ed
                                    • Instruction ID: b90a2f2f3adca784e2192f9809a91c0bf098fd3835bcf72414f142d221406c00
                                    • Opcode Fuzzy Hash: 8e6ebf50ad260c94fa7c322dc1146ed37ff06c17d4b8b11401615a5a7bed03ed
                                    • Instruction Fuzzy Hash: D0F01974949318CFEB04DF69C9486ADB7FAFB89305F2084959509AB214D738A981CF00
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f193ea7904f9677dba6bfba702521476c8277e83c7377a5b1a82fd596842e21b
                                    • Instruction ID: 1567a8f40ca6dcf82b1e42170c72bf4c8f991e9c686aa74a65940c3af7690e37
                                    • Opcode Fuzzy Hash: f193ea7904f9677dba6bfba702521476c8277e83c7377a5b1a82fd596842e21b
                                    • Instruction Fuzzy Hash: A0F03771C0020AEBCF01DF98C8049EEBB75FF89320F00C61AEA5823210D771A5A2DB90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1888b2cb52b14419321cd8f3951e98730b137fcf892ed9c3bcd4267fa44a3594
                                    • Instruction ID: e5c5ac2435bf0dfa24271272482e82857093d43f4a3097d65f93c076797fa939
                                    • Opcode Fuzzy Hash: 1888b2cb52b14419321cd8f3951e98730b137fcf892ed9c3bcd4267fa44a3594
                                    • Instruction Fuzzy Hash: FFF08C30908288EFC745DF98D4512EDBBF0EF4A200F1480DAD888EB781D6399A42CB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 99986c0c56f8ea4028319d2fef52a5aaeb0a884772daab17a1abd07351f48a6d
                                    • Instruction ID: ccbc2bd095ac70ef68ea4850b40d95ae99e1cf9f013b74f40fea66c68cc11086
                                    • Opcode Fuzzy Hash: 99986c0c56f8ea4028319d2fef52a5aaeb0a884772daab17a1abd07351f48a6d
                                    • Instruction Fuzzy Hash: 17F04F74809248EFCB02CF98C994A9DBFB1BF45304F14809AE84857252D3319921DB51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e53fc2a7cf5c4645d7f6b2d14fb3a992b1ba153f940cc57e88c93bd3b82497ac
                                    • Instruction ID: 3c30863e396a8f320868f01be33cc1b03796eeb575963ce7c1e68e9dbe9b544d
                                    • Opcode Fuzzy Hash: e53fc2a7cf5c4645d7f6b2d14fb3a992b1ba153f940cc57e88c93bd3b82497ac
                                    • Instruction Fuzzy Hash: 6AF0B479408249EFCB01CF94DC919DEBFB4FF06300F14849AED4457252D3319A61EB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b216deec08c57f077fcfd893a72e5c7fd06524538a6f37c60c4c685aa04b3fce
                                    • Instruction ID: b015a837559eb67816e8c8ae1cde2a8884fd4f9a640342a1f1babe532e3a8c88
                                    • Opcode Fuzzy Hash: b216deec08c57f077fcfd893a72e5c7fd06524538a6f37c60c4c685aa04b3fce
                                    • Instruction Fuzzy Hash: 480104B4900219CFDB51CF68D494B9DB7BAFB48325F1045AAE409A7340CB359D858F20
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1fbf79bc6123da58eb8d3ff5a6ec805ed87647c23cce515b91d0e72f32510c55
                                    • Instruction ID: 6ef1a65015ff84608b3df3c1502f39403983a8105bed6c739e7bc95dff19c359
                                    • Opcode Fuzzy Hash: 1fbf79bc6123da58eb8d3ff5a6ec805ed87647c23cce515b91d0e72f32510c55
                                    • Instruction Fuzzy Hash: D5F082749087449FC751CBA4D5405E9BBF4EF46225F2481CBC85887392C7355A06DB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2366769e5bcb8556c92711117cbd3d4da48676fb5d673c94fd018a9139b9692d
                                    • Instruction ID: 1ea830a9d03d760be9c515804a704201055e87a0c719a36d927e67a703730e20
                                    • Opcode Fuzzy Hash: 2366769e5bcb8556c92711117cbd3d4da48676fb5d673c94fd018a9139b9692d
                                    • Instruction Fuzzy Hash: 1E01A274A0055E8FCB68DF18C9959E9B7F2FB88300F1145D4E509EB354DB30AD948F54
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2495ec55c0bd4dab04d986bf62ea29944f89791482a5034bc814530adb0274b9
                                    • Instruction ID: 77b5b0fad05677d08b6f5dd3fe1ce58ea1d7e3a3106046a9763e914fb2f32c01
                                    • Opcode Fuzzy Hash: 2495ec55c0bd4dab04d986bf62ea29944f89791482a5034bc814530adb0274b9
                                    • Instruction Fuzzy Hash: 3AE09275909248EFC700DFA4E995AE9BBF4FF46314F1480DAD84497741DA316D82C791
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8b77d4b184e5b6e2e158c70b06f1f4895a7d79e3ca55c4cc59b133e3089ea40c
                                    • Instruction ID: fbc84f5f243ad7a7389e9d9e9f74dfa815f9c9bec59ad5cfed81a7296b2a2c23
                                    • Opcode Fuzzy Hash: 8b77d4b184e5b6e2e158c70b06f1f4895a7d79e3ca55c4cc59b133e3089ea40c
                                    • Instruction Fuzzy Hash: 54F09070A08288DFCB55DF75D0441ECBFB1EF4A204F1441DAD844EB281D7389A45CF51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 20cc079ab2da2b583d03af0b0714b8f0b0b7a86516b0e93d64bba9b6b08ea373
                                    • Instruction ID: 202a2de21f6ed4cb4f4496b9ade75a2f29b6e81c79b960f39c3b88e45da37eb8
                                    • Opcode Fuzzy Hash: 20cc079ab2da2b583d03af0b0714b8f0b0b7a86516b0e93d64bba9b6b08ea373
                                    • Instruction Fuzzy Hash: AEF0A9B4900259CBCB05CF28D881B8DBB75FF05325F008586E84AA7340CB325D86CF42
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a0ee945b5774f24616cbc9ec382e7dfc620a7e21cd13ddcd21022dca1d6dcb71
                                    • Instruction ID: caa166171aab480c63127d583ab0e5b9ac6b6f0470b60e1faecea2cb40311495
                                    • Opcode Fuzzy Hash: a0ee945b5774f24616cbc9ec382e7dfc620a7e21cd13ddcd21022dca1d6dcb71
                                    • Instruction Fuzzy Hash: DE01C4B4A002698FCB64DF69D988ADDB7B6FB89301F0141DAA509A7354DB309E81CF54
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 81a039de4d4a6a8f021c3fc0c38ee636b090afc6bc89f28fd7d089be10b46e1e
                                    • Instruction ID: ed118eb44d513244cceb63b089323d747287bd2f7e5d44615907ab4e8524d4f2
                                    • Opcode Fuzzy Hash: 81a039de4d4a6a8f021c3fc0c38ee636b090afc6bc89f28fd7d089be10b46e1e
                                    • Instruction Fuzzy Hash: 54F030B5819248EFCB41CF94C9549EDBFB1FF4A300F14849AEC4497261C3319A61EB41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ac99fce8f3b338741541fcab044a2315b38c380b8a49a7c1af702749db950992
                                    • Instruction ID: d4439eb18903f8bc28051d4f6de2a96c09b6ec8632ded1fae1c937d9fb35b787
                                    • Opcode Fuzzy Hash: ac99fce8f3b338741541fcab044a2315b38c380b8a49a7c1af702749db950992
                                    • Instruction Fuzzy Hash: 83F08276409208EFCB01CF94DC919EDBFB5FF59310F14845AEC0413251C731AA66EB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3730fbbfeb116ced680560c7b9af767b382ce674bd8cd706f332a01cd4a7864a
                                    • Instruction ID: 581d75bc242dfe9a5cd83ba43bb341de4ce7f3dcc5e423cd1c11f1bb9690741d
                                    • Opcode Fuzzy Hash: 3730fbbfeb116ced680560c7b9af767b382ce674bd8cd706f332a01cd4a7864a
                                    • Instruction Fuzzy Hash: 94F0E5B1A05244EFC782DBA8C8416E9BFF4EF06115F1480DBD808D3342C3354A46C791
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fbd64afa2dad8926961cfc33cbe1e2ffd0ad2d1421c80065513f31f4713ccbbf
                                    • Instruction ID: 3532ad442153fea34f787671c38a67b9e6d1aeaa87480b5b9919e70e83f25d3b
                                    • Opcode Fuzzy Hash: fbd64afa2dad8926961cfc33cbe1e2ffd0ad2d1421c80065513f31f4713ccbbf
                                    • Instruction Fuzzy Hash: 21F019B49002198FCB84DF18D994A9CB7F6FF88321F5084A5E009A7350DB345D85CF01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2160b00f93649c2b65b90138df5d59e1511ef67ba9d309f5c6389872ba55cbea
                                    • Instruction ID: a703fa587f78bb8035db5c4236eff26371051784ab2598f48bc011adb4cb500b
                                    • Opcode Fuzzy Hash: 2160b00f93649c2b65b90138df5d59e1511ef67ba9d309f5c6389872ba55cbea
                                    • Instruction Fuzzy Hash: 4CF0E2B09083899FCB13CFB8C4005EDBFB1AF16311F5542DBC490972A2D3354A82DB45
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9d68d030e33d56b093a0f103b655f0f6217fe6235b09cab5412743f1cdd75c52
                                    • Instruction ID: 922d36b007b0c8eb917d153a145888806b297547fa87df75503aa4dc9badce09
                                    • Opcode Fuzzy Hash: 9d68d030e33d56b093a0f103b655f0f6217fe6235b09cab5412743f1cdd75c52
                                    • Instruction Fuzzy Hash: 6EF03A75809288EFCB11CF94C860AAEBFB0BF4A300F18819AE85457262D3359A21DB51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 951a4d0a68619eec956f0d554acd0ec0fa739db48a8caf9555fd36d13fef582a
                                    • Instruction ID: f48f4f437e4776337efad640396a671bb3fa113c7a425d4b4776c5e846f97025
                                    • Opcode Fuzzy Hash: 951a4d0a68619eec956f0d554acd0ec0fa739db48a8caf9555fd36d13fef582a
                                    • Instruction Fuzzy Hash: 91F0307091924CAFC781DBA8D9947DC7BF4EB06201F140296C84497251E6706A58D791
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cf274be62241d85b4b8ae668d8f330cfbdbf094f080a6a58f4b891e29e7bfc72
                                    • Instruction ID: c94f03ecc595f1446e1394320f2649f14f0032e6f11f3f0abd83771c6d56324c
                                    • Opcode Fuzzy Hash: cf274be62241d85b4b8ae668d8f330cfbdbf094f080a6a58f4b891e29e7bfc72
                                    • Instruction Fuzzy Hash: 2DF08C74808288AFCB02CFA4C8502ACBBB4EF46204F2480DAC89497352D6395A16CB52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bd2234ff98511a0d1965b87845464e08d4f8389b0d13c82d30cf5bb337ad6e44
                                    • Instruction ID: 8c622ea3b2658b6b8cf86843b018141a4e091ad45b87dcfabf8d2a6d1939e1a0
                                    • Opcode Fuzzy Hash: bd2234ff98511a0d1965b87845464e08d4f8389b0d13c82d30cf5bb337ad6e44
                                    • Instruction Fuzzy Hash: D3F06D70809388AFCB42EFB498592D8BFB4AB06111F1505EBD888D7291D6744A86DB46
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d52a912baecb0e0f25316f8068db129f4e9cd3806a098810e1f1ecd13f4ae11d
                                    • Instruction ID: 28f2e531a20f151b6d2bc36eeacbf2046db384bf0055cd631aefec23556d5a7b
                                    • Opcode Fuzzy Hash: d52a912baecb0e0f25316f8068db129f4e9cd3806a098810e1f1ecd13f4ae11d
                                    • Instruction Fuzzy Hash: 01F01CB4E0424CEFCB90DFA8C850AADBBF8BB49300F14C0AAE958D3341D6359A51DF50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 46d84d6fc051ced4045bdc238c49daae574326edf560f1f78ffe5fe743c80c12
                                    • Instruction ID: bad1bbb504e6109f409a21380b28dc0863f0d9422ca25cb25787a5621933aa25
                                    • Opcode Fuzzy Hash: 46d84d6fc051ced4045bdc238c49daae574326edf560f1f78ffe5fe743c80c12
                                    • Instruction Fuzzy Hash: 28F02270809204DFC700CF94DCA099CBBB4FF4B300F1884DAD80457351D732AA02CB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 779666594342c9a01737fc922e1262812ace3bb88cc6b37cb5fe7d03ed81fb3f
                                    • Instruction ID: 91d7f5560cda13dddce37f059f2e37247ba9c8f13e205c43c9af6500f14bd257
                                    • Opcode Fuzzy Hash: 779666594342c9a01737fc922e1262812ace3bb88cc6b37cb5fe7d03ed81fb3f
                                    • Instruction Fuzzy Hash: 5DF0F27994020DEFCB45CF94CA94AEDBBB1FB49314F24859AEC1993211C7329A62EF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7f5c9e8500e73fd4403a97603fe4ef9cebf6d965fc6822c647511b7b91967035
                                    • Instruction ID: cfdb3a3db3cae1cab5081cec1894a87eb1ab7eb3ba2fc9e696d17bb74534b68e
                                    • Opcode Fuzzy Hash: 7f5c9e8500e73fd4403a97603fe4ef9cebf6d965fc6822c647511b7b91967035
                                    • Instruction Fuzzy Hash: 5DE09272909348EFD712EBB195546DEBBF4AF46100F5400E6D444D72A0EA384A0493A3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 312147c1c7a9bff1c755c1d4141a78026a85f9960f658f43c2c95c91ebf5ef3e
                                    • Instruction ID: 19beef988976f54a53e910921c34885ec41c17ed6a2aedfd6380fe6e13ef7091
                                    • Opcode Fuzzy Hash: 312147c1c7a9bff1c755c1d4141a78026a85f9960f658f43c2c95c91ebf5ef3e
                                    • Instruction Fuzzy Hash: D4F0ED34908208EFCB04DBA4E8986A8BBB4FF46300F2881D9C80547342C331AE96C781
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4c176f88b21afcb731dfcab205f5f4a4fa75cec2aa021b44bb45a1dc8056dbc4
                                    • Instruction ID: 8393b93060a77313c1962001b56913043780313d028096aabc716b4e08fd2324
                                    • Opcode Fuzzy Hash: 4c176f88b21afcb731dfcab205f5f4a4fa75cec2aa021b44bb45a1dc8056dbc4
                                    • Instruction Fuzzy Hash: 29F0927A908308EFCB51CF94D8457ACBBF4FB55300F1480E9D88467342D739AA96DB51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4b490ad153d85a9f57430fcfa5d6c0e7242570cceb0e581a7e0dd18bb44eae7d
                                    • Instruction ID: 18eee91ab320c154c2d4a5fd7beb5232bf44bef53298f479f2407a2f1d78e516
                                    • Opcode Fuzzy Hash: 4b490ad153d85a9f57430fcfa5d6c0e7242570cceb0e581a7e0dd18bb44eae7d
                                    • Instruction Fuzzy Hash: E5F014B4A00219CFCB05DF58E995BDDB7B6FF45321F400499E505AB340CB745D808F01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3d165cd28050aff50eaae9e6122627db8030235df3c5629902f90dae38f14d07
                                    • Instruction ID: 31a8680c672342f1a9e5a213227b5900710dff9f8d9d3e41efb39289eaf35ea2
                                    • Opcode Fuzzy Hash: 3d165cd28050aff50eaae9e6122627db8030235df3c5629902f90dae38f14d07
                                    • Instruction Fuzzy Hash: D501BDB0C10258CFEB51DF68D889B9CBBF6FB0A322F1004AAE409AB742C7745984CF01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7b1d092abc077f64d23ad614750ed8d215557cd4d9aa09b49bd5d524419c21ef
                                    • Instruction ID: 3a9de0976c28c4b4d8efdca0dc8d78f560d1831fd45cf92aa1e52020a1cde811
                                    • Opcode Fuzzy Hash: 7b1d092abc077f64d23ad614750ed8d215557cd4d9aa09b49bd5d524419c21ef
                                    • Instruction Fuzzy Hash: C3F0C4B4910218DFCB51DF68E9A4BADB7B6FB44326F40019AE409A7381CB345D81CF11
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8ebe10c356b81c3cecfadf49c663cb07af85b2cb43f1157dd4109d6bd6b5029d
                                    • Instruction ID: 1388eaff11af9a9b856e828f97318ff4696bf381e24bda5eabbe734b510d1d95
                                    • Opcode Fuzzy Hash: 8ebe10c356b81c3cecfadf49c663cb07af85b2cb43f1157dd4109d6bd6b5029d
                                    • Instruction Fuzzy Hash: 5BF03974909244AFC785DFE8D8A1AE9BBF4BF0A204F1444EAC848D7351E331AE51CB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 798a92886d78ff4a64c5530b7abb40671bf982e16ada4e82f7343a414757c633
                                    • Instruction ID: bf8b1e434f1157840012011cd3c439be080e05ecf692c1855327b686c6607834
                                    • Opcode Fuzzy Hash: 798a92886d78ff4a64c5530b7abb40671bf982e16ada4e82f7343a414757c633
                                    • Instruction Fuzzy Hash: CEF0E2B4A402189FDBA0CF14CC95BD9B7B1BB49304F1080DAE98CAB281D3B5AEC1CF41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e41b94b655466554cdd733af91cd0a7040c0b777d057b941d822c227cd43a0a6
                                    • Instruction ID: 1870a3a518718f17e77586b5a3e50bbc23aafcc8b0b39411d19c73e799f94228
                                    • Opcode Fuzzy Hash: e41b94b655466554cdd733af91cd0a7040c0b777d057b941d822c227cd43a0a6
                                    • Instruction Fuzzy Hash: 9CF058B6904208AFCB04CF98D8946E8BFB0FB4A310F1480AADC4493310D2359A52DB45
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fc85c4c14ac2f09267d53eda040fcfa611b85585649e25b187a11459841e3a77
                                    • Instruction ID: 955cdf98e5cf78daab03331de5bec61c86f16661b093e28192b67b2776302e8d
                                    • Opcode Fuzzy Hash: fc85c4c14ac2f09267d53eda040fcfa611b85585649e25b187a11459841e3a77
                                    • Instruction Fuzzy Hash: 21E092755583899FC345CB94C9956A87BB4EB06209F2845CACC08873A2C632AA07C741
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 588fa611a8c2b3350fe0cacf23b5937283277ce34d653bc73774d2e17e2e6b55
                                    • Instruction ID: 1ed99da99611e7d48dc5505b879ba9b162fd2a68c41168178bb283b9b0381cad
                                    • Opcode Fuzzy Hash: 588fa611a8c2b3350fe0cacf23b5937283277ce34d653bc73774d2e17e2e6b55
                                    • Instruction Fuzzy Hash: 6BE01235700305A7C721AB26E884C8BF7DADFD1665714C53AA10A8B225DE70ED4A86A1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ca875d914f4b771fc73f3ba0f723746aa69784ce7ff6f086ee35bc8d46018a6d
                                    • Instruction ID: 1ca16dae815afe991d49d7f7e7f26cb523d8be090a1795e9879a9ee587387409
                                    • Opcode Fuzzy Hash: ca875d914f4b771fc73f3ba0f723746aa69784ce7ff6f086ee35bc8d46018a6d
                                    • Instruction Fuzzy Hash: 09E092309081089FDB14CFA4D982AECBF71FB45315F2481D9C84597345C6756E82CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: eb6d4960032c603930297c12d82193ec4174e10ef412d7acb7e5d95a51ced928
                                    • Instruction ID: 2d322cb1f95fcd76a4fd08e8a68f7d115761ca938b2571de6aa7750349f0e46e
                                    • Opcode Fuzzy Hash: eb6d4960032c603930297c12d82193ec4174e10ef412d7acb7e5d95a51ced928
                                    • Instruction Fuzzy Hash: 5DF0E534809385DFC705CB64C840568BFB1FB42304F1881DAD88463211C3359A56C750
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 78848e5ea5d204cf1a1ede418baf0d2c1ed861f8caea70d1e2b73083bdff998c
                                    • Instruction ID: e8823ee122a5dcdeca151012be6f926fc9abcdbefb4b99ac202b8ff42ba56f4f
                                    • Opcode Fuzzy Hash: 78848e5ea5d204cf1a1ede418baf0d2c1ed861f8caea70d1e2b73083bdff998c
                                    • Instruction Fuzzy Hash: 99E06DB4409244DFC754DFA4D9A59E97FB4FF87305F1880DED84467361C631A942CB41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 30db2c2eee69e4d5230f46cefab47eb123a99f2fad4ff870c7f45dbc54a3b116
                                    • Instruction ID: d40a5f073e3c46f03ed44f793a3e97392043b67211f39fa7c7821e0eb396cb4e
                                    • Opcode Fuzzy Hash: 30db2c2eee69e4d5230f46cefab47eb123a99f2fad4ff870c7f45dbc54a3b116
                                    • Instruction Fuzzy Hash: BFE06D705082089FCB44DFA4D9D55E8BBB0FF8A305F1482AAC80897310C6326A16DB00
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d24fb3edfdfcb5ca7c78520a02931324f89253c87d67e7e2b82e5c25dfd15196
                                    • Instruction ID: 139b1dcacb22959da2c2fc3783015400897aa06a0d5ce07b8129f1fd1160eaf6
                                    • Opcode Fuzzy Hash: d24fb3edfdfcb5ca7c78520a02931324f89253c87d67e7e2b82e5c25dfd15196
                                    • Instruction Fuzzy Hash: BBF08CB0D08284AFCB41CBA4C4545ACBFF1BF4A200F1481EBC84893361C2359A16DF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e81176c9eda910f1250e4828a06383e9663980c0c5d4df585e458f2cc3624f04
                                    • Instruction ID: f5347703bb0491497a7d61af639052f678d82012f59205768c874918990f8b73
                                    • Opcode Fuzzy Hash: e81176c9eda910f1250e4828a06383e9663980c0c5d4df585e458f2cc3624f04
                                    • Instruction Fuzzy Hash: 2FE068B4808204DFC704DBA4D8501EDBFF4BB42318F1046CBCC1823381CA315D12C740
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8748dfb446a0f9d115bebb999ce9338dbe79cf9295c920b6d46f1be6950b2302
                                    • Instruction ID: 9057e41553f94d23e5b615767462ff216e23fd00e680e03a6e5a04b37b5313bb
                                    • Opcode Fuzzy Hash: 8748dfb446a0f9d115bebb999ce9338dbe79cf9295c920b6d46f1be6950b2302
                                    • Instruction Fuzzy Hash: 69F08C788093849FC752CFA4C8A16A9BFF0AF0A201F1440DAD84097361C6349940DB41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 08160db8fe099c09bb05f347a7b112c1d07c73d2f42da68073eebf341842c33e
                                    • Instruction ID: c1063a29217d271767ff560d5068a2b49b9924d380eb055533bc18e98192fe2d
                                    • Opcode Fuzzy Hash: 08160db8fe099c09bb05f347a7b112c1d07c73d2f42da68073eebf341842c33e
                                    • Instruction Fuzzy Hash: E8E0D8B4908304EFC701DB94DC9559CBBB4BB46310F5446AAC854973D1DB319F46C781
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1fff3315ff8131dea4d8d29b66381babf15420c2f82f6e3a8924791d7d24ae9e
                                    • Instruction ID: 2c8eb0f539142354b59b5a4c819f9111bb0ec93f8e93382433a5fbebbba850c2
                                    • Opcode Fuzzy Hash: 1fff3315ff8131dea4d8d29b66381babf15420c2f82f6e3a8924791d7d24ae9e
                                    • Instruction Fuzzy Hash: 45F03974D082089FDB94DFB9D1482ADBBF4FB48205F1080EAC804A7384DB389A41DF91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d1b69abfb92fde941e07c97ec1d5b67cbaaebc83f56707bf60b9b21d0e953b64
                                    • Instruction ID: 244f398660c60478385b49c2686d0ceae8f221cb82e0b8928422e45e09a301bd
                                    • Opcode Fuzzy Hash: d1b69abfb92fde941e07c97ec1d5b67cbaaebc83f56707bf60b9b21d0e953b64
                                    • Instruction Fuzzy Hash: F8E06D31A05348AFCB01DBB4D91569E7BF5DB02214F1044DAD44C97642EA756E048B92
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: da26011e8fdb73ac4258a1fa4e2d62fcb19e5d949613c5d18af70f960109119e
                                    • Instruction ID: 6401719412d77f28a9c1f38cabe0f0816d889af3db4acb7da8567781784b79e8
                                    • Opcode Fuzzy Hash: da26011e8fdb73ac4258a1fa4e2d62fcb19e5d949613c5d18af70f960109119e
                                    • Instruction Fuzzy Hash: 82F039B580420CEFCB41DF98D954AADBBB5FB48300F14C09AEC5463361C7329A61EF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 12df164fd91747a4676e99fdad1709771efab3b485d8081efab862f1b81fa343
                                    • Instruction ID: 3b80633340c9f6a1ae1b7f947e9a9e2c4938d38aea4fba9715e1df80288802e6
                                    • Opcode Fuzzy Hash: 12df164fd91747a4676e99fdad1709771efab3b485d8081efab862f1b81fa343
                                    • Instruction Fuzzy Hash: 16E092F490D284EFC745CBA0D8946ACBBB8AB82311F1981DACC0857351E6355E41C741
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e4278377b4dc8dd0700a83cd55963ac43080fa79a50096ce2f1f63232a90f34e
                                    • Instruction ID: 5ad05504af7076aeae4288a0fa40f35ab38980456b1f03846c93b44c655cca00
                                    • Opcode Fuzzy Hash: e4278377b4dc8dd0700a83cd55963ac43080fa79a50096ce2f1f63232a90f34e
                                    • Instruction Fuzzy Hash: 40F015B5904208EFCB45CF98D984AADBBB5FB48300F1080AAEC0953351D7329A61EB50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e334736c237203b3db59425b33185f2ba51b477d1e3c90b0fa2b29ae955d68f4
                                    • Instruction ID: dd576d9170fb4bfd404729a1077520c1d6e3feceb8037dd6fd64aaa531305801
                                    • Opcode Fuzzy Hash: e334736c237203b3db59425b33185f2ba51b477d1e3c90b0fa2b29ae955d68f4
                                    • Instruction Fuzzy Hash: 31E06DB4909244DFCB01DFB4E5546ACBFB0FB47201F2491DAC80597252C631994ACB40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6d1017225c5b6ceb859c71e310213ddaccab41be4825fa3005c4e28242c2086d
                                    • Instruction ID: a3627e96e868a8092384dd4fe894f39aeb20e6f8ba84c304cdc4a7ae733c7eab
                                    • Opcode Fuzzy Hash: 6d1017225c5b6ceb859c71e310213ddaccab41be4825fa3005c4e28242c2086d
                                    • Instruction Fuzzy Hash: C6F08C7480828CDFCB01CFE4D4606ACBFB0EF8A300F2980EACC5887392D2399A51CB41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e4278377b4dc8dd0700a83cd55963ac43080fa79a50096ce2f1f63232a90f34e
                                    • Instruction ID: 7576ca6cf59973022cc7c3f2c0c4270a97ea205df3e53faba31ab15ce113d050
                                    • Opcode Fuzzy Hash: e4278377b4dc8dd0700a83cd55963ac43080fa79a50096ce2f1f63232a90f34e
                                    • Instruction Fuzzy Hash: D2F0157594420CEFCB45CF94D944AADBBB5FB49300F1080AAEC0893351C7329A62EF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d36860e7b9f1618e860783d18e99f805549619ed1f0f0cfbacdab73d9c56f45c
                                    • Instruction ID: b7c59e2dedead06b92b8249c12535e1962f787bf4e6a1f63ee8e9907c3af6f65
                                    • Opcode Fuzzy Hash: d36860e7b9f1618e860783d18e99f805549619ed1f0f0cfbacdab73d9c56f45c
                                    • Instruction Fuzzy Hash: EEE0D8B1C0520DDFD721DBB4D4546EDBBB4BF45200F1401E6C48597150EF354E14D792
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ef02b8d583fc7af47987a0f2bb28070d9c5bba9faf2dd853964b0652c017977d
                                    • Instruction ID: 0456707bdaddec5824e8017375eef3274af11149613bc91d4f8d3fac1a94430c
                                    • Opcode Fuzzy Hash: ef02b8d583fc7af47987a0f2bb28070d9c5bba9faf2dd853964b0652c017977d
                                    • Instruction Fuzzy Hash: 09E0CD71B5031597F72469A54801BF7739D9B86632F14046FE6055F380D971E802C766
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 10c848bdbe119f09c57a31179cedf263e3dc10e035ee062e4d0f0cd53a9e1ef8
                                    • Instruction ID: 8e68ca16621a4203c596956045ce62c42a9ecd9e4a24438506baaa036434eea8
                                    • Opcode Fuzzy Hash: 10c848bdbe119f09c57a31179cedf263e3dc10e035ee062e4d0f0cd53a9e1ef8
                                    • Instruction Fuzzy Hash: 0DE0A5B4D04208AFCB94DFA8D54569DBBF4EB59300F10C0A9D82893350D675AA52DB40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 10c848bdbe119f09c57a31179cedf263e3dc10e035ee062e4d0f0cd53a9e1ef8
                                    • Instruction ID: 227688afd3bafb026d81ea095118370c60bde437f9ba006793c6b4bea6d32580
                                    • Opcode Fuzzy Hash: 10c848bdbe119f09c57a31179cedf263e3dc10e035ee062e4d0f0cd53a9e1ef8
                                    • Instruction Fuzzy Hash: 86E0C2B4E0420CEFCB84DFA8D584AADBBF4EB58300F10C0AAD818E7340D6759A52DF81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 10c848bdbe119f09c57a31179cedf263e3dc10e035ee062e4d0f0cd53a9e1ef8
                                    • Instruction ID: 4559a07ff530545cda52d599d7b71b671c84b577aced97ec732d6d2a2ba8b18c
                                    • Opcode Fuzzy Hash: 10c848bdbe119f09c57a31179cedf263e3dc10e035ee062e4d0f0cd53a9e1ef8
                                    • Instruction Fuzzy Hash: 2DE0A5B8D04208AFCB94DFA8D54469DBBF4AB58200F10C0A9980893340D6759A51DF80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1eb0a03ffdcdda7056b10be4ed95372af0c7ad41fe66d017449d6fbf8c36705e
                                    • Instruction ID: 311325c84b90fbb77c64706a7a0958f2e4119c298cf7c1cf4423d4ea3a5d9f20
                                    • Opcode Fuzzy Hash: 1eb0a03ffdcdda7056b10be4ed95372af0c7ad41fe66d017449d6fbf8c36705e
                                    • Instruction Fuzzy Hash: ACE04F74A0420CDFC744DB94D9546ACBBB8BB45204F5982AACC0867341D7319E42DB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3b75b91c3db827b3addc67d70e2bb77d7fc5c99dfa4e565276fa48e2944f3315
                                    • Instruction ID: fcd38c4c1c91ed73a5f8fbb68e4a06ab464123f65280fb561bb597acc3e612e1
                                    • Opcode Fuzzy Hash: 3b75b91c3db827b3addc67d70e2bb77d7fc5c99dfa4e565276fa48e2944f3315
                                    • Instruction Fuzzy Hash: 6DF032B8804208EFCB41CF94C850AADBFB5FB48300F24C1AEEC1853351C7329A62EB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2ef33d3bb3a4fd1ea82f64b134e9eac0e92612d9158c903d6621ab2e5752dcea
                                    • Instruction ID: 6b01aeb11152d2d4101a7d4f542c4209307c05a137713483811aea53fbf61cc1
                                    • Opcode Fuzzy Hash: 2ef33d3bb3a4fd1ea82f64b134e9eac0e92612d9158c903d6621ab2e5752dcea
                                    • Instruction Fuzzy Hash: 59E092F2805248DFC755EBF0D8557DE7BF4BF45200F0408E6C404C7261EA31991497A2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d6cb4b3b1c35677d0094bb220282d889bbffa2ef60c8dd0555472b6362b6a84b
                                    • Instruction ID: 0fda7fa7248a7b0b2a7f34e918cb3d6f3dba40a442db07418efca00605ebecc4
                                    • Opcode Fuzzy Hash: d6cb4b3b1c35677d0094bb220282d889bbffa2ef60c8dd0555472b6362b6a84b
                                    • Instruction Fuzzy Hash: 99F067B4A41218CFEBA0CF24D995BD9B7B1BB46304F1044D6DA4DAB2C0D7B5AE84CF46
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 603f88b4e063ca4c305bec1981b4fc8f6aec3383bc525d946040ccf47c0cd16a
                                    • Instruction ID: 16e261a7a88447c1429d799c30736f5b10314cc0eabac8a3ce952fed7f63ba0d
                                    • Opcode Fuzzy Hash: 603f88b4e063ca4c305bec1981b4fc8f6aec3383bc525d946040ccf47c0cd16a
                                    • Instruction Fuzzy Hash: BFE086B144A2459FD711CB68D8A1BE93BB8AF43305F1954DFC84557151C6700941D751
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dd9f81c4b43ead5611bc25a5bb45538afeaa24ef9ae90054608017d01a81271f
                                    • Instruction ID: 69779ba1dc4f951df59cb9e63a146e438b9e493447bb97e903f186e9f34d32e4
                                    • Opcode Fuzzy Hash: dd9f81c4b43ead5611bc25a5bb45538afeaa24ef9ae90054608017d01a81271f
                                    • Instruction Fuzzy Hash: 70E0E5B4E04208EFCB84DFA8D584AADBBF8FB48211F1084AAC81893340D7359A42CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ee556aaf227d2a23e0f15e9cde04b2c97d07bffa0c256adaed6908346b3f0c8d
                                    • Instruction ID: 48e095c0e0624ad540f944620ef697548e34e8289e6839676db9f8dc76c68492
                                    • Opcode Fuzzy Hash: ee556aaf227d2a23e0f15e9cde04b2c97d07bffa0c256adaed6908346b3f0c8d
                                    • Instruction Fuzzy Hash: D3E0E5B4E04308EFCB95DFA8D44469DBBF9BB58305F1181AAD804A3304D7359A51DF81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dd9f81c4b43ead5611bc25a5bb45538afeaa24ef9ae90054608017d01a81271f
                                    • Instruction ID: 77cb8b36bc7384028a636fbff53061ff17a19bca531489978ceb21862001bcd6
                                    • Opcode Fuzzy Hash: dd9f81c4b43ead5611bc25a5bb45538afeaa24ef9ae90054608017d01a81271f
                                    • Instruction Fuzzy Hash: CEE0E5B4E04208EFCB84DFA8D5846ADBBF8FB49211F1080AAC81893340D735AA52CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0c4796ed2cab490f0fd562da9eca0c040c090b917776f4323c869531d721b218
                                    • Instruction ID: 4a5a1804aa53f27a573d9bcdf3c6095b626a746515a6d5ff4b2b91acd5da0cc9
                                    • Opcode Fuzzy Hash: 0c4796ed2cab490f0fd562da9eca0c040c090b917776f4323c869531d721b218
                                    • Instruction Fuzzy Hash: 7CE0C2B4E04208AFCB84DFA8D5846ACBBF5EB49304F1080A99818D3340D6759A42DB40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0c4796ed2cab490f0fd562da9eca0c040c090b917776f4323c869531d721b218
                                    • Instruction ID: 8925dacc98296f7694041ec16ef0784b195f1fcdc08b6244cd9899e040fd9b5d
                                    • Opcode Fuzzy Hash: 0c4796ed2cab490f0fd562da9eca0c040c090b917776f4323c869531d721b218
                                    • Instruction Fuzzy Hash: D6E052B4E04208AFCB94DFA8D5856ADBBF4AB49204F2481E99818D3341D6759A52DB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7449a26353b0133cd99c833c7c3abdc03ed55a2d5a6b37211fdef4625ba8344d
                                    • Instruction ID: ab8d551f7ced529cce781cde3099fb4ec9506dd1950004a31f05537f74c7d59a
                                    • Opcode Fuzzy Hash: 7449a26353b0133cd99c833c7c3abdc03ed55a2d5a6b37211fdef4625ba8344d
                                    • Instruction Fuzzy Hash: AAD05B7905B7049FC3918754ECED7F677F8BF4B115F590881F848535639670A056C750
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4ddbb7affd98400fc4e3bf25ab7104d70b424db72e60626d654658745214584a
                                    • Instruction ID: ba22a62f93a03a6bd527b0e90119cd809366cc01bb71116d9e3af63629381241
                                    • Opcode Fuzzy Hash: 4ddbb7affd98400fc4e3bf25ab7104d70b424db72e60626d654658745214584a
                                    • Instruction Fuzzy Hash: 0EE0E5B4E04208EFCB84DFA8D5946ACFBF4FB48204F1084AAC81893340D6359A52CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8f485c120815a3638a263e4744845c7394392d6aaca961fa57fd79164e016c84
                                    • Instruction ID: 2765e063a750f68d4cfa7474d35e7658b70948c14a2bdf4d6726a369d34bdaed
                                    • Opcode Fuzzy Hash: 8f485c120815a3638a263e4744845c7394392d6aaca961fa57fd79164e016c84
                                    • Instruction Fuzzy Hash: 5DF0F274900218CFCB41DF28D84AB9DBBB9FF46322F008596E44AE3260CB349D858F81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 62fe617c9041bd394c54d324feec49c8412a91bebab3f25ee14189afafca219a
                                    • Instruction ID: 02de2d23fed7c4e47b9440fa1078474a352edbee4fbc0e583198a214140b6e3a
                                    • Opcode Fuzzy Hash: 62fe617c9041bd394c54d324feec49c8412a91bebab3f25ee14189afafca219a
                                    • Instruction Fuzzy Hash: 34E0E5B4D04308EFCB55DFA8D4442ADBBF8AB44205F1080AAC80893300D6355A41CB41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5687f953657aec1a80e914893b68451c51cff0d600dd1c3c7d7285e629574669
                                    • Instruction ID: 709e6b2dbb541723b364a48875c43d3a51f2d31b87649774de358b63d6de2ca2
                                    • Opcode Fuzzy Hash: 5687f953657aec1a80e914893b68451c51cff0d600dd1c3c7d7285e629574669
                                    • Instruction Fuzzy Hash: B2E026B580820CEFC700CF98D440A6EBBB8BB55300F20C099E80493340C6319A42DB90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ad53bbc325a27201c62b23428912fa05d813fcaadccd266dda25594e06ead176
                                    • Instruction ID: 8340e61a482700f733145625d1959f05ae8b2a56ad9132277449caad642e32bc
                                    • Opcode Fuzzy Hash: ad53bbc325a27201c62b23428912fa05d813fcaadccd266dda25594e06ead176
                                    • Instruction Fuzzy Hash: EBE0E5B5904208EFDB54DF94D5946ACBBB4BB49210F2480AADC4453341D6359A92DB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 860264d4ffac440b379f1aa65b63c0e3be6f8e457ace03e16af568b931f43915
                                    • Instruction ID: 68bbd990518100ade49b8cfe61b4686aa61abf7d4ff6a5df6eb72ae6886054fd
                                    • Opcode Fuzzy Hash: 860264d4ffac440b379f1aa65b63c0e3be6f8e457ace03e16af568b931f43915
                                    • Instruction Fuzzy Hash: FFE08C79908208EFCB84DF94D985AADBBF9FB45300F2080E9DC0463341C736AE96DB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 59a57028f37685ac13508f84dd412a5e5a1e9935b1ee945519e78c4063c413af
                                    • Instruction ID: 1c85b8331186006b842e6f356ad56a73c524060b52e32cd4f8e31bd9bc255cf1
                                    • Opcode Fuzzy Hash: 59a57028f37685ac13508f84dd412a5e5a1e9935b1ee945519e78c4063c413af
                                    • Instruction Fuzzy Hash: F3E04F74D08208EFC745DFA4D5406ACFBF4FB48204F2480E9CC5853341DA35AA42DF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8b7b2889deeae20c951cc930ed5a8ef119bcd0e2edc07dd016aac7c020bf3ce2
                                    • Instruction ID: 2547903141e7026e0ef30f4c3ec96f0d7460ccc46c0849004e789180e882b8de
                                    • Opcode Fuzzy Hash: 8b7b2889deeae20c951cc930ed5a8ef119bcd0e2edc07dd016aac7c020bf3ce2
                                    • Instruction Fuzzy Hash: B0E086B4D04208DFC780DFA8C5846ACBBF8EB08211F2040A9C80CD3351D7319E42CB40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6d5691cdd54ed046ad6b8c640299359269ee439129ad4ec5511d0f281fc2a62b
                                    • Instruction ID: 00bc95bd63cf9239d6637f6661fb4a39d2a65d122d1b55d8770b012484349712
                                    • Opcode Fuzzy Hash: 6d5691cdd54ed046ad6b8c640299359269ee439129ad4ec5511d0f281fc2a62b
                                    • Instruction Fuzzy Hash: 6DF03974A1021ACFDB11DF28E854BADB7BAFF46221F404096E04AA3340CB346D808F62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3fbbf560739c20292de7fb4677aac46926f55df2c281716436990b2aa105ea2c
                                    • Instruction ID: 24627fae8f9996183d54842c6269d4b5b0cd932aa10d04ebaf9c565e61023ff8
                                    • Opcode Fuzzy Hash: 3fbbf560739c20292de7fb4677aac46926f55df2c281716436990b2aa105ea2c
                                    • Instruction Fuzzy Hash: C2E04FB4D0820CEFC744DFA4D5806ACFBF4EB49204F24C0E9C80893341C7759A42DB40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a8d4afdd77888773a22abd680349267a52490f9ef357a4401c56a8f34b0dda36
                                    • Instruction ID: 204f01b5df5e96f9bad2752d8e9fee3034fda2771424d81815c107f13792710b
                                    • Opcode Fuzzy Hash: a8d4afdd77888773a22abd680349267a52490f9ef357a4401c56a8f34b0dda36
                                    • Instruction Fuzzy Hash: EFF0AC74900219DFDB58DF55D855ADCB7B1FF86314F1484D9850DA7350CA31AD82CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a5e86ec5126ba5080288e64de9020971e44d04515d4cfd36b96d7b9116f1ffe2
                                    • Instruction ID: 23d983612ac56034c7a9554b74957070b8defe4e44c912480858893983e36973
                                    • Opcode Fuzzy Hash: a5e86ec5126ba5080288e64de9020971e44d04515d4cfd36b96d7b9116f1ffe2
                                    • Instruction Fuzzy Hash: 31F06274945228DFEB20CF64D994BA9BBB1FB49304F1090DAE909A7380D676AE81CF00
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cb33d3f28bcde240cb5e36bff9412a52423453b8c5b9453db6fa7bf0184e12cf
                                    • Instruction ID: 89fce2b28302ca8000e762d555c07ab7df41c60c711e957a649ee0fc6f14d0cb
                                    • Opcode Fuzzy Hash: cb33d3f28bcde240cb5e36bff9412a52423453b8c5b9453db6fa7bf0184e12cf
                                    • Instruction Fuzzy Hash: 10E04FB4D0420CEFC744DF98D5646ACFBF4FB49200F1480EACC5853341C6359A42DB40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b0b6b134d400b7abe27b7a25cb289b30ffc33d580f8158f033d96f755cbcf777
                                    • Instruction ID: b3d4aad2232f6cb1998b2057727145788ccdf7910d67ffa6a2be7a7cd437cae7
                                    • Opcode Fuzzy Hash: b0b6b134d400b7abe27b7a25cb289b30ffc33d580f8158f033d96f755cbcf777
                                    • Instruction Fuzzy Hash: A0E017B280520CEBDB61EBF595586EEB7F8FB49200FA004E5D40993290EE359A1497A2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 85e2a2725aadbe6c2a545fc91d16a6a156a10c02c3f6f88404494ec9b904e4ba
                                    • Instruction ID: f6ea2131f6cd250cad93272f4a375212c394a33411783b672e9be3b13f0e2617
                                    • Opcode Fuzzy Hash: 85e2a2725aadbe6c2a545fc91d16a6a156a10c02c3f6f88404494ec9b904e4ba
                                    • Instruction Fuzzy Hash: DFE0C27490820CDBCB04EF94E98466CBBB4FB45300F2080D8D80813340C731AE82CB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 85e2a2725aadbe6c2a545fc91d16a6a156a10c02c3f6f88404494ec9b904e4ba
                                    • Instruction ID: 847759f90317856465d29dfb6dfd373a9e5d5ac5a82eb6ec1d8c99ef4ae05220
                                    • Opcode Fuzzy Hash: 85e2a2725aadbe6c2a545fc91d16a6a156a10c02c3f6f88404494ec9b904e4ba
                                    • Instruction Fuzzy Hash: F1E0C23490820CEBC704DFA8E581AACBBB8FB45304F2080DCC80813344CB31AE52CB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3d6020df1bc602e548439506d125a00877c940e25c337f7864a45ba9a40448ad
                                    • Instruction ID: 53bd76eb8c9bd677ba7c030c982d1a9e29e7ad3d26d0e553f0eb340b987b980a
                                    • Opcode Fuzzy Hash: 3d6020df1bc602e548439506d125a00877c940e25c337f7864a45ba9a40448ad
                                    • Instruction Fuzzy Hash: CCE017B180120DEBDB61EBF595486EEB7F8FB49200F5004A6C40997250EF369A1497A6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c6fd05a2d75984604262502f20dcd2e16feadcc05722d17df218cc82eda05f23
                                    • Instruction ID: 8dea061f9160f74ee2958e73162588057d79e728da2d53ea6423cf3b2f3f31e0
                                    • Opcode Fuzzy Hash: c6fd05a2d75984604262502f20dcd2e16feadcc05722d17df218cc82eda05f23
                                    • Instruction Fuzzy Hash: B4E06DF0910108CFDB01DF98E154A9CB3BAFF01332F004416E0029B350C7388C858F04
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6e40a40a5d200dcd349152e878baafd9680617424f77c0df59f98e0771a48406
                                    • Instruction ID: 542224854c8ee447bc373df6041063cef7e0f6798aa3048e1b913cc78b2a7991
                                    • Opcode Fuzzy Hash: 6e40a40a5d200dcd349152e878baafd9680617424f77c0df59f98e0771a48406
                                    • Instruction Fuzzy Hash: 8BE012B4D1520CDFCB90EFB8D54969DBFF8AB05212F2045AAD848D3340E7715A50CB42
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 21d70594c2f357f85fe6891e3b7aca961806c399e9d98cf31e0227694cf43dcd
                                    • Instruction ID: b9fc0ab47d5702a00d6870089df79e6e920a38404622272da9abd78525f29068
                                    • Opcode Fuzzy Hash: 21d70594c2f357f85fe6891e3b7aca961806c399e9d98cf31e0227694cf43dcd
                                    • Instruction Fuzzy Hash: 62F0AEB4D0120ACFEB64CF59C944B99FBFABF48312F14A4A6D008E3250E330AD828F10
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ca15cd2544d439ffdd351825dc6f7871975ebcfd88cabebf13c02b424e1c948d
                                    • Instruction ID: cedb2ee8bffd8d53c07f22ad118a6c76cb8658be01862d531d8b7f71d4fbbb73
                                    • Opcode Fuzzy Hash: ca15cd2544d439ffdd351825dc6f7871975ebcfd88cabebf13c02b424e1c948d
                                    • Instruction Fuzzy Hash: 50E06D7062810DCBDF14DFA8E8556ADB6B5FF84305F51149AD00A97380CF302D40CF60
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f4f3607677bbb2235d8a5a7acc8076f5f23a22104830eb9c1f9688a5f3cdc443
                                    • Instruction ID: 0fc05a4d84f003fc1723e16bf76a639196daff6eedb48ffc6b42ccc3d0fae972
                                    • Opcode Fuzzy Hash: f4f3607677bbb2235d8a5a7acc8076f5f23a22104830eb9c1f9688a5f3cdc443
                                    • Instruction Fuzzy Hash: DEE0C2B490920CDFC704DF94D58056CBBB9FB85304F2080A8C80863380C7719E42CB90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction ID: 34ac21e176ff4f4cbc5100e766e853095d3b3e889cd090520a8b52f6b7d7ce68
                                    • Opcode Fuzzy Hash: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction Fuzzy Hash: 3EE0ECB4908208EBCB44DF94E5955ADBBB8BB45305F2481AADC0D57341CA359E52DB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction ID: 14d2508b178d57e5b98e82090affd9041a4a1bc0c3b91cef0ab15f8f298ccf76
                                    • Opcode Fuzzy Hash: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction Fuzzy Hash: 46E0ECB4908208DBC744DF94D5955ADBBB8BB45305F2481EADC0857341CA719E52DB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction ID: db620d8b3c4927a103910e9cbe8ffa5e29205762f125d7dbd9fd84450db9a315
                                    • Opcode Fuzzy Hash: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction Fuzzy Hash: 06E0C2F8D08248EBC704DFD4E5906ACBBB4FB45305F20819ACC0813340C7319E82CB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction ID: 3f26ad50e086ea7b0caab86f8bd918e75446b6191589766fa57131ceb5c708d2
                                    • Opcode Fuzzy Hash: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction Fuzzy Hash: 23E012B490820CDBCB44DF94D5956ADBBB8FB45305F6481AECC0857741CB319E52DB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction ID: 7cc754b30256e474951c8d7899f7746e50c9300ca3309590717e6b44139d0fdd
                                    • Opcode Fuzzy Hash: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction Fuzzy Hash: 21E012B4908208DBCB44DF98D5955ADBBF4FB46305F64919ACC0C57341C731AE52DB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction ID: 605c497d30db13e21e4088f4d4a53a2a34aac297f5cde76661dfc6173933832f
                                    • Opcode Fuzzy Hash: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction Fuzzy Hash: 13E012B4D08208DBC744DF94E5956ADBBB4FB45305F24C19ACC0857341C731AE56DB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 247bb6d229cbb913d33a2b49f22ce0cf69acf8d5c5e85625f231c66a321d7e1e
                                    • Instruction ID: 5aab0834771187571da0f6f60574317334b0e55b5dd74ee32329641e9b33bd06
                                    • Opcode Fuzzy Hash: 247bb6d229cbb913d33a2b49f22ce0cf69acf8d5c5e85625f231c66a321d7e1e
                                    • Instruction Fuzzy Hash: 0AE012F190120DEFDB61EBF595547DFB7F8BB45200F5004A6C50893550EE715A1497A2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction ID: 15f0476d6c0fe221eaa83f6bdec251adb01fdcf4f82e504c78312a6d342d2df1
                                    • Opcode Fuzzy Hash: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction Fuzzy Hash: 42E0C2B4908208DBCB04DF94D5905ACBBB4FB45314F60809ACC0813341CB319E42CB84
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction ID: af9eb24564e5e936ae9e4a20505e81f55e56fe1046b189772248bc2ed3cf36d4
                                    • Opcode Fuzzy Hash: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction Fuzzy Hash: 59E0C2B4908208DBCB04DFD4D5905ACBBB4FB4A300F2088AADC0813340C7329E42CB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction ID: 791f912ed8bfd7a2087526cbc87eff53fe971a84afa6501ab13b86aad26b027b
                                    • Opcode Fuzzy Hash: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction Fuzzy Hash: 25E0C2F4908208DFC704DF94D5955ACBBB4FB46304F20819ACC0813340CB319E42CB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction ID: 466f8abf871899bdbdb36e3496cf5b719313656f215b64c7dde64c5d6f851c5a
                                    • Opcode Fuzzy Hash: e865e5c11489fe8b82d05df0dd672bc91c413345d5b9d0faf9d65aedf3382abf
                                    • Instruction Fuzzy Hash: F4E012B4908308DBC744DF94D5955ADBBB8FB45345F64819ECC0857351CB329E52DB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0721a0f17029403147d896ae205bcc838a8e9c201acd35fbdb34e6e47a54f698
                                    • Instruction ID: f3fe7fe978184c2a5dbef35120c3fb653b2a1bf821b151543cfb27f6192aada3
                                    • Opcode Fuzzy Hash: 0721a0f17029403147d896ae205bcc838a8e9c201acd35fbdb34e6e47a54f698
                                    • Instruction Fuzzy Hash: 3BE0ECB495524CAFC780EBA895557EDBBF4AB05201F2001AA880893254E7305A50D741
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9ea37b428eed8b01f5045121f0d4bc8ee33cf4b5edccf3c9e42db5385bc67234
                                    • Instruction ID: 95f8e3f997dd983cecc3a64e3b83ae49dc4b9f090443e54bc0490a3a8d9b6199
                                    • Opcode Fuzzy Hash: 9ea37b428eed8b01f5045121f0d4bc8ee33cf4b5edccf3c9e42db5385bc67234
                                    • Instruction Fuzzy Hash: 88F0FD749046688FCB65DF24EC8469ABBF5BB48252F1051DA9809B7254EB705E81CF00
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 16777b2f0368869f8af88f1dfd869e9a89523f214d09659b1bce5a6c11ed07ab
                                    • Instruction ID: c5bdeca307cb07cdab4b214a48b705c6e4af4e02cbfef7b79bf31ad2913a548b
                                    • Opcode Fuzzy Hash: 16777b2f0368869f8af88f1dfd869e9a89523f214d09659b1bce5a6c11ed07ab
                                    • Instruction Fuzzy Hash: 38E01230A0020DEFDB00DFB4D995A7DBBF5EB55214F504998E4089B240DA31AE009B95
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 620b470247ee01c35d4575f80c7c76016424036c1c033d24096080e9cdc2d713
                                    • Instruction ID: 5654a6e3f435822d7454bb9ab4f6a07395d63e502f965f16f5444834cc57860d
                                    • Opcode Fuzzy Hash: 620b470247ee01c35d4575f80c7c76016424036c1c033d24096080e9cdc2d713
                                    • Instruction Fuzzy Hash: 50F092789582298FDB24CF25C844AD8B6B1FB49345F1045EAE509A7381DB749EC48F41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ae17cf3e0337298e2cff506fbfe447fa465b83fd9f5d5c19416d1ce2dd6473a1
                                    • Instruction ID: ff99aec89ef2e90b2e1a629191be38d598fd33e492a4670514f22515b5db3250
                                    • Opcode Fuzzy Hash: ae17cf3e0337298e2cff506fbfe447fa465b83fd9f5d5c19416d1ce2dd6473a1
                                    • Instruction Fuzzy Hash: 6CE0C2B4804208DFC780DBE4C5602BCBBF8FB09211F1484DACC0853341E6319E42CB40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0563427f891cfaad2020ac55ae1ac4f4387457a68f8fcb458f10921a1f98cf6a
                                    • Instruction ID: b1838a996e2eda0179ee54ad6ce705c8641db29e2e2cb99d6dcacd0817fe2d81
                                    • Opcode Fuzzy Hash: 0563427f891cfaad2020ac55ae1ac4f4387457a68f8fcb458f10921a1f98cf6a
                                    • Instruction Fuzzy Hash: 6DE01271A0020CEFCB00DFB4E55569D7BF5EB45214F6045A8D40DD7700EA716E009B91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c87756280234ac2b219de0159200dcd4f41858a846d15765d80aeebcae2ac2cd
                                    • Instruction ID: 3f2a7a4d8feb1bf1b34996cce0c834ed9b80d572c8776c2332ea0ba8e56d59d2
                                    • Opcode Fuzzy Hash: c87756280234ac2b219de0159200dcd4f41858a846d15765d80aeebcae2ac2cd
                                    • Instruction Fuzzy Hash: 6CE0C27491021ACFCB20DB24C95AB98BBB6FF45205F0040E6980AA7B45DB305E81CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 56e0b06da9ce466de7090a38a7850c35a46c1502eb26c1c48f32f822d59681b1
                                    • Instruction ID: 472a2258c9cd55e6be4503fae0a58ece15d86570b82c3ae0629deec22d25ff72
                                    • Opcode Fuzzy Hash: 56e0b06da9ce466de7090a38a7850c35a46c1502eb26c1c48f32f822d59681b1
                                    • Instruction Fuzzy Hash: 9FE0C274A042189FCB61DF24D859799BBB6FF8A316F004099D10EA3354CB345E858F41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 61c7764e4c902c57399e0ccc8df9d3ac1128112280156ec7d2fa3134f5f1f135
                                    • Instruction ID: c3c1e2eff1fec90b05db73d8f1436c4fc103f2c865d996ed339798d126286612
                                    • Opcode Fuzzy Hash: 61c7764e4c902c57399e0ccc8df9d3ac1128112280156ec7d2fa3134f5f1f135
                                    • Instruction Fuzzy Hash: 5EE0E570A1021D8FDB14DB24D959B9DBAB6FB86711F4100A99409A7380CB306D80CF22
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 69198b3465bbdbd70424a81e6db6ff420ef5815d45e99a58826de77e4a199f36
                                    • Instruction ID: 9bb4f99b40c1a8b8a227d0935d6a9fcd2c26701f5b62f387e4b2edaecee0bf58
                                    • Opcode Fuzzy Hash: 69198b3465bbdbd70424a81e6db6ff420ef5815d45e99a58826de77e4a199f36
                                    • Instruction Fuzzy Hash: BEE0E570901119CBEB58EF64D955B9DB7B5EB85301F00419AD509A3340CB342E818F60
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c266a652e9b23ad021e5003dcf02737c719afea555e9e24f067675c5bd276591
                                    • Instruction ID: be283b1ed7f7d3fba30761e3e1f6d670597f01af196d5176593a826ccf55960b
                                    • Opcode Fuzzy Hash: c266a652e9b23ad021e5003dcf02737c719afea555e9e24f067675c5bd276591
                                    • Instruction Fuzzy Hash: 6DE0E570A142188BCF18EF38D855B9EBBB2FB85311F0040999409A3350CF302D808F81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 75c329d6583c1f934eee972a6629b272fedff45dcee8e4350a1a35dbf250f79a
                                    • Instruction ID: 5b5d813248f822ce9d27822d87576c99963f6c656ccf990d3d64a191034557ba
                                    • Opcode Fuzzy Hash: 75c329d6583c1f934eee972a6629b272fedff45dcee8e4350a1a35dbf250f79a
                                    • Instruction Fuzzy Hash: A4E01AB0A0021A8BDBA4DF24D894BACB7B2FF85212F4041E9D01EA3740CF306DC99F14
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e85b133e2e6d0f9129cd3ddccd67b84dd2bbf0fbb69ae89148b7e30b71fbb205
                                    • Instruction ID: 3157cd81e48a244ddaf683b9c5e3ea90fd4cb08439fdb6b3ef5ecf266d6d9121
                                    • Opcode Fuzzy Hash: e85b133e2e6d0f9129cd3ddccd67b84dd2bbf0fbb69ae89148b7e30b71fbb205
                                    • Instruction Fuzzy Hash: 8BE01A749002188FCB14EF24D95579CB7B2FF46302F000099E509A3380CB316F84CF41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4bfedce627f9f86e637cdfb5614f603784606bb4c12b405fb294f55fa415727f
                                    • Instruction ID: 01c805be5340047c7cb8cce2ea3890ce3605ccf2a6486ff627d584cdddf8506a
                                    • Opcode Fuzzy Hash: 4bfedce627f9f86e637cdfb5614f603784606bb4c12b405fb294f55fa415727f
                                    • Instruction Fuzzy Hash: 8BE01A749102198BCF64EF64D9557ADBBB5FF85202F1000AAD60AA3344CB302D808F20
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 57900d7868d538e99aa5a11fd3a85dd1ca1ffa060f7fe49be15c21617b6c1b04
                                    • Instruction ID: cd35b6092447d384cbab4e45112686b7314ad4e78c1e70f2b2baa48551db1d2d
                                    • Opcode Fuzzy Hash: 57900d7868d538e99aa5a11fd3a85dd1ca1ffa060f7fe49be15c21617b6c1b04
                                    • Instruction Fuzzy Hash: A0E01274A2002C8BCB04EF79C8996ADBBB6FF89309F008059D806A7380CF306D488F40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 070d79ad764a0bf4377879c787e62e578bc79768c8b852024c1b2c1bb184736d
                                    • Instruction ID: 2e895e257eb3245bf4814bb2a5cda03c4bfbd28b09185ba80417a672c2d0bc20
                                    • Opcode Fuzzy Hash: 070d79ad764a0bf4377879c787e62e578bc79768c8b852024c1b2c1bb184736d
                                    • Instruction Fuzzy Hash: 5ED022F084A30AEBE740CAA8C461BAA73ACF702304F0418AECC0813200CB700E00C3A6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bb0745fcfe7b0784cb77a662a5bceda05dd0f44bc1af7c32ca98f2271816b273
                                    • Instruction ID: b38496b5c147bcb9de866cfb2a8be0adb48a640008ac8ce6b2a5e01f4b2ba10f
                                    • Opcode Fuzzy Hash: bb0745fcfe7b0784cb77a662a5bceda05dd0f44bc1af7c32ca98f2271816b273
                                    • Instruction Fuzzy Hash: 89D05E300091C8AFCB028F39D464DE93FB0AF1631075981C6E4C88B233C6359C18CF10
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0824c63b8e4da810ff655f49699e3e68ed170ebf2b6cc9b184a12dcc9641f908
                                    • Instruction ID: cc3d4e94087acc0415aeeeaed8462ae95c8db4f28c032a91183e406bc2aff3f3
                                    • Opcode Fuzzy Hash: 0824c63b8e4da810ff655f49699e3e68ed170ebf2b6cc9b184a12dcc9641f908
                                    • Instruction Fuzzy Hash: 2DC0121140FE882ACB0246702E2AAE27F35B80329134801C3E1488E8A3A90111908AF3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 991b40129e0e6717226371398d395dd504f7b2a0bb49b2c3d3a8e584fd53fc51
                                    • Instruction ID: 36024a2c9c8364c4aab0cd19d4cbf8b4782495e147fb911a60f3952b607fb337
                                    • Opcode Fuzzy Hash: 991b40129e0e6717226371398d395dd504f7b2a0bb49b2c3d3a8e584fd53fc51
                                    • Instruction Fuzzy Hash: EED067B4D15228CFDB34CF20DD287DABB71BB43305F04549B994927290D7B45984CF46
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 58cc531bc0ddc9feb7fceb5191014533ed075e16ace43cc3d16686afc646bb51
                                    • Instruction ID: f7446fa49320819c01642c6ab17850b308da603d6b7e63b6ecfb638ada647394
                                    • Opcode Fuzzy Hash: 58cc531bc0ddc9feb7fceb5191014533ed075e16ace43cc3d16686afc646bb51
                                    • Instruction Fuzzy Hash: 74E02D78900218CFDB50CF54C494A98BBB5EB4A314F14849A880EA7351D735A982CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c7e4b67fa8b50095f12048a602fa028ce0838ae62238c643aa32e3f0c29c2f93
                                    • Instruction ID: c0c13d6ab688536bd896816e654ff676b77456f6b1b6507b91ea7e68e1f6f962
                                    • Opcode Fuzzy Hash: c7e4b67fa8b50095f12048a602fa028ce0838ae62238c643aa32e3f0c29c2f93
                                    • Instruction Fuzzy Hash: DEE0EC7981422ECFDB60CF21C948FD8BBB1BB04304F0084E6840963250D778AAC5DF50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c032624908dd572e0831a9f6bba61bddc9c03fd85428206be3915c327470dcc2
                                    • Instruction ID: 85a221efcc05c43a060f7378c2571a5381d8c4154ca361485401726d20d6fec5
                                    • Opcode Fuzzy Hash: c032624908dd572e0831a9f6bba61bddc9c03fd85428206be3915c327470dcc2
                                    • Instruction Fuzzy Hash: A2E0BDB09192288FDBA0DF30D89CB88B7F1BB48311F1056DA801DAA260DB301E81CF01
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: afd81d6795cf94312529c270cfe454dbcb446a87cc60cfeb2287aa8ec6eb5ce0
                                    • Instruction ID: 084dce621f620dc7994a6834bff2ffc7a62b5f73c785db2fbe9f6f1fdcfdad3b
                                    • Opcode Fuzzy Hash: afd81d6795cf94312529c270cfe454dbcb446a87cc60cfeb2287aa8ec6eb5ce0
                                    • Instruction Fuzzy Hash: B6D0927490562E8FCB60DFA4C944BAEBBF1BF19311F2491EA841CA7350E7309E808F05
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b5d4afdaf7cad3cc96cebb4c2f049a09d7107127dfac14dd8510797a33f3b12e
                                    • Instruction ID: d6b7a485194d364a2058838fbb0eb922070521777a497cb992eb9dc0773edb80
                                    • Opcode Fuzzy Hash: b5d4afdaf7cad3cc96cebb4c2f049a09d7107127dfac14dd8510797a33f3b12e
                                    • Instruction Fuzzy Hash: B9C04C76E5001E9BCF04DBD9E5418DCF7B4FF94322F004036D214A7114D6301526CF50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 229407afb2f84b557f34d51e061c0a05694666bcd3d4c8a1d3e4c7a0c5b617ab
                                    • Instruction ID: 22e07dcec9491447b37cde022adb6179f8acd9921c31b27008fe59ae8b8eabf5
                                    • Opcode Fuzzy Hash: 229407afb2f84b557f34d51e061c0a05694666bcd3d4c8a1d3e4c7a0c5b617ab
                                    • Instruction Fuzzy Hash: EAD0EA78D04228DFDBA4DF25D888B98BBB1BB46304F10D0DA948DA7351DE341AC8CF14
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                    • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                    • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                    • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 243b6436c7ed8b1d1757579b92fa8bdf63a726a23b947c853f45a3f757e43482
                                    • Instruction ID: 98b5ebd93099c6bc75a1c4b4a2cfe0af46e2c40b143a10dff36d4699cce122d0
                                    • Opcode Fuzzy Hash: 243b6436c7ed8b1d1757579b92fa8bdf63a726a23b947c853f45a3f757e43482
                                    • Instruction Fuzzy Hash: B8A01130008208EB8A00CB008A0A80ABA30ABB8300B00C020BA80A02A88A30A820EA02
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $"$4cq$4cq$4cq$PHq$\$$q$$q$$q$$q$cq$cq$cq
                                    • API String ID: 0-3269567963
                                    • Opcode ID: 670af22d8d4393e0c99ae217f0000bdeee93ae5af5fd5b615012242791476b2c
                                    • Instruction ID: a2598f41df24a28761bd09540974ff79aa0a668f33db6405c8a35b21824c4175
                                    • Opcode Fuzzy Hash: 670af22d8d4393e0c99ae217f0000bdeee93ae5af5fd5b615012242791476b2c
                                    • Instruction Fuzzy Hash: EAE29C74D01228CFDB69DF29C984BE9BBB5BB89300F1095EAD409AB254DB319EC5CF44
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613331523.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_74e0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (q$,q
                                    • API String ID: 0-275420656
                                    • Opcode ID: 3c6c3eac5567662b3e59ed51d2e355681533dfe074b568f35d4a9edf7a7897f0
                                    • Instruction ID: e1eb62cd6d99d595ece47b3276f60ca7dcdbcbdbde086288549c26d8882971b3
                                    • Opcode Fuzzy Hash: 3c6c3eac5567662b3e59ed51d2e355681533dfe074b568f35d4a9edf7a7897f0
                                    • Instruction Fuzzy Hash: D4D11BB4F006058FDB14CF69C584AAAB7F6BF89321F2585AAE4059B361D770EC81CF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q$4'q
                                    • API String ID: 0-1467158625
                                    • Opcode ID: 65e64c4aa1db80466d35816df576992af80611a8b79f71d5fbe8803e35eb746b
                                    • Instruction ID: 399face69ac638845e3a7b90bb6e823082a52f9a492a048332d5b6d4d22d1b29
                                    • Opcode Fuzzy Hash: 65e64c4aa1db80466d35816df576992af80611a8b79f71d5fbe8803e35eb746b
                                    • Instruction Fuzzy Hash: C7711C70D026058FEB49DF7AE954699BBF2FFC5210F14C569D008AF269DB3458068F51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'q$4'q
                                    • API String ID: 0-1467158625
                                    • Opcode ID: d8a25f656d294ee25010c8596ed8388b2917c39e80600f9d88c65cb1a2a690f0
                                    • Instruction ID: 1c733cfadae145abddef26745eb3563f3fbbbb6227baa51748c64605b910ce5e
                                    • Opcode Fuzzy Hash: d8a25f656d294ee25010c8596ed8388b2917c39e80600f9d88c65cb1a2a690f0
                                    • Instruction Fuzzy Hash: 61611CB0E026058FEB49DF7AE55469ABBF3FFC9210F14C569D008AF269EB3458068F51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (q
                                    • API String ID: 0-2414175341
                                    • Opcode ID: 243b4b9d941842d78cc481cb58a6040dbda06669406805db66e753aeb0b36d7f
                                    • Instruction ID: dac2e213a8983a382bb34072ba06cd80d0059c61ddebef50440688991c49a50d
                                    • Opcode Fuzzy Hash: 243b4b9d941842d78cc481cb58a6040dbda06669406805db66e753aeb0b36d7f
                                    • Instruction Fuzzy Hash: 98229E74B006168FDB08DF69C59562EFBF2FF89300F68856AD59ADB340DB30A901CB84
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: H
                                    • API String ID: 0-2852464175
                                    • Opcode ID: e65e5083b3326002592fafa614099c21ea00f15ed740e9a509740933d4d4e4a3
                                    • Instruction ID: d49c3e6202ce3c5dbb3ca28d44ad708b2c086a777bf9ed2cdf6eac6dda912562
                                    • Opcode Fuzzy Hash: e65e5083b3326002592fafa614099c21ea00f15ed740e9a509740933d4d4e4a3
                                    • Instruction Fuzzy Hash: 815117B0D05268CEEB24CF6AC858BD9BBF2BB89300F04D4A7C409B7250D7785A85DF64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614145123.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_75b0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: x
                                    • API String ID: 0-2363233923
                                    • Opcode ID: ee6b2b9bfc612bf5264ed9f5b70c18498c61ec3f39e16043bcf8780d39c44ac8
                                    • Instruction ID: e3cc81323fd74fbff59c1a17423a724342251c3caf9b93718a6b57d25d9ce115
                                    • Opcode Fuzzy Hash: ee6b2b9bfc612bf5264ed9f5b70c18498c61ec3f39e16043bcf8780d39c44ac8
                                    • Instruction Fuzzy Hash: F5514CB1D056688BEB68CF6B8D456DAFAF3AFC8300F04C1FA954CA6254DB740AC58F11
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: F
                                    • API String ID: 0-1304234792
                                    • Opcode ID: 553558ce037356fa17a1b22e0224d419c23528b21535513c88e0b26e75029cc8
                                    • Instruction ID: e5a2ee16819e3428520688d7bb93369e974e1cc88241a9c02f31f121802414da
                                    • Opcode Fuzzy Hash: 553558ce037356fa17a1b22e0224d419c23528b21535513c88e0b26e75029cc8
                                    • Instruction Fuzzy Hash: 5841B775D056288BDB68DF67C889699BAF7AFC8300F14C1EAC40DAB264DB745A81CF50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 16894516f20fbd6e1b917065e6355fcc97d0494380a2950863a8b0e82c890a5b
                                    • Instruction ID: 865975066f499711ea0d6d3fefe3661cf3ea2a8076c7daf3d2430d142952a4e5
                                    • Opcode Fuzzy Hash: 16894516f20fbd6e1b917065e6355fcc97d0494380a2950863a8b0e82c890a5b
                                    • Instruction Fuzzy Hash: 5A12C271E046199FDB14CFAAC98069EFBF2FF88304F28C169D458AB219D734A946CF54
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 32af1592cf172ae5412f0c8a9df83eabd32556611ef7cbeba69227933c5375fc
                                    • Instruction ID: 6cd00c8918bbab27b0effdf2e4f458e88da45f729562b9d52c57adc351669112
                                    • Opcode Fuzzy Hash: 32af1592cf172ae5412f0c8a9df83eabd32556611ef7cbeba69227933c5375fc
                                    • Instruction Fuzzy Hash: 1BE1F578E04209CFCB08CFA9C4849AEBBF6FF89310F549265E819EB355D731A956CB50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 939aa16fc3347a78db93bf709027897fcb78db6cf6237ebfdd625bca4be7e6fe
                                    • Instruction ID: c9a6808988dc7fa6060ccdb7dcd2ebff11906b8f7f8cf1727bda5b28d364537f
                                    • Opcode Fuzzy Hash: 939aa16fc3347a78db93bf709027897fcb78db6cf6237ebfdd625bca4be7e6fe
                                    • Instruction Fuzzy Hash: 39E1E274E042198FDB58CFA9C4806EEBBF6BF89300F1481AAD819AB355DB349955CF60
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b90e819a0df9dce8bb6ab37ace9019e4e127fbdae445f5eceb2268704eb5538c
                                    • Instruction ID: 508bb50ce3a282f1b836f8f05a635422a92728fafcc2da8fbab443683945b343
                                    • Opcode Fuzzy Hash: b90e819a0df9dce8bb6ab37ace9019e4e127fbdae445f5eceb2268704eb5538c
                                    • Instruction Fuzzy Hash: 1EC1D0B4D04209CFDB08CF99C584AAEFBF6FF89300F25C1A5D505AB259D770A995CBA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: efb85bbfba62fc7b09fa1ec63a93bac87ba43295abd2510d63b70f9911b2c078
                                    • Instruction ID: c2e6250464b71cd644fd9ae2e8f8953f7cfdaba7984f86bf1bfd5a72892a1435
                                    • Opcode Fuzzy Hash: efb85bbfba62fc7b09fa1ec63a93bac87ba43295abd2510d63b70f9911b2c078
                                    • Instruction Fuzzy Hash: D9B126B4915209CFDB14CFA9D5A8BEDBBB2FF8A305F10446AD80AA7391DB355985CF00
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e8d93aeb391538a8dbbd24a13af3f4d536c35642d2b04aeb53195bb35831b41e
                                    • Instruction ID: 41304eb6d029cf0b0b934da16cdcb654cd332f0dabd600f0898562bbc88eff2b
                                    • Opcode Fuzzy Hash: e8d93aeb391538a8dbbd24a13af3f4d536c35642d2b04aeb53195bb35831b41e
                                    • Instruction Fuzzy Hash: 93B115B4E15209CFDB14CFA9D5A8BEDBBB2FF4A305F10546AD80AA7291CB355985CF00
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dddaed88cff92176b887f04109f313b2431183d04cbe5780c5b64a80cbd98718
                                    • Instruction ID: 5366a2cf30fa3b8c08dfa42529f06a23b0f9ba915aac16dea948c5e738b9c84a
                                    • Opcode Fuzzy Hash: dddaed88cff92176b887f04109f313b2431183d04cbe5780c5b64a80cbd98718
                                    • Instruction Fuzzy Hash: 22A1F678E04209CFCB18CFA9D4409ADBBF6FF89310F1492AAE819EB355D7319955CB50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5c170c068d4460dd03d2358ce67f81d2f4f1c72146bc91fa0ba7eed4a2fe2f36
                                    • Instruction ID: 111d8191b546a42af3bfdbc4b5f10bcab0b89e4c0eb6ec9fadbb29b2d7b5da1b
                                    • Opcode Fuzzy Hash: 5c170c068d4460dd03d2358ce67f81d2f4f1c72146bc91fa0ba7eed4a2fe2f36
                                    • Instruction Fuzzy Hash: 7AC1B4B4A01219CFDB64DF24D9A9BD9B7B2FB99311F1041EAD809AB354DB346E81CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 05f7a683263b6b53da9464efcb209dad88d9f693f405aea8eb505f65e01d2d8f
                                    • Instruction ID: c9fc0ef6eab84b4f29deaba8ca4a22d51d5a69d8d43a939ac0719d09c4e418b1
                                    • Opcode Fuzzy Hash: 05f7a683263b6b53da9464efcb209dad88d9f693f405aea8eb505f65e01d2d8f
                                    • Instruction Fuzzy Hash: 1F91DF74D08209CFDF18CFA9C4806EEBBF6FF89300F1492AAD419AB255D7349951CB94
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7a7de7b649bab2c8956a9686f8ccc7e6b741126e35622264042c75b6007e5a10
                                    • Instruction ID: 46013fbd1c91cab4e6a5020e0856daea6575bdc61c8cb4f3b9c90fb75aa508fd
                                    • Opcode Fuzzy Hash: 7a7de7b649bab2c8956a9686f8ccc7e6b741126e35622264042c75b6007e5a10
                                    • Instruction Fuzzy Hash: C671D074D08249CFDB08CFA9C4806EEBBF6FF89300F1492AAD419AB255D7309955CF54
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1613896670.0000000007550000.00000040.00000800.00020000.00000000.sdmp, Offset: 07550000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7550000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 36896b8e8c2dbb5998bc515cc52c615c898d6b56ef12b4f889762c90b8501b5b
                                    • Instruction ID: c370558b148c1c97719ec943f699a372f056c703c1b9b715d3d588c58a4e422d
                                    • Opcode Fuzzy Hash: 36896b8e8c2dbb5998bc515cc52c615c898d6b56ef12b4f889762c90b8501b5b
                                    • Instruction Fuzzy Hash: 1471B6B0A00219CFDB54DF64D969BADBBB2FB49301F1085AAD80EAB354DB756D81CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0fa20f4f00c421cb994e69aac74521fb54a83c0094a6905514739bcb117677a6
                                    • Instruction ID: 524d93b2ca454fb64b9cc22278fab866b7c5323b9fc4f3608141e7c3c7f47953
                                    • Opcode Fuzzy Hash: 0fa20f4f00c421cb994e69aac74521fb54a83c0094a6905514739bcb117677a6
                                    • Instruction Fuzzy Hash: 6A5122B0D05608CFDB04DFA9D5587AEBBF6FB59301F10802AE019AB394D734A986CF08
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614145123.00000000075B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_75b0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5c1b08160896c2e78477da351682535e9a5dbb896af683369a07fd6a940dcbd3
                                    • Instruction ID: 1bcacdbb636457e7aae141d7d09fd5bd93f4ab3cf8d7f310702dcfb39314952e
                                    • Opcode Fuzzy Hash: 5c1b08160896c2e78477da351682535e9a5dbb896af683369a07fd6a940dcbd3
                                    • Instruction Fuzzy Hash: E0516DB1D056588FE769CF278D552DAFBF3AFC9300F08C1EA854CAA265DB740A858F11
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 196156e84309a7dc9fd3cd474cd92d19245cea4204cd96e26451e3cce1650551
                                    • Instruction ID: 52e93e960d8891916dbef75a12dded17648b8cf82561ee437205603f9dba9b1c
                                    • Opcode Fuzzy Hash: 196156e84309a7dc9fd3cd474cd92d19245cea4204cd96e26451e3cce1650551
                                    • Instruction Fuzzy Hash: 5D4157B5E016198BDB18CFABC94069EFBF3BFC8200F18C16AD958AB215DB3459468F54
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1707df32834cdeb8a1cbba605e4e7a12bde19957fa85657460ee90a228f185e2
                                    • Instruction ID: eee9a1782c115a91009600065a3b4617b47bd78d47bf76ed8a4b8ba64d78fc88
                                    • Opcode Fuzzy Hash: 1707df32834cdeb8a1cbba605e4e7a12bde19957fa85657460ee90a228f185e2
                                    • Instruction Fuzzy Hash: 1141FEB4D003589FDB18CFA9D885BAEBBF1BB49304F20912AE855EB350D7359885CF44
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600285383.0000000001B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B30000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1b30000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 015c3c592c87d78df685746b6bff82d14bbf1ccd037837d6360e8648fa6e8ba9
                                    • Instruction ID: 8f9df6bd8be708a6d60faa19c758f300e6a85523aea866fa21f001e9f4a2cb6a
                                    • Opcode Fuzzy Hash: 015c3c592c87d78df685746b6bff82d14bbf1ccd037837d6360e8648fa6e8ba9
                                    • Instruction Fuzzy Hash: CF41EEB4D003589FDB28CFA9D884BAEBBF1FB49304F209129E855EB290D7759885CF45
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 02ffb755538e3582cf03e1e18e35060416237993c30795205dcecf568cc35733
                                    • Instruction ID: bc7aa57e5c8c96a92cc68fbce2bf31f9c310a77c0d6c285663b6d69f5fecb4ef
                                    • Opcode Fuzzy Hash: 02ffb755538e3582cf03e1e18e35060416237993c30795205dcecf568cc35733
                                    • Instruction Fuzzy Hash: B141F0B5C04258DFDF10CFA9D484AEEFBF1AB49310F14802AE455B7240C738AA85CF68
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1600448669.00000000034A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_34a0000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 434a2bf5a11a8f050ffc5a6cfe64abca0914684d163afa38bcbfe5df69cef274
                                    • Instruction ID: 75c33279359bc6f2d4675014f7f8f4a94993b0a4511a8f9e3043423350e8d767
                                    • Opcode Fuzzy Hash: 434a2bf5a11a8f050ffc5a6cfe64abca0914684d163afa38bcbfe5df69cef274
                                    • Instruction Fuzzy Hash: 8741DDB5C05258DFDB10CFAAD484AEEFBF4AB09310F14942AE455B7240C738AA85CF68
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fd9d5a1e17fe0d949d5812e04478fde7cd743be5624e5098c3266d8e8559142c
                                    • Instruction ID: 33fa2c7f982d26bbd9ddb55f94cc812a8f0654d2f2ab536b08a621ac15d1d4a2
                                    • Opcode Fuzzy Hash: fd9d5a1e17fe0d949d5812e04478fde7cd743be5624e5098c3266d8e8559142c
                                    • Instruction Fuzzy Hash: 8E31CD71D096688BDB59CF2B8848299BFF3AFC9200F18C5FAD4486B265DB351A85CF41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3cc09e59a3d50c960b569fd46534640f1d1812814d58ed81f8736ea38189a5c6
                                    • Instruction ID: 8dd02e6d885bd56a3f21b723d6da5af4564437c25489c4421e77f344106b8331
                                    • Opcode Fuzzy Hash: 3cc09e59a3d50c960b569fd46534640f1d1812814d58ed81f8736ea38189a5c6
                                    • Instruction Fuzzy Hash: 04313C71D057558FD719CF6ACC542DABBF3AF86200F04C1FAC448AA265DB700986CF51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1614836308.0000000007830000.00000040.00000800.00020000.00000000.sdmp, Offset: 07830000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7830000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 99ab6b191319625d3e1fae86c6bc3ce61b6d357c77132f0c0c5a5ec19b84b93a
                                    • Instruction ID: a087f99d40a7644add8886f186db593de3be6967a49e5a5c9a2ed62a2c1719e7
                                    • Opcode Fuzzy Hash: 99ab6b191319625d3e1fae86c6bc3ce61b6d357c77132f0c0c5a5ec19b84b93a
                                    • Instruction Fuzzy Hash: 1E31EBB4E05619CBDB68CF6AC944799B7F6AF89304F04C0EAD40DAA254EB705A818F41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 026791210e46795b3b2603b45316c89b0d50ec4cf0b6d1b18acd6189f95af834
                                    • Instruction ID: 0a028118d7bdc03c86d44acb0563c39275712df67c115b6e88297e655224862a
                                    • Opcode Fuzzy Hash: 026791210e46795b3b2603b45316c89b0d50ec4cf0b6d1b18acd6189f95af834
                                    • Instruction Fuzzy Hash: 2E318771D05A588BDB18CF6BC9446DEFBF7AFC9301F14C1AAD809AA214DB745A85CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6e1a29c6368a4a9dc230622bb986bde5e811ad61d04e4033c58beb66c96e5ba2
                                    • Instruction ID: ed2a229f473d11b4161d33a40943fb06f4fad3799f312db031a085a1133a2c9a
                                    • Opcode Fuzzy Hash: 6e1a29c6368a4a9dc230622bb986bde5e811ad61d04e4033c58beb66c96e5ba2
                                    • Instruction Fuzzy Hash: 01219C71D05A59CBEB19CF6B89442DAFBF3AFC9300F14C1BAD449AA254DB741946CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1603054850.0000000005B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B60000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5b60000_SecuriteInfo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (q$4'q$4'q$4'q$4'q$pq
                                    • API String ID: 0-2944075406
                                    • Opcode ID: 2d490f483d90b614eb95281b07061129d82b628de8063c788fc783b531eda31d
                                    • Instruction ID: 920253a7fdba8da87cc0dd3ed52c8c0674edd196b47da19b213e49abf6919999
                                    • Opcode Fuzzy Hash: 2d490f483d90b614eb95281b07061129d82b628de8063c788fc783b531eda31d
                                    • Instruction Fuzzy Hash: 86D17B36A002059FDF15CF64D844EA9BBB2FF89310B0584E9E509AF272D736ED56CB90

                                    Execution Graph

                                    Execution Coverage:10.8%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:5.4%
                                    Total number of Nodes:74
                                    Total number of Limit Nodes:7
                                    execution_graph 63451 d78fa0 63452 d78fa2 63451->63452 63453 d78fb4 63452->63453 63456 568165b 63452->63456 63459 56839c7 63452->63459 63463 5687bd0 63456->63463 63462 5687bd0 VirtualProtect 63459->63462 63460 5680a9e 63460->63459 63461 56839e5 63460->63461 63462->63460 63465 5687be3 63463->63465 63467 5687c80 63465->63467 63468 5687cc8 VirtualProtect 63467->63468 63470 568166e 63468->63470 63430 5687e50 63431 5687e90 FindCloseChangeNotification 63430->63431 63433 5687ec1 63431->63433 63381 5924808 63382 592484e KiUserCallbackDispatcher 63381->63382 63384 59248a1 63382->63384 63385 592cdb8 63386 592cdce 63385->63386 63390 592d1f8 63386->63390 63396 592d208 63386->63396 63387 592cdc8 63392 592d208 63390->63392 63391 592d224 63391->63387 63392->63391 63402 592d250 63392->63402 63412 592d241 63392->63412 63393 592d239 63393->63387 63398 592d210 63396->63398 63397 592d224 63397->63387 63398->63397 63400 592d250 OleGetClipboard 63398->63400 63401 592d241 OleGetClipboard 63398->63401 63399 592d239 63399->63387 63400->63399 63401->63399 63403 592d262 63402->63403 63404 592d27d 63403->63404 63406 592d2a9 63403->63406 63409 592d250 OleGetClipboard 63404->63409 63410 592d241 OleGetClipboard 63404->63410 63405 592d283 63405->63393 63408 592d329 63406->63408 63422 592f998 63406->63422 63408->63393 63409->63405 63410->63405 63413 592d250 63412->63413 63414 592d27d 63413->63414 63416 592d2a9 63413->63416 63420 592d250 OleGetClipboard 63414->63420 63421 592d241 OleGetClipboard 63414->63421 63415 592d283 63415->63393 63418 592d329 63416->63418 63419 592f998 OleGetClipboard 63416->63419 63417 592d347 63417->63393 63418->63393 63419->63417 63420->63415 63421->63415 63424 592f9ad 63422->63424 63425 592d347 63424->63425 63426 592f4b8 63424->63426 63425->63393 63427 592fa40 OleGetClipboard 63426->63427 63429 592fada 63427->63429 63434 592f8a8 63435 592f8b3 63434->63435 63437 592f8c3 63435->63437 63438 592f3a4 63435->63438 63439 592f8f8 OleInitialize 63438->63439 63440 592f95c 63439->63440 63440->63437 63441 592f5c8 63442 592f60e 63441->63442 63448 592f38c 63442->63448 63445 592f7d8 DuplicateHandle 63446 592f86e 63445->63446 63447 592f716 63449 592f7d8 DuplicateHandle 63448->63449 63450 592f704 63449->63450 63450->63445 63450->63447 63377 5ab2da0 63378 5ab2dc5 63377->63378 63379 5ab2e73 LdrInitializeThunk 63378->63379 63380 5ab2ddf 63378->63380 63379->63380
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,q$4$$q$$q$$q$$q$$q$$q$$q$$q$$q$$q
                                    • API String ID: 0-2072453518
                                    • Opcode ID: 0399a180a3d57f49f9263bae9d080b9306aa90e40d533c5d42548c2c43bdd0f6
                                    • Instruction ID: fec14d972727f6134d0736142fb4f462b8a3562f8c210b17ea50cb1e48c2a7d2
                                    • Opcode Fuzzy Hash: 0399a180a3d57f49f9263bae9d080b9306aa90e40d533c5d42548c2c43bdd0f6
                                    • Instruction Fuzzy Hash: 5EB2E434A00218DFDB14DFA9C994BADB7B6FB88700F158199E506AB3A5DB70ED81CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: TJq$z$z
                                    • API String ID: 0-3253512934
                                    • Opcode ID: 4e25eb93a04b157f5ae3be99e5a2aa2e0d74cbdcefd9d29c74eec86585bfd23a
                                    • Instruction ID: 314d9da7afbe56feef93312d3ad4c261236fee2b925e85127a3dabcc03881e12
                                    • Opcode Fuzzy Hash: 4e25eb93a04b157f5ae3be99e5a2aa2e0d74cbdcefd9d29c74eec86585bfd23a
                                    • Instruction Fuzzy Hash: AEB239779082459FD715CF28C886A69FBF2FFD5300B5983AAD2159B352D330D852EB82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1770914241.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_d70000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Teq
                                    • API String ID: 0-1098410595
                                    • Opcode ID: cc5da037972505474e45b01a8bb8ee4958aaf4cef93f582fa4b707bec4bf3349
                                    • Instruction ID: 34187489974622edc7fb604356c95a81e2e17971ee9f0df980cefc69ba479afe
                                    • Opcode Fuzzy Hash: cc5da037972505474e45b01a8bb8ee4958aaf4cef93f582fa4b707bec4bf3349
                                    • Instruction Fuzzy Hash: 9BC14B38A00104CFD755DBACD548B69B3F3FB99305F28C1A5E40A9B3A5EB749C81DB25
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Vzm
                                    • API String ID: 0-779989405
                                    • Opcode ID: 6d5a1ac2f81d5e6759a1beb2241e7b69db70e43209ac25e77a362be12ce63854
                                    • Instruction ID: 956d8eeebb552dbc3ae35c1d049f9ee515b50f88c1b06f55082fc2ceb506bbb6
                                    • Opcode Fuzzy Hash: 6d5a1ac2f81d5e6759a1beb2241e7b69db70e43209ac25e77a362be12ce63854
                                    • Instruction Fuzzy Hash: 94918D76E002089FDF14CFA9C9857EDBBF2BF88314F148229E405AB294EB749845DF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1608 57a1a02-57a1b00 call 57a1960 1631 57a1a28-57a1a35 call 57a1ca0 1608->1631 1632 57a1a3b-57a1aa8 1631->1632
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: fq$ fq$4'q
                                    • API String ID: 0-1374027347
                                    • Opcode ID: 55db0395887f26aafa1b6566b3f0fe11861ba7314a810594b58f1ff1efaaea5b
                                    • Instruction ID: 203ddb18be85ca6a5ce2b2e6b1ea5e88cdb426f6996a31220d5808e4e20e7245
                                    • Opcode Fuzzy Hash: 55db0395887f26aafa1b6566b3f0fe11861ba7314a810594b58f1ff1efaaea5b
                                    • Instruction Fuzzy Hash: 40216232E0420DDBDB44EBA4D4516AD7BB6FF84300F90466AE416BB348DB315A01DB92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1637 57a1a10-57a1b00 call 57a1ca0 call 57a1960 1660 57a1a3b-57a1aa8 1637->1660
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: fq$ fq$4'q
                                    • API String ID: 0-1374027347
                                    • Opcode ID: 7344567b5fa69980a28a0b09d5b5d4be9c75c7a52e14e3b313bd28df846e3919
                                    • Instruction ID: 4b26fd76c19d68b2910e00ed2ec5b0f917ab050aea4a05af22ea4caf3e800b68
                                    • Opcode Fuzzy Hash: 7344567b5fa69980a28a0b09d5b5d4be9c75c7a52e14e3b313bd28df846e3919
                                    • Instruction Fuzzy Hash: 99214131E0420EDBDB44EBA4D4515ADBBB6FFC4300F90466AE416BB358DB316A05DBA2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2293 59247f8-592485c 2297 5924867-592489f KiUserCallbackDispatcher 2293->2297 2298 59248a1-59248a7 2297->2298 2299 59248a8-59248ce 2297->2299 2298->2299
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(00000050), ref: 0592488B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1790495551.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5920000_InstallUtil.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID: 4'q
                                    • API String ID: 2492992576-1807707664
                                    • Opcode ID: 9fcc005486039952f698166a56d53b421ab64f7e7b7c630832246811384fc4c6
                                    • Instruction ID: 42d72397d2060f5efd3c9ee4cc948391e09131929424708ff6274d02d3010aa3
                                    • Opcode Fuzzy Hash: 9fcc005486039952f698166a56d53b421ab64f7e7b7c630832246811384fc4c6
                                    • Instruction Fuzzy Hash: 102144B1C043598FCB10DFA9D845AEEBBF4BB08320F10851AE859B7280C7396944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2302 5924808-592489f KiUserCallbackDispatcher 2306 59248a1-59248a7 2302->2306 2307 59248a8-59248ce 2302->2307 2306->2307
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(00000050), ref: 0592488B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1790495551.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5920000_InstallUtil.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID: 4'q
                                    • API String ID: 2492992576-1807707664
                                    • Opcode ID: 944608261e15e4381383fd88f05f0dbeca19e3b3cb60d319b7fc1c11c14cea89
                                    • Instruction ID: fdbdef4ccf4341a0a7996c80604b604d6e5c237c457114eee2963c51cba2f60f
                                    • Opcode Fuzzy Hash: 944608261e15e4381383fd88f05f0dbeca19e3b3cb60d319b7fc1c11c14cea89
                                    • Instruction Fuzzy Hash: B42137B1D043598FCB14DFA9D4456EEBBF4BB08320F10851AE819B7380C7396904CFA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (q$Hq
                                    • API String ID: 0-1154169777
                                    • Opcode ID: ec5ade0a481fa7d17c4a578d0d47315ae95b85ae785d4e33fcac7569552c3c7e
                                    • Instruction ID: f533e7a9f58271c8635375d5af31117554d4b8aa25b5d1c88bf20fb7fdd93c24
                                    • Opcode Fuzzy Hash: ec5ade0a481fa7d17c4a578d0d47315ae95b85ae785d4e33fcac7569552c3c7e
                                    • Instruction Fuzzy Hash: 1C41E271605B008FE725DF6AD45075A77E2EFC4320F248A2ED4468B7A1DB74E906CBA2
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?), ref: 0592F85F
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1790495551.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5920000_InstallUtil.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: a76bc7b8c1413f8a9ac065a419c82eefcc886122d263ea9542d9362fc65aa039
                                    • Instruction ID: d43a43c586a606aeee53ae0cfc2301215dcd2f970994c11ebe6490fa3990e9b3
                                    • Opcode Fuzzy Hash: a76bc7b8c1413f8a9ac065a419c82eefcc886122d263ea9542d9362fc65aa039
                                    • Instruction Fuzzy Hash: 079111B5D003189FDB14CFAAD988B9EBBF5EF48314F10841AE819A7360D778A845CF65
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Teq
                                    • API String ID: 0-1098410595
                                    • Opcode ID: f1ea661223399002b6533919d209b7b66b83bb63ed924fd44b312ca02df89d31
                                    • Instruction ID: d56b94fdabec06b8168200d60b1af31c9b0c948dd923d2615ca720fa6150b379
                                    • Opcode Fuzzy Hash: f1ea661223399002b6533919d209b7b66b83bb63ed924fd44b312ca02df89d31
                                    • Instruction Fuzzy Hash: ECC178B39453449BCB10DE14CCC3BEA7771EB72626BDD8959D482CBB02EA29C486CF45
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1790495551.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5920000_InstallUtil.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: 2f9a5601b8f9626cb0259031df4879cfa10bfa7c7149f6ad2a183a0684e52ded
                                    • Instruction ID: 6f91f375c5a2d3c9351fb1b92ca8b07997236e4cf1aa2ea37836fa6a7e286ba7
                                    • Opcode Fuzzy Hash: 2f9a5601b8f9626cb0259031df4879cfa10bfa7c7149f6ad2a183a0684e52ded
                                    • Instruction Fuzzy Hash: 7A3134B0D01358DFEB14CF99C595BDEBBF9BB48304F208019E008BB294D7B5A845CB65
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?), ref: 0592F85F
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1790495551.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5920000_InstallUtil.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 000da2c101b829730d3876fda3f2d53facf3fee70e7472ec0139cfcaf4ba817c
                                    • Instruction ID: 88a1d96fc7ab5f96a0c1ded779c53f6999c90e8f24d7cc95e7b32d6798d594b3
                                    • Opcode Fuzzy Hash: 000da2c101b829730d3876fda3f2d53facf3fee70e7472ec0139cfcaf4ba817c
                                    • Instruction Fuzzy Hash: BF2105B5D00258AFDB10CFAAD484AEEFBF8FB48310F14841AE915A7310D379A950CFA4
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05687CF4
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788890129.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5680000_InstallUtil.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: e9fda2ee430fc005780b4aa3d55850cc1c537129c4a37184a1efcf45de5a8e51
                                    • Instruction ID: 6c97721e30aecaef35cf986b9bcde1664ebae0c0f039b894d11fd34d473f17be
                                    • Opcode Fuzzy Hash: e9fda2ee430fc005780b4aa3d55850cc1c537129c4a37184a1efcf45de5a8e51
                                    • Instruction Fuzzy Hash: A611E3B1D003499FDB14DFAAC884BAEFBF4FF48210F14842AE419A7240D7799940CFA5
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE ref: 05687EB2
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788890129.0000000005680000.00000040.00000800.00020000.00000000.sdmp, Offset: 05680000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5680000_InstallUtil.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 3e641b3c980c04fa2257dccdfe26c425c0f85407264ff6fecf2db5b012dc0b2b
                                    • Instruction ID: eb09e5eabe4f81200e41d9697f3e4f375ebec5a0e5a981b916c1c8ed29648642
                                    • Opcode Fuzzy Hash: 3e641b3c980c04fa2257dccdfe26c425c0f85407264ff6fecf2db5b012dc0b2b
                                    • Instruction Fuzzy Hash: 0B112871D003488FDB24DFAAC4447AFFBF4EB88214F24841AD419A7640CB79A940CBA5
                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 0592F94D
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1790495551.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5920000_InstallUtil.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 97a0a3f672fc2dfc611023e45fb6e517eeec60bcfe791bf9bd155a019491ed59
                                    • Instruction ID: 9c6bfc9f71d2b3ba3de02d93afd1e11cf73278ae9cdbfb75680527adbc5074cb
                                    • Opcode Fuzzy Hash: 97a0a3f672fc2dfc611023e45fb6e517eeec60bcfe791bf9bd155a019491ed59
                                    • Instruction Fuzzy Hash: 701133B5C047498FCB20DF9AC445BDEBBF4EB48324F20841AD519A7300D379A944CFA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: pq
                                    • API String ID: 0-153521182
                                    • Opcode ID: 9268b891a2d77115ea24ec7a90d56a96f0bb644cf270325d17abbd9819eb26d2
                                    • Instruction ID: f84479b9325104d850ea8a060e3875bccd37137c966a8b38c46465425e2f54f9
                                    • Opcode Fuzzy Hash: 9268b891a2d77115ea24ec7a90d56a96f0bb644cf270325d17abbd9819eb26d2
                                    • Instruction Fuzzy Hash: 52513176600104AFDB459F98D905E69BBB3FF8D31471980D8E2099B376DB32DC12DB51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (q
                                    • API String ID: 0-2414175341
                                    • Opcode ID: 1a67e44d97195864cf5e4f8c96e08daf779bc44c722e310994396cd1f64824cb
                                    • Instruction ID: a17e9c6377cd19dde2dc9876910740b5ed7f5c6827f5b3d05e92e79f12a53404
                                    • Opcode Fuzzy Hash: 1a67e44d97195864cf5e4f8c96e08daf779bc44c722e310994396cd1f64824cb
                                    • Instruction Fuzzy Hash: E7418831A006168FCB10CF68C484A6AFBB1FF89324F558699D9299B781D730EC52CFD0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LRq
                                    • API String ID: 0-3187445251
                                    • Opcode ID: b22efc4f3a247d7f1b58451fbfb9c270be5830ad9f4c9bcfe599ee2d34ef9afb
                                    • Instruction ID: 2c77a6529b9d6f0a4a44107aa6f79171c3faf2ad91b1dc14fd391e7f7de5535c
                                    • Opcode Fuzzy Hash: b22efc4f3a247d7f1b58451fbfb9c270be5830ad9f4c9bcfe599ee2d34ef9afb
                                    • Instruction Fuzzy Hash: 23416D36E111289BDF14DF69C8445AEB7F3BFC8315B168694E802BB389CB34AD059BD1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (q
                                    • API String ID: 0-2414175341
                                    • Opcode ID: eebdd9940555ff7a12b9e266c69565f9461bd662295834102305180da062b0df
                                    • Instruction ID: 99a6f6ddf4e923ec06da3f0672981b13260ac2ce4f43b69e6b471ed866df85d8
                                    • Opcode Fuzzy Hash: eebdd9940555ff7a12b9e266c69565f9461bd662295834102305180da062b0df
                                    • Instruction Fuzzy Hash: 2B318072E002198FDB04DFA9D8566DEBBF6EFC9210F648166D505F7340EA309906CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LRq
                                    • API String ID: 0-3187445251
                                    • Opcode ID: c8736ce6e73bf844cce3867e5bb0d332d6f13e5b921728714e2884dbf8a2d4aa
                                    • Instruction ID: e96db8b1d2d3c33a54bf8a3536c240e55f72c25ea9d32dd526fab0bbacff039e
                                    • Opcode Fuzzy Hash: c8736ce6e73bf844cce3867e5bb0d332d6f13e5b921728714e2884dbf8a2d4aa
                                    • Instruction Fuzzy Hash: 4B216D32A111745BDF089B6AC8141BE77F3AFC431172A8A94EC027B389CB34AE059BD1
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8f034e4f359ab6c79d6bfe4c8ac92c83ea0a332bf7d499b5d9cc10aa18f4123f
                                    • Instruction ID: 80d31dcf8bcb114cdf7397d375b31b704be84bc2b45cf5eae3c33627a3d30f3d
                                    • Opcode Fuzzy Hash: 8f034e4f359ab6c79d6bfe4c8ac92c83ea0a332bf7d499b5d9cc10aa18f4123f
                                    • Instruction Fuzzy Hash: 42813735A422088FDB15DFA5E454AAEBBF2FF88311F158069E812AB3A0CB35DD41CF50
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9bdfd7525e485d5a94ee441c6b04644ad78b700247bd72830519ef0488af8e40
                                    • Instruction ID: a1b0a001f83981e09c230eb95f62fe3d5831feddb2678e521fcd6ad653594cc4
                                    • Opcode Fuzzy Hash: 9bdfd7525e485d5a94ee441c6b04644ad78b700247bd72830519ef0488af8e40
                                    • Instruction Fuzzy Hash: 48811975A00618CFCB24DFA8D484A9EB7F5FF88710B168169E8169B760DB31ED42CF90
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9c93d6693c9bfc8e36162c5b23fe341f2af926595408fb4ad988ed3f2ad93467
                                    • Instruction ID: 78e876a165ba2bf5c617339a37eb662d1eff3a8a3b4783ff5eaa2320a2147073
                                    • Opcode Fuzzy Hash: 9c93d6693c9bfc8e36162c5b23fe341f2af926595408fb4ad988ed3f2ad93467
                                    • Instruction Fuzzy Hash: 245133B3B042158FCB14CB68D444A7AB7E2FBC4321F04836AE61ACB650EB31DD51EB81
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 63f893712e25099ca9e46a6de538c979887f3f7fe602fdfda13d21df06529368
                                    • Instruction ID: afddb06fedec6679ef722328af28f6ebb6a4c7c1efbe8fcd6a20314627f360f3
                                    • Opcode Fuzzy Hash: 63f893712e25099ca9e46a6de538c979887f3f7fe602fdfda13d21df06529368
                                    • Instruction Fuzzy Hash: 6C51D235B04204CFEB04DB65E859BAA77B3FBC9301F14C6A5E1069B399EB349C46CB51
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c99c6dd4b3948435ccf436dae0d769c1667bdd2a10d954c70adb9b6537758d7f
                                    • Instruction ID: bba29ff9913ad085e7e5a2e504348b22818e32ef70e5fa3722900ef8d8566903
                                    • Opcode Fuzzy Hash: c99c6dd4b3948435ccf436dae0d769c1667bdd2a10d954c70adb9b6537758d7f
                                    • Instruction Fuzzy Hash: 1D717136A006049FC718DF69D584E69BBF2FF89310B158669E416EB3A5DB31EC42CF90
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 16ac2dd918c1b85fa631a1b266daac292aec94f2b4fe120aa42dde7bf54db1ba
                                    • Instruction ID: 3eccf5b306683dd9fffe98a1d8ef0872a24f966c47e7ae9642e383c8fea77084
                                    • Opcode Fuzzy Hash: 16ac2dd918c1b85fa631a1b266daac292aec94f2b4fe120aa42dde7bf54db1ba
                                    • Instruction Fuzzy Hash: 06519E35B00204CFDB14DB65E849BAE77A3FBC9301F24C5A5E1069B799EB749C42CB51
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9745d7375e6e1cd14d00c2916a1bca0ae33c3ef22e4839e55df53fcbb3eef954
                                    • Instruction ID: 68854b625d6a877a8e49584f210b917255cfa4801c739413b099c5782f569a42
                                    • Opcode Fuzzy Hash: 9745d7375e6e1cd14d00c2916a1bca0ae33c3ef22e4839e55df53fcbb3eef954
                                    • Instruction Fuzzy Hash: 5841AF30B04108CFDB50DB29E845B6A77A3FB85311F6580B5E006DBBA9DB75A847CF54
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 31cb23e4ea32f95464bc22b527bf810551f2c04c0304c0702ee1c19c5f664251
                                    • Instruction ID: 52a4c278349a313dc3f248585c4783eb5d5fc31959987f0bd1c6a6023ae21eb4
                                    • Opcode Fuzzy Hash: 31cb23e4ea32f95464bc22b527bf810551f2c04c0304c0702ee1c19c5f664251
                                    • Instruction Fuzzy Hash: F0516D35B00204CFEB14EB65E84DBAE73A3FBC5311F24C6A4E1069B699EB749C42CB51
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7601b56fddefd09c6b64ae3cbb860f0ee55eb2f9361d2f83eb8b98b5656b2aa5
                                    • Instruction ID: d5adc82ac8987acf48728bdb72296859df6d09d440a1f98a8ed633e18fc187e2
                                    • Opcode Fuzzy Hash: 7601b56fddefd09c6b64ae3cbb860f0ee55eb2f9361d2f83eb8b98b5656b2aa5
                                    • Instruction Fuzzy Hash: D1518076A04355DFEB14DF64D584A6DBBF6FB89300F158228E802AB341CB74EC42DB94
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 843eeba0e583d3731e0d59f5af750c4d69adbf0cd5478d1f905a414f1a38f1cc
                                    • Instruction ID: cc58b73f881521f7a0d2943d66d57d05dee352a8840ef226d8bdd87dabb81e28
                                    • Opcode Fuzzy Hash: 843eeba0e583d3731e0d59f5af750c4d69adbf0cd5478d1f905a414f1a38f1cc
                                    • Instruction Fuzzy Hash: 1F41A176A04248DFDB15DFB4D059AAD7BB2EFC8300F049659E406AB391CF349C02DBA1
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 42b3f645dfce4f90f50b822954c7bdd1b01e3c1152de9916feeb71504059583f
                                    • Instruction ID: 2e054c36f4f5596d4a0bc6787a89d4f9ddc3fb621cd3e8b4ba52f16e428ed72d
                                    • Opcode Fuzzy Hash: 42b3f645dfce4f90f50b822954c7bdd1b01e3c1152de9916feeb71504059583f
                                    • Instruction Fuzzy Hash: DD414E31E102189BEB14DBE9D998AEEBBF2BF88310F548165D516BB391DB309C01CF65
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9262d0378973a4e81e113bfedb297c7f6aa17b3b5d9904628e80a5c4470d6c04
                                    • Instruction ID: 3966d3a9b5af4069e38938ec768c12fa06695136b4a919e8f08542b5168f7c84
                                    • Opcode Fuzzy Hash: 9262d0378973a4e81e113bfedb297c7f6aa17b3b5d9904628e80a5c4470d6c04
                                    • Instruction Fuzzy Hash: B1418831A002198FDB54CFA5D944ABFBBB2FB88705F0084A9E406E73A5E735D945CF91
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 549114d83082a834ed65663a4b68151e566806018690d90d212ade1268d36b45
                                    • Instruction ID: fea86a7c3bb9c298f894ea1657d780a84f44f060dcc87656a9c2ca51a3b33f7a
                                    • Opcode Fuzzy Hash: 549114d83082a834ed65663a4b68151e566806018690d90d212ade1268d36b45
                                    • Instruction Fuzzy Hash: 5B41D0B1D0034CDFDB24DFA9C484ADEBBF5BF48314F14812AE809AB250DB75A945CB95
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b892071e6fa68807f864376cb99fb4ad5d0684cf1a17f998f3483a87aa55e79f
                                    • Instruction ID: 46bc492a259f67e1cee7d496cc4db706e839f77feb525f89a5ed4cde45858249
                                    • Opcode Fuzzy Hash: b892071e6fa68807f864376cb99fb4ad5d0684cf1a17f998f3483a87aa55e79f
                                    • Instruction Fuzzy Hash: 2F31C17D51861A8FE704CB2AC840AAA77B3FFC9315F40F765E4469F21ADB319A02CB40
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bfb5711f5e94c272c838ff49518890602c9d35e206275f7cbe1e4904a923792b
                                    • Instruction ID: 36e482dc50fbf31a5877d1bd1e89d29d6c6369b5c65c7cf7f5369cca7adf4300
                                    • Opcode Fuzzy Hash: bfb5711f5e94c272c838ff49518890602c9d35e206275f7cbe1e4904a923792b
                                    • Instruction Fuzzy Hash: E331B330A04108DFDB90CF19E845BAA77B3FB89311F2480B5E406AB798DB75AC46CF54
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 796c8672576f25a498f4b4300f5f41ed0888f718a7b67fac932399e95e7786bc
                                    • Instruction ID: 1880e4f938e7bd9ee9ddb4ab1bc2d52310a4044d2d251b87b7e067c0bed2c747
                                    • Opcode Fuzzy Hash: 796c8672576f25a498f4b4300f5f41ed0888f718a7b67fac932399e95e7786bc
                                    • Instruction Fuzzy Hash: 15219C7E5185168BEB14CB6AC840ABA7673BBC4311F10F765D407DF69ADF358A02CB80
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8739c5481d23ed1b0d3071ae633be41f5d532543d01e819f64240e445c1fa673
                                    • Instruction ID: 60401448808682bc6de488830effe23bab5775fdd14257ff39d01cf9a91e66d5
                                    • Opcode Fuzzy Hash: 8739c5481d23ed1b0d3071ae633be41f5d532543d01e819f64240e445c1fa673
                                    • Instruction Fuzzy Hash: F931A030A14108CFDB90CB19E845BAA77B3FB88311F2480B5E406ABB98DB75AC46CF54
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ab1a0c83457220317cbcf958d90b803a7962f1d63c67022cc03ab394d1539bcb
                                    • Instruction ID: d603b9469e35c66a862164f9fac7db5af3834dfa3c9c06307597784089a6c49b
                                    • Opcode Fuzzy Hash: ab1a0c83457220317cbcf958d90b803a7962f1d63c67022cc03ab394d1539bcb
                                    • Instruction Fuzzy Hash: 6811385BC0EA864BCB074E20AC877427BB3E3E2715B1E03DBE76089153E70695447212
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ccf946276a9e9be401a03389d9ebc123ff9d3a863ea172c93d5236ab7a5a8c3c
                                    • Instruction ID: 4035f81be8b9bdeda64e9bf00698cb44942b165be6a4258645cb6f320d0136c2
                                    • Opcode Fuzzy Hash: ccf946276a9e9be401a03389d9ebc123ff9d3a863ea172c93d5236ab7a5a8c3c
                                    • Instruction Fuzzy Hash: BA216D32B042198B9F10DFA9E8854BEB3FAFF852617144876E419D7760DA34DD02CB60
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7f86427cacbd5624d6e17c72fed656bc5b5e406084e9268749b5adbc1cca1421
                                    • Instruction ID: f7008bb54c9b81388562d3b6c31236a77c9b30ab93ac815ad22676f816a5517e
                                    • Opcode Fuzzy Hash: 7f86427cacbd5624d6e17c72fed656bc5b5e406084e9268749b5adbc1cca1421
                                    • Instruction Fuzzy Hash: 5A210531A042199FDF90DEB9D404BAEBBB5AB04350F108066E919DB7A0E638DA51CF91
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4544ee718d9d6423dbe8179332e194372fbca2940afd4cef43213cfd6bec0b38
                                    • Instruction ID: aec27f8b7cdb5eef422c566cb4bd1b6fe3ad59ffb11527b35a2411196f790c22
                                    • Opcode Fuzzy Hash: 4544ee718d9d6423dbe8179332e194372fbca2940afd4cef43213cfd6bec0b38
                                    • Instruction Fuzzy Hash: 87213075A00208AFDB159F65D854ADEBBB6EB8C320F158129E811B73A0DB759D41CFA0
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 03303f7ef77cb90b9e12701912965be625cb75d745d8e9ea58b1d17ae23c42b6
                                    • Instruction ID: e54df8d1a77f9196879b48a9d3fee51220aeda30324e2232fb0269cb0368a5e8
                                    • Opcode Fuzzy Hash: 03303f7ef77cb90b9e12701912965be625cb75d745d8e9ea58b1d17ae23c42b6
                                    • Instruction Fuzzy Hash: D8217C32A111745BDF089B6AC8101BE77F3AFC431172A8994E8423B389CB34AE059BD1
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 97e09b114102a587509db73c7f3762eaa034993b4d656241f6213639fd03501a
                                    • Instruction ID: 82e76a11e1af0c8584df86b39a8319a4690dadb19824ac55be1bca99746092bd
                                    • Opcode Fuzzy Hash: 97e09b114102a587509db73c7f3762eaa034993b4d656241f6213639fd03501a
                                    • Instruction Fuzzy Hash: FF21C3357002055FEB10EB68E8457AE77E6EB88714F008529E00ADB395DF79AD068BE1
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: eee17434f743626f1fee235e5260f9b5881437741dae4e3afc1a7c936802b930
                                    • Instruction ID: e3741cf942c3ef3a4ee901dd0e3b0820b165f193feb1269de56e10bf5465975f
                                    • Opcode Fuzzy Hash: eee17434f743626f1fee235e5260f9b5881437741dae4e3afc1a7c936802b930
                                    • Instruction Fuzzy Hash: D0214C75A00208AFDB149FA9D454ADEBBB6FBCC320F158129E811B73A0DB759C41CFA0
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e92171656a30c34c7b2dfd729486e160934cad50bc94bbf0866a34c4641af37c
                                    • Instruction ID: c2bb27ea4f6aaec34ea1283418e343223cedcc6a8c41a54a593c40f088905cb6
                                    • Opcode Fuzzy Hash: e92171656a30c34c7b2dfd729486e160934cad50bc94bbf0866a34c4641af37c
                                    • Instruction Fuzzy Hash: 9B110E30B003049FDB54ABBAAC49B7A7A9ABFCC310F148469F10AEB381DD709C0187B5
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3448aab64a1f6b63e2354abc465b2b2cdc52f1fb92536e89bf142deae91944ec
                                    • Instruction ID: 05cbccace6c53c834a3574099d7af88dcd4729ffd53215e5c1936ddf85272842
                                    • Opcode Fuzzy Hash: 3448aab64a1f6b63e2354abc465b2b2cdc52f1fb92536e89bf142deae91944ec
                                    • Instruction Fuzzy Hash: 8B11A030B043145FE718EB799856BABAB9AFFC9350F1540A9A00EDF396DD649C0243A5
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ff6a1346900649150d2ba37cc93f312911dc2e8a2388074f6845243025b45705
                                    • Instruction ID: 857ff5d3650974eb78854ed968c92f9b04ef09ed5a9a64501850ea38f14db48e
                                    • Opcode Fuzzy Hash: ff6a1346900649150d2ba37cc93f312911dc2e8a2388074f6845243025b45705
                                    • Instruction Fuzzy Hash: 2701CC30B003185FE718EB7A9C56B6FA6DAFFC9650F144069B00EDB395DD609C0243B9
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9be1ecf7a4b02f720e5b085488e006ecf6d7061292ddc33f02e6868db644b603
                                    • Instruction ID: d952e217eec588f019de1f0c185b55335302b72f55229b37eea67bb8235f925e
                                    • Opcode Fuzzy Hash: 9be1ecf7a4b02f720e5b085488e006ecf6d7061292ddc33f02e6868db644b603
                                    • Instruction Fuzzy Hash: 1801DE317003185FE718E77A9C55B6FA6CAFFC9210F144069B10ADB395ED61AC0143A5
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 708ab04ad779318ba22306ad1e0984a6a9a139161f06a83ee57802995e008ffc
                                    • Instruction ID: f041b28a2d255112123a11d3fdb2516b90595ba842f3c86399742ddf1e5cb234
                                    • Opcode Fuzzy Hash: 708ab04ad779318ba22306ad1e0984a6a9a139161f06a83ee57802995e008ffc
                                    • Instruction Fuzzy Hash: 8D115976C006098FDB10DFAAC845BEEFBF1FF88320F148829D468A7250D7799541DBA5
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e88fa6cff89379bd75fa813c13de24da9d86d2abe4011cc8ceae66d5ea5ed2af
                                    • Instruction ID: eadf2c2f06d5a07118e5c247ae35ca755f5e87e580a585008fee0f5451314240
                                    • Opcode Fuzzy Hash: e88fa6cff89379bd75fa813c13de24da9d86d2abe4011cc8ceae66d5ea5ed2af
                                    • Instruction Fuzzy Hash: B0118B317041408FD314C62EC804B56BBE7EB96610F6AC0B6E006CB769DB709C42CF55
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ebcc70601b1a4b1d3eb5db36d36c48dec3f05d60e0639f67681c3ab78aa657ea
                                    • Instruction ID: 98f32ea4700dabd3b4b732526339efaeb1ce12cf592701861e0f963399e2eb58
                                    • Opcode Fuzzy Hash: ebcc70601b1a4b1d3eb5db36d36c48dec3f05d60e0639f67681c3ab78aa657ea
                                    • Instruction Fuzzy Hash: A401807A94430EEBFF14DBA5D5456ACB7B2EB80304F9067A69007D7241EB364A01EB52
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 292a97b062891c051a1fb975bfb1b3ea6d3ec59eb23896c96032bf51b454e286
                                    • Instruction ID: 58bfc0c9c39d672845fd308e98690860e088fe97ae1823bd3ee178423c48132b
                                    • Opcode Fuzzy Hash: 292a97b062891c051a1fb975bfb1b3ea6d3ec59eb23896c96032bf51b454e286
                                    • Instruction Fuzzy Hash: 4D113776C003098FDB10CFAAC844BEEFBF5EF88324F148829D558A7240D7799540DBA5
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ba7e0e4ec3d63264fd0c0fbc18ce24d65f065078667f2b0c2ec3777e49ca31c6
                                    • Instruction ID: d2ab5a3380fcc8f3403cccc5931444686b36f8d250a8ad4e997e0105fdd3bd75
                                    • Opcode Fuzzy Hash: ba7e0e4ec3d63264fd0c0fbc18ce24d65f065078667f2b0c2ec3777e49ca31c6
                                    • Instruction Fuzzy Hash: F1014C7A98430EEBFF14DBA5E1455ACB7B2AB80300F9067A69017D6240DB364A00EB52
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2b6e11ec0f158880837b46ca165912fb84c3051042ffec914edd96a40eb92a3d
                                    • Instruction ID: e62168c25e556e75b81390cd290c191157b092a5679bc9eccb21d052b687bdec
                                    • Opcode Fuzzy Hash: 2b6e11ec0f158880837b46ca165912fb84c3051042ffec914edd96a40eb92a3d
                                    • Instruction Fuzzy Hash: 62115A32615101DFEB15CE16E44CB7A33A3FBC1316F24DAA8E0038B699DB74A885EF01
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e60ebcb133498c006159b15b8d53b2af8693873e032c6c5e25eb0e1bddfb6127
                                    • Instruction ID: 4f375aa63ba470444781d7d8ee6555015b4b554a4892068ad62707950bab16a5
                                    • Opcode Fuzzy Hash: e60ebcb133498c006159b15b8d53b2af8693873e032c6c5e25eb0e1bddfb6127
                                    • Instruction Fuzzy Hash: B811CC3E900119CFD704CF69C880BA9B3B2FBC8311F10E665E806AF24ACB319942CF40
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b904e2f775042429ce5cf21c28de027504cddff0ec4cc33ed514c9287b915fa8
                                    • Instruction ID: 3e97c56fcd1f6fcba34df655ebd2b25f00a1300250077cd386bd13914700d853
                                    • Opcode Fuzzy Hash: b904e2f775042429ce5cf21c28de027504cddff0ec4cc33ed514c9287b915fa8
                                    • Instruction Fuzzy Hash: 83015E36619100CFEB12DE16E44DB7A3263FBC5311F24DAA5E10347699DB349985EF02
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8769a8a054fd83e9f511bebf27945e189a390a79dcc102b816febd532105ff52
                                    • Instruction ID: 3a6757e09e61d187d810736d8a4e654a735ad9f30f949cc2cf5cac42f63c12c5
                                    • Opcode Fuzzy Hash: 8769a8a054fd83e9f511bebf27945e189a390a79dcc102b816febd532105ff52
                                    • Instruction Fuzzy Hash: A9F02432F083115FF7688619F85076AF7A9FBC8720F054029E80AEB390CA66EC43C794
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b97a152a5fe1e08a1326b2cf84ad07720601f18cb2a7e11128e9b354fc31726b
                                    • Instruction ID: 1b869938188e2e50888622b0f753a442fedb8907d8b10ef9e24a3bf28f10dea4
                                    • Opcode Fuzzy Hash: b97a152a5fe1e08a1326b2cf84ad07720601f18cb2a7e11128e9b354fc31726b
                                    • Instruction Fuzzy Hash: FBF062326007006BDA19B768A4A16BD76D7CEC06A0344492DE057DB354DF647E46C3E2
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f0b4bfd61073e9ebe7a7ef8f1dd78313c52d179165c6c1c2b9774f7c016a16f6
                                    • Instruction ID: af0eca8a4b6c1b964120e02efe2989c56830a0b14c34b370c8ad712e219a6275
                                    • Opcode Fuzzy Hash: f0b4bfd61073e9ebe7a7ef8f1dd78313c52d179165c6c1c2b9774f7c016a16f6
                                    • Instruction Fuzzy Hash: E1F0F062F0D3D05FF3260628A820365ABA2AB96114F09009AC0868F7A2D986DC03C751
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8676563b769fa5d024e09e086db8c92d7932a17661124fe635503e10ef619ea7
                                    • Instruction ID: 617ff92ecc9d485bf674e89d154a8b70b35aae2ce808ba1ac7acbe6561e2e502
                                    • Opcode Fuzzy Hash: 8676563b769fa5d024e09e086db8c92d7932a17661124fe635503e10ef619ea7
                                    • Instruction Fuzzy Hash: 1F01AD35B053008FCB54EB78945976D36E2AB4A311B4640A8E84BEB790DE24DC07CF12
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cc62ad70a282bf585cfdee0ff04e560e11b79c9045a5282ea69dbb18646817c5
                                    • Instruction ID: 19e928daaae41015ea5f1a4ccf1ec14b06eae6e7c023f8d68d5c01bcd4d038f0
                                    • Opcode Fuzzy Hash: cc62ad70a282bf585cfdee0ff04e560e11b79c9045a5282ea69dbb18646817c5
                                    • Instruction Fuzzy Hash: 1A01D635B002048FCB14DF79C594AA9BBF2EF89204F5141AAE61ADB3A2DE309D05CF52
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3b5a77704141420edf6b02f4c8f5bfcc957bf1fdb4fd8730c0b2edf5c68c607b
                                    • Instruction ID: bed0305f3106736383a9586aff348eee68bfd8d717c5c72b40758dd76aceb3ec
                                    • Opcode Fuzzy Hash: 3b5a77704141420edf6b02f4c8f5bfcc957bf1fdb4fd8730c0b2edf5c68c607b
                                    • Instruction Fuzzy Hash: 7C014B30A00640CFD745EB78D468AAE37F2EB49310F1550AAE906CF361DA358C028F62
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6a1b7b9be4bfad531c1896ed34133cd4b2f66760d351bb1109c84bc7a46bee0b
                                    • Instruction ID: 2512d5a6b7f5cc4c84c61e592e5668c2061d8cf275ff05c1ec3de729b57c033e
                                    • Opcode Fuzzy Hash: 6a1b7b9be4bfad531c1896ed34133cd4b2f66760d351bb1109c84bc7a46bee0b
                                    • Instruction Fuzzy Hash: 71F0B4B1704210AFE7209B56D888B377B99EF85731F06C965C445CBB51CA29D8C2CF59
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0d068a45cb03c8383f5586cdf256a5d9ca61085cdf57caef9689f3962d96e1c0
                                    • Instruction ID: 7d892cb63cb92db57a32e5d1a201ad9c31c079efdaaed96acf00100b09af1ac5
                                    • Opcode Fuzzy Hash: 0d068a45cb03c8383f5586cdf256a5d9ca61085cdf57caef9689f3962d96e1c0
                                    • Instruction Fuzzy Hash: 4501193A909119CFEB66CFA0DC98FBD7B72BF84305F044255C206A7562CB349A85EF25
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4a1201971c26bcdc5c2c05a9a61648e05a47dc5d53e3067f88f6a096762ea717
                                    • Instruction ID: a493fbf596bec77f3cc86529e57d8862ac344124beaef1a28696cb83129f6b27
                                    • Opcode Fuzzy Hash: 4a1201971c26bcdc5c2c05a9a61648e05a47dc5d53e3067f88f6a096762ea717
                                    • Instruction Fuzzy Hash: B5E012737182189FA744D6A8A4005DABBEDD788261F54417AD509D3640EA729941C790
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: abacbc3a2afbd2b007d21401d4dcb97f87fc6e645e61428a7a251f1d5c16bbad
                                    • Instruction ID: bc2b7ff249241e768672d44e49ebdae6d957d37dc0aa33f0aaa3e4826010645a
                                    • Opcode Fuzzy Hash: abacbc3a2afbd2b007d21401d4dcb97f87fc6e645e61428a7a251f1d5c16bbad
                                    • Instruction Fuzzy Hash: BEF0623AD10014DFDB04DFA8D484AACB7B2FF88300F548215E40AA7746DB346D05CF91
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: af28f3b0ba90b75ef780c271f6f89105f9540fa388f0bfe6cbdf055ad4784525
                                    • Instruction ID: beefe6432c168655fa699c7c0b625c16c12ea60b54c53ad290ad9d6de8cbd321
                                    • Opcode Fuzzy Hash: af28f3b0ba90b75ef780c271f6f89105f9540fa388f0bfe6cbdf055ad4784525
                                    • Instruction Fuzzy Hash: 00E020779101549FD3209B94E948F617FD8EBC4329F8B8255E404E7143C620EC40DBE1
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f09f3ed8dd1055f792a13bc8a583a8ee39379ed457a597138f45f700e38a6cfe
                                    • Instruction ID: bd1cf80da01309c391c3535c3b45aee2e1fccfbfe7f92ddff4dae3dbe6c5b235
                                    • Opcode Fuzzy Hash: f09f3ed8dd1055f792a13bc8a583a8ee39379ed457a597138f45f700e38a6cfe
                                    • Instruction Fuzzy Hash: 31E02632B10254638B28E179441857E75DF4BCC210B000639A812AB384ECA05C0493E2
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 90bf1612f86a05dbc1af766826a550d9f86ce26890bec1408f5dd7c1df82675e
                                    • Instruction ID: 287d11ac1012495a72eb8cc77b46ded02a46588617e84cd57d605c13dda51591
                                    • Opcode Fuzzy Hash: 90bf1612f86a05dbc1af766826a550d9f86ce26890bec1408f5dd7c1df82675e
                                    • Instruction Fuzzy Hash: CCE0CD31B433049BFB26A67A4800BA63399AB45A50F11006996065F390DD61EC43CF67
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4bf55c6c927c8bbf22bf438f53ccebcafc1ca0bf2fa1a5534e339a237a57187e
                                    • Instruction ID: a709db83b8687bfaf41199ed556ba8c1d5d4a2f852983d2a9b7dc4eae3aa700a
                                    • Opcode Fuzzy Hash: 4bf55c6c927c8bbf22bf438f53ccebcafc1ca0bf2fa1a5534e339a237a57187e
                                    • Instruction Fuzzy Hash: B9E0D831304600CFD714DA29D448B293793BFC6310F108BA9D156C72A9C73098429A46
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f660e889f358360ffea12193e4bd22c21f12bb3b680dbe23d1f0ae0de60f11ab
                                    • Instruction ID: 03d3fe48896704de899b64bd8584ecb951d437f3f949699f81e54dbafb1d7818
                                    • Opcode Fuzzy Hash: f660e889f358360ffea12193e4bd22c21f12bb3b680dbe23d1f0ae0de60f11ab
                                    • Instruction Fuzzy Hash: 9CE08635A40308EBDB44EFB5F94279D77B2DB44324F0146A5D8199B3D0EA315F029741
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: efebd3efd9fc3de1208dd08838f998ae3e9777d1b0d87764e7ae550e66003e37
                                    • Instruction ID: e520663f51085c136e6f2a51d7d65a2e1ae382e048a3581f2fb0c74bead3f619
                                    • Opcode Fuzzy Hash: efebd3efd9fc3de1208dd08838f998ae3e9777d1b0d87764e7ae550e66003e37
                                    • Instruction Fuzzy Hash: 12E0DFB8A0460ADBDF369B2198027B9B3637FE521270C91A6C0024EA19CF304847CB51
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 46496e51902679df59e81ab06a8c26c053ab4853b5ea9222df8b04344e3c84ba
                                    • Instruction ID: 3ef642d5f3359268e4670266e0caa54781808181f1e23d3b987cd01aece7ccb8
                                    • Opcode Fuzzy Hash: 46496e51902679df59e81ab06a8c26c053ab4853b5ea9222df8b04344e3c84ba
                                    • Instruction Fuzzy Hash: 85E0E23302808DCBFB485A94A80E7393F76DB8131EF921391F40E88062DB1AD9A5E956
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d60121797d01d13b9735d6f99a9d92c4daa1c96811588f02cc61182ce0bd347f
                                    • Instruction ID: 76477c9529a6bb5ca18fcd5e070f318778ffbf8c91f781865e07452fd1bbfce6
                                    • Opcode Fuzzy Hash: d60121797d01d13b9735d6f99a9d92c4daa1c96811588f02cc61182ce0bd347f
                                    • Instruction Fuzzy Hash: F2E08C72A01108EFFB00EFB4E94179DB7E9DB45204F1085A9E809E7351EA32AF028791
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 89cf840cb6f74efc5fe08dc63275e4236b3f2a7e9d8e7ecddd6771aa5a08e18f
                                    • Instruction ID: f07d41e8019d44a6a00808ac8b3188bbdf5337c4727bc159fa36003144d397b3
                                    • Opcode Fuzzy Hash: 89cf840cb6f74efc5fe08dc63275e4236b3f2a7e9d8e7ecddd6771aa5a08e18f
                                    • Instruction Fuzzy Hash: 3AE0C230A4030CEBDB04EFB4E9016ADB3F5EB84200F0041A8D8099B300EA316F009781
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1b92a6b6f153f01e71fdc75b250b9fb624bbe0681fbd5a303fcda226ff9577ab
                                    • Instruction ID: ce398bd36c89e00cc223bfe4b2702cef40c88a89e956e98233ab5442c1e08933
                                    • Opcode Fuzzy Hash: 1b92a6b6f153f01e71fdc75b250b9fb624bbe0681fbd5a303fcda226ff9577ab
                                    • Instruction Fuzzy Hash: FEE08678A04A49CBDB359771A4485B97697AFC621071C95A9C10149154DE7044C6CF51
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: def934ff86bc5accb60042ce5f1afb8461f21577a243987e19c990ef4cb88f6a
                                    • Instruction ID: 942f18d72f1517b1692f0fff0d720e7949a581fcc37822ad8950567312a53e8e
                                    • Opcode Fuzzy Hash: def934ff86bc5accb60042ce5f1afb8461f21577a243987e19c990ef4cb88f6a
                                    • Instruction Fuzzy Hash: 68E01270A0110CEFEB00DFB4E54069DB7F5DB45204F1081A9D809E7341DA316F019791
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 635c7dceb92098cfe93cf4a26e12044c5c8ae89cc28f48bda165ba7067a1c091
                                    • Instruction ID: ed3d42172c632afd4efb601974557302dfd1e4715916a19cb235a00f331fa13a
                                    • Opcode Fuzzy Hash: 635c7dceb92098cfe93cf4a26e12044c5c8ae89cc28f48bda165ba7067a1c091
                                    • Instruction Fuzzy Hash: A0E04631A04264DBEB20DB60DC5A7EE7372BB00322F000564C8466BAA4CB788887CF85
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b5b7a8908ef0d434019d0c6e2192357e4eb2d057e1ae7df5a5832db356071f35
                                    • Instruction ID: 2b83d34209223b954f3dd5f2a1e939ae892f7434938a493d2ee019d49399215d
                                    • Opcode Fuzzy Hash: b5b7a8908ef0d434019d0c6e2192357e4eb2d057e1ae7df5a5832db356071f35
                                    • Instruction Fuzzy Hash: AAD0C9A340D7C89FC70316319C163863F788B23204F8B44D3E184CA197E50C59068366
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 514a9bd9480bf8543bb5987b02380bd64bc81348d98105eb19cada15e653fa19
                                    • Instruction ID: 54b0048af5061a1d2cf30d2d273ce1c691b210340deacd6e61bf1182b181528f
                                    • Opcode Fuzzy Hash: 514a9bd9480bf8543bb5987b02380bd64bc81348d98105eb19cada15e653fa19
                                    • Instruction Fuzzy Hash: 43D0C771C0820DDF4750EFB9450526FBBF4EB44200F5146AAC449E3600F77546119BD2
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0055f5a5ea94bcaf40384c1cc0d9e2b1cacbddca8c30f942e8bf637a7890f63f
                                    • Instruction ID: 5861e4865dfc92315ad38b88a8cd777b58a341daaca9977aa06d7ccd59a2760b
                                    • Opcode Fuzzy Hash: 0055f5a5ea94bcaf40384c1cc0d9e2b1cacbddca8c30f942e8bf637a7890f63f
                                    • Instruction Fuzzy Hash: E9D0E93202818DCFFB88A794B40E5397F76E78131BF825350F50B840519F549998E956
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c3cd2bd47c55d7d8f22407db329a733e4e172eb2d6905a86f8912f1e454b3f48
                                    • Instruction ID: 1bec1b48abc1a147af396664d2705dec140f3872d194ec63bd2dc5c2353abc6f
                                    • Opcode Fuzzy Hash: c3cd2bd47c55d7d8f22407db329a733e4e172eb2d6905a86f8912f1e454b3f48
                                    • Instruction Fuzzy Hash: 6ED0C7764142589FD3205755D50DB227FD9FBC5718F499254E404931528770E880DBE1
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 14aee31bb02abd13a20f6d60a1895498b3074fff51ffde3eb61c37b6c02ab868
                                    • Instruction ID: 4b23cc26dbd3493e18b31a7e9630115eefb2e6206c9aa21042fb1b15529916dd
                                    • Opcode Fuzzy Hash: 14aee31bb02abd13a20f6d60a1895498b3074fff51ffde3eb61c37b6c02ab868
                                    • Instruction Fuzzy Hash: 57D01C34A00209CFDB00EB24E888BA8BBB2AF80314F118295A0069B2A0DB70A8808F41
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 73ef4054c5e1f1026993e19ea95b098e1a16a5237cc20e0c96f0edf489c05a39
                                    • Instruction ID: b885e71812db8be7dd6b3de6713d8c53db802996e7afbe1e1a57a7af862503b8
                                    • Opcode Fuzzy Hash: 73ef4054c5e1f1026993e19ea95b098e1a16a5237cc20e0c96f0edf489c05a39
                                    • Instruction Fuzzy Hash: 17C08C76904004ABC6008294D842B00B389CB9C61CF18C068E50CC7303EB33E9034091
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1770914241.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_d70000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dbcef5c395f5c673d87ed76c55c2f1c93d814102d17bdb09fc090918b690f88a
                                    • Instruction ID: 58c7e918dc9fc6e739d0296992eb27fcb8a7bf4254ad48f247067e0340e6a738
                                    • Opcode Fuzzy Hash: dbcef5c395f5c673d87ed76c55c2f1c93d814102d17bdb09fc090918b690f88a
                                    • Instruction Fuzzy Hash: A6C012313402095BD304CA88C842A22B3AADBC8614B14C079A808C7746DE36EC028694
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 73cf4e4f776b8a57e7fd073234977e98d34ba1cea6702bee3374732be20b644d
                                    • Instruction ID: 7cb6d9b0ec9af0afe0a49ad9be515ebe5bb15844541b999e603fac538a5d3049
                                    • Opcode Fuzzy Hash: 73cf4e4f776b8a57e7fd073234977e98d34ba1cea6702bee3374732be20b644d
                                    • Instruction Fuzzy Hash: 03C02B254CC184D6CF10C330E48F7CC3F30DB04570F14429CE419AAE01C158400B4622
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c16aae344a251e280e1043aa5131cc62d7377cf61074de5fb5169b143da48c0e
                                    • Instruction ID: 02ed9ccbb8d3844c86a6801e8eb527c980b684b9c8587408008eb1d433896f94
                                    • Opcode Fuzzy Hash: c16aae344a251e280e1043aa5131cc62d7377cf61074de5fb5169b143da48c0e
                                    • Instruction Fuzzy Hash: 3FC08CB880D3C18ED3078B300810682FFB0BC022023CE82EF84408A353D12C849C8322
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fe7fe08b5a6cb52a3d9af009d8c417cf38805476c4be9d19d4e5bdefe0048e01
                                    • Instruction ID: 55137c84319e406ec67e7ef070ceba92e112cc23f36bdb936d941c0971746c12
                                    • Opcode Fuzzy Hash: fe7fe08b5a6cb52a3d9af009d8c417cf38805476c4be9d19d4e5bdefe0048e01
                                    • Instruction Fuzzy Hash: 56C08C2548C2C81FCF02837028A90A87F20CA0220430803CEEC4984897C154082A8B86
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6f29f197560effdd754e3a31bdedb1782deb52591ef7e29b8caede3bfa776124
                                    • Instruction ID: 0d8a99c93f73ead4f018171f2ecec6e70aaf2c9b5794ebb4409f2a8de496919a
                                    • Opcode Fuzzy Hash: 6f29f197560effdd754e3a31bdedb1782deb52591ef7e29b8caede3bfa776124
                                    • Instruction Fuzzy Hash: 31C09239884242EFC3420FE8ACAA4E17BF1EE062357080282AC4156223E69849679620
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1770914241.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_d70000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                    • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                    • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                    • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1fd37fa3da190bff08aba4b55f3b44e2e47e658fa38ab2c4810383ee34cf6609
                                    • Instruction ID: 06590d2c8ff29b8eea9b0cd48f425d81e2f165e39b7a3554c7144c85520e3f05
                                    • Opcode Fuzzy Hash: 1fd37fa3da190bff08aba4b55f3b44e2e47e658fa38ab2c4810383ee34cf6609
                                    • Instruction Fuzzy Hash: 13C09230604215ABEB50EB70EC86AEA7373EB40711F0096A0D0064B1A5CE755E87CF81
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9cfd43f9590ff4d89479d31eba80c539712901602eb412f866d9d231485c3570
                                    • Instruction ID: 6ff136745c4d17a8ef49c8a7337a239e0a4cb30b07cabb71972042f225a12fa5
                                    • Opcode Fuzzy Hash: 9cfd43f9590ff4d89479d31eba80c539712901602eb412f866d9d231485c3570
                                    • Instruction Fuzzy Hash: 9C90027214860CCF49402B976409A6DB77CA6545157904051B50DCA5025A65641046E5
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1789842342.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_57a0000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9f4ca360845a081c15305feec69b0a90ee109b03c272e9ebac6441452a24805d
                                    • Instruction ID: 300af7f8147fb94016d8d126b48ee8d2bea8a92376f3a44d8c8952b6148206e7
                                    • Opcode Fuzzy Hash: 9f4ca360845a081c15305feec69b0a90ee109b03c272e9ebac6441452a24805d
                                    • Instruction Fuzzy Hash: 6490023105564C8B469037E5750A5557B9C96545557801055F50D525015E566C104595
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 311134d3c47075ea008644adff3850aed5950f3f6cda0a9e812f9986130ba98f
                                    • Instruction ID: eacede9a9263f0e2fec3cbbce12eb27e68ee1ee8d989e030f97d7e6e1df414da
                                    • Opcode Fuzzy Hash: 311134d3c47075ea008644adff3850aed5950f3f6cda0a9e812f9986130ba98f
                                    • Instruction Fuzzy Hash: BD90027104465C8B454067D57849559B75C96446157804151A50D455135E6964124699
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.1788556659.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_5640000_InstallUtil.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 58ddaac75ce233ec0844d3aa9137245d8b28792348e2c492daffba45ee6ba269
                                    • Instruction ID: 7360528bdf503d9054ab489ce2c4375003b5975789dc1fd1010d319932931a14
                                    • Opcode Fuzzy Hash: 58ddaac75ce233ec0844d3aa9137245d8b28792348e2c492daffba45ee6ba269
                                    • Instruction Fuzzy Hash: 4690023148460CCB4D8067957409595775CE5486267804451B50D995015AA5646446B5