Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hKvlV6A1Rl.exe

Overview

General Information

Sample name:hKvlV6A1Rl.exe
renamed because original name is a hash value
Original sample name:edb3d030a4a033bae41057c19437dff31c171573b65afab0acd433cbd0572a17.exe
Analysis ID:1578205
MD5:ab0d88d920d75c9de43ccbdd901c8a53
SHA1:638197f5a23428f1c15a0a5473b6558d263b0a0c
SHA256:edb3d030a4a033bae41057c19437dff31c171573b65afab0acd433cbd0572a17
Tags:51-15-17-193exeuser-JAMESWT_MHT
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Quasar RAT
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • hKvlV6A1Rl.exe (PID: 7828 cmdline: "C:\Users\user\Desktop\hKvlV6A1Rl.exe" MD5: AB0D88D920D75C9DE43CCBDD901C8A53)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "51.15.17.193:4782;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "e318fab0-811e-40a6-b0aa-1e21015956c8", "StartupKey": "Quasar Client Startup", "Tag": "Slimo", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2578044246.0000017E38F22000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
    00000001.00000002.2578044246.0000017E38D51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
      00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
              1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
              • 0x28d0d8:$x1: Quasar.Common.Messages
              • 0x29d401:$x1: Quasar.Common.Messages
              • 0x2a9a3a:$x4: Uninstalling... good bye :-(
              • 0x2ab22f:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
              1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
              • 0x2a8fec:$f1: FileZilla\recentservers.xml
              • 0x2a902c:$f2: FileZilla\sitemanager.xml
              • 0x2a906e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
              • 0x2a92ba:$b1: Chrome\User Data\
              • 0x2a9310:$b1: Chrome\User Data\
              • 0x2a95e8:$b2: Mozilla\Firefox\Profiles
              • 0x2a96e4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
              • 0x2fb668:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
              • 0x2a983c:$b4: Opera Software\Opera Stable\Login Data
              • 0x2a98f6:$b5: YandexBrowser\User Data\
              • 0x2a9964:$b5: YandexBrowser\User Data\
              • 0x2a9638:$s4: logins.json
              • 0x2a936e:$a1: username_value
              • 0x2a938c:$a2: password_value
              • 0x2a9678:$a3: encryptedUsername
              • 0x2fb5ac:$a3: encryptedUsername
              • 0x2a969c:$a4: encryptedPassword
              • 0x2fb5ca:$a4: encryptedPassword
              • 0x2fb548:$a5: httpRealm
              1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
              • 0x163116:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
              • 0x2a9b24:$s3: Process already elevated.
              • 0x28cdd7:$s4: get_PotentiallyVulnerablePasswords
              • 0x276e93:$s5: GetKeyloggerLogsDirectory
              • 0x29cb60:$s5: GetKeyloggerLogsDirectory
              • 0x28cdfa:$s6: set_PotentiallyVulnerablePasswords
              • 0x2fcc96:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
              1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                Click to see the 13 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-19T12:32:21.934236+010020355951Domain Observed Used for C2 Detected51.15.17.1934782192.168.2.749704TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-19T12:32:21.934236+010020276191Domain Observed Used for C2 Detected51.15.17.1934782192.168.2.749704TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpackMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "51.15.17.193:4782;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "e318fab0-811e-40a6-b0aa-1e21015956c8", "StartupKey": "Quasar Client Startup", "Tag": "Slimo", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                Source: hKvlV6A1Rl.exeReversingLabs: Detection: 55%
                Source: hKvlV6A1Rl.exeVirustotal: Detection: 54%Perma Link
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2578044246.0000017E38F22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2578044246.0000017E38D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: hKvlV6A1Rl.exe PID: 7828, type: MEMORYSTR
                Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.7:49715 version: TLS 1.2
                Source: hKvlV6A1Rl.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 51.15.17.193:4782 -> 192.168.2.7:49704
                Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 51.15.17.193:4782 -> 192.168.2.7:49704
                Source: Malware configuration extractorURLs: 51.15.17.193
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: global trafficTCP traffic: 192.168.2.7:49704 -> 51.15.17.193:4782
                Source: Joe Sandbox ViewIP Address: 108.181.61.49 108.181.61.49
                Source: Joe Sandbox ViewIP Address: 51.15.17.193 51.15.17.193
                Source: Joe Sandbox ViewASN Name: OnlineSASFR OnlineSASFR
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: ipwho.is
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownTCP traffic detected without corresponding DNS query: 51.15.17.193
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: ipwho.is
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA.crt0
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigning-g1.crl03
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigning-g1.crl0K
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2577358218.0000017E371B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2582136305.0000017E515D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en89)
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2578044246.0000017E38ED4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://ocsp.digicert.com0A
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://ocsp.digicert.com0H
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://ocsp.digicert.com0I
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://ocsp.digicert.com0O
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2578044246.0000017E38F22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2578044246.0000017E38D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: hKvlV6A1Rl.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2578044246.0000017E38EBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2578044246.0000017E38EBA000.00000004.00000800.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://ipwho.is/
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2578044246.0000017E38D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                Source: hKvlV6A1Rl.exeString found in binary or memory: https://www.digicert.com/CPS0
                Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.7:49715 version: TLS 1.2

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2578044246.0000017E38F22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2578044246.0000017E38D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: hKvlV6A1Rl.exe PID: 7828, type: MEMORYSTR

                System Summary

                barindex
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Quasar infostealer Author: ditekshen
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC30295E1_2_00007FFAAC30295E
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC5896211_2_00007FFAAC589621
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC584E561_2_00007FFAAC584E56
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC59F6F01_2_00007FFAAC59F6F0
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC59B0091_2_00007FFAAC59B009
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC5980E21_2_00007FFAAC5980E2
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC59B9F71_2_00007FFAAC59B9F7
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC59C2951_2_00007FFAAC59C295
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC58AA4D1_2_00007FFAAC58AA4D
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC5973361_2_00007FFAAC597336
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC59E3991_2_00007FFAAC59E399
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC588C791_2_00007FFAAC588C79
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC590E0F1_2_00007FFAAC590E0F
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC590EFA1_2_00007FFAAC590EFA
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC5810D11_2_00007FFAAC5810D1
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC585B241_2_00007FFAAC585B24
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC64214D1_2_00007FFAAC64214D
                Source: hKvlV6A1Rl.exeStatic PE information: invalid certificate
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs hKvlV6A1Rl.exe
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs hKvlV6A1Rl.exe
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClient.exe. vs hKvlV6A1Rl.exe
                Source: hKvlV6A1Rl.exe, 00000001.00000000.1318561254.00007FF6DAD27000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRegAsm.exeT4 vs hKvlV6A1Rl.exe
                Source: hKvlV6A1Rl.exeBinary or memory string: OriginalFilenameRegAsm.exeT4 vs hKvlV6A1Rl.exe
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/2
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeMutant created: NULL
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeMutant created: \Sessions\1\BaseNamedObjects\CTX_bhIJfsdqLbmaqp
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeMutant created: \Sessions\1\BaseNamedObjects\Local\e318fab0-811e-40a6-b0aa-1e21015956c8
                Source: hKvlV6A1Rl.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: hKvlV6A1Rl.exeReversingLabs: Detection: 55%
                Source: hKvlV6A1Rl.exeVirustotal: Detection: 54%
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: hKvlV6A1Rl.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: hKvlV6A1Rl.exeStatic PE information: Image base 0x140000000 > 0x60000000
                Source: hKvlV6A1Rl.exeStatic file information: File size 8588640 > 1048576
                Source: hKvlV6A1Rl.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x4b1a00
                Source: hKvlV6A1Rl.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x31e200
                Source: hKvlV6A1Rl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: hKvlV6A1Rl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: hKvlV6A1Rl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: hKvlV6A1Rl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: hKvlV6A1Rl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: hKvlV6A1Rl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: hKvlV6A1Rl.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: hKvlV6A1Rl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: hKvlV6A1Rl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: hKvlV6A1Rl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: hKvlV6A1Rl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: hKvlV6A1Rl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: hKvlV6A1Rl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: hKvlV6A1Rl.exeStatic PE information: real checksum: 0x8386fe should be: 0x838d27
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC1ED2A5 pushad ; iretd 1_2_00007FFAAC1ED2A6
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeCode function: 1_2_00007FFAAC5A2DFA push esp; iretd 1_2_00007FFAAC5A2DFB

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeFile opened: C:\Users\user\Desktop\hKvlV6A1Rl.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeMemory allocated: 17E38B50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeMemory allocated: 17E50D50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeWindow / User API: threadDelayed 946Jump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeWindow / User API: threadDelayed 476Jump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeWindow / User API: threadDelayed 617Jump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformationJump to behavior
                Source: hKvlV6A1Rl.exe, 00000001.00000002.2582136305.0000017E51605000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeThread register set: target process: unknownJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeThread register set: unknown 1Jump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\hKvlV6A1Rl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2578044246.0000017E38F22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2578044246.0000017E38D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: hKvlV6A1Rl.exe PID: 7828, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e51be0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.hKvlV6A1Rl.exe.17e48d59ac0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2578044246.0000017E38F22000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2578044246.0000017E38D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: hKvlV6A1Rl.exe PID: 7828, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                Windows Management Instrumentation
                1
                DLL Side-Loading
                2
                Process Injection
                2
                Virtualization/Sandbox Evasion
                OS Credential Dumping11
                Security Software Discovery
                Remote Services1
                Archive Collected Data
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory2
                Virtualization/Sandbox Evasion
                Remote Desktop ProtocolData from Removable Media1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                Process Injection
                Security Account Manager1
                Application Window Discovery
                SMB/Windows Admin SharesData from Network Shared Drive1
                Ingress Tool Transfer
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Hidden Files and Directories
                NTDS1
                System Network Configuration Discovery
                Distributed Component Object ModelInput Capture2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets24
                System Information Discovery
                SSHKeylogging113
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                hKvlV6A1Rl.exe55%ReversingLabsWin64.Trojan.CrypterX
                hKvlV6A1Rl.exe54%VirustotalBrowse
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                51.15.17.1930%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                ipwho.is
                108.181.61.49
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://ipwho.is/false
                    high
                    51.15.17.193true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/hKvlV6A1Rl.exe, 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmpfalse
                      high
                      https://stackoverflow.com/q/14436606/23354hKvlV6A1Rl.exe, 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2578044246.0000017E38D91000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://stackoverflow.com/q/2152978/23354sCannothKvlV6A1Rl.exe, 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          http://schemas.datacontract.org/2004/07/hKvlV6A1Rl.exe, 00000001.00000002.2578044246.0000017E38F22000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namehKvlV6A1Rl.exe, 00000001.00000002.2578044246.0000017E38D51000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://ipwho.ishKvlV6A1Rl.exe, 00000001.00000002.2578044246.0000017E38ED4000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://stackoverflow.com/q/11564914/23354;hKvlV6A1Rl.exe, 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, hKvlV6A1Rl.exe, 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmpfalse
                                  high
                                  https://ipwho.ishKvlV6A1Rl.exe, 00000001.00000002.2578044246.0000017E38EBA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    108.181.61.49
                                    ipwho.isCanada
                                    852ASN852CAfalse
                                    51.15.17.193
                                    unknownFrance
                                    12876OnlineSASFRtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1578205
                                    Start date and time:2024-12-19 12:31:13 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 5m 37s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:7
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:hKvlV6A1Rl.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:edb3d030a4a033bae41057c19437dff31c171573b65afab0acd433cbd0572a17.exe
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@1/0@1/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 87%
                                    • Number of executed functions: 174
                                    • Number of non-executed functions: 3
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 13.107.246.63, 52.149.20.212
                                    • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    108.181.61.49888.exeGet hashmaliciousLuca StealerBrowse
                                    • /?output=json
                                    888.exeGet hashmaliciousLuca StealerBrowse
                                    • /?output=json
                                    Cracker.exeGet hashmaliciousLuca StealerBrowse
                                    • /?output=json
                                    51.15.17.193kqeGVKtpy2.exeGet hashmaliciousQuasarBrowse
                                      LFLtlBAuf7.exeGet hashmaliciousQuasarBrowse
                                        O9MV0lNEO5.exeGet hashmaliciousQuasarBrowse
                                          RegAsm.exeGet hashmaliciousQuasarBrowse
                                            truepepe-qt.exeGet hashmaliciousQuasarBrowse
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              ipwho.iskqeGVKtpy2.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              LFLtlBAuf7.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              O9MV0lNEO5.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              RegAsm.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              truepepe-qt.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              alyemenione.lnkGet hashmaliciousHavoc, QuasarBrowse
                                              • 108.181.61.49
                                              jignesh.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              skibidi.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              vanilla.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              888.exeGet hashmaliciousLuca StealerBrowse
                                              • 108.181.61.49
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              ASN852CAkqeGVKtpy2.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              LFLtlBAuf7.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              O9MV0lNEO5.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              RegAsm.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              truepepe-qt.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              TT copy.jsGet hashmaliciousFormBookBrowse
                                              • 108.181.20.35
                                              alyemenione.lnkGet hashmaliciousHavoc, QuasarBrowse
                                              • 108.181.61.49
                                              mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                              • 204.191.146.80
                                              la.bot.mips.elfGet hashmaliciousMiraiBrowse
                                              • 161.184.58.16
                                              la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                                              • 199.175.174.49
                                              OnlineSASFRkqeGVKtpy2.exeGet hashmaliciousQuasarBrowse
                                              • 51.15.17.193
                                              LFLtlBAuf7.exeGet hashmaliciousQuasarBrowse
                                              • 51.15.17.193
                                              O9MV0lNEO5.exeGet hashmaliciousQuasarBrowse
                                              • 51.15.17.193
                                              RegAsm.exeGet hashmaliciousQuasarBrowse
                                              • 51.15.17.193
                                              truepepe-qt.exeGet hashmaliciousQuasarBrowse
                                              • 51.15.17.193
                                              http://bluepeak-group.com/fcGet hashmaliciousUnknownBrowse
                                              • 163.172.143.199
                                              gaozw40v.exeGet hashmaliciousXmrigBrowse
                                              • 163.172.154.142
                                              twjMb9cX64.exeGet hashmaliciousSliverBrowse
                                              • 51.158.71.131
                                              WOlxr4yjgF.exeGet hashmaliciousSliverBrowse
                                              • 51.158.71.131
                                              bot.mips.elfGet hashmaliciousMiraiBrowse
                                              • 51.158.232.138
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              3b5074b1b5d032e5620f69f9f700ff0ekqeGVKtpy2.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              LFLtlBAuf7.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              O9MV0lNEO5.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              RegAsm.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              truepepe-qt.exeGet hashmaliciousQuasarBrowse
                                              • 108.181.61.49
                                              FjfZ7uM8zh.lnkGet hashmaliciousUnknownBrowse
                                              • 108.181.61.49
                                              yswmdaREME.lnkGet hashmaliciousUnknownBrowse
                                              • 108.181.61.49
                                              0bNBLjPn56.lnkGet hashmaliciousUnknownBrowse
                                              • 108.181.61.49
                                              t5lpvahkgypd7wy.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                              • 108.181.61.49
                                              RFQ Letter and Instructions.pdfGet hashmaliciousUnknownBrowse
                                              • 108.181.61.49
                                              No context
                                              No created / dropped files found
                                              File type:PE32+ executable (GUI) x86-64, for MS Windows
                                              Entropy (8bit):6.874967026449675
                                              TrID:
                                              • Win64 Executable GUI (202006/5) 92.65%
                                              • Win64 Executable (generic) (12005/4) 5.51%
                                              • Generic Win/DOS Executable (2004/3) 0.92%
                                              • DOS Executable Generic (2002/1) 0.92%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:hKvlV6A1Rl.exe
                                              File size:8'588'640 bytes
                                              MD5:ab0d88d920d75c9de43ccbdd901c8a53
                                              SHA1:638197f5a23428f1c15a0a5473b6558d263b0a0c
                                              SHA256:edb3d030a4a033bae41057c19437dff31c171573b65afab0acd433cbd0572a17
                                              SHA512:25e1f1f5afe0cb1920be2d6a1db59f11b9f34b0bd154d3d553eb0dc44ecbc810463a7e1dcca5a176d7a08f0a34ed3e669a56cd35f9cc5ed796bfa5385f0e15f7
                                              SSDEEP:98304:L6KJqPxBPsa29RMwzAAFySYrz0Cvt30F0BS9YR4:LHWPsa+RMwzVu0kJ0mBH4
                                              TLSH:40869C21131D91A0CDEA7531945B1762DA30FF0C913C67A58FF40AA57EFFA6069AE23C
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$...J...J...J...I...J...O.V.J...N...J...I...J...N...J.......J...K...J...K.^.J...O...J...C...J...H...J.Rich..J.........PE..d..
                                              Icon Hash:55497933cc61714d
                                              Entrypoint:0x1404a1240
                                              Entrypoint Section:.text
                                              Digitally signed:true
                                              Imagebase:0x140000000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x67563719 [Mon Dec 9 00:17:29 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:6
                                              OS Version Minor:0
                                              File Version Major:6
                                              File Version Minor:0
                                              Subsystem Version Major:6
                                              Subsystem Version Minor:0
                                              Import Hash:b366497cd3cff2367e10ca55cfd84f3a
                                              Signature Valid:false
                                              Signature Issuer:CN=DigiCert EV Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
                                              Signature Validation Error:The digital signature of the object did not verify
                                              Error Number:-2146869232
                                              Not Before, Not After
                                              • 12/06/2016 20:00:00 24/01/2019 07:00:00
                                              Subject Chain
                                              • CN=Realtek Semiconductor Corp., O=Realtek Semiconductor Corp., L=Hsinchu, S=Taiwan, C=TW, PostalCode=300, STREET="No. 2, Innovation Road II, Hsinchu Science Park", SERIALNUMBER=22671299, OID.1.3.6.1.4.1.311.60.2.1.3=TW, OID.2.5.4.15=Private Organization
                                              Version:3
                                              Thumbprint MD5:7B0CA4029E3A73373CE0BD3DF12A08C1
                                              Thumbprint SHA-1:37A0BACB152A547382195095AB33601929877364
                                              Thumbprint SHA-256:B08CF4E204D1BA2BA8642D7709499D61CFF8CF7AA75CCD832A6BA1D7F1B82DF7
                                              Serial:0320BE3EB866526927F999B97B04346E
                                              Instruction
                                              dec eax
                                              sub esp, 28h
                                              call 00007F5FA14371B4h
                                              dec eax
                                              add esp, 28h
                                              jmp 00007F5FA1436977h
                                              int3
                                              int3
                                              dec eax
                                              sub esp, 28h
                                              dec ebp
                                              mov eax, dword ptr [ecx+38h]
                                              dec eax
                                              mov ecx, edx
                                              dec ecx
                                              mov edx, ecx
                                              call 00007F5FA1436B12h
                                              mov eax, 00000001h
                                              dec eax
                                              add esp, 28h
                                              ret
                                              int3
                                              int3
                                              int3
                                              inc eax
                                              push ebx
                                              inc ebp
                                              mov ebx, dword ptr [eax]
                                              dec eax
                                              mov ebx, edx
                                              inc ecx
                                              and ebx, FFFFFFF8h
                                              dec esp
                                              mov ecx, ecx
                                              inc ecx
                                              test byte ptr [eax], 00000004h
                                              dec esp
                                              mov edx, ecx
                                              je 00007F5FA1436B15h
                                              inc ecx
                                              mov eax, dword ptr [eax+08h]
                                              dec ebp
                                              arpl word ptr [eax+04h], dx
                                              neg eax
                                              dec esp
                                              add edx, ecx
                                              dec eax
                                              arpl ax, cx
                                              dec esp
                                              and edx, ecx
                                              dec ecx
                                              arpl bx, ax
                                              dec edx
                                              mov edx, dword ptr [eax+edx]
                                              dec eax
                                              mov eax, dword ptr [ebx+10h]
                                              mov ecx, dword ptr [eax+08h]
                                              dec eax
                                              mov eax, dword ptr [ebx+08h]
                                              test byte ptr [ecx+eax+03h], 0000000Fh
                                              je 00007F5FA1436B0Dh
                                              movzx eax, byte ptr [ecx+eax+03h]
                                              and eax, FFFFFFF0h
                                              dec esp
                                              add ecx, eax
                                              dec esp
                                              xor ecx, edx
                                              dec ecx
                                              mov ecx, ecx
                                              pop ebx
                                              jmp 00007F5FA14364E6h
                                              int3
                                              dec eax
                                              mov dword ptr [esp+10h], ebx
                                              dec eax
                                              mov dword ptr [esp+18h], esi
                                              push ebp
                                              push edi
                                              inc ecx
                                              push esi
                                              dec eax
                                              mov ebp, esp
                                              dec eax
                                              sub esp, 10h
                                              xor eax, eax
                                              xor ecx, ecx
                                              cpuid
                                              inc esp
                                              mov eax, ecx
                                              inc esp
                                              mov edx, edx
                                              inc ecx
                                              xor edx, 49656E69h
                                              inc ecx
                                              xor eax, 6C65746Eh
                                              inc esp
                                              mov ecx, ebx
                                              inc esp
                                              mov esi, eax
                                              xor ecx, ecx
                                              Programming Language:
                                              • [IMP] VS2008 build 21022
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x5055dc0x64.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x82a0000x6f58.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x8270000x1b6c.pdata
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x82c6000x4760.rsrc
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x8290000x68c.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x502d800x1c.rdata
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x502c400x140.rdata
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x4b30000x370.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x4b18a00x4b1a007e13a63bd3a9ea7ad10b369fb01dca02unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x4b30000x5313e0x53200379751b8665598bb041e23efb360aeecFalse0.527329064849624OpenPGP Secret Key7.109781406196381IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x5070000x31f3b00x31e200ec2c27891a60a9b585e537197ea26680unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .pdata0x8270000x1b6c0x1c00907f1c68836feb61060889792d126b59False0.48758370535714285data5.530487452134769IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x8290000x68c0x800e7d6bb9ad0a93103290bf9d11f284c60False0.50439453125data4.937320036060456IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              .rsrc0x82a0000x6f580x700060ea4ae7eeec875a73d3695c9e7db208False0.3858119419642857data6.018534395926453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0x82a3280x668Device independent bitmap graphic, 48 x 96 x 4, image size 00.21341463414634146
                                              RT_ICON0x82a9900x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.34139784946236557
                                              RT_ICON0x82ac780x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.5202702702702703
                                              RT_ICON0x82ada00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.47334754797441364
                                              RT_ICON0x82bc480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.6101083032490975
                                              RT_ICON0x82c4f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.596820809248555
                                              RT_ICON0x82ca580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.2932572614107884
                                              RT_ICON0x82f0000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.4343339587242026
                                              RT_ICON0x8300a80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.7198581560283688
                                              RT_ICON0x8305100x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.42473118279569894
                                              RT_ICON0x8307f80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.35618279569892475
                                              RT_GROUP_ICON0x830ae00x84data0.6363636363636364
                                              RT_GROUP_ICON0x830b640x14data1.25
                                              RT_GROUP_ICON0x830b780x14data1.25
                                              RT_VERSION0x830b8c0x3ccdataEnglishUnited States0.4506172839506173
                                              DLLImport
                                              USER32.dllwsprintfW, TranslateMessage, SetTimer, GetMessageW, DispatchMessageW, KillTimer
                                              mscoree.dllCLRCreateInstance
                                              OLEAUT32.dllSafeArrayCreateVector, SafeArrayUnlock, SafeArrayLock, SafeArrayCreate
                                              KERNEL32.dllIsDebuggerPresent, WriteConsoleW, CreateFileW, SetFilePointerEx, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, HeapReAlloc, HeapSize, GetProcessHeap, LCMapStringW, CompareStringW, FlsFree, FlsSetValue, FlsGetValue, CreateTimerQueueTimer, GetCurrentProcess, lstrlenW, CreateJobObjectW, DeleteTimerQueueEx, CreateMutexW, GetLocaleInfoW, WaitForSingleObject, GetModuleHandleA, GetACP, CreateEventW, MultiByteToWideChar, GetLastError, LoadLibraryA, QueryPerformanceFrequency, CloseHandle, AddVectoredExceptionHandler, GetThreadContext, GetProcAddress, GlobalMemoryStatusEx, GetModuleHandleW, FreeLibrary, lstrcpyW, GetDiskFreeSpaceExA, GetSystemTime, SetThreadContext, QueryPerformanceCounter, CreateMailslotW, GetTickCount, CreateTimerQueue, LocalFree, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, GetStartupInfoW, FlsAlloc, RtlUnwindEx, RtlPcToFileHeader, RaiseException, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetOEMCP, GetCPInfo, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetFileType, GetStringTypeW
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-12-19T12:32:21.934236+01002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)151.15.17.1934782192.168.2.749704TCP
                                              2024-12-19T12:32:21.934236+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert151.15.17.1934782192.168.2.749704TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 19, 2024 12:32:20.303896904 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:32:20.423623085 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:32:20.423702002 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:32:20.432924986 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:32:20.552355051 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:32:21.842036009 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:32:21.842051983 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:32:21.842139006 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:32:21.847883940 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:32:21.934236050 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:32:21.934340000 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:32:21.967355013 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:32:22.243216991 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:32:22.296504974 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:32:22.987901926 CET49715443192.168.2.7108.181.61.49
                                              Dec 19, 2024 12:32:22.987965107 CET44349715108.181.61.49192.168.2.7
                                              Dec 19, 2024 12:32:22.988034964 CET49715443192.168.2.7108.181.61.49
                                              Dec 19, 2024 12:32:22.989556074 CET49715443192.168.2.7108.181.61.49
                                              Dec 19, 2024 12:32:22.989573956 CET44349715108.181.61.49192.168.2.7
                                              Dec 19, 2024 12:32:25.392731905 CET44349715108.181.61.49192.168.2.7
                                              Dec 19, 2024 12:32:25.392805099 CET49715443192.168.2.7108.181.61.49
                                              Dec 19, 2024 12:32:25.394756079 CET49715443192.168.2.7108.181.61.49
                                              Dec 19, 2024 12:32:25.394773006 CET44349715108.181.61.49192.168.2.7
                                              Dec 19, 2024 12:32:25.395020962 CET44349715108.181.61.49192.168.2.7
                                              Dec 19, 2024 12:32:25.399277925 CET49715443192.168.2.7108.181.61.49
                                              Dec 19, 2024 12:32:25.439333916 CET44349715108.181.61.49192.168.2.7
                                              Dec 19, 2024 12:32:26.005304098 CET44349715108.181.61.49192.168.2.7
                                              Dec 19, 2024 12:32:26.005368948 CET44349715108.181.61.49192.168.2.7
                                              Dec 19, 2024 12:32:26.005491018 CET49715443192.168.2.7108.181.61.49
                                              Dec 19, 2024 12:32:26.125240088 CET49715443192.168.2.7108.181.61.49
                                              Dec 19, 2024 12:32:26.364789963 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:32:26.484363079 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:32:26.484426975 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:32:26.603943110 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:32:26.874655962 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:32:26.921565056 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:32:27.066492081 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:32:27.109029055 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:32:52.077899933 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:32:52.197501898 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:33:17.203028917 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:33:17.322834969 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:33:42.328205109 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:33:42.447757959 CET47824970451.15.17.193192.168.2.7
                                              Dec 19, 2024 12:34:07.453269005 CET497044782192.168.2.751.15.17.193
                                              Dec 19, 2024 12:34:07.573012114 CET47824970451.15.17.193192.168.2.7
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 19, 2024 12:32:22.840961933 CET5111253192.168.2.71.1.1.1
                                              Dec 19, 2024 12:32:22.981759071 CET53511121.1.1.1192.168.2.7
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Dec 19, 2024 12:32:22.840961933 CET192.168.2.71.1.1.10x6d99Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Dec 19, 2024 12:32:22.981759071 CET1.1.1.1192.168.2.70x6d99No error (0)ipwho.is108.181.61.49A (IP address)IN (0x0001)false
                                              • ipwho.is
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.749715108.181.61.494437828C:\Users\user\Desktop\hKvlV6A1Rl.exe
                                              TimestampBytes transferredDirectionData
                                              2024-12-19 11:32:25 UTC150OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                              Host: ipwho.is
                                              Connection: Keep-Alive
                                              2024-12-19 11:32:26 UTC223INHTTP/1.1 200 OK
                                              Date: Thu, 19 Dec 2024 11:32:25 GMT
                                              Content-Type: application/json; charset=utf-8
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              Server: ipwhois
                                              Access-Control-Allow-Headers: *
                                              X-Robots-Tag: noindex
                                              2024-12-19 11:32:26 UTC1021INData Raw: 33 66 31 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f
                                              Data Ascii: 3f1{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.189", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yo


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Target ID:1
                                              Start time:06:32:14
                                              Start date:19/12/2024
                                              Path:C:\Users\user\Desktop\hKvlV6A1Rl.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\Desktop\hKvlV6A1Rl.exe"
                                              Imagebase:0x7ff6da500000
                                              File size:8'588'640 bytes
                                              MD5 hash:AB0D88D920D75C9DE43CCBDD901C8A53
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.2578044246.0000017E38F22000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.2578044246.0000017E38D51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.2582807874.0000017E516BC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.2580358962.0000017E48D51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: MALWARE_Win_QuasarStealer, Description: Detects Quasar infostealer, Source: 00000001.00000002.2586091584.0000017E51BE0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekshen
                                              Reputation:low
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:6.5%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:3
                                                Total number of Limit Nodes:0
                                                execution_graph 56918 7ffaac3036ed 56919 7ffaac3036f5 DeleteFileW 56918->56919 56921 7ffaac303796 56919->56921
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: H
                                                • API String ID: 0-2852464175
                                                • Opcode ID: 65d1fe40980326add9b178beaf66fc85df12d03d6016169272c80568c2e870ca
                                                • Instruction ID: fdc88eeb6c5fa91f5426868866a3a7648d371a2f56aeee7f029eb2c7c6032938
                                                • Opcode Fuzzy Hash: 65d1fe40980326add9b178beaf66fc85df12d03d6016169272c80568c2e870ca
                                                • Instruction Fuzzy Hash: D2831951B1AE4B8FFBE6D32C465567567D2EF9A600B58A07AD00EC36DAFD18EC0903C1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1500 7ffaac59e399-7ffaac59e3db 1504 7ffaac59e437-7ffaac59e49f call 7ffaac5848f0 1500->1504 1505 7ffaac59e3dd-7ffaac59e3fc 1500->1505 1509 7ffaac59e4a9-7ffaac59e4b9 1504->1509 1510 7ffaac59e4a1-7ffaac59e4a6 1504->1510 1505->1504 1511 7ffaac59e9e2-7ffaac59e9ed 1509->1511 1512 7ffaac59e4bf-7ffaac59e4d9 call 7ffaac58a6d0 1509->1512 1510->1509 1513 7ffaac59e9f7-7ffaac59ea57 call 7ffaac583fd0 1511->1513 1514 7ffaac59e9ef-7ffaac59e9f4 1511->1514 1518 7ffaac59e8ef-7ffaac59e924 1512->1518 1519 7ffaac59e4df-7ffaac59e4ea 1512->1519 1524 7ffaac59ea5d-7ffaac59ea66 1513->1524 1525 7ffaac59e981-7ffaac59e9ce 1513->1525 1514->1513 1534 7ffaac59e925-7ffaac59e941 1518->1534 1522 7ffaac59e507-7ffaac59e540 call 7ffaac583fd0 1519->1522 1523 7ffaac59e4ec-7ffaac59e4fd 1519->1523 1540 7ffaac59e542-7ffaac59e566 call 7ffaac58a3f0 call 7ffaac58a550 1522->1540 1541 7ffaac59e56b-7ffaac59e649 call 7ffaac583fd0 1522->1541 1523->1522 1537 7ffaac59e4ff-7ffaac59e504 1523->1537 1529 7ffaac59ec5b-7ffaac59eca7 1524->1529 1530 7ffaac59ea6c-7ffaac59ea77 1524->1530 1569 7ffaac59e9d5-7ffaac59e9d8 1525->1569 1555 7ffaac59ecae-7ffaac59ecf5 1529->1555 1530->1529 1531 7ffaac59ea7d-7ffaac59ea80 1530->1531 1538 7ffaac59ea86-7ffaac59eb27 1531->1538 1539 7ffaac59e948-7ffaac59e96a 1531->1539 1534->1539 1537->1522 1578 7ffaac59ed74-7ffaac59ed7d 1538->1578 1579 7ffaac59eb2d-7ffaac59eb35 1538->1579 1539->1534 1557 7ffaac59e96c-7ffaac59e97a 1539->1557 1540->1541 1604 7ffaac59e8b6-7ffaac59e8d8 1541->1604 1605 7ffaac59e64f-7ffaac59e653 1541->1605 1566 7ffaac59ed12-7ffaac59ed1b 1555->1566 1567 7ffaac59ecf7-7ffaac59ed06 1555->1567 1557->1525 1571 7ffaac59ed1e-7ffaac59ed65 1566->1571 1573 7ffaac59ed0d-7ffaac59ed10 1567->1573 1569->1511 1575 7ffaac59ed6c-7ffaac59ed6f 1571->1575 1573->1571 1576 7ffaac59ec01-7ffaac59ec1c 1575->1576 1586 7ffaac59ec56 1576->1586 1587 7ffaac59ec1e-7ffaac59ec2f 1576->1587 1578->1576 1580 7ffaac59ed83-7ffaac59ed8b 1578->1580 1582 7ffaac59eb44-7ffaac59eb5b 1579->1582 1583 7ffaac59eb37-7ffaac59eb3c 1579->1583 1580->1576 1584 7ffaac59ed91-7ffaac59eda2 1580->1584 1582->1555 1589 7ffaac59eb61-7ffaac59ebb1 1582->1589 1583->1582 1584->1576 1594 7ffaac59eda8-7ffaac59edb3 1584->1594 1595 7ffaac59ec35-7ffaac59ec54 1587->1595 1596 7ffaac59e7c7-7ffaac59e7d3 1587->1596 1597 7ffaac59ebb3-7ffaac59ebea 1589->1597 1598 7ffaac59ebec-7ffaac59ebf3 1589->1598 1602 7ffaac59edb5-7ffaac59edd8 1594->1602 1603 7ffaac59edec-7ffaac59edf5 1594->1603 1595->1586 1613 7ffaac59e882-7ffaac59e889 1596->1613 1614 7ffaac59e7d9-7ffaac59e7f1 1596->1614 1597->1598 1608 7ffaac59ebfa-7ffaac59ebfb 1598->1608 1602->1576 1611 7ffaac59e893 1603->1611 1612 7ffaac59edfb-7ffaac59ee3a 1603->1612 1620 7ffaac59e894-7ffaac59e8af 1604->1620 1627 7ffaac59e8da-7ffaac59e8e8 1604->1627 1609 7ffaac59e659-7ffaac59e6e8 1605->1609 1610 7ffaac59e88e 1605->1610 1608->1576 1609->1569 1649 7ffaac59e6ee-7ffaac59e74a 1609->1649 1610->1611 1611->1620 1621 7ffaac59ee41-7ffaac59ee61 call 7ffaac59ee62 1612->1621 1613->1621 1625 7ffaac59e7f7-7ffaac59e7fe 1614->1625 1626 7ffaac59eddd-7ffaac59edeb 1614->1626 1620->1604 1630 7ffaac59e800-7ffaac59e822 1625->1630 1626->1603 1627->1518 1636 7ffaac59e829-7ffaac59e83d 1630->1636 1641 7ffaac59e852-7ffaac59e85d 1636->1641 1642 7ffaac59e83f-7ffaac59e850 1636->1642 1641->1613 1642->1613 1642->1641 1655 7ffaac59e789-7ffaac59e7c5 1649->1655 1656 7ffaac59e74c-7ffaac59e787 1649->1656 1655->1596 1656->1655
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 6$8%_L$=%_L$>0_L
                                                • API String ID: 0-1249359813
                                                • Opcode ID: fed804126df3c4f9feeaaf7abaf7995bbbc409f07ca11153452633a967c06b33
                                                • Instruction ID: 8553e12c7547d437eeb976289168138edeeb1b19ee4640628c34c10257282016
                                                • Opcode Fuzzy Hash: fed804126df3c4f9feeaaf7abaf7995bbbc409f07ca11153452633a967c06b33
                                                • Instruction Fuzzy Hash: A272C271A18A4A8FEB98DF18C495A7977E1FF99300F1440BDE45EC7292CE39EC468781
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $ $@%_H
                                                • API String ID: 0-1962768461
                                                • Opcode ID: ed36d71335d7860c133cc4e14a1f6ec1ddaeb2dc1192c883e6b0bd3551787d0e
                                                • Instruction ID: c557ee989fa35b5af06b0c2a9a93b77560b547d908b9d59bdf0d09ac160487d7
                                                • Opcode Fuzzy Hash: ed36d71335d7860c133cc4e14a1f6ec1ddaeb2dc1192c883e6b0bd3551787d0e
                                                • Instruction Fuzzy Hash: 5992F671A1DA4A8FEBA4DB6CC855A7437D5FF5A300B1441F9E04EC72A2DE1DEC098781

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1997 7ffaac59b009-7ffaac59b064 2000 7ffaac59b0c5-7ffaac59b0c9 1997->2000 2001 7ffaac59b066-7ffaac59b09b 1997->2001 2002 7ffaac59b0cb-7ffaac59b0d8 call 7ffaac589a20 2000->2002 2003 7ffaac59b0da 2000->2003 2001->2000 2006 7ffaac59b0dc-7ffaac59b0e5 2002->2006 2003->2006 2008 7ffaac59b0eb-7ffaac59b0f0 2006->2008 2009 7ffaac59b21a-7ffaac59b21f 2006->2009 2011 7ffaac59b0f6-7ffaac59b0fb 2008->2011 2012 7ffaac59b6bd-7ffaac59b6ef 2008->2012 2013 7ffaac59b285-7ffaac59b289 2009->2013 2014 7ffaac59b221-7ffaac59b233 call 7ffaac583050 2009->2014 2015 7ffaac59b0fd-7ffaac59b109 2011->2015 2016 7ffaac59b10f-7ffaac59b125 call 7ffaac589640 2011->2016 2022 7ffaac59b6f6-7ffaac59b728 2012->2022 2018 7ffaac59b28b-7ffaac59b2a7 call 7ffaac5839d0 2013->2018 2019 7ffaac59b2da-7ffaac59b2e2 2013->2019 2032 7ffaac59b238-7ffaac59b23f 2014->2032 2015->2016 2015->2022 2029 7ffaac59b12a-7ffaac59b215 call 7ffaac58a2f0 2016->2029 2047 7ffaac59b2ad-7ffaac59b2b8 2018->2047 2048 7ffaac59b72f-7ffaac59b74b 2018->2048 2028 7ffaac59b2e9-7ffaac59b305 2019->2028 2022->2048 2044 7ffaac59b314 2028->2044 2045 7ffaac59b307-7ffaac59b312 2028->2045 2066 7ffaac59b6a9-7ffaac59b6bc 2029->2066 2033 7ffaac59b235-7ffaac59b236 2032->2033 2034 7ffaac59b241-7ffaac59b262 call 7ffaac59aea0 2032->2034 2033->2032 2050 7ffaac59b267-7ffaac59b280 2034->2050 2051 7ffaac59b316-7ffaac59b325 2044->2051 2045->2051 2055 7ffaac59b2ba-7ffaac59b2d5 2047->2055 2056 7ffaac59b32c-7ffaac59b33a 2047->2056 2069 7ffaac59b752-7ffaac59b75d 2048->2069 2050->2066 2060 7ffaac59b327-7ffaac59b32b 2051->2060 2061 7ffaac59b34c-7ffaac59b360 2051->2061 2055->2066 2065 7ffaac59b361-7ffaac59b36a call 7ffaac587490 2056->2065 2067 7ffaac59b33c-7ffaac59b345 2056->2067 2060->2056 2061->2065 2076 7ffaac59b524-7ffaac59b527 2065->2076 2077 7ffaac59b36e 2065->2077 2070 7ffaac59b34b 2067->2070 2071 7ffaac59b52c-7ffaac59b52f 2067->2071 2078 7ffaac59b7a8-7ffaac59b7f0 2069->2078 2070->2061 2075 7ffaac59b43f-7ffaac59b441 2071->2075 2079 7ffaac59b447-7ffaac59b466 call 7ffaac587490 2075->2079 2080 7ffaac59b4f6-7ffaac59b4ff 2075->2080 2076->2075 2084 7ffaac59b370-7ffaac59b387 call 7ffaac586b60 2077->2084 2102 7ffaac59b7f2-7ffaac59b7f9 2078->2102 2103 7ffaac59b7fb-7ffaac59b806 2078->2103 2079->2080 2093 7ffaac59b46c-7ffaac59b483 call 7ffaac586b60 2079->2093 2081 7ffaac59b505-7ffaac59b50a 2080->2081 2082 7ffaac59b5e1-7ffaac59b5e6 2080->2082 2087 7ffaac59b534 2081->2087 2088 7ffaac59b50c-7ffaac59b51a 2081->2088 2090 7ffaac59b634-7ffaac59b66e 2082->2090 2091 7ffaac59b5e8-7ffaac59b5fe 2082->2091 2106 7ffaac59b389-7ffaac59b399 2084->2106 2107 7ffaac59b3a0-7ffaac59b3aa 2084->2107 2099 7ffaac59b536-7ffaac59b538 2087->2099 2088->2099 2101 7ffaac59b670-7ffaac59b69e 2090->2101 2091->2101 2108 7ffaac59b600-7ffaac59b60c 2091->2108 2124 7ffaac59b485-7ffaac59b49a 2093->2124 2125 7ffaac59b49c-7ffaac59b4a3 2093->2125 2109 7ffaac59b539-7ffaac59b53d 2099->2109 2110 7ffaac59b53f-7ffaac59b541 2099->2110 2126 7ffaac59b6a5-7ffaac59b6a6 2101->2126 2102->2103 2112 7ffaac59b807-7ffaac59b858 2102->2112 2106->2107 2114 7ffaac59b3db-7ffaac59b3e2 2107->2114 2115 7ffaac59b3ac-7ffaac59b3b6 2107->2115 2116 7ffaac59b62c-7ffaac59b62d 2108->2116 2117 7ffaac59b60e-7ffaac59b625 2108->2117 2118 7ffaac59b577-7ffaac59b583 2109->2118 2119 7ffaac59b543-7ffaac59b544 2110->2119 2120 7ffaac59b55b-7ffaac59b568 2110->2120 2114->2078 2123 7ffaac59b3e8-7ffaac59b3ff 2114->2123 2128 7ffaac59b3b9-7ffaac59b3d5 2115->2128 2129 7ffaac59b3b8 2115->2129 2116->2090 2117->2116 2141 7ffaac59b585-7ffaac59b588 2118->2141 2142 7ffaac59b5d4-7ffaac59b5db 2118->2142 2121 7ffaac59b546-7ffaac59b559 2119->2121 2122 7ffaac59b56f-7ffaac59b574 2119->2122 2120->2122 2121->2120 2122->2118 2131 7ffaac59b401-7ffaac59b41e 2123->2131 2132 7ffaac59b420-7ffaac59b439 call 7ffaac587490 2123->2132 2124->2125 2125->2078 2136 7ffaac59b4a9-7ffaac59b4bf 2125->2136 2126->2066 2128->2069 2128->2114 2129->2128 2131->2132 2132->2075 2163 7ffaac59b51c-7ffaac59b51f 2132->2163 2139 7ffaac59b4d8-7ffaac59b4f0 call 7ffaac587490 2136->2139 2140 7ffaac59b4c1-7ffaac59b4c2 2136->2140 2139->2080 2139->2093 2152 7ffaac59b4c9-7ffaac59b4d1 2140->2152 2148 7ffaac59b5b2-7ffaac59b5d0 call 7ffaac584c40 2141->2148 2149 7ffaac59b58a-7ffaac59b5a2 2141->2149 2142->2081 2142->2082 2148->2142 2160 7ffaac59b5a5-7ffaac59b5ae 2149->2160 2161 7ffaac59b5a4 2149->2161 2152->2139 2160->2109 2166 7ffaac59b5b0 2160->2166 2161->2160 2163->2084 2166->2148
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 6$b4$b4
                                                • API String ID: 0-1526618767
                                                • Opcode ID: e8cf1af21ea61827a858e828105006c5aaf10636e95fa56da7d428ebf0604a85
                                                • Instruction ID: 993fdd8c637a7f8847ba8e870781324c428afbce70b0db973c337e6bedccc577
                                                • Opcode Fuzzy Hash: e8cf1af21ea61827a858e828105006c5aaf10636e95fa56da7d428ebf0604a85
                                                • Instruction Fuzzy Hash: 8852C471A19E4A8FFBA8DB288455A75B7D1FF99300F0446BDE44EC3292DE29F80587C1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ^0_L
                                                • API String ID: 0-1823739453
                                                • Opcode ID: a0cd4f9d99279928d12808170a5aac69fa3e94c0b93ec9269f0cdf395d92c347
                                                • Instruction ID: 1c1b317691bd61c3206af3969dc4ad8b6cba417e8eabfe6abf638955f788363a
                                                • Opcode Fuzzy Hash: a0cd4f9d99279928d12808170a5aac69fa3e94c0b93ec9269f0cdf395d92c347
                                                • Instruction Fuzzy Hash: 49820661A5EA8A8FF7A5D72884156B47BD1EF57310B0441FAE04EC72A3DE1DBC0A87C1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2992 7ffaac589621-7ffaac589669 2994 7ffaac58967a-7ffaac58968c 2992->2994 2995 7ffaac58966b-7ffaac589679 2992->2995 2997 7ffaac589692-7ffaac5896a2 2994->2997 2998 7ffaac58970f-7ffaac589713 2994->2998 3004 7ffaac5896a8-7ffaac5896f7 2997->3004 3005 7ffaac589990-7ffaac5899df 2997->3005 2999 7ffaac589715-7ffaac589719 2998->2999 3000 7ffaac58972b-7ffaac58972f 2998->3000 3006 7ffaac589720-7ffaac589724 2999->3006 3002 7ffaac58975e-7ffaac589762 3000->3002 3003 7ffaac589731-7ffaac589758 3000->3003 3007 7ffaac589768-7ffaac58976d 3002->3007 3008 7ffaac589981-7ffaac58998f 3002->3008 3003->3002 3013 7ffaac5899e6-7ffaac5899fd 3003->3013 3042 7ffaac589704-7ffaac589708 3004->3042 3043 7ffaac5896f9-7ffaac589702 3004->3043 3005->3013 3006->3000 3007->3008 3011 7ffaac589773-7ffaac58977d 3007->3011 3016 7ffaac58977f-7ffaac589791 3011->3016 3017 7ffaac5897d0-7ffaac5897d5 3011->3017 3029 7ffaac589a09 3013->3029 3030 7ffaac5899ff-7ffaac589a05 3013->3030 3016->3017 3028 7ffaac589793-7ffaac589799 3016->3028 3022 7ffaac5897db-7ffaac5897e5 3017->3022 3023 7ffaac58995d-7ffaac589962 3017->3023 3022->3023 3032 7ffaac5897eb-7ffaac5897fd 3022->3032 3023->3008 3026 7ffaac589964-7ffaac589979 3023->3026 3026->3008 3041 7ffaac58997b-7ffaac58997e 3026->3041 3033 7ffaac58979b 3028->3033 3034 7ffaac58979c-7ffaac5897c3 3028->3034 3036 7ffaac589a0d-7ffaac589a68 3029->3036 3038 7ffaac589a0b 3029->3038 3035 7ffaac589a07 3030->3035 3030->3036 3047 7ffaac5898f3-7ffaac589907 3032->3047 3048 7ffaac589803-7ffaac589848 3032->3048 3033->3034 3034->3017 3053 7ffaac5897c5-7ffaac5897c9 3034->3053 3035->3029 3056 7ffaac58a027-7ffaac58a039 3036->3056 3057 7ffaac589a6e-7ffaac589a80 3036->3057 3038->3036 3041->3008 3042->2998 3043->2998 3048->3047 3063 7ffaac58984e-7ffaac5898ac 3048->3063 3053->3017 3057->3056 3060 7ffaac589a86-7ffaac589abf 3057->3060 3060->3056 3068 7ffaac589ac5-7ffaac589add 3060->3068 3063->3047 3076 7ffaac5898ae-7ffaac5898c2 3063->3076 3071 7ffaac589adf 3068->3071 3072 7ffaac589ae0-7ffaac589b0b 3068->3072 3071->3072 3079 7ffaac589bc2-7ffaac589bd5 3072->3079 3080 7ffaac589b11-7ffaac589b29 3072->3080 3083 7ffaac589c34 3079->3083 3084 7ffaac589bd7-7ffaac589be9 3079->3084 3085 7ffaac589bb6-7ffaac589bbc 3080->3085 3086 7ffaac589b2f-7ffaac589b46 3080->3086 3087 7ffaac589c36-7ffaac589c3b 3083->3087 3088 7ffaac589beb 3084->3088 3089 7ffaac589bec-7ffaac589bfd 3084->3089 3085->3079 3085->3080 3094 7ffaac589b48 3086->3094 3095 7ffaac589b49-7ffaac589b54 3086->3095 3090 7ffaac589c82-7ffaac589ca5 3087->3090 3091 7ffaac589c3d-7ffaac589c44 3087->3091 3088->3089 3097 7ffaac589c2d-7ffaac589c32 3089->3097 3098 7ffaac589bff-7ffaac589c11 3089->3098 3103 7ffaac589cab-7ffaac589cca 3090->3103 3104 7ffaac589da0-7ffaac589dac 3090->3104 3096 7ffaac589c4b-7ffaac589c65 3091->3096 3094->3095 3095->3085 3105 7ffaac589b56-7ffaac589b68 3095->3105 3096->3090 3108 7ffaac589c67-7ffaac589c80 3096->3108 3097->3087 3101 7ffaac589c13 3098->3101 3102 7ffaac589c14-7ffaac589c2b 3098->3102 3101->3102 3102->3087 3112 7ffaac589ccc 3103->3112 3113 7ffaac589ccd-7ffaac589cd8 3103->3113 3104->3056 3107 7ffaac589db2-7ffaac589dc7 3104->3107 3105->3085 3114 7ffaac589b6a-7ffaac589b6e 3105->3114 3107->3056 3108->3090 3112->3113 3119 7ffaac589d94-7ffaac589d9a 3113->3119 3120 7ffaac589cda-7ffaac589cf9 3113->3120 3117 7ffaac589b74-7ffaac589b7c 3114->3117 3118 7ffaac58a03a-7ffaac58a059 3114->3118 3122 7ffaac589b82-7ffaac589b89 3117->3122 3123 7ffaac58a063-7ffaac58a06d 3118->3123 3124 7ffaac58a05b-7ffaac58a062 3118->3124 3119->3103 3119->3104 3120->3119 3131 7ffaac589cff-7ffaac589d11 3120->3131 3127 7ffaac589b90-7ffaac589b92 3122->3127 3126 7ffaac58a06f-7ffaac58a0c9 3123->3126 3124->3123 3130 7ffaac58a0d0-7ffaac58a0d3 3126->3130 3127->3085 3129 7ffaac589b94-7ffaac589bb2 call 7ffaac584c40 3127->3129 3129->3085 3133 7ffaac58a1e5-7ffaac58a218 3130->3133 3134 7ffaac58a0d9-7ffaac58a0db 3130->3134 3131->3119 3140 7ffaac589d17-7ffaac589d1b 3131->3140 3149 7ffaac58a21f-7ffaac58a251 3133->3149 3136 7ffaac58a0f5-7ffaac58a103 3134->3136 3137 7ffaac58a0dd-7ffaac58a0ef 3134->3137 3141 7ffaac58a258-7ffaac58a28b 3136->3141 3142 7ffaac58a109-7ffaac58a120 3136->3142 3137->3136 3137->3149 3140->3118 3147 7ffaac589d21-7ffaac589d64 3140->3147 3164 7ffaac58a292-7ffaac58a2d1 3141->3164 3158 7ffaac58a122-7ffaac58a134 3142->3158 3159 7ffaac58a13a-7ffaac58a13d 3142->3159 3147->3119 3172 7ffaac589d66-7ffaac589d91 call 7ffaac584c40 3147->3172 3149->3141 3158->3159 3158->3164 3162 7ffaac58a166-7ffaac58a182 call 7ffaac5873a0 3159->3162 3163 7ffaac58a13f-7ffaac58a156 3159->3163 3176 7ffaac58a1b3-7ffaac58a1b7 3162->3176 3177 7ffaac58a184-7ffaac58a1b2 3162->3177 3163->3162 3179 7ffaac58a158-7ffaac58a15c 3163->3179 3182 7ffaac58a2d3-7ffaac58a2d9 3164->3182 3183 7ffaac58a2dd 3164->3183 3172->3119 3185 7ffaac58a1be-7ffaac58a1e4 3176->3185 3187 7ffaac58a163-7ffaac58a164 3179->3187 3188 7ffaac58a2db 3182->3188 3189 7ffaac58a2e1-7ffaac58a31c 3182->3189 3183->3189 3190 7ffaac58a2df 3183->3190 3187->3162 3188->3183 3194 7ffaac58a31e-7ffaac58a345 3189->3194 3195 7ffaac58a35f-7ffaac58a368 3189->3195 3190->3189 3198 7ffaac58a399-7ffaac58a3bb 3194->3198 3203 7ffaac58a347-7ffaac58a35e 3194->3203 3195->3198
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: }
                                                • API String ID: 0-3750035705
                                                • Opcode ID: 734fcd4f9f702929ade60c51b22f18b4a2ebe22b9b497463811623a61996af1d
                                                • Instruction ID: 60f491e121b9a3d89c9851ece19b2f7bbd2e30eeacd813fb932ca05e716c965f
                                                • Opcode Fuzzy Hash: 734fcd4f9f702929ade60c51b22f18b4a2ebe22b9b497463811623a61996af1d
                                                • Instruction Fuzzy Hash: DA82FA7161DA4A8FEB98EB2CD455A7577D1FF9A310F0480B9E44EC72A3DE24EC068781
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3df4e47689fa14021262b7da271e0d70a2fffa1069d274f6daee399c243b3e89
                                                • Instruction ID: 7951c6ecc9735b73cd81dac9d8078a0d73bbaea346a97363eed1703ea1ab946b
                                                • Opcode Fuzzy Hash: 3df4e47689fa14021262b7da271e0d70a2fffa1069d274f6daee399c243b3e89
                                                • Instruction Fuzzy Hash: 7113A270A09A4A8FEB99DF18C451BB97BE1FF5A300F5481A9D04ED7292CE34ED45CB81
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9aae4621992ae3bbc6c9fabf4a6b06fd4eb82aff6eb4b7f50361dd12d676a1c3
                                                • Instruction ID: 2964afee4684e9b4f677818171dfea5959bd20e80ca39bd5d6aa6795d89269c4
                                                • Opcode Fuzzy Hash: 9aae4621992ae3bbc6c9fabf4a6b06fd4eb82aff6eb4b7f50361dd12d676a1c3
                                                • Instruction Fuzzy Hash: EC728370A09A4A8FEB98EB2CC455B7577E5FF9A300F1485B9E04DCB2A6CE34EC458741
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a785186b280cfa32a2ccc0ee9a59397cf173eacc0bd25976cdbb873dafaeed9b
                                                • Instruction ID: 411c8a7848c39bda901263e540b9baeef74850c1304a44cb488abe7bbee939bc
                                                • Opcode Fuzzy Hash: a785186b280cfa32a2ccc0ee9a59397cf173eacc0bd25976cdbb873dafaeed9b
                                                • Instruction Fuzzy Hash: C5421671A1DA4B8FF365DB288445A7977D1EF96300F0485F9E48EC3196DE29F80687C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0d7a0604522461a6ea51497cf718cc2f7b342c24606c34a0583a29531e56a005
                                                • Instruction ID: 599612f9cb5e60bcde06402075955ec13607a68832feec2097496d6f5e225847
                                                • Opcode Fuzzy Hash: 0d7a0604522461a6ea51497cf718cc2f7b342c24606c34a0583a29531e56a005
                                                • Instruction Fuzzy Hash: AE42C430A0DA4A8FEB98DB2884557B977E1FF5A310F1441BDE44EC72D2CE25ED458781
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cea8a0f2f56b79d390e2f9c49489594f1cae5fee4e1f0a6e4f8d550113c81e4f
                                                • Instruction ID: 4ec747fae6321bd046f0ac2eb832b1c2a840519ed12cfa66aa69122d1f11c8bd
                                                • Opcode Fuzzy Hash: cea8a0f2f56b79d390e2f9c49489594f1cae5fee4e1f0a6e4f8d550113c81e4f
                                                • Instruction Fuzzy Hash: D0024C34A19A1A8FEB98DF18C4457B9B3E1FF59301F5481B9E44ED3292DE34ED858B80
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2dc601cf2ab3096641f58328be1ad3a5ac27d1bdac5af1fd9104b9c6b6eb0b98
                                                • Instruction ID: eccaf0c83bc579436ecce8e82877eda4cb3e2a4ad5ec64c7e972d8f2f9ac348f
                                                • Opcode Fuzzy Hash: 2dc601cf2ab3096641f58328be1ad3a5ac27d1bdac5af1fd9104b9c6b6eb0b98
                                                • Instruction Fuzzy Hash: 88F1A630909A8E8FEBA8DF28C8557E937D1FF55350F0482AEE84DC7291DB39D9458B81
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a7afba504eb6ffe75abaef91911bacdbe0141d9657a207aaaaa9bee11199c75e
                                                • Instruction ID: c8497a0371a713ed95daa38173d334180ea77e1e092e23cb59689a9856b63b5f
                                                • Opcode Fuzzy Hash: a7afba504eb6ffe75abaef91911bacdbe0141d9657a207aaaaa9bee11199c75e
                                                • Instruction Fuzzy Hash: CFE1C430908A8E8FEBA8DF28C8557E977D1EF55310F04826EE84DC7291CB79D9458BC1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2591696809.00007FFAAC300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac300000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 21cb47ede43164d52a66deae3bfec21b09750dcb528827589bbc7c5efa106aa4
                                                • Instruction ID: 706124ca28fa6eaf2a707d066f13a72ca5d191e32ce7653ed3b88d76bc7682e7
                                                • Opcode Fuzzy Hash: 21cb47ede43164d52a66deae3bfec21b09750dcb528827589bbc7c5efa106aa4
                                                • Instruction Fuzzy Hash: 0FB1D441A0FAC76FE3C6A37C0426976AFE18F9725070984FAC18DCB5E7DC58D84983A1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1378 7ffaac591b28-7ffaac591b49 1381 7ffaac591b74-7ffaac591b86 1378->1381 1382 7ffaac591b4b-7ffaac591b71 1378->1382 1385 7ffaac591b88-7ffaac591bab 1381->1385 1382->1385 1391 7ffaac591b73 1382->1391 1393 7ffaac591bac-7ffaac591bb6 1385->1393 1391->1381 1394 7ffaac591bb8-7ffaac591c28 1393->1394 1394->1393 1401 7ffaac591c2a-7ffaac591c32 1394->1401 1401->1394 1403 7ffaac591c34-7ffaac591c67 1401->1403 1407 7ffaac591c69-7ffaac591c79 1403->1407 1408 7ffaac591cb1 1403->1408 1411 7ffaac591cd2-7ffaac591cd6 1407->1411 1412 7ffaac591c7b-7ffaac591c7e 1407->1412 1409 7ffaac591cb2-7ffaac591cb3 1408->1409 1410 7ffaac591cb4-7ffaac591cb9 1408->1410 1409->1410 1415 7ffaac591cba-7ffaac591cbb 1410->1415 1416 7ffaac591cbc-7ffaac591cca 1410->1416 1413 7ffaac591d52-7ffaac591d53 1411->1413 1414 7ffaac591cd7 1411->1414 1417 7ffaac591cff-7ffaac591d01 1412->1417 1418 7ffaac591c80-7ffaac591c87 1412->1418 1421 7ffaac591d54 1413->1421 1419 7ffaac591d48-7ffaac591d4e 1414->1419 1420 7ffaac591cd8-7ffaac591cdb 1414->1420 1415->1416 1424 7ffaac591ccc 1416->1424 1425 7ffaac591ccd-7ffaac591cd1 1416->1425 1422 7ffaac591d02-7ffaac591d03 1417->1422 1423 7ffaac591d04-7ffaac591d16 1417->1423 1426 7ffaac591c89 1418->1426 1427 7ffaac591c8a-7ffaac591c9d 1418->1427 1419->1413 1428 7ffaac591d57-7ffaac591d7e call 7ffaac590fe8 1420->1428 1429 7ffaac591cdd-7ffaac591cfc 1420->1429 1421->1428 1422->1423 1444 7ffaac591d1b-7ffaac591d20 1423->1444 1424->1425 1425->1411 1426->1427 1440 7ffaac591c9f 1427->1440 1441 7ffaac591ca0-7ffaac591ca9 1427->1441 1437 7ffaac591d80 1428->1437 1438 7ffaac591d81-7ffaac591d8e 1428->1438 1429->1417 1437->1438 1438->1421 1448 7ffaac591d90 1438->1448 1440->1441 1445 7ffaac591d25-7ffaac591d30 1441->1445 1446 7ffaac591caa 1441->1446 1444->1445 1449 7ffaac591d31-7ffaac591d41 1445->1449 1446->1444 1450 7ffaac591cab-7ffaac591cb0 1446->1450 1451 7ffaac591d92-7ffaac591d94 call 7ffaac591898 1448->1451 1452 7ffaac591e0c-7ffaac591e33 1448->1452 1456 7ffaac591dc2-7ffaac591dc4 1449->1456 1457 7ffaac591d43-7ffaac591d46 1449->1457 1450->1408 1450->1449 1462 7ffaac591d99-7ffaac591d9e 1451->1462 1455 7ffaac591e35-7ffaac591e38 1452->1455 1459 7ffaac591f5a-7ffaac591f65 1455->1459 1460 7ffaac591e3b-7ffaac591e43 1455->1460 1456->1455 1461 7ffaac591dc6-7ffaac591dc8 1456->1461 1457->1419 1468 7ffaac591fd9-7ffaac591ffc call 7ffaac590e50 1459->1468 1464 7ffaac591e44 1460->1464 1461->1464 1465 7ffaac591dca 1461->1465 1466 7ffaac591dcc-7ffaac591dcd 1462->1466 1467 7ffaac591da0-7ffaac591da6 1462->1467 1464->1468 1469 7ffaac591e4a-7ffaac591e56 1464->1469 1465->1466 1470 7ffaac591dce-7ffaac591e03 1465->1470 1466->1470 1472 7ffaac591da8 1467->1472 1473 7ffaac591da9-7ffaac591db7 1467->1473 1486 7ffaac591ffe 1468->1486 1487 7ffaac591fff-7ffaac592052 1468->1487 1475 7ffaac591e05-7ffaac591e0b 1470->1475 1476 7ffaac591e57-7ffaac591e60 1470->1476 1472->1473 1477 7ffaac591db9 1473->1477 1478 7ffaac591dba-7ffaac591dbf 1473->1478 1480 7ffaac591ed6-7ffaac591ef9 call 7ffaac590e50 1475->1480 1481 7ffaac591e11-7ffaac591e38 1475->1481 1476->1480 1477->1478 1478->1456 1492 7ffaac591efb 1480->1492 1493 7ffaac591efc-7ffaac591f4f 1480->1493 1481->1459 1484 7ffaac591e3e 1481->1484 1484->1464 1486->1487 1492->1493 1493->1459
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: hYI$hYI$pYI$pYI$xYI
                                                • API String ID: 0-700338209
                                                • Opcode ID: 7e5a900251d5abf64c2edbe6883f2ff231d2669e08d76a0185a8b8e6a086c124
                                                • Instruction ID: e3b0dd92f16db932948b42f1d5cb9966068044fe66c0a6bbe1697f7665959446
                                                • Opcode Fuzzy Hash: 7e5a900251d5abf64c2edbe6883f2ff231d2669e08d76a0185a8b8e6a086c124
                                                • Instruction Fuzzy Hash: 20024662D4E7978FE355977898524A93BE4DF57310B0841FAE08DCB2E3D91DA80E83D1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2167 7ffaac59e401-7ffaac59e49f call 7ffaac5848f0 2174 7ffaac59e4a9-7ffaac59e4b9 2167->2174 2175 7ffaac59e4a1-7ffaac59e4a6 2167->2175 2176 7ffaac59e9e2-7ffaac59e9ed 2174->2176 2177 7ffaac59e4bf-7ffaac59e4cf call 7ffaac58a6d0 2174->2177 2175->2174 2178 7ffaac59e9f7-7ffaac59ea57 call 7ffaac583fd0 2176->2178 2179 7ffaac59e9ef-7ffaac59e9f4 2176->2179 2181 7ffaac59e4d4-7ffaac59e4d9 2177->2181 2189 7ffaac59ea5d-7ffaac59ea66 2178->2189 2190 7ffaac59e981-7ffaac59e9ce 2178->2190 2179->2178 2183 7ffaac59e8ef-7ffaac59e924 2181->2183 2184 7ffaac59e4df-7ffaac59e4ea 2181->2184 2199 7ffaac59e925-7ffaac59e941 2183->2199 2187 7ffaac59e507-7ffaac59e540 call 7ffaac583fd0 2184->2187 2188 7ffaac59e4ec-7ffaac59e4fd 2184->2188 2205 7ffaac59e542-7ffaac59e566 call 7ffaac58a3f0 call 7ffaac58a550 2187->2205 2206 7ffaac59e56b-7ffaac59e649 call 7ffaac583fd0 2187->2206 2188->2187 2202 7ffaac59e4ff-7ffaac59e504 2188->2202 2194 7ffaac59ec5b-7ffaac59eca7 2189->2194 2195 7ffaac59ea6c-7ffaac59ea77 2189->2195 2234 7ffaac59e9d5-7ffaac59e9d8 2190->2234 2220 7ffaac59ecae-7ffaac59ecf5 2194->2220 2195->2194 2196 7ffaac59ea7d-7ffaac59ea80 2195->2196 2203 7ffaac59ea86-7ffaac59eb27 2196->2203 2204 7ffaac59e948-7ffaac59e96a 2196->2204 2199->2204 2202->2187 2243 7ffaac59ed74-7ffaac59ed7d 2203->2243 2244 7ffaac59eb2d-7ffaac59eb35 2203->2244 2204->2199 2222 7ffaac59e96c-7ffaac59e97a 2204->2222 2205->2206 2269 7ffaac59e8b6-7ffaac59e8d8 2206->2269 2270 7ffaac59e64f-7ffaac59e653 2206->2270 2231 7ffaac59ed12-7ffaac59ed1b 2220->2231 2232 7ffaac59ecf7-7ffaac59ed06 2220->2232 2222->2190 2236 7ffaac59ed1e-7ffaac59ed65 2231->2236 2238 7ffaac59ed0d-7ffaac59ed10 2232->2238 2234->2176 2240 7ffaac59ed6c-7ffaac59ed6f 2236->2240 2238->2236 2241 7ffaac59ec01-7ffaac59ec1c 2240->2241 2251 7ffaac59ec56 2241->2251 2252 7ffaac59ec1e-7ffaac59ec2f 2241->2252 2243->2241 2245 7ffaac59ed83-7ffaac59ed8b 2243->2245 2247 7ffaac59eb44-7ffaac59eb5b 2244->2247 2248 7ffaac59eb37-7ffaac59eb3c 2244->2248 2245->2241 2249 7ffaac59ed91-7ffaac59eda2 2245->2249 2247->2220 2254 7ffaac59eb61-7ffaac59ebb1 2247->2254 2248->2247 2249->2241 2259 7ffaac59eda8-7ffaac59edb3 2249->2259 2260 7ffaac59ec35-7ffaac59ec54 2252->2260 2261 7ffaac59e7c7-7ffaac59e7d3 2252->2261 2262 7ffaac59ebb3-7ffaac59ebea 2254->2262 2263 7ffaac59ebec-7ffaac59ebf3 2254->2263 2267 7ffaac59edb5-7ffaac59edd8 2259->2267 2268 7ffaac59edec-7ffaac59edf5 2259->2268 2260->2251 2278 7ffaac59e882-7ffaac59e889 2261->2278 2279 7ffaac59e7d9-7ffaac59e7f1 2261->2279 2262->2263 2273 7ffaac59ebfa-7ffaac59ebfb 2263->2273 2267->2241 2276 7ffaac59e893 2268->2276 2277 7ffaac59edfb-7ffaac59ee3a 2268->2277 2285 7ffaac59e894-7ffaac59e8af 2269->2285 2292 7ffaac59e8da-7ffaac59e8e8 2269->2292 2274 7ffaac59e659-7ffaac59e6e8 2270->2274 2275 7ffaac59e88e 2270->2275 2273->2241 2274->2234 2314 7ffaac59e6ee-7ffaac59e74a 2274->2314 2275->2276 2276->2285 2286 7ffaac59ee41-7ffaac59ee61 call 7ffaac59ee62 2277->2286 2278->2286 2290 7ffaac59e7f7-7ffaac59e822 2279->2290 2291 7ffaac59eddd-7ffaac59edeb 2279->2291 2285->2269 2301 7ffaac59e829-7ffaac59e83d 2290->2301 2291->2268 2292->2183 2306 7ffaac59e852-7ffaac59e85d 2301->2306 2307 7ffaac59e83f-7ffaac59e850 2301->2307 2306->2278 2307->2278 2307->2306 2320 7ffaac59e789-7ffaac59e7c5 2314->2320 2321 7ffaac59e74c-7ffaac59e787 2314->2321 2320->2261 2321->2320
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 6$=%_L$>0_L
                                                • API String ID: 0-2043559767
                                                • Opcode ID: d1df6547069584b4589ddb85ea935ba7f542112efef71165d7eefcb0cc1db3fb
                                                • Instruction ID: b1e2ddb15ca71a7f5a3736b8e344dac40843010e878c157ac2569d8ff6cb1c90
                                                • Opcode Fuzzy Hash: d1df6547069584b4589ddb85ea935ba7f542112efef71165d7eefcb0cc1db3fb
                                                • Instruction Fuzzy Hash: 57E1B370618A4A8FEB58DB18D855A7977E2FF99300F1481BDE45EC7292CE38EC46C781

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2327 7ffaac6401ba-7ffaac6401c1 2328 7ffaac6407d9-7ffaac640841 2327->2328 2329 7ffaac6401c7-7ffaac6401df 2327->2329 2331 7ffaac6401e1 2329->2331 2332 7ffaac6401e2-7ffaac6401f1 2329->2332 2331->2332 2334 7ffaac6401f4-7ffaac64020d 2332->2334 2335 7ffaac6401f3 2332->2335 2337 7ffaac640213-7ffaac64021c 2334->2337 2335->2334 2340 7ffaac64021e-7ffaac64022c 2337->2340 2341 7ffaac640236-7ffaac640270 2337->2341 2340->2341 2344 7ffaac64022e-7ffaac640234 2340->2344 2341->2328 2344->2341
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: "&_L$r6$r6
                                                • API String ID: 0-3696463462
                                                • Opcode ID: d8a06d40f6d790e9099ff1d1422f9f4c28697eeb414c4416045cc40e599c54e2
                                                • Instruction ID: bb7d45dbf7ccd80448856b87b657581766ef765589d918dddf7dd02d7d49c650
                                                • Opcode Fuzzy Hash: d8a06d40f6d790e9099ff1d1422f9f4c28697eeb414c4416045cc40e599c54e2
                                                • Instruction Fuzzy Hash: F1413871A1EB858FF359D76C99266757BC1EB56210F0421BED08FC32E3EC189C058386

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2351 7ffaac582440-7ffaac59aa14 2353 7ffaac59ad13-7ffaac59ad1d 2351->2353 2354 7ffaac59aa1a-7ffaac59aa1f 2351->2354 2361 7ffaac59ad1e-7ffaac59ad8e 2353->2361 2355 7ffaac59aa2b-7ffaac59aa44 2354->2355 2356 7ffaac59aa21-7ffaac59aa26 call 7ffaac582438 2354->2356 2359 7ffaac59aa46-7ffaac59aa56 2355->2359 2360 7ffaac59aa58-7ffaac59aa85 2355->2360 2356->2355 2359->2360 2360->2361 2365 7ffaac59aa8b-7ffaac59aa96 2360->2365 2377 7ffaac59adab-7ffaac59adbc 2361->2377 2378 7ffaac59ad90-7ffaac59ad96 2361->2378 2367 7ffaac59ab54-7ffaac59ab59 2365->2367 2368 7ffaac59aa9c-7ffaac59aaaa 2365->2368 2370 7ffaac59ab5f-7ffaac59ab69 2367->2370 2371 7ffaac59abde-7ffaac59abe8 2367->2371 2368->2361 2372 7ffaac59aab0-7ffaac59aac1 2368->2372 2370->2361 2379 7ffaac59ab6f-7ffaac59ab83 2370->2379 2375 7ffaac59ac0a-7ffaac59ac11 2371->2375 2376 7ffaac59abea-7ffaac59ac08 call 7ffaac582458 2371->2376 2373 7ffaac59aac3-7ffaac59aae6 2372->2373 2374 7ffaac59ab29-7ffaac59ab40 2372->2374 2380 7ffaac59ab88-7ffaac59ab8d 2373->2380 2381 7ffaac59aaec-7ffaac59aaff 2373->2381 2374->2361 2382 7ffaac59ab46-7ffaac59ab4e 2374->2382 2387 7ffaac59ac14-7ffaac59ac1e 2375->2387 2376->2375 2385 7ffaac59adcd-7ffaac59adf0 2377->2385 2386 7ffaac59adbe-7ffaac59adcc 2377->2386 2383 7ffaac59ad98-7ffaac59ada9 2378->2383 2384 7ffaac59adf1-7ffaac59ae34 call 7ffaac586b60 2378->2384 2379->2387 2392 7ffaac59ab03-7ffaac59ab27 2380->2392 2381->2392 2382->2367 2382->2368 2383->2377 2383->2378 2409 7ffaac59ae36-7ffaac59ae4e 2384->2409 2410 7ffaac59ae50 2384->2410 2386->2385 2387->2361 2391 7ffaac59ac24-7ffaac59ac3c 2387->2391 2391->2361 2395 7ffaac59ac42-7ffaac59ac5a 2391->2395 2392->2374 2402 7ffaac59ab92-7ffaac59ab95 2392->2402 2395->2361 2400 7ffaac59ac60-7ffaac59ac85 2395->2400 2400->2361 2414 7ffaac59ac8b-7ffaac59ac9e 2400->2414 2406 7ffaac59ab97-7ffaac59aba7 2402->2406 2407 7ffaac59abab-7ffaac59abb8 2402->2407 2406->2407 2407->2361 2408 7ffaac59abbe-7ffaac59abdd 2407->2408 2409->2410 2415 7ffaac59ae57-7ffaac59ae79 2410->2415 2418 7ffaac59ad01-7ffaac59ad12 2414->2418 2419 7ffaac59aca0-7ffaac59acab 2414->2419 2419->2418 2422 7ffaac59acad-7ffaac59acc4 2419->2422 2424 7ffaac59acd5-7ffaac59acfc call 7ffaac582458 2422->2424 2425 7ffaac59acc6-7ffaac59acd3 2422->2425 2424->2418 2425->2424
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: b4$d
                                                • API String ID: 0-2243634771
                                                • Opcode ID: 77006ceec1b330bd70f9ff8c7c6de7fa9cd5f4d1c9deb79e17c68bfbf87b7035
                                                • Instruction ID: 036e65d2d2e34f7a1ad72cf54e004ad78907ed850d7014345860bc468cb83592
                                                • Opcode Fuzzy Hash: 77006ceec1b330bd70f9ff8c7c6de7fa9cd5f4d1c9deb79e17c68bfbf87b7035
                                                • Instruction Fuzzy Hash: 22F1EE70A58B0A8FE758DF18C485575B3E1EF9A310B2485BDE44EC72A6DE39EC4287C1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2430 7ffaac583fa6-7ffaac583fa8 2431 7ffaac583faa-7ffaac583faf 2430->2431 2432 7ffaac584009-7ffaac58401d 2430->2432 2431->2432 2435 7ffaac58401f-7ffaac584027 2432->2435 2436 7ffaac58406d-7ffaac58406e 2432->2436 2437 7ffaac584029-7ffaac58402c 2435->2437 2438 7ffaac584062-7ffaac584068 2435->2438 2441 7ffaac584075-7ffaac58407d 2436->2441 2437->2438 2439 7ffaac58402e-7ffaac584039 2437->2439 2440 7ffaac584573-7ffaac584585 2438->2440 2442 7ffaac58403b-7ffaac584056 2439->2442 2443 7ffaac58407f-7ffaac584094 2441->2443 2444 7ffaac584098-7ffaac58409e 2441->2444 2453 7ffaac58405d 2442->2453 2443->2444 2445 7ffaac5843d9-7ffaac5843e0 2444->2445 2446 7ffaac5840a4-7ffaac5840b8 2444->2446 2447 7ffaac5843e7-7ffaac5843f3 2445->2447 2448 7ffaac5843e2-7ffaac5843e5 2445->2448 2446->2445 2450 7ffaac5843f5-7ffaac5843f8 2447->2450 2448->2450 2454 7ffaac5843fa-7ffaac584400 2450->2454 2455 7ffaac584405-7ffaac58440d 2450->2455 2456 7ffaac584586-7ffaac584599 2453->2456 2454->2456 2457 7ffaac58456d 2455->2457 2458 7ffaac584413-7ffaac584430 2455->2458 2457->2440 2460 7ffaac584457-7ffaac584462 2458->2460 2461 7ffaac584432-7ffaac584442 call 7ffaac583050 2458->2461 2462 7ffaac584468-7ffaac58446d 2460->2462 2463 7ffaac584522-7ffaac584525 2460->2463 2461->2460 2473 7ffaac584444-7ffaac584452 2461->2473 2465 7ffaac58446f 2462->2465 2466 7ffaac584474-7ffaac584477 2462->2466 2463->2457 2467 7ffaac584527-7ffaac58452d 2463->2467 2465->2466 2469 7ffaac584479-7ffaac584483 2466->2469 2470 7ffaac584487-7ffaac58448a 2466->2470 2471 7ffaac58452f-7ffaac584534 2467->2471 2472 7ffaac584536 2467->2472 2469->2470 2474 7ffaac58448c-7ffaac58448f 2470->2474 2475 7ffaac5844da-7ffaac5844dd 2470->2475 2476 7ffaac58453b-7ffaac58456b 2471->2476 2472->2476 2473->2460 2477 7ffaac5844b1-7ffaac5844b4 2474->2477 2478 7ffaac584491-7ffaac5844ab 2474->2478 2480 7ffaac5844df-7ffaac5844e8 2475->2480 2481 7ffaac5844ea-7ffaac5844ef 2475->2481 2476->2456 2483 7ffaac5844b6-7ffaac5844bc 2477->2483 2484 7ffaac5844c4-7ffaac5844ca 2477->2484 2478->2477 2490 7ffaac58459a-7ffaac5845a0 2478->2490 2482 7ffaac5844f3-7ffaac584520 2480->2482 2481->2482 2482->2456 2483->2484 2487 7ffaac5844be-7ffaac5844c1 2483->2487 2484->2475 2489 7ffaac5844cc-7ffaac5844d6 2484->2489 2487->2484 2489->2475 2491 7ffaac5845a3-7ffaac5845bd 2490->2491 2492 7ffaac5845a2 2490->2492 2495 7ffaac5845c0-7ffaac5845cb 2491->2495 2496 7ffaac5845bf 2491->2496 2492->2491 2498 7ffaac5845cd-7ffaac5845d3 2495->2498 2499 7ffaac5845e7-7ffaac5845ed 2495->2499 2496->2495 2500 7ffaac5845d6-7ffaac5845e5 2498->2500 2501 7ffaac5845d5 2498->2501 2502 7ffaac5845f0-7ffaac584610 2499->2502 2503 7ffaac5845ef 2499->2503 2506 7ffaac584612-7ffaac584684 2500->2506 2501->2500 2502->2506 2503->2502 2511 7ffaac584689-7ffaac5846c3 2506->2511 2512 7ffaac584686-7ffaac584688 2506->2512 2515 7ffaac5846c5-7ffaac5846cd 2511->2515 2516 7ffaac5846d4-7ffaac5846e6 2511->2516 2512->2511 2515->2516 2518 7ffaac5846cf 2515->2518 2519 7ffaac5846e8-7ffaac5846f2 2516->2519 2520 7ffaac5846f3-7ffaac584705 2516->2520 2521 7ffaac58476c-7ffaac584771 2518->2521 2523 7ffaac584707-7ffaac584711 2520->2523 2524 7ffaac584712-7ffaac584724 2520->2524 2526 7ffaac584731-7ffaac584743 2524->2526 2527 7ffaac584726-7ffaac584730 2524->2527 2529 7ffaac58474c-7ffaac58475e 2526->2529 2530 7ffaac584745-7ffaac58474a 2526->2530 2532 7ffaac584760-7ffaac584765 2529->2532 2533 7ffaac584767 2529->2533 2530->2521 2532->2521 2533->2521
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: @$r6
                                                • API String ID: 0-2003788277
                                                • Opcode ID: aed0b147b90a42243f513c67aa0589c6607a4d148113270f67a8c65abaa10df2
                                                • Instruction ID: d71c82a0999301e4b151e3af3a8d42bf5fdf537c58b7ec2e1fb90548b69dec55
                                                • Opcode Fuzzy Hash: aed0b147b90a42243f513c67aa0589c6607a4d148113270f67a8c65abaa10df2
                                                • Instruction Fuzzy Hash: EAE12421A4E6478FF795973894622793BD5EF47310F0441BAE88ECB2D2DE18ED4A93C1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2534 7ffaac5917e5-7ffaac591807 2537 7ffaac591809-7ffaac591814 2534->2537 2538 7ffaac591851-7ffaac59189e 2534->2538 2541 7ffaac59181f-7ffaac591825 2537->2541 2547 7ffaac5918a3-7ffaac5918ac 2538->2547 2543 7ffaac591827 2541->2543 2544 7ffaac591828-7ffaac591831 2541->2544 2543->2544 2545 7ffaac591832 2544->2545 2546 7ffaac5918ad-7ffaac5918b1 2544->2546 2545->2547 2548 7ffaac591833-7ffaac591836 2545->2548 2551 7ffaac5918b2-7ffaac591941 2546->2551 2547->2546 2548->2551 2552 7ffaac591838 2548->2552 2565 7ffaac591943-7ffaac591961 2551->2565 2566 7ffaac59196e-7ffaac5919c6 2551->2566 2553 7ffaac59183a-7ffaac59183e 2552->2553 2554 7ffaac591840-7ffaac59184f 2552->2554 2553->2554 2554->2538 2571 7ffaac591963-7ffaac59196d 2565->2571 2572 7ffaac5919c9-7ffaac5919f1 2565->2572 2566->2572 2571->2566
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: +&_^$pYI
                                                • API String ID: 0-4082220545
                                                • Opcode ID: ddd39a9341d2b659a5d138dc4459cbb4768f25e0fa41542be56c811fea7a0675
                                                • Instruction ID: b62fed2c67470418caaa43326ce8cc0b8da9c3fb46c013d3add81797862a4a98
                                                • Opcode Fuzzy Hash: ddd39a9341d2b659a5d138dc4459cbb4768f25e0fa41542be56c811fea7a0675
                                                • Instruction Fuzzy Hash: C0617257D0D2A34BE721777CB4665EA3F908F4233570885F7E2CDCA1A3D90C648A8695

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2581 7ffaac640718-7ffaac640722 2582 7ffaac6407d9-7ffaac640841 2581->2582 2583 7ffaac640728-7ffaac640740 2581->2583 2585 7ffaac640743-7ffaac640752 2583->2585 2586 7ffaac640742 2583->2586 2588 7ffaac640755-7ffaac64076e 2585->2588 2589 7ffaac640754 2585->2589 2586->2585 2591 7ffaac640774-7ffaac64077d 2588->2591 2589->2588 2594 7ffaac64077f-7ffaac64078d 2591->2594 2595 7ffaac640797-7ffaac6407a3 2591->2595 2594->2595 2601 7ffaac64078f-7ffaac640795 2594->2601 2599 7ffaac6407a5-7ffaac6407c5 2595->2599 2600 7ffaac6407c9-7ffaac6407d1 2595->2600 2599->2600 2600->2582 2601->2595
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6$r6
                                                • API String ID: 0-2018302956
                                                • Opcode ID: 0424c09b20f8e7570f93041208af19ee4de31a3a84b80c74173c192cf457d030
                                                • Instruction ID: 400ba1467ffc38f3751afaa510387490117a3a6e5edf23d0b5a1bcba65f18b20
                                                • Opcode Fuzzy Hash: 0424c09b20f8e7570f93041208af19ee4de31a3a84b80c74173c192cf457d030
                                                • Instruction Fuzzy Hash: EF41E362A1EA858FF399D76C9916674BBC1EB56310F1411BED08EC32E3E818AC0586C7

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3630 7ffaac59d320-7ffaac59d343 3634 7ffaac59d345-7ffaac59d348 3630->3634 3635 7ffaac59d346-7ffaac59d349 3630->3635 3636 7ffaac59d34a-7ffaac59d350 3634->3636 3635->3636 3637 7ffaac59d3c1-7ffaac59d3cc 3636->3637 3638 7ffaac59d351-7ffaac59d354 3636->3638 3639 7ffaac59d3cd-7ffaac59d3cf 3637->3639 3640 7ffaac59d356-7ffaac59d35c 3638->3640 3641 7ffaac59d3d0-7ffaac59d3db 3638->3641 3639->3641 3640->3639 3648 7ffaac59d35e-7ffaac59d361 3640->3648 3643 7ffaac59d425-7ffaac59d430 3641->3643 3644 7ffaac59d3dd-7ffaac59d3fb 3641->3644 3646 7ffaac59d465-7ffaac59d467 3643->3646 3651 7ffaac59d432-7ffaac59d438 3644->3651 3652 7ffaac59d3fd 3644->3652 3649 7ffaac59d469-7ffaac59d46e 3646->3649 3650 7ffaac59d4d8-7ffaac59d4e2 3646->3650 3648->3644 3653 7ffaac59d363 3648->3653 3654 7ffaac59d4ef 3649->3654 3655 7ffaac59d470-7ffaac59d475 3649->3655 3656 7ffaac59d43b-7ffaac59d44b 3651->3656 3657 7ffaac59d43a 3651->3657 3658 7ffaac59d3fe-7ffaac59d403 3652->3658 3659 7ffaac59d365-7ffaac59d37d 3653->3659 3660 7ffaac59d3a9-7ffaac59d3b0 3653->3660 3662 7ffaac59d531-7ffaac59d53e 3654->3662 3663 7ffaac59d4f1-7ffaac59d4f5 3654->3663 3664 7ffaac59d477-7ffaac59d47c 3655->3664 3665 7ffaac59d4e6-7ffaac59d4ec 3655->3665 3681 7ffaac59d491-7ffaac59d497 3656->3681 3686 7ffaac59d44d-7ffaac59d451 3656->3686 3657->3656 3666 7ffaac59d405 3658->3666 3667 7ffaac59d406 3658->3667 3659->3658 3668 7ffaac59d37f-7ffaac59d3a3 3659->3668 3669 7ffaac59d4f6-7ffaac59d4fc 3663->3669 3670 7ffaac59d4fd-7ffaac59d505 3664->3670 3671 7ffaac59d47e 3664->3671 3665->3654 3672 7ffaac59d407-7ffaac59d410 3666->3672 3667->3672 3668->3660 3669->3670 3680 7ffaac59d508-7ffaac59d53b 3670->3680 3676 7ffaac59d481-7ffaac59d48a 3671->3676 3672->3676 3678 7ffaac59d412-7ffaac59d414 3672->3678 3676->3681 3683 7ffaac59d416 3678->3683 3684 7ffaac59d490 3678->3684 3689 7ffaac59d542-7ffaac59d54e 3680->3689 3681->3680 3685 7ffaac59d499-7ffaac59d49c 3681->3685 3687 7ffaac59d418-7ffaac59d41c 3683->3687 3688 7ffaac59d45c-7ffaac59d461 3683->3688 3684->3681 3690 7ffaac59d49e 3685->3690 3691 7ffaac59d453-7ffaac59d456 3686->3691 3692 7ffaac59d4c2-7ffaac59d4d1 3686->3692 3693 7ffaac59d48d-7ffaac59d48e 3687->3693 3694 7ffaac59d41e-7ffaac59d421 3687->3694 3688->3646 3698 7ffaac59d58d-7ffaac59d5a5 call 7ffaac59d1a0 3689->3698 3699 7ffaac59d550-7ffaac59d56a 3689->3699 3700 7ffaac59d51f-7ffaac59d53b 3690->3700 3701 7ffaac59d4a0-7ffaac59d4b0 3690->3701 3695 7ffaac59d4d2 3691->3695 3702 7ffaac59d458 3691->3702 3692->3695 3693->3684 3696 7ffaac59d423 3694->3696 3697 7ffaac59d49d 3694->3697 3695->3650 3696->3643 3696->3649 3697->3690 3713 7ffaac59d9e2-7ffaac59da0c 3698->3713 3714 7ffaac59d5ab-7ffaac59d5b9 3698->3714 3699->3698 3707 7ffaac59d56c-7ffaac59d585 3699->3707 3700->3689 3701->3669 3711 7ffaac59d4b2-7ffaac59d4c1 3701->3711 3702->3690 3706 7ffaac59d45a 3702->3706 3706->3688 3707->3698 3711->3692 3724 7ffaac59da7c-7ffaac59da84 3713->3724 3725 7ffaac59da0e-7ffaac59da19 3713->3725 3715 7ffaac59d5bf-7ffaac59d5ca 3714->3715 3716 7ffaac59d720-7ffaac59d72b 3714->3716 3717 7ffaac59d896 3715->3717 3718 7ffaac59d5d0-7ffaac59d602 3715->3718 3720 7ffaac59d89b-7ffaac59d8b1 call 7ffaac59c7c0 3716->3720 3721 7ffaac59d731-7ffaac59d740 3716->3721 3717->3720 3741 7ffaac59d608-7ffaac59d6a1 call 7ffaac59d1a0 * 2 call 7ffaac59c7c0 call 7ffaac59d0f0 call 7ffaac59d1f0 call 7ffaac59d320 call 7ffaac59d3d0 3718->3741 3742 7ffaac59d70d-7ffaac59d71a 3718->3742 3744 7ffaac59d91c-7ffaac59d9db call 7ffaac59c7c0 3720->3744 3721->3720 3737 7ffaac59d746-7ffaac59d891 call 7ffaac59c7c0 call 7ffaac59d0f0 call 7ffaac59c7c0 call 7ffaac59db4c 3721->3737 3726 7ffaac59da86-7ffaac59dae5 call 7ffaac59c7c0 3724->3726 3727 7ffaac59daec-7ffaac59daf4 3724->3727 3725->3717 3729 7ffaac59da1f-7ffaac59da4e 3725->3729 3726->3727 3731 7ffaac59daf6-7ffaac59db13 3727->3731 3732 7ffaac59db3a-7ffaac59db4b call 7ffaac59db84 3727->3732 3749 7ffaac59da6d-7ffaac59da7a 3729->3749 3750 7ffaac59da50-7ffaac59da62 3729->3750 3731->3732 3757 7ffaac59db15-7ffaac59db39 3731->3757 3737->3744 3801 7ffaac59d6a3-7ffaac59d6c0 call 7ffaac59d320 call 7ffaac59c7c0 call 7ffaac59cc70 3741->3801 3802 7ffaac59d6c5-7ffaac59d708 call 7ffaac59d3d0 3741->3802 3742->3715 3742->3716 3744->3713 3749->3724 3749->3725 3755 7ffaac59da64-7ffaac59da68 3750->3755 3755->3749 3757->3732 3801->3802 3802->3742
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: H
                                                • API String ID: 0-2852464175
                                                • Opcode ID: 6a6e80f55f65abd2d0c02bfb8b205b84ff5499f8871be564c6873e2c02947140
                                                • Instruction ID: 8ca966a6dcab8883da876527321305decd4c73d98d74138b0bd5d6f3c6dee77c
                                                • Opcode Fuzzy Hash: 6a6e80f55f65abd2d0c02bfb8b205b84ff5499f8871be564c6873e2c02947140
                                                • Instruction Fuzzy Hash: 7352B93151DA4A8FEB94EF18C455AA97BE1FF5A300F5041B9E44DCB296CE29EC46CBC0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3823 7ffaac58ffa7-7ffaac58ffac 3824 7ffaac590027-7ffaac590048 3823->3824 3825 7ffaac58ffae-7ffaac58ffb4 3823->3825 3835 7ffaac590052-7ffaac59005c 3824->3835 3836 7ffaac59004a-7ffaac59004b 3824->3836 3826 7ffaac58fff2-7ffaac58fff8 3825->3826 3827 7ffaac58ffb6-7ffaac58ffbc 3825->3827 3829 7ffaac58fffa 3826->3829 3830 7ffaac58fffb-7ffaac590004 3826->3830 3831 7ffaac58ffbe 3827->3831 3832 7ffaac58ffbf-7ffaac58ffcd 3827->3832 3829->3830 3831->3832 3837 7ffaac58ffd6-7ffaac58ffe2 3832->3837 3838 7ffaac58ffcf-7ffaac58ffd0 3832->3838 3839 7ffaac59006c-7ffaac590079 3835->3839 3840 7ffaac59005e-7ffaac59006a 3835->3840 3836->3835 3848 7ffaac58ffe4 3837->3848 3849 7ffaac58ffe5-7ffaac58ffef 3837->3849 3841 7ffaac58ffd2 3838->3841 3842 7ffaac58ffd3-7ffaac58ffd5 3838->3842 3843 7ffaac590080-7ffaac590087 3839->3843 3840->3839 3840->3843 3841->3842 3842->3837 3845 7ffaac590095 3843->3845 3846 7ffaac590089-7ffaac590093 3843->3846 3850 7ffaac59009a-7ffaac59009c 3845->3850 3846->3850 3848->3849 3849->3826 3851 7ffaac5900a7-7ffaac5900ad 3850->3851 3852 7ffaac59009e-7ffaac5900a5 3850->3852 3855 7ffaac5900af 3851->3855 3856 7ffaac5900b0-7ffaac5900b3 3851->3856 3854 7ffaac5900b4-7ffaac5900b9 3852->3854 3858 7ffaac5900f9-7ffaac590101 3854->3858 3859 7ffaac5900bb-7ffaac5900c4 3854->3859 3855->3856 3856->3854 3860 7ffaac590103-7ffaac59010d 3858->3860 3861 7ffaac59010f 3858->3861 3862 7ffaac5900d2 3859->3862 3863 7ffaac5900c6-7ffaac5900d0 3859->3863 3865 7ffaac590114-7ffaac590116 3860->3865 3861->3865 3864 7ffaac5900d7-7ffaac5900d9 3862->3864 3863->3864 3866 7ffaac5900e4-7ffaac5900ea 3864->3866 3867 7ffaac5900db-7ffaac5900e2 3864->3867 3868 7ffaac590118-7ffaac59011f 3865->3868 3869 7ffaac590121-7ffaac590127 3865->3869 3871 7ffaac5900ec 3866->3871 3872 7ffaac5900ed-7ffaac5900f0 3866->3872 3870 7ffaac5900f1-7ffaac5900f6 3867->3870 3873 7ffaac59012e-7ffaac59013e 3868->3873 3874 7ffaac590129 3869->3874 3875 7ffaac59012a-7ffaac59012d 3869->3875 3870->3858 3871->3872 3872->3870 3878 7ffaac59014c-7ffaac590150 3873->3878 3879 7ffaac590140-7ffaac590141 3873->3879 3874->3875 3875->3873 3882 7ffaac590151-7ffaac590153 3878->3882 3880 7ffaac590143-7ffaac59014a 3879->3880 3881 7ffaac59014b 3879->3881 3880->3882 3881->3878 3883 7ffaac590155-7ffaac59015c 3882->3883 3884 7ffaac59015e-7ffaac590164 3882->3884 3886 7ffaac59016b-7ffaac59017b 3883->3886 3887 7ffaac590166 3884->3887 3888 7ffaac590167-7ffaac59016a 3884->3888 3890 7ffaac590189 3886->3890 3891 7ffaac59017d-7ffaac590187 3886->3891 3887->3888 3888->3886 3892 7ffaac59018e-7ffaac590190 3890->3892 3891->3892 3893 7ffaac590192-7ffaac590199 3892->3893 3894 7ffaac59019b-7ffaac5901a1 3892->3894 3895 7ffaac5901a8-7ffaac5901ad 3893->3895 3896 7ffaac5901a3 3894->3896 3897 7ffaac5901a4-7ffaac5901a7 3894->3897 3899 7ffaac5901ec-7ffaac5901fd 3895->3899 3900 7ffaac5901af-7ffaac5901b8 3895->3900 3896->3897 3897->3895 3901 7ffaac5901ff-7ffaac590206 3899->3901 3902 7ffaac590250-7ffaac590254 3899->3902 3903 7ffaac5901c6 3900->3903 3904 7ffaac5901ba-7ffaac5901c4 3900->3904 3907 7ffaac590208-7ffaac59023e 3901->3907 3908 7ffaac59026b-7ffaac590281 3901->3908 3905 7ffaac590256 3902->3905 3906 7ffaac59025d-7ffaac59026a 3902->3906 3909 7ffaac5901cb-7ffaac5901cd 3903->3909 3904->3909 3905->3906 3938 7ffaac59024d 3907->3938 3939 7ffaac590240-7ffaac590249 3907->3939 3917 7ffaac590283 3908->3917 3918 7ffaac590285-7ffaac5902b0 3908->3918 3910 7ffaac5901d8-7ffaac5901de 3909->3910 3911 7ffaac5901cf-7ffaac5901d6 3909->3911 3913 7ffaac5901e0 3910->3913 3914 7ffaac5901e1-7ffaac5901e4 3910->3914 3912 7ffaac5901e5-7ffaac5901eb 3911->3912 3912->3899 3913->3914 3914->3912 3917->3918 3920 7ffaac5902c5 3917->3920 3925 7ffaac5902b2 3918->3925 3926 7ffaac5902b3-7ffaac5902ba 3918->3926 3923 7ffaac5902c7-7ffaac5902d4 3920->3923 3924 7ffaac5902de-7ffaac5902e4 3920->3924 3923->3924 3932 7ffaac5902d6-7ffaac5902dc 3923->3932 3928 7ffaac5902e6 3924->3928 3929 7ffaac5902e7-7ffaac5902fe call 7ffaac58dd28 3924->3929 3925->3926 3935 7ffaac590318-7ffaac59031c 3926->3935 3936 7ffaac5902bc-7ffaac5902c3 3926->3936 3928->3929 3943 7ffaac590304-7ffaac590316 3929->3943 3932->3924 3942 7ffaac590322-7ffaac59032b 3935->3942 3936->3920 3938->3902 3939->3901 3941 7ffaac59024b 3939->3941 3941->3902 3944 7ffaac590344-7ffaac590402 call 7ffaac590403 call 7ffaac59043d 3942->3944 3945 7ffaac59032d-7ffaac59033a 3942->3945 3943->3935 3945->3944 3948 7ffaac59033c-7ffaac590342 3945->3948 3948->3944
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: =&_H
                                                • API String ID: 0-1524714763
                                                • Opcode ID: b128b3cfac7282741b398ea1a69187027ae8cc367869454e971ef5bb1b578152
                                                • Instruction ID: 5121e881e73944ec7cd3621f607e8601535ea0941f3bc997097e71a1e63b001b
                                                • Opcode Fuzzy Hash: b128b3cfac7282741b398ea1a69187027ae8cc367869454e971ef5bb1b578152
                                                • Instruction Fuzzy Hash: 4202D521A0EA4B8FE794D768C451A75B7E5FF9A300F1489FAD04EC7196CE29EC4987C0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: H
                                                • API String ID: 0-2852464175
                                                • Opcode ID: c8051b9cefddcf1719a1e95b624c78963d0aa1b256cfddef2bc2bb92694d36a5
                                                • Instruction ID: 1585ad40c1dbf86b0868e01495d5fb53f25740e35a651b54ddcdb97f5f7971b6
                                                • Opcode Fuzzy Hash: c8051b9cefddcf1719a1e95b624c78963d0aa1b256cfddef2bc2bb92694d36a5
                                                • Instruction Fuzzy Hash: CCE12872A4EA8B8FE795EB2C88155757FD0EF66310F0441FAE04DCB292DD28DD0A8791
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 8h
                                                • API String ID: 0-2550175997
                                                • Opcode ID: bcce784e9ac52a4a2028cbd6a4be88198047103363c3b55a813490dff0128c5a
                                                • Instruction ID: 683e90fe317a7b50438db45914fe7a6525af96467569adc9abb979d8fca6709b
                                                • Opcode Fuzzy Hash: bcce784e9ac52a4a2028cbd6a4be88198047103363c3b55a813490dff0128c5a
                                                • Instruction Fuzzy Hash: 9DD1E321A0DA0A8FF798DB2C84417B877D5EF5A310F1481B9E44EC72D3DE28ED499391
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: D
                                                • API String ID: 0-2746444292
                                                • Opcode ID: 3c762d962fda8c56a4b93879ef4ea2a437999381474bd20e760f17ff08060d3b
                                                • Instruction ID: 9f9adca9541d707d46eb22b7592d64135aa545bb13946faa7738bf6add786687
                                                • Opcode Fuzzy Hash: 3c762d962fda8c56a4b93879ef4ea2a437999381474bd20e760f17ff08060d3b
                                                • Instruction Fuzzy Hash: 98D1DB71A1CA0A8FEB94EF28C445BB877E1FF59300F158179E04ED7296DE34E9468B81
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2591696809.00007FFAAC300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac300000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID: DeleteFile
                                                • String ID:
                                                • API String ID: 4033686569-0
                                                • Opcode ID: 7132a475266bd0f91d94a21c53960e522df2433e43de1bb4d4ad35bc939b3f00
                                                • Instruction ID: 1d5ac9c3d2df8e9a1e5c922dcf0feede62e867bab7579aac1db417ce801c25bb
                                                • Opcode Fuzzy Hash: 7132a475266bd0f91d94a21c53960e522df2433e43de1bb4d4ad35bc939b3f00
                                                • Instruction Fuzzy Hash: 8E412C7180DA4C9FDB59DB6C8459AF9BFE0EF56310F0481AFD04DC7292CA34A909C791
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: `&_H
                                                • API String ID: 0-1669765748
                                                • Opcode ID: d27ed418a7018652518ee7f8d9f1b0c40d543010d6af5f7047363aeaf8ef9a94
                                                • Instruction ID: fae97c879c9884b17faac8a017c88dd3e3db030414f5636b7ebe81d939d78919
                                                • Opcode Fuzzy Hash: d27ed418a7018652518ee7f8d9f1b0c40d543010d6af5f7047363aeaf8ef9a94
                                                • Instruction Fuzzy Hash: 78B10772B18F4A8FFB94D73C9055AB577D1EF89350B1045BEE44EC3296DE24E8468780
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2591696809.00007FFAAC300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac300000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID: DeleteFile
                                                • String ID:
                                                • API String ID: 4033686569-0
                                                • Opcode ID: e6a76669baaa9db441ace2a080917465b9af1b6d2dfceebedbf47c22aeaa4e14
                                                • Instruction ID: ba84d79aa6947c217992114353cd9cf10ff1b78a91412c83d2736cad99b4d7ac
                                                • Opcode Fuzzy Hash: e6a76669baaa9db441ace2a080917465b9af1b6d2dfceebedbf47c22aeaa4e14
                                                • Instruction Fuzzy Hash: A231F27180CA4C8FDB58DB58C449AE9BBE0EF65321F04826FD04AC3252CB34A805CB81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: d
                                                • API String ID: 0-2564639436
                                                • Opcode ID: 7a21998eafaf37dc559d428bddb2d493ed994a6f624f09f8905a9a8c6f8eeef9
                                                • Instruction ID: 4e740757f42ac0d57cbc3d2d0198b338fa48bec8d760a59f915b48ba87422683
                                                • Opcode Fuzzy Hash: 7a21998eafaf37dc559d428bddb2d493ed994a6f624f09f8905a9a8c6f8eeef9
                                                • Instruction Fuzzy Hash: 74A1CF30658B0A8FE75CDF08C48557573E1EB9A314B2485BDE44EC7296DA39E843CBD1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6
                                                • API String ID: 0-2984296541
                                                • Opcode ID: eacb1ded96f31cb8c25b6f58da8f9f9421c7bf3b09fbf6d466f69ebb15d61dc1
                                                • Instruction ID: 513cae5da72004f9889b330cdaf8f90290d30248c36a4d4cbc88bccdaa428a03
                                                • Opcode Fuzzy Hash: eacb1ded96f31cb8c25b6f58da8f9f9421c7bf3b09fbf6d466f69ebb15d61dc1
                                                • Instruction Fuzzy Hash: 5B613692A5EB8B8FF756573848116A57BD5EFA3210B0581FAE04EC7193DD0DA80A83D2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: "&_^
                                                • API String ID: 0-2790244243
                                                • Opcode ID: c93f25da60af419416bb8d90bbcdaf9a5ab5c5b9ee1d706bd303d8562b8ebf9f
                                                • Instruction ID: 6be15228f85d00f9526103944ab13ea4678f4ec3b2e4df0be34332f07793180a
                                                • Opcode Fuzzy Hash: c93f25da60af419416bb8d90bbcdaf9a5ab5c5b9ee1d706bd303d8562b8ebf9f
                                                • Instruction Fuzzy Hash: 66610876A0865B8FD711FF3CE8915EA37A0EF86325B0481B7E14DCB1A3CE289449C795
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: "&_^
                                                • API String ID: 0-2790244243
                                                • Opcode ID: ee996f8510945331e975f678f3533e857c907da74df99c5c1a124d2819ad7282
                                                • Instruction ID: 6f48a33be5d47362c20c03be75f6d428b949faa98c840daac0be05d7b9939fd0
                                                • Opcode Fuzzy Hash: ee996f8510945331e975f678f3533e857c907da74df99c5c1a124d2819ad7282
                                                • Instruction Fuzzy Hash: 4551A476A0865B8BD710FF6CE8915FA73A0EF85325B0481B6E14DCB1A3CE28E4498795
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: #'_^
                                                • API String ID: 0-523350721
                                                • Opcode ID: c63e41c9814eb2e1d457836df0e87a336a46cff36c27037d6239d0858ce9c74c
                                                • Instruction ID: d81f68be334c06e529be72927d69aea76c4bd4a3043b296562d590d84dd10b2c
                                                • Opcode Fuzzy Hash: c63e41c9814eb2e1d457836df0e87a336a46cff36c27037d6239d0858ce9c74c
                                                • Instruction Fuzzy Hash: 5E410B27E485274BD320BABDF4868F9B7A0DF85335708C177D28DCA163DA18644587D4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: K3
                                                • API String ID: 0-411264050
                                                • Opcode ID: 6e1c5d2cdf1fbf5d28fa393c67ffcbfc9b5451c2b3511534443bad7f8b9584e6
                                                • Instruction ID: 0f4e17b2bf1d0d121e3aeae3a8f7b1ee3d277920a8c603ef2616b47ed7f88239
                                                • Opcode Fuzzy Hash: 6e1c5d2cdf1fbf5d28fa393c67ffcbfc9b5451c2b3511534443bad7f8b9584e6
                                                • Instruction Fuzzy Hash: D0410967A0C5AA4FD711BB7CF4515EA37A0EF86330B0441B7E18DCB1A3CE28685983D5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: #'_^
                                                • API String ID: 0-523350721
                                                • Opcode ID: 7176c1cc962346605f724ee78e25032342e5511590fe16865a66da1ed0bc35cb
                                                • Instruction ID: 8e23d480a4eff34be43de0fc42a576f73ef9df121ff03d1472d8a4fc68569c3d
                                                • Opcode Fuzzy Hash: 7176c1cc962346605f724ee78e25032342e5511590fe16865a66da1ed0bc35cb
                                                • Instruction Fuzzy Hash: E1311E27E585274BD3207ABDF4868FAB790DF85335708C177D28DCE1A3DA18514987D4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: #'_^
                                                • API String ID: 0-523350721
                                                • Opcode ID: 58f107b3acbefbc6d20038908b6a84492286d826cb60ce912b5e0029218362f8
                                                • Instruction ID: e12447d4d0baf95c683e53414ac5bbc0c09b3f201a2fcc739a8e66b057b93d05
                                                • Opcode Fuzzy Hash: 58f107b3acbefbc6d20038908b6a84492286d826cb60ce912b5e0029218362f8
                                                • Instruction Fuzzy Hash: 7C313F27E5852B4BD3207ABDF4868FAB790DF85335B08C277C18DCE1A3DA18504987D4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: /
                                                • API String ID: 0-1686368129
                                                • Opcode ID: 2906d3d68770045bf85ee9ff4e0d4bc971bce1db24c695bcccfd06ccb6493f2b
                                                • Instruction ID: 6fc69bd6d24d6c83ad40dcef0fbf88f5a50d6c39b49839a0fee7470b1506be01
                                                • Opcode Fuzzy Hash: 2906d3d68770045bf85ee9ff4e0d4bc971bce1db24c695bcccfd06ccb6493f2b
                                                • Instruction Fuzzy Hash: 8D414070A4A94BCFEB95DB2CC855BA877A5EF56300F5440F9E00DD7292CE2DEC498781
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: H
                                                • API String ID: 0-2852464175
                                                • Opcode ID: 12967cc96b9a6bf5c5af549ca462edc26e32ec45cf74b1a5917b8352c2d2a0f7
                                                • Instruction ID: 821da5a5e460ea40a9854d37a1580ccc6690f960444a5f90a1f3a4aa1fc16d57
                                                • Opcode Fuzzy Hash: 12967cc96b9a6bf5c5af549ca462edc26e32ec45cf74b1a5917b8352c2d2a0f7
                                                • Instruction Fuzzy Hash: 9331062190EB8A8FE39A973888555707FE1DF5B314B0581FAD00ECB597DC69DC4AC391
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: K3
                                                • API String ID: 0-411264050
                                                • Opcode ID: f65189937837bc98eb2864211976782891e5d18fba70f97f9009ec869df72433
                                                • Instruction ID: dc4f3f93cd9c069389324b90f665b711f4ab210b8152efb1543616bec2a4be0f
                                                • Opcode Fuzzy Hash: f65189937837bc98eb2864211976782891e5d18fba70f97f9009ec869df72433
                                                • Instruction Fuzzy Hash: 43313937B0C56A4FD700AF6CF8515EA77A0EF86330B0441B7E54DC7153CA24985A87D5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Y&_H
                                                • API String ID: 0-4003802463
                                                • Opcode ID: 7d5c210feed6d8d8c242a8c6f9ce2efca2c8fbcb36736c017ebf745adbc64b68
                                                • Instruction ID: 7818611de8d273ae0ca794edf6c41cade1879ab415201e5325bfe4abc0a8d1c5
                                                • Opcode Fuzzy Hash: 7d5c210feed6d8d8c242a8c6f9ce2efca2c8fbcb36736c017ebf745adbc64b68
                                                • Instruction Fuzzy Hash: 0F3140B2E1DA4B8FF745E77884055BD7BE5EF95301F4444BAE04EC71D2DE24A9098380
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: r6
                                                • API String ID: 0-2984296541
                                                • Opcode ID: 9046d9e701117e58412ab71d58c4a6d57af9a9598421d20684297dd6e0fbe0c0
                                                • Instruction ID: b8555d83c8a6d296a798874dcd894a76a1642771ad7073b3bfa17178b3afe6ac
                                                • Opcode Fuzzy Hash: 9046d9e701117e58412ab71d58c4a6d57af9a9598421d20684297dd6e0fbe0c0
                                                • Instruction Fuzzy Hash: E7214971B0D70A4BE7189B2CD4495B4BBD6EBD5221B1582BFE04EC7293DC299C4383C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 501ea2337331e28c47d58ad85ac2da05a9296ada0aa5c2f022ae8d57adbe1d6e
                                                • Instruction ID: 398321e93c17aff4b82df7d7e6c6d32aa4ced6e627ec2d1c05bed9a68cf02e30
                                                • Opcode Fuzzy Hash: 501ea2337331e28c47d58ad85ac2da05a9296ada0aa5c2f022ae8d57adbe1d6e
                                                • Instruction Fuzzy Hash: D572DA3191DA4A8FEB94DF18C445AA57BE1FF5A300F5041B9E44DCB292DE29EC4ACBC1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 89572e69181597ca741e7e1971d8d02b18f57634859de66710f6484e083d2bfa
                                                • Instruction ID: 02e1a007e37ea9bf0793dee96b69061093c134d040663ba8fb0afae8acb5e3b6
                                                • Opcode Fuzzy Hash: 89572e69181597ca741e7e1971d8d02b18f57634859de66710f6484e083d2bfa
                                                • Instruction Fuzzy Hash: F772B87191D64B8FEB94DF18C451AA97BE1FF5A300F5040B9E44DCB292DA29EC4ACBC1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1620182fae61625aa167f2e31b85287b6e243ed65ce7c05fb3f210b5e6cce513
                                                • Instruction ID: 71a261c4f56a062f3ae04e11f38e1b20ac556be2abfb0ad463a9fb80355c160c
                                                • Opcode Fuzzy Hash: 1620182fae61625aa167f2e31b85287b6e243ed65ce7c05fb3f210b5e6cce513
                                                • Instruction Fuzzy Hash: 35324231A1994A8FEB94EF18C455AA97BE1FF69300F5041B9E40DC7296CE39EC56CBC0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f5e8a01024665483067f0eaf72ece0546d3015f26c0fe07b6eec8b7d953c0d65
                                                • Instruction ID: 3d2a58396e41834d644ed2a70e41517f6fcc87ca50cb4b5ee8594860859d6efc
                                                • Opcode Fuzzy Hash: f5e8a01024665483067f0eaf72ece0546d3015f26c0fe07b6eec8b7d953c0d65
                                                • Instruction Fuzzy Hash: 21327B30A1DA5ACFEB98EB28885576977E1FF59700F1481B9E00DC7296DE38EC45CB81
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 91acf76178a918ba9ed3a14783c017015e8bb6a3907cfdb7a9ad042aa4a78820
                                                • Instruction ID: f1990d229f5b994d31fe756984f8201eaedcd9378dad77ad8ae815bd11b65cca
                                                • Opcode Fuzzy Hash: 91acf76178a918ba9ed3a14783c017015e8bb6a3907cfdb7a9ad042aa4a78820
                                                • Instruction Fuzzy Hash: 7C22F27184E687CFF375872448165A43FE4EF57310B0881FAE49DCB5A2EA5EA80E87D1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2c3994f14fb6ce5fa883bbc9c637d8244f4cdeef4b6e0607b727b9e6518884b8
                                                • Instruction ID: 3db7558603669c2e1c01196534159ec889948d22c45614bbb7d6706124439106
                                                • Opcode Fuzzy Hash: 2c3994f14fb6ce5fa883bbc9c637d8244f4cdeef4b6e0607b727b9e6518884b8
                                                • Instruction Fuzzy Hash: 6BF1E831A1990A8FFBA8DB6CC855A7437D1FF5A301B1441F9E44EC72A2DE2DEC498781
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f235a6a231cd442334746a95f25645f903af300d3c4afbc74eabea48c1495d7a
                                                • Instruction ID: c7a4f41712be37a0d10548e5c12d8708561fbf90e2142574c93dada1d5b57188
                                                • Opcode Fuzzy Hash: f235a6a231cd442334746a95f25645f903af300d3c4afbc74eabea48c1495d7a
                                                • Instruction Fuzzy Hash: 14F11931A09A4F8FEB95DB68C455ABD77E1FF96300F0440BAE40DD7292DE29EC068791
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 71f336742e921b1dcbd33679bdb60b04bc1034a8adbd17fa6c008627e16ee192
                                                • Instruction ID: 1bf5c0be4a173f72513140aa37c6dffada33bdaacbfda909403328ef01679173
                                                • Opcode Fuzzy Hash: 71f336742e921b1dcbd33679bdb60b04bc1034a8adbd17fa6c008627e16ee192
                                                • Instruction Fuzzy Hash: 10E12B71A6EA468FF795D72884596747BD1EFDA710B0440B9E04EC7293DD18EC4A83C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: db2339e437b7bab2d9311c6b37abfed0fd763534b0f5e724fe57be55ab3e59d7
                                                • Instruction ID: 7b27903d27f0357ca6bc63702fddab4dc1abc51aae3cb6a0d0bdaefbaef6dcfd
                                                • Opcode Fuzzy Hash: db2339e437b7bab2d9311c6b37abfed0fd763534b0f5e724fe57be55ab3e59d7
                                                • Instruction Fuzzy Hash: 0BC1C671B1CA0E8FEB58EB6C9455AB9B7D1EF59700F1481B9E00EC3292CE24EC468785
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 82782bd692ef2f0734f390c8e4cefc42b6c22d571236353c8112845235a1ad26
                                                • Instruction ID: 9d08dcf812185bc789bc7f4e2c664b72509c360fcaad9edf2222c6c88ef912cd
                                                • Opcode Fuzzy Hash: 82782bd692ef2f0734f390c8e4cefc42b6c22d571236353c8112845235a1ad26
                                                • Instruction Fuzzy Hash: 96B15931A1DA4A8FF794E72CC45967577D1FF9A714F1484B9E04EC72A2CE29EC4A8380
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e7607f5607cdb1bb11b425b9882d600a8fd47a60b91405f75c378df9f21debed
                                                • Instruction ID: cfdc6cbdd3abe8e6aa4155e0c368da37da24fa19f0844b2aa50a0593f9e9b9d6
                                                • Opcode Fuzzy Hash: e7607f5607cdb1bb11b425b9882d600a8fd47a60b91405f75c378df9f21debed
                                                • Instruction Fuzzy Hash: 16B19631A0DA4A8FEB98EB2CD4516BD77D1EF8A314F14817DE44ED7282DE34E8068791
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a77d8d7a8f2f7501ef71830a72c67bd37f106b414f5845b13ad7ddaa59f1c672
                                                • Instruction ID: 3f761df78bd4c64eb813ef113e4fe75ab60ea7a508007919037aa91723385b95
                                                • Opcode Fuzzy Hash: a77d8d7a8f2f7501ef71830a72c67bd37f106b414f5845b13ad7ddaa59f1c672
                                                • Instruction Fuzzy Hash: 1DB1C77050CA4E8FEB69DF28C8557E93BD1EF55350F04826EE84EC7292CA39D945CB82
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d9d16645ae3e52edc94ddf2385940409f34cf507c5880baccba00b6c0ba0ff52
                                                • Instruction ID: 72c68776e26621bdb3899346b4664267292c18997ecfb35754bddc245d2b855b
                                                • Opcode Fuzzy Hash: d9d16645ae3e52edc94ddf2385940409f34cf507c5880baccba00b6c0ba0ff52
                                                • Instruction Fuzzy Hash: A2910762B1DE4A8FF7A5E72C841567577D5EF9A340F0480B9E00EC7297DE28ED069381
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7a391999c42efe812f18ee12294673430cf5edf67646b79c022b52ceac4612e0
                                                • Instruction ID: d329b2b43299e251a3787f25b5d7991e05f44b6ea1ceedb671d9ce4283e5c4e2
                                                • Opcode Fuzzy Hash: 7a391999c42efe812f18ee12294673430cf5edf67646b79c022b52ceac4612e0
                                                • Instruction Fuzzy Hash: 0291B571B19E1A8FFB48E76894596BD77E1EF9A710F504079E00EC7292CE29EC4687C0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ef974151c35db74cdd013bf004b9c35bd85e8773fcb561ad798a6feca074ee78
                                                • Instruction ID: 2b3e374b9c5d8a2609e8e5553161ee33958bf19e59f9266f6997d0e34afd871f
                                                • Opcode Fuzzy Hash: ef974151c35db74cdd013bf004b9c35bd85e8773fcb561ad798a6feca074ee78
                                                • Instruction Fuzzy Hash: 68A13931A4EB4A8FE7A5DB2CC4159B5B7E4EF56320F0441BAD04EC7293CE28E949C381
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 11778ff9b8ab77f12102b67cb9417a2926d2e8dbb8036c473e0a4f567122d9da
                                                • Instruction ID: 95684ec54cdd6ad973f41744d220ea349f7dcde157925f0b10973425802d05e5
                                                • Opcode Fuzzy Hash: 11778ff9b8ab77f12102b67cb9417a2926d2e8dbb8036c473e0a4f567122d9da
                                                • Instruction Fuzzy Hash: E1A1B321A09A0A8FFB98DB1C84457B977D5FF9A300F5480B9E48EC72D3CD28ED499790
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ebda3c4883cf724173b96ef3efc19139e27d958a2df4f8cf5c5dcf7307def5c4
                                                • Instruction ID: b48e3c6ff8649658d203f9fb19c0cc029c05414ff1cf27dc35a0457e5f673b9e
                                                • Opcode Fuzzy Hash: ebda3c4883cf724173b96ef3efc19139e27d958a2df4f8cf5c5dcf7307def5c4
                                                • Instruction Fuzzy Hash: 4BA1B421A09A0A8FFB98DB1C84557B977D5EF5A300F5481BDE44EC72D3CE28ED499780
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 46eacf5829fe16fac44c2da69969f972c8178e3a1204525e2f9795ac796d21e3
                                                • Instruction ID: 867a3f802c87fac3c61d970fa6b2f817811e6d802331f8214f19060b04abc4be
                                                • Opcode Fuzzy Hash: 46eacf5829fe16fac44c2da69969f972c8178e3a1204525e2f9795ac796d21e3
                                                • Instruction Fuzzy Hash: 0AA1A220A09A0A8FFB98DB1C84557B977D5EF9A300F1480BDE44EC72D3CE28ED499780
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f6c30fe693a2a8eec631b565f5c1a8e42f0935e223e63e6a160bab0241ddff4a
                                                • Instruction ID: a5e012507c10cd7ba648be4d989877cb7839a037d0a0e511c085df569578a437
                                                • Opcode Fuzzy Hash: f6c30fe693a2a8eec631b565f5c1a8e42f0935e223e63e6a160bab0241ddff4a
                                                • Instruction Fuzzy Hash: 2AA1A221A09A0A8FFB98DB1C84457B9B3D5EF99300F5481B9E44EC72D3CE28ED499790
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 127123130ba20e569b181fd79e9db86a41d28dd71637ba19c8c9c01c2b6b5aea
                                                • Instruction ID: f5aaede9fa072a84cad7c9618530d791c96750250bfb06ab593cad0f5fd92855
                                                • Opcode Fuzzy Hash: 127123130ba20e569b181fd79e9db86a41d28dd71637ba19c8c9c01c2b6b5aea
                                                • Instruction Fuzzy Hash: 7BA1A221A09A0A8FFB98DB1C84557B977D5EF99300F5481BDE48EC72D3CD28ED499780
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1df045d97f69edd001aef651b512a23466f4775b60e3ee0a28f3eeb179aa88d0
                                                • Instruction ID: 89c6321159916293b7cb6cea9ba6940ad8646aa2cf19d4665de020db711b5f46
                                                • Opcode Fuzzy Hash: 1df045d97f69edd001aef651b512a23466f4775b60e3ee0a28f3eeb179aa88d0
                                                • Instruction Fuzzy Hash: 94A19220A09A0A8FFB98DB1C8455BB977D6EF59300F1481BDE44EC72D3CE28ED499780
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 156bf091a9c4eea9e76e8484f69a7e87cd44023eb0be2dfb615bc45b3b1cacf4
                                                • Instruction ID: 250c6b9f3af7a96dab5dfc1ab3f1d028d6c2976344fcf86fd6787e8927ccf935
                                                • Opcode Fuzzy Hash: 156bf091a9c4eea9e76e8484f69a7e87cd44023eb0be2dfb615bc45b3b1cacf4
                                                • Instruction Fuzzy Hash: 79A19320A09A0A8FFB98DB1C84557B977D5FF99300F5481B9E44EC72D3CD28ED499790
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 230bf7615c98f3df2b99ef66fe25f9fe476640443f5b80003e60c83853bd5657
                                                • Instruction ID: f5420501fe117ee4a4693b7efbc46d747a71063fb7b7e25d14bf6188f13bc47b
                                                • Opcode Fuzzy Hash: 230bf7615c98f3df2b99ef66fe25f9fe476640443f5b80003e60c83853bd5657
                                                • Instruction Fuzzy Hash: 50B12D31A5990ECFEF84EF58C895EA97BA1FF69344B444168E40ED7296CA24EC45CBC0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 13a64994b9c179670ce19d2c890a508db747c60e68bbc294b89dec6cdec607ca
                                                • Instruction ID: d3e59ec103bbd208f70463bef1cb2fb5ee4deb3367c1638987a057034eb9bd6a
                                                • Opcode Fuzzy Hash: 13a64994b9c179670ce19d2c890a508db747c60e68bbc294b89dec6cdec607ca
                                                • Instruction Fuzzy Hash: CD81F561B1DA468FFB98D76C88556782BD6EF96740B0481FAE04EC7293DD1DEC0A83C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d5d621fec8bbd80dec25e3f5fcd643760616bbaef194809b16257c3345600bfa
                                                • Instruction ID: 47b29584f7c5ebb657ff92611f32acf800f603f5f719f34c9fbf0d69318c5e55
                                                • Opcode Fuzzy Hash: d5d621fec8bbd80dec25e3f5fcd643760616bbaef194809b16257c3345600bfa
                                                • Instruction Fuzzy Hash: 0281A430B5DA1A8FEB98EB2DD455A7877E1FF5A704B0441B9E04EC7296CE28EC0587C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2443e4a9e91582693d3a830c42baf032eee871188a3c89a93b2357e4122c7a03
                                                • Instruction ID: 0c23826b122856aedad8a468d247c86d822b365d26c3781784965f1d39865eb7
                                                • Opcode Fuzzy Hash: 2443e4a9e91582693d3a830c42baf032eee871188a3c89a93b2357e4122c7a03
                                                • Instruction Fuzzy Hash: E481D63194EA4A8FFB98D7298C16AB477A5EF57710F0481FAE04DC7292CD24ED4987C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ffa242f966713ebe29a1ca97eb52bbeb8d14941be78796e5068f41af086ac9a6
                                                • Instruction ID: a22765a4645f79fd68762b33510bbd4a17fc226695a3ce30a094dd41a38269cc
                                                • Opcode Fuzzy Hash: ffa242f966713ebe29a1ca97eb52bbeb8d14941be78796e5068f41af086ac9a6
                                                • Instruction Fuzzy Hash: D791463161994ACFEB94EF2CC455AA57BE2FF69340F5040A9E40DC7296CE39EC56CB80
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 58528c5db65d8c585ed1213ad5313aabfc2766e1e8fe029d032022759dca6ee1
                                                • Instruction ID: 04540232d37714db663dbf48b19fe86e41904e8bd1f789afc6f9cbac7f3b198e
                                                • Opcode Fuzzy Hash: 58528c5db65d8c585ed1213ad5313aabfc2766e1e8fe029d032022759dca6ee1
                                                • Instruction Fuzzy Hash: CF71053171DA468FE799E76C9419A647BE1EF5A700F0440FAE04DC72A3CE28EC46C785
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dad7c7dfb36aab81fac8427ac5734aa393f4826e5cc400eb95ac4025bc0ec733
                                                • Instruction ID: 60c3d193e4e2407554f4a7617b21fc2ef216b693639f9cdb37059833fc69cf46
                                                • Opcode Fuzzy Hash: dad7c7dfb36aab81fac8427ac5734aa393f4826e5cc400eb95ac4025bc0ec733
                                                • Instruction Fuzzy Hash: 4C71F4628AF6879FF7659724481A1A57FD4EF97600F0484FAD48ECB193D91CA80E83D2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6748a3bed249d3e559ffd72729aab90434c7b0eea87f5a8b9fdb5726a54e7420
                                                • Instruction ID: 9b81e01f8033c27fe49f683eecfdd8895432837bf1d26fd27c9ec0409778a741
                                                • Opcode Fuzzy Hash: 6748a3bed249d3e559ffd72729aab90434c7b0eea87f5a8b9fdb5726a54e7420
                                                • Instruction Fuzzy Hash: CD71BF20A5DA07CBF798D758C450A75A2E6FFD9300F54CAB6E00EC2196DE3DE88997C0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 49f98cdb98301303abd30776a90d07ee401ea2060f315d174ec8278ff394f56c
                                                • Instruction ID: 8cb3d3bd33fbe581a94d728504d3a5409b05c5313802bf4f9ea5575710652894
                                                • Opcode Fuzzy Hash: 49f98cdb98301303abd30776a90d07ee401ea2060f315d174ec8278ff394f56c
                                                • Instruction Fuzzy Hash: 1151426190FA8A8FFB5AA73C88015717BD0DF47314F1445BEE48EC71D3DA18E90A8382
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a9aad3c5a8572de2a4f7ea1a97b02caef719bd142323b5e231d6e17bcf5e5098
                                                • Instruction ID: 524e23269e9ecce32bc9478cd79d8ea39b237f8c8fd9da3579fbd3b5da1a28f4
                                                • Opcode Fuzzy Hash: a9aad3c5a8572de2a4f7ea1a97b02caef719bd142323b5e231d6e17bcf5e5098
                                                • Instruction Fuzzy Hash: 7751CC7190E64A8FE799E77888556B87BE1EF1B300F0441FAD04DDB2A2DA2DDC44C781
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9fd6cc8bed276477479f04543212895a052e06a3fc88c7f8f7b12f6fe7897b09
                                                • Instruction ID: 9d4182bad04d387bff78e91345585620b29c6a29aa4cae40fe495e3a79d277fb
                                                • Opcode Fuzzy Hash: 9fd6cc8bed276477479f04543212895a052e06a3fc88c7f8f7b12f6fe7897b09
                                                • Instruction Fuzzy Hash: AA51AF71A1994A8FEB98EF2CC454AB977E2FF59310F0445B9E04EC7296CE24EC45CB80
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 37af80595b237007b704e165d4281de1d4e24a0ff2efec9741206eb2b3c81933
                                                • Instruction ID: 091698e76b7071ef5983036fc8ed04e9b2dc20197e766482259ad360b08aca62
                                                • Opcode Fuzzy Hash: 37af80595b237007b704e165d4281de1d4e24a0ff2efec9741206eb2b3c81933
                                                • Instruction Fuzzy Hash: 6351113160E98B8FFB94EB2CA465AB57BD0EF5B314B4440FAE44DC7292DE19EC458780
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 68b472c7003978edae1e065e66a9af44d249215d6a6cfad1a46dfe0f5ebf6ed5
                                                • Instruction ID: 9530b3c5d4b0809f7d9275eb2821e39cfa497f7d160b308e31e600219f9742ba
                                                • Opcode Fuzzy Hash: 68b472c7003978edae1e065e66a9af44d249215d6a6cfad1a46dfe0f5ebf6ed5
                                                • Instruction Fuzzy Hash: E0514F71918A1D8FDBA8DF58D845BE9B7F1FB58310F1082AAD40DE3251DE34A9858FC1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9621f256daa89dc0b35bde4a407eb49c53e037a6c7fc5e70a6b5467475af9f49
                                                • Instruction ID: 55d825cb1e70f89aa7ef58f05657b8a1ca83a56b5b1d4d771ec6a3d5e261ba82
                                                • Opcode Fuzzy Hash: 9621f256daa89dc0b35bde4a407eb49c53e037a6c7fc5e70a6b5467475af9f49
                                                • Instruction Fuzzy Hash: AC5126A191DACB8FEB85EB7884569F57BF0EF56310B0441F6E00EC71A7DD28E8068384
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 058ea0ee3569e5780bc6a84a6997bf119a1d821935c5a946882385df514220b6
                                                • Instruction ID: eeb77bbb4a22743967b18cf821c6d2ac9d140f71e14ff06457de302cfe011f68
                                                • Opcode Fuzzy Hash: 058ea0ee3569e5780bc6a84a6997bf119a1d821935c5a946882385df514220b6
                                                • Instruction Fuzzy Hash: DE51A671E0A64E8FE788DB7888156B9B7E1EF16304F4445FAE00DD72A2DE2D9844C781
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2360d42216ea6889bde64d5e3a899dc0aeb15f1f0b660b1ec4d7ab71b4f9e30d
                                                • Instruction ID: 696340f90f90833e3b269465df12e4862791223d804ebe63246637b50dc39737
                                                • Opcode Fuzzy Hash: 2360d42216ea6889bde64d5e3a899dc0aeb15f1f0b660b1ec4d7ab71b4f9e30d
                                                • Instruction Fuzzy Hash: 6B515D71918A1D8FDB98DF58D845BE9B7E1FB58310F1082AAE00DE3255DF34A9848FC1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 06f0b49ede1f3a2cdb82640c96f4eeac3c54f5f7d4647d50a59bc137577d98d9
                                                • Instruction ID: 2d023b1c50cb173fec28125ff80c295dc5668f68c296d8ec04da660455d4f66e
                                                • Opcode Fuzzy Hash: 06f0b49ede1f3a2cdb82640c96f4eeac3c54f5f7d4647d50a59bc137577d98d9
                                                • Instruction Fuzzy Hash: 26413862B4DE4B8FF798D26C98455B57BC5EF9A260B1541BAF04EC3297DD14EC0683C0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7eed29d0bc8ab08b03ab12b3326fbc75bc83f3bba9f54a2d1477bd309f853b52
                                                • Instruction ID: 6ed5d94abc4580fb7021acfee6d2aa9ca301427fdf6f0c665f4168719533296d
                                                • Opcode Fuzzy Hash: 7eed29d0bc8ab08b03ab12b3326fbc75bc83f3bba9f54a2d1477bd309f853b52
                                                • Instruction Fuzzy Hash: E1413673A1DB868FE3AACB2C94555B47FE0EF57210B0482BAE04EC7593DE14E94983D1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6e4bb5137b570c8c44884116ce19be8d1b57db1d92e5198faee2b6b5714f24ef
                                                • Instruction ID: 5fe485b1cf895b2468e1f231029d6c6d3260bc90bc78a04038ee820dfb5c8c15
                                                • Opcode Fuzzy Hash: 6e4bb5137b570c8c44884116ce19be8d1b57db1d92e5198faee2b6b5714f24ef
                                                • Instruction Fuzzy Hash: 1A518130A09A4B8FEB99DB28C451BB977E5FF06305F4444B9E40ECB1D2CE29E959CB41
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2591300820.00007FFAAC1ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC1ED000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac1ed000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 713b8acc94ca80c8c63222fcae493b01b2222e560f4156e67a8ada49db2c456c
                                                • Instruction ID: 7756e4b261f18ea2c7b428bdbb4d96b5f8d503f230defe1cef9b53dea7aaa7d0
                                                • Opcode Fuzzy Hash: 713b8acc94ca80c8c63222fcae493b01b2222e560f4156e67a8ada49db2c456c
                                                • Instruction Fuzzy Hash: 6F41057140EBC48FE7579B2898469623FF0EF57320B1945DFD08CCB1A3D624A849C792
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b73ff14a7ad97f45661e739684a541377e423a36ca41499b9f42b801e2454e40
                                                • Instruction ID: bda10e09586661110a013d7e088f60174dfbbb8ef4d1f283d3c6a3542230d2ae
                                                • Opcode Fuzzy Hash: b73ff14a7ad97f45661e739684a541377e423a36ca41499b9f42b801e2454e40
                                                • Instruction Fuzzy Hash: 1D41F23150D789CFEB688B1C88566B57BE5EF56350F14406EF4CEC3292CA38E945C781
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6fd1e1d6122b6484867437b086da6667cfb7efa8d8d62ab3bbe283ef970586a4
                                                • Instruction ID: d74abb3d17b2143f8b7a0b5e3caa7f3895cd3d61ef1c4f94a8568fe860dbc9b8
                                                • Opcode Fuzzy Hash: 6fd1e1d6122b6484867437b086da6667cfb7efa8d8d62ab3bbe283ef970586a4
                                                • Instruction Fuzzy Hash: 6541B971E0AA4FCFE795EB6884556B97BE1EF16300F4444FAE00DD72A2DA2DD848C781
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 538d013b729365d3125afcad09bf4f388fd6d47650c2f48474c5c0deedb67fe2
                                                • Instruction ID: 99460bba3f9234a1dbaa3c03a01f95118507e4440fcaf4ce451b29da1d00919c
                                                • Opcode Fuzzy Hash: 538d013b729365d3125afcad09bf4f388fd6d47650c2f48474c5c0deedb67fe2
                                                • Instruction Fuzzy Hash: A1311A62B4DA4A8FE754E72C98499757BD1EF9A350B0541FAF04EC7197DD14EC068380
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6196423c878bb1d93f89c5dee509556fe8f3c53c458d787405c0a1b8386bcd51
                                                • Instruction ID: fdd91b34528272c04cbe7e5e250b6ed07636ff70224e49aacd3618d5345a7782
                                                • Opcode Fuzzy Hash: 6196423c878bb1d93f89c5dee509556fe8f3c53c458d787405c0a1b8386bcd51
                                                • Instruction Fuzzy Hash: B131D631B1DA068FFA98D76D98556B827CAEF86745F0541F9F08EC32D3DD2DAC0A4281
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f8634e9a85dff4d3f8c9df26acb9f271fbd87741d5600e19f40cb124e52ec91c
                                                • Instruction ID: cd25f196ceb065bb0a4e4b51cec9a7a678136195cc1a454857ed8d93fb312bdb
                                                • Opcode Fuzzy Hash: f8634e9a85dff4d3f8c9df26acb9f271fbd87741d5600e19f40cb124e52ec91c
                                                • Instruction Fuzzy Hash: 4D41FF30A4991ECFEF98EB18C855B6877A1EF5A700F5481E9E00DD7292CE35ED49CB81
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b6a0a75cf09901c756e1512b872795aa77fd7658637b2accb03321c239ff24f8
                                                • Instruction ID: fe7385ef9f416df1966da00665f910c5be56ddeb9cf3042795469b5169e81c2a
                                                • Opcode Fuzzy Hash: b6a0a75cf09901c756e1512b872795aa77fd7658637b2accb03321c239ff24f8
                                                • Instruction Fuzzy Hash: FD31D471A0E90A8FFB88EB2CD405A7577D5EF96354F4181B9E44DC3292ED28ED0647C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 50af9b7f2455dcb3a2db0712ef8c8a9f1ee390a4cdb7113662bd9daa666f5a67
                                                • Instruction ID: 6e2f124f114a42fd7021cf02d5d7ccdefbda0fe50041e07a3dffbaea9d6f4226
                                                • Opcode Fuzzy Hash: 50af9b7f2455dcb3a2db0712ef8c8a9f1ee390a4cdb7113662bd9daa666f5a67
                                                • Instruction Fuzzy Hash: 41312B3170CA4A9FE784DB2CD444AA57BD1FF9A310B0441BEF04EC72A2CE39D8428781
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6d73a02936179568d011832559366a255e04294fd8459daf8d3653e66dbbb502
                                                • Instruction ID: c4a79c5c3515eca4a8942de1692930db22a6e69d23698b3a7f621bcdbfc96ca6
                                                • Opcode Fuzzy Hash: 6d73a02936179568d011832559366a255e04294fd8459daf8d3653e66dbbb502
                                                • Instruction Fuzzy Hash: D631447155EB998FE76556289C1A6B23BA8DB47720F0400EBE04DC3292ED24AC4AC3D2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8b7630aea2c7aed8c60303c0adc4c9e515e997a207f564b933f7cf0e5e889bbd
                                                • Instruction ID: 6b9efa469ff089bc0efae3c09a2aa97dfb5f616d4afb91f6e2568cb163539ac1
                                                • Opcode Fuzzy Hash: 8b7630aea2c7aed8c60303c0adc4c9e515e997a207f564b933f7cf0e5e889bbd
                                                • Instruction Fuzzy Hash: 93316B7190DB8A8FE755DB389454A717BE0EF56200B0845FAE44ECB2E3DD1DE849C780
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1598979f56e89b59e7ef956d3b6959f698b4f624b2b6728e4777fbd8ab5e36b6
                                                • Instruction ID: 784fc1785d79bb0c9177e93c72582895e93daafade69ed8cc758165daa4dd66a
                                                • Opcode Fuzzy Hash: 1598979f56e89b59e7ef956d3b6959f698b4f624b2b6728e4777fbd8ab5e36b6
                                                • Instruction Fuzzy Hash: 1731B532A0C6164BDB58EA6CE0556FA73D1EF88325F14853FE14ED22A2DE2594458788
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0e544ecd5e8296eea9ba075517e3ee54aade6b1447abf9e0dfff47c2aee3d8ea
                                                • Instruction ID: 80777f5299ad25a7d88906bcde67545ede614ab43d727fc85346a359944d7c9d
                                                • Opcode Fuzzy Hash: 0e544ecd5e8296eea9ba075517e3ee54aade6b1447abf9e0dfff47c2aee3d8ea
                                                • Instruction Fuzzy Hash: 5C312965B1AE478FFBA6E33C45517756AC2DF9A610758A079D40EC32DAED18EC0943C0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fdef7267b2340b512ffc575268d0f845a99d8d22b5aa24082ebbdb1ef9408ece
                                                • Instruction ID: 970217a4b76d882066c4eaf4a2e535dffe930b98a0db0361a8a53f57c10245d1
                                                • Opcode Fuzzy Hash: fdef7267b2340b512ffc575268d0f845a99d8d22b5aa24082ebbdb1ef9408ece
                                                • Instruction Fuzzy Hash: 6D215A62B1AE4A8FFADAE32C415573966C2DFCA610755A17AD40EC32DAFC18DC4603C5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 782aa84c99b5bc97f11a37f0a9bee2fb4fda919874d096712ca7831d35becd86
                                                • Instruction ID: 6b7796bfe6fe455599f0a75d90c6053b6c4ceaf7e6480733b2700a2df4eba98c
                                                • Opcode Fuzzy Hash: 782aa84c99b5bc97f11a37f0a9bee2fb4fda919874d096712ca7831d35becd86
                                                • Instruction Fuzzy Hash: 2621D931A1EB599FEB69A72C5C164A8BBA1EF9721074441BFE04DC3193CD1D980983D1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 61e36132cda3f71dcbf186652318a1ea36b85352c1ab0492616705ed2e46ddef
                                                • Instruction ID: 3f8d8d68b4ad6ae211e81a931d887d8b9b9c26ea985aafba79b531630b1e760f
                                                • Opcode Fuzzy Hash: 61e36132cda3f71dcbf186652318a1ea36b85352c1ab0492616705ed2e46ddef
                                                • Instruction Fuzzy Hash: 5231F82161DF4A8FF781EB2C9454575BBD1FF99214F0442BBE84CC32A2DE68DD858382
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 69d7bb298b759d6ed5d22d7e960f597958ac28acf28522facc0952b1c5ca7d81
                                                • Instruction ID: f8b07eac7318de88ed9ee611ee8edb090354a59710807abe15addd878b5b23bb
                                                • Opcode Fuzzy Hash: 69d7bb298b759d6ed5d22d7e960f597958ac28acf28522facc0952b1c5ca7d81
                                                • Instruction Fuzzy Hash: 2E213761B1EE4B8BFAE7E32C465077566C2DFDA200B58A17AD40EC3396ED18DC0543C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6582cb08324448268a4d06043dd5c6389d592a6585e875102e40553134f1455d
                                                • Instruction ID: 21fceaac10ff9c19552c060ecd8bb7deea0a9989833077629f96d52d7ab0250b
                                                • Opcode Fuzzy Hash: 6582cb08324448268a4d06043dd5c6389d592a6585e875102e40553134f1455d
                                                • Instruction Fuzzy Hash: D2213721B1EE4B8FFFD6E32C4115739A6D2DF9A200B58A07AD40EC3396EC18DC454381
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dfab22676ff351639f9734d3b0697ddf7ca0bd72f95406c149ddbc088090f479
                                                • Instruction ID: 94ca6c1bfc0348ec4a85833ee92c68e041b9e510a9d9f205242e7747c31b4bb4
                                                • Opcode Fuzzy Hash: dfab22676ff351639f9734d3b0697ddf7ca0bd72f95406c149ddbc088090f479
                                                • Instruction Fuzzy Hash: F821F732A0D7494FD799DF6C94156BA7BE0EF9A321F0445BFE04EC32A2CE2598448745
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9b023d214d0916ee2e9d629e9d27988c5861714cde327c7ad347aa0a5b4ed390
                                                • Instruction ID: 40ba989e51a632656474a00711c1680077e4be30ed980fdfa701ae114a38967e
                                                • Opcode Fuzzy Hash: 9b023d214d0916ee2e9d629e9d27988c5861714cde327c7ad347aa0a5b4ed390
                                                • Instruction Fuzzy Hash: 61318034519A4E8FEB84EF28C454BAA77E1FF55300F0084A9E41EC7292CB39E8158B80
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 130f15f6cbc0a773da199ca3ccc327006f3d87863a2b65e1ee6b5174b3eec23d
                                                • Instruction ID: 7c847e22b3320cc751f45737a432c279dbcc4e36ab03f6f743741838c2f198f9
                                                • Opcode Fuzzy Hash: 130f15f6cbc0a773da199ca3ccc327006f3d87863a2b65e1ee6b5174b3eec23d
                                                • Instruction Fuzzy Hash: 2C312751A29A4B8FE794E7288451AF9B7E1EF6A300F04C176D04FC75D7CC68E84A83A1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3a42c46698d55de256e9e49353a916255ca42b8023ff3c2b993a3f9fc8d51c58
                                                • Instruction ID: f9b26514ec738ac994e1e2102e36df23e44073cba22138b2d63602d1b342217a
                                                • Opcode Fuzzy Hash: 3a42c46698d55de256e9e49353a916255ca42b8023ff3c2b993a3f9fc8d51c58
                                                • Instruction Fuzzy Hash: 3B31B031909B898FD789EB28C4156A97BE1FF9A314F1441BAE00DC7292DA34E806CB91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 33defba5e8847f245aa5185e04cd5d3d002c5c38e59efef3c513f1c090be6fd2
                                                • Instruction ID: 8b4ef15459ea08d0afd804aeaf686f1a5d7068a9165a093e1db5b1bbaedf976f
                                                • Opcode Fuzzy Hash: 33defba5e8847f245aa5185e04cd5d3d002c5c38e59efef3c513f1c090be6fd2
                                                • Instruction Fuzzy Hash: 4721E471A19A4D8FDB85EB78C8999A97BF0FF5A31070441ABE04EC7262DA24D845CBC1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 73c2a796016d873adb3968825c78c3a3e484a9a1755d018feea0c1ebe4cf0c5d
                                                • Instruction ID: 883e00c822691528aa3b7931f67a377f5b4daa335364b70f98a8e6ddf3224d0d
                                                • Opcode Fuzzy Hash: 73c2a796016d873adb3968825c78c3a3e484a9a1755d018feea0c1ebe4cf0c5d
                                                • Instruction Fuzzy Hash: 1931267058E9878FF7698328D46467576D4EF87210F1880BAE44ECB1E3DD58FD858B81
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0c4d4fc6c06ba0aad0e509bffbf6544c87135289b3b86ef1f8cd018bcd53810b
                                                • Instruction ID: 89fd7e738a01a5200ee58e567bb89b304fdd9383157da957a16b208aa1b3a3a0
                                                • Opcode Fuzzy Hash: 0c4d4fc6c06ba0aad0e509bffbf6544c87135289b3b86ef1f8cd018bcd53810b
                                                • Instruction Fuzzy Hash: 57214B21A0DB4A8FF398972CA81A6B577D5DB97260F0441BEE88DC7193DD14EC4783C2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1f8442da230272bd56b06571053a732fad02540ff723fdec6cd53c5cf20079f6
                                                • Instruction ID: dc429776622d2cb242aa3903c630d81a169e70b015b61c972b9fb1460c5ba700
                                                • Opcode Fuzzy Hash: 1f8442da230272bd56b06571053a732fad02540ff723fdec6cd53c5cf20079f6
                                                • Instruction Fuzzy Hash: 1E31752094E60A8FFA98DB158C52B6873A5EF57700F5480F9E44DD3282CD39ED4D8BC1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e4fb7efc0fc861833d8631f6404eefb783516c596cd55b5399ca391e59d23e79
                                                • Instruction ID: a3f31203ed962ae4f41fc17433c380f149e80c1f6c0aaf403b0062d22fd54aef
                                                • Opcode Fuzzy Hash: e4fb7efc0fc861833d8631f6404eefb783516c596cd55b5399ca391e59d23e79
                                                • Instruction Fuzzy Hash: ED212512B1EE4A4BFBE6E32C4555679A6C2DFDA210759A17AD40EC339AFC18DC460380
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 49003dfe5332c134f5430f1a325b0f9193966532058a4816708ca0d8d6d626bf
                                                • Instruction ID: 5e5786aa29e2fce1a2c2228bebe3ad2abef511aacc886467d44f33a3d24bebc6
                                                • Opcode Fuzzy Hash: 49003dfe5332c134f5430f1a325b0f9193966532058a4816708ca0d8d6d626bf
                                                • Instruction Fuzzy Hash: 9C21F63171EE459FE799DB3C8455A65BBD0EF5A30071441B9E00EC7693CE29EC45C781
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d968df10aef0172cec6857578dbcbe296f89ebccb0a454c810ef4d2cffe824fe
                                                • Instruction ID: 8793f57cbe0bb27ecdf94ee23f64daf3442c99dca38b46d1a1fc7b3a49f336bc
                                                • Opcode Fuzzy Hash: d968df10aef0172cec6857578dbcbe296f89ebccb0a454c810ef4d2cffe824fe
                                                • Instruction Fuzzy Hash: 09213A2151DAC74FD716A7288451AB6BFE0EF57214B0542EEE08EC31E7CD5DA40AC385
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8a0e49a360a208a291940e4554c38c023bc8573bdd187861a1eefe41859fd65d
                                                • Instruction ID: fdcc4308874d135811857fa8bb91fe6f3988bd3c568fc1df3715436d483c57fb
                                                • Opcode Fuzzy Hash: 8a0e49a360a208a291940e4554c38c023bc8573bdd187861a1eefe41859fd65d
                                                • Instruction Fuzzy Hash: D1216A51B19E4A8FFB96E33C455463967C2DFD9200B68A179D40EC33D6ED28EC0943C0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1e62711de916c9bae4b65b44a51a7457c6ad06f67250e1591e2e3f2fbca465c6
                                                • Instruction ID: 66b0cf9c7896ea9480f398cdba6db4161a01cc186080a2af466fb1185201aa96
                                                • Opcode Fuzzy Hash: 1e62711de916c9bae4b65b44a51a7457c6ad06f67250e1591e2e3f2fbca465c6
                                                • Instruction Fuzzy Hash: 12216A21B1AE8B4FFB96E32C4165739A6C2DFD9210B59A079D40EC33D7ED18DC050380
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2f2e9655ef1cf01b5328f7a78825c3635bf1d6a03c1c95d27bff1d75766b387d
                                                • Instruction ID: 8df5aff2a2d76501b41a730122419e5782bb2c7baac54c89d4b3bf0a62675956
                                                • Opcode Fuzzy Hash: 2f2e9655ef1cf01b5328f7a78825c3635bf1d6a03c1c95d27bff1d75766b387d
                                                • Instruction Fuzzy Hash: 0C213652B2EE478BF7A6D32C865267967C2DF8621075961BAD00EC3296FD18DC464381
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0f3382995a6c23dde0c3ca1a9608554a2e796c86f17925af475b51404ef6dbad
                                                • Instruction ID: 5059c876919b827b7b4a4731f55ba3916dcc73027adf552896e89c5079770be5
                                                • Opcode Fuzzy Hash: 0f3382995a6c23dde0c3ca1a9608554a2e796c86f17925af475b51404ef6dbad
                                                • Instruction Fuzzy Hash: 18212851B1DE4B4FFBD6E32C455567566C2DF9A210758A079D40EC3396FD18DC0543C4
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bd294d0a35001ff3f285304fa5968cb01cbcfef85aa76b077d9cc25e667b8bfa
                                                • Instruction ID: 4e742eecbaab929ea8db64d02838382bebdcb7a84067f443a07a87f8b79270e0
                                                • Opcode Fuzzy Hash: bd294d0a35001ff3f285304fa5968cb01cbcfef85aa76b077d9cc25e667b8bfa
                                                • Instruction Fuzzy Hash: 1321503061DA498FE784EB1C8488A697BE1FF9D311F5445BEF04EC72A6CE29D8458B81
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2dfd45dea1c9d996260cab7be4eebd04a93174853b2c24ff65b148c3b8d1203e
                                                • Instruction ID: b4dbf60b26d61289a4e5b012e692dfc63fd8397ed2838a0090a3b7238ab7acf4
                                                • Opcode Fuzzy Hash: 2dfd45dea1c9d996260cab7be4eebd04a93174853b2c24ff65b148c3b8d1203e
                                                • Instruction Fuzzy Hash: 25210721B1AE4B8FFB9AE33C4555639A6C3DFDA200759A079D40EC3396ED28DC054385
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b57d0b493d68a6c7c58ce159f48fd2827c35c4bf89cc0f88f8f074c7610b3043
                                                • Instruction ID: ba013ea63159f382020830e16829fa1632940d0a076db005b4c5a58bb9703c08
                                                • Opcode Fuzzy Hash: b57d0b493d68a6c7c58ce159f48fd2827c35c4bf89cc0f88f8f074c7610b3043
                                                • Instruction Fuzzy Hash: EE21F511B1AE4B8FFAE6E72C4565639A6C2DF9A200769A07AD40FC379AED18DC054380
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 85d13a47d2b8d781c50fcc7a012adf1412793cfbe1260f81c42579937e1cbf72
                                                • Instruction ID: 690a58e26b8cf479c4042529ee92bcbc24bb26b820cb0c16f1660a8ca4e4a23e
                                                • Opcode Fuzzy Hash: 85d13a47d2b8d781c50fcc7a012adf1412793cfbe1260f81c42579937e1cbf72
                                                • Instruction Fuzzy Hash: C2113A23B5DE0F8BF6A8965CA84587577C5DB863A071542B9F00EC3296DC14EC0683D4
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: daa77c6f7b03910f73fdbebfbbf1d779c089c33647e4fa277452729546a85f9a
                                                • Instruction ID: b8ea382ab3230abe6600ce9f24b0807585fa692ad045ed61ace588e161348462
                                                • Opcode Fuzzy Hash: daa77c6f7b03910f73fdbebfbbf1d779c089c33647e4fa277452729546a85f9a
                                                • Instruction Fuzzy Hash: 8021368361DE8A4BEB89E33C84556B567D1EF9A210F0481BFE04FC3193CD08E9094384
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c5b378f2b48a7479f02e8f6fefbab452f3061f43720fc97422990df9e29a2a77
                                                • Instruction ID: 0864a10eb74af9a826de0250bf0451b785bb71a580ee615b04e5a2ebcd4b6c8f
                                                • Opcode Fuzzy Hash: c5b378f2b48a7479f02e8f6fefbab452f3061f43720fc97422990df9e29a2a77
                                                • Instruction Fuzzy Hash: 7D213712B1AE4B8FFAE6E33C4551635A6C2DF8A200B69A079D40FC3297ED28DC0543C4
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 125c6f2382679e8a1a5c168cc376b8d78d7cf0ff0bf2a580dbdbbb2ebe4c3311
                                                • Instruction ID: 4eaf745453fadafa005af7c404cbb5d2679d1ac87adf7ee176e4ed5b33d00a33
                                                • Opcode Fuzzy Hash: 125c6f2382679e8a1a5c168cc376b8d78d7cf0ff0bf2a580dbdbbb2ebe4c3311
                                                • Instruction Fuzzy Hash: FA214C21B19F4A8FFBE6E32C4551679B6C2DFD9200B55A179D40EC32D6FD28DC454381
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f80fa97ae72f01088a3d223911c4de6c27cc22d090e0b06c0b0be9b6d090693c
                                                • Instruction ID: 0a985f72d50a1c290505ae72d3842e9907b7520fe5aa867a1a5cebf29addd8be
                                                • Opcode Fuzzy Hash: f80fa97ae72f01088a3d223911c4de6c27cc22d090e0b06c0b0be9b6d090693c
                                                • Instruction Fuzzy Hash: D7210721B19F4A8FFBE6E33C4551A3576D2DF8A600B59A179D40EC329AFD28EC054385
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3f3c0b1a2f601353a3f1417ce902ca426817741aa8392854bf1851d7067e727e
                                                • Instruction ID: 14e765e04e1e828f80bbf70d73cb2bc65fe0ae7231cb9645ccefb6e0a6d3d100
                                                • Opcode Fuzzy Hash: 3f3c0b1a2f601353a3f1417ce902ca426817741aa8392854bf1851d7067e727e
                                                • Instruction Fuzzy Hash: 6C213711B1AE4A8BF6E6E32D4151635A6D2DFD9210B68A079C40EC3396ED28EC454385
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6b1a34dce114a384a0be109f3ebf4ad64da7a6c56f1b94bd2601baee797b014a
                                                • Instruction ID: 5df40a2bc54c4a96f3bd9ec81bdcf0cc10fda14d714b9a776deb1eac88dbfa31
                                                • Opcode Fuzzy Hash: 6b1a34dce114a384a0be109f3ebf4ad64da7a6c56f1b94bd2601baee797b014a
                                                • Instruction Fuzzy Hash: 40210A11B1EE4B4FFAE6E32C4551639B6C2DF9A200B59A079D40EC339AED18EC0543C5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b711f6815b3898cfb4e378beb0fd95ff79c487caff78ad0bc24e1e33233ec8e7
                                                • Instruction ID: de2ee90edd1e7c88876bca077dd8b52ed2385c1903667d9484c9e42775487cdf
                                                • Opcode Fuzzy Hash: b711f6815b3898cfb4e378beb0fd95ff79c487caff78ad0bc24e1e33233ec8e7
                                                • Instruction Fuzzy Hash: 3F212951B1AE4A8BF7DAE32C456563962C3DFD9210B65A07AD40EC32DAEC18DC4A03C5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 58286b7b0ca8b1acc28f1267fe4f29069e8702a155571cdd673d4a960f67562c
                                                • Instruction ID: e3d70b994b232e8a25282da767cd228f7d6d77c5020b210e1db73dac063e6ef0
                                                • Opcode Fuzzy Hash: 58286b7b0ca8b1acc28f1267fe4f29069e8702a155571cdd673d4a960f67562c
                                                • Instruction Fuzzy Hash: A021F631A0DA1A9BE75CDB1C94426B676D5EF8A710F00817EF44ED3282DD29EC0646D5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 74817f636da7639398b3893f35da4666ebf5d0331c290c45d87620bfc1e8dbb1
                                                • Instruction ID: 5e3f77d5d9338a7b2aad34fe4cdaaf20a3e5adb62b8219f9fe7b1ff35e336f2f
                                                • Opcode Fuzzy Hash: 74817f636da7639398b3893f35da4666ebf5d0331c290c45d87620bfc1e8dbb1
                                                • Instruction Fuzzy Hash: 2721657190CA1C9FDB68EA58DC4A9F9B7F4EBA5321F00413FD44ED3211DA31A5498B82
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2dc598c56b79335c3718a0476cdbcfc1a7b42cc7ad682fac1e17b577c81fa695
                                                • Instruction ID: 061431799e12f4b865790ce85b0273d1c86080411cdfcd2e6aa1d5045581a2b6
                                                • Opcode Fuzzy Hash: 2dc598c56b79335c3718a0476cdbcfc1a7b42cc7ad682fac1e17b577c81fa695
                                                • Instruction Fuzzy Hash: 0E11EC3171DB0A9FF698971CA81AAB633C9DB97260F04417EF84EC7292DD15EC4643C2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 55a3b004c9808636448ce1c7f7ad77c68627272c8ef7387c9db55ce4094fbe5e
                                                • Instruction ID: 71ef36bd5118f715378233abe7bdd578f31477395b3f210719909e997d0f13c8
                                                • Opcode Fuzzy Hash: 55a3b004c9808636448ce1c7f7ad77c68627272c8ef7387c9db55ce4094fbe5e
                                                • Instruction Fuzzy Hash: BE21256155EBC99FE76647288C1A6B13FA8DB57620F0440EBE08CC71A3DD28AC4DC3D2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e7be903beb2f808fe5472a453f2ff15eb015b0c89d353396b33c9741e9111f35
                                                • Instruction ID: 444beddd69dd19db7ff2f8f749834e51fc59118c5153e63c32e8204f7b12ba7d
                                                • Opcode Fuzzy Hash: e7be903beb2f808fe5472a453f2ff15eb015b0c89d353396b33c9741e9111f35
                                                • Instruction Fuzzy Hash: 26213E34618A4E8FEB84EF28C4547AA73E1FF59304F5045A9E41EC7296DF39E855CB80
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c2799970ff220a596d0d0953c0826e6ad03f7cd231d474c20b1fb2d7588902ff
                                                • Instruction ID: facf187305a900ae558af9faa968fc9b4686251d081e18381c3c307348a5bb27
                                                • Opcode Fuzzy Hash: c2799970ff220a596d0d0953c0826e6ad03f7cd231d474c20b1fb2d7588902ff
                                                • Instruction Fuzzy Hash: 8821372161DA868FE755AB1C94496B07FE1DBA6250F0849AAF8CCC72B2D819DEC5C381
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a6120d908c57acbc779ed5ea01693e0213023b97c82a3824f73aaf63ae895ae0
                                                • Instruction ID: 375d5350601676dd7e0890b81c675d954e55ce71c90ffb34d482e1bafc761ed5
                                                • Opcode Fuzzy Hash: a6120d908c57acbc779ed5ea01693e0213023b97c82a3824f73aaf63ae895ae0
                                                • Instruction Fuzzy Hash: 37312C70909A4E8FEB94EF64C8457FD7BA1FF59300F5484B6E41DC2286DE3AA9448B81
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 342a718ddb270b0b853f3d2e7441829b8d1eadedac5e0d88fff1bd301559bf09
                                                • Instruction ID: b98e7079d697d5cb2dcd4bf0c4ce513515068905097a0769e72fff2942007e5e
                                                • Opcode Fuzzy Hash: 342a718ddb270b0b853f3d2e7441829b8d1eadedac5e0d88fff1bd301559bf09
                                                • Instruction Fuzzy Hash: F021815148F7C25FD35397B48C259927FE49F9716070D41EAE089CF4E3C54D994AC3A2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5cee6c33d5cb75566058d68ddd2fcf4c5c6cc7a1490a2e693395c73da736b7f6
                                                • Instruction ID: c07efe427bbdf4e28f7be401f516373b211568eca8cd2eb6b43dd221ad8c0828
                                                • Opcode Fuzzy Hash: 5cee6c33d5cb75566058d68ddd2fcf4c5c6cc7a1490a2e693395c73da736b7f6
                                                • Instruction Fuzzy Hash: 8321D17080D7CA9FE7459B6C88116B9BFF4EF4A300F0405EEE08DC71D3DAA495088785
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4591e18b8740091063800560fdf0a5b81be9d05c58d161bc79039a50da272a40
                                                • Instruction ID: 257e77a39aa58115c13162510d68fec4fe471bb30760d68076287fe560bb5e36
                                                • Opcode Fuzzy Hash: 4591e18b8740091063800560fdf0a5b81be9d05c58d161bc79039a50da272a40
                                                • Instruction Fuzzy Hash: AD21384088F7C71FE39353B849655923FE58E47120B0E41EBE588CE0A7D48D884EC3A2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8fe36d40256e905f11c89ec8b97773b045a084893a5ef5fa256cf9734d330cd6
                                                • Instruction ID: 3151c712e45106409d541b0c581b832d6fc78bed3b4496e523f1cbf2acccca89
                                                • Opcode Fuzzy Hash: 8fe36d40256e905f11c89ec8b97773b045a084893a5ef5fa256cf9734d330cd6
                                                • Instruction Fuzzy Hash: E411910158FAC75FE34657B48C299E63FE5DF8711070D82EBE085CB4A3D84C599B83A2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 98b350edd945260df3401cb0796b8d4be34105b1245801bc546fd3e692578dc6
                                                • Instruction ID: b8cc0efda34e8007691c255dcfb937782b5a66a31df555e3a6bc4cf6e5f9e7e7
                                                • Opcode Fuzzy Hash: 98b350edd945260df3401cb0796b8d4be34105b1245801bc546fd3e692578dc6
                                                • Instruction Fuzzy Hash: C5119A42A4FB8B4FE786A37808265646BE09F57290B0944F6E04CCB1E3DD4C9C0983A2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: adc8ce70da95f299dd60e09341c529c9557b3dc31dddd5759364744dc572a578
                                                • Instruction ID: e0fa26967720e930bb31853fc5955e75563d4a0992f831a23d195e7b7ff47650
                                                • Opcode Fuzzy Hash: adc8ce70da95f299dd60e09341c529c9557b3dc31dddd5759364744dc572a578
                                                • Instruction Fuzzy Hash: 4E113822719E4B4FFBE6E32C8150B39B6C2EF8A200B6961B9D40EC36D6ED18DC414380
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2651069ee704371fd1cd37ea420d099abd4273a18d336eea6384ce5a3ea80ec2
                                                • Instruction ID: c529a61d9fdfb6aa8aff6108b4732c32527a0047ae272369779a351c33ca8f76
                                                • Opcode Fuzzy Hash: 2651069ee704371fd1cd37ea420d099abd4273a18d336eea6384ce5a3ea80ec2
                                                • Instruction Fuzzy Hash: AC115761B0DE4B8FF7A7E33C4152679A6C2DF8A200B69A0B9D40EC32DAED18DC454385
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0d4b8aae12245e53886a549ae35a4ab54cee102c1911be28ac546b1d30cf9205
                                                • Instruction ID: f23695c0c116f38c52d5655825a0fd6f14601b0c768430f223ca937cc333396c
                                                • Opcode Fuzzy Hash: 0d4b8aae12245e53886a549ae35a4ab54cee102c1911be28ac546b1d30cf9205
                                                • Instruction Fuzzy Hash: A4112E6171DE4B8FFB97E32D8150639B6C2EF8A200B69A179D40EC32D6ED28DC454385
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 215e7331cbac992fd77f134d31e42f30b27561f6299e05b3b9e67c6467880ada
                                                • Instruction ID: d8d1e17c66549bfbd4c7f11770e2c7ef790ace03ec151a3d9583bf33c3d04d44
                                                • Opcode Fuzzy Hash: 215e7331cbac992fd77f134d31e42f30b27561f6299e05b3b9e67c6467880ada
                                                • Instruction Fuzzy Hash: 301104A1B1AE4B4FFBA7E33C4551739B6C2DF8A200B59A0BAD40EC3296ED18DC454385
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 352b37d7c857bc5e64ab7d04eee08dc56624daee0bdb6e7ccff92112abbb8939
                                                • Instruction ID: bb9fb9b632e9da89c0f2c47c312582d42593ee9e593dab33dba71da3380130cb
                                                • Opcode Fuzzy Hash: 352b37d7c857bc5e64ab7d04eee08dc56624daee0bdb6e7ccff92112abbb8939
                                                • Instruction Fuzzy Hash: B2118631A4DE8E8FEB85EB2C94116B977A1FF9A310B0441B6E40DC7292CE39DC0987C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cff1d68242fd98553dbb2006a4819891cfd4e686e136d23ef45e937f7d41860e
                                                • Instruction ID: f5721406419f048382c7c90a40f8db51a546d96041d2ba36329029031183af85
                                                • Opcode Fuzzy Hash: cff1d68242fd98553dbb2006a4819891cfd4e686e136d23ef45e937f7d41860e
                                                • Instruction Fuzzy Hash: 53119E2158EBC65FC34797748C20AA17FE5EF8B11030941EAE089CB6A3C91D994BC761
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a7d2327083fe58e7c2ba2b1c409b1b815b4ad72f828c9ab8a5eb160562b1397b
                                                • Instruction ID: 7f7027af81d5a60791d260e198f81ce6da37b7ce16dd977b1c7ff4504970a73d
                                                • Opcode Fuzzy Hash: a7d2327083fe58e7c2ba2b1c409b1b815b4ad72f828c9ab8a5eb160562b1397b
                                                • Instruction Fuzzy Hash: 16110622A9E5838BF715973458145E57AD4AF83310B5882FAF44DD71A3ED0EE88AC3D0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 93ae214d3aa08006259e76d96339e702cebbe5d0b72de56191109ab3f0c127a2
                                                • Instruction ID: 540464fdf28fa53e24bfbe795190bd9bdb1c7136d73535702ada9c22cecd1dd6
                                                • Opcode Fuzzy Hash: 93ae214d3aa08006259e76d96339e702cebbe5d0b72de56191109ab3f0c127a2
                                                • Instruction Fuzzy Hash: D311E671A1DB8A8FE795DB38C494A657BE0EF59300B0845EDE44ECB2D3DD19E808C780
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0a865432c7a8580f710cd722b8caef9720be85fc49e232ce4a4d390f050e297d
                                                • Instruction ID: 404601f73ca9597526bfdb6290d33ab0ee8c3900a2287f9992e20050fc5d4e75
                                                • Opcode Fuzzy Hash: 0a865432c7a8580f710cd722b8caef9720be85fc49e232ce4a4d390f050e297d
                                                • Instruction Fuzzy Hash: CA11A33184964ACFD741EBB4C815AEABBF0FF06300F0546FAD059C7462DB789545CB91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e2ceb02f1698aa15cffa9a94c411ada9a245df4131eb0e6c016089b0943b5c50
                                                • Instruction ID: b31f1f022b95221166dd5fa9a46c6195e5ceb06a79f70f89f378d120f9fa5e19
                                                • Opcode Fuzzy Hash: e2ceb02f1698aa15cffa9a94c411ada9a245df4131eb0e6c016089b0943b5c50
                                                • Instruction Fuzzy Hash: 7911E33188E6C34FF716532058164E13BA8AF43310B0A81F6E48CDB0A3D80EE98A83E1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 30685a9b34f8f8136a9c4ee4c9827a52f6bd01423541059c33d882b98882c3df
                                                • Instruction ID: 1133724309785338149941379325f23a07d2fa8e1b636806739ec8e8e1a230fa
                                                • Opcode Fuzzy Hash: 30685a9b34f8f8136a9c4ee4c9827a52f6bd01423541059c33d882b98882c3df
                                                • Instruction Fuzzy Hash: 1F01F572B0DA484FEB19966CA4068A97BE1DB9B720B1501FFE04DC7193ED15EC0A83C0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7e17d77019013661d84a3ae0c175a675997676cca8a14a7ee65a8fc1533c37f0
                                                • Instruction ID: 7f14ef968db9ba429bdecdec1f5da38b99d2baac2b0e9254f5306c9111fbf01c
                                                • Opcode Fuzzy Hash: 7e17d77019013661d84a3ae0c175a675997676cca8a14a7ee65a8fc1533c37f0
                                                • Instruction Fuzzy Hash: E101DB22A6EF478FF789932D1429274A9C1DF87610B0480FAE00EC71D2DD2DDC4943D1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2862ae93a0332a5079a56b29fbc9c2bdd233958ed49f29b4a7883217b64345cb
                                                • Instruction ID: 6ac980ce251796983908332ef8c5f10ff2531ba555d565a70244470eedc34fe9
                                                • Opcode Fuzzy Hash: 2862ae93a0332a5079a56b29fbc9c2bdd233958ed49f29b4a7883217b64345cb
                                                • Instruction Fuzzy Hash: 1A110671A19A5A8FE798EB38C094A6677E4EF59200B0445FCE44FC72D2DD19E809CB80
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 75b885d2c43bdfb359a71442d71f0ba25c7d92a61413266f3a029c740926482d
                                                • Instruction ID: f200b3cf10d2ae275ab5f33d6f27ee6e8d1d0bbd67406bd9534b68105e313239
                                                • Opcode Fuzzy Hash: 75b885d2c43bdfb359a71442d71f0ba25c7d92a61413266f3a029c740926482d
                                                • Instruction Fuzzy Hash: 73F0C87260CA185EA71CA529AC0B5F773D9D786631B00013FE48ED3152ED21BC1746D5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ca6a38692bf565b1ce0633513c8b5016d004c23de810c0027f014a9a4033340f
                                                • Instruction ID: 8625d10fc8e132ede8e8e2bf6b0c22560befe58aafac5e26d36bbf516be74e95
                                                • Opcode Fuzzy Hash: ca6a38692bf565b1ce0633513c8b5016d004c23de810c0027f014a9a4033340f
                                                • Instruction Fuzzy Hash: 8D01A712A5EA4B5FF749937924692B8AAC1DFC7614B5880FAE00EC71D2DD2DE84983C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d9b52b9fdc66803449154913bb4c9f532e4391c68c013e5dd4709e19dd81c4b2
                                                • Instruction ID: 4d10f433b1083c3ba141a7656dd5fa322d6cc01f21b643b595e2fb2dd98e9684
                                                • Opcode Fuzzy Hash: d9b52b9fdc66803449154913bb4c9f532e4391c68c013e5dd4709e19dd81c4b2
                                                • Instruction Fuzzy Hash: 9701A211A1DF8A0FE796E77854959F2B7E1DF9A21030982FBD04EC31ABDC18E8498385
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b340ed3dae3d0249550375f6a6f8ea6c05d88960f0edff74dfba5169b1a28d46
                                                • Instruction ID: c568011715463a512289c4d0d1caac633c8c52a0b0eee18fe633437d6e5812ff
                                                • Opcode Fuzzy Hash: b340ed3dae3d0249550375f6a6f8ea6c05d88960f0edff74dfba5169b1a28d46
                                                • Instruction Fuzzy Hash: DD01266180EBCE6FE75297788845AB6BFF4DF56200F0544E7E44DCB193C824A608C392
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: da6adad1d2946ed4f41b648b76f48bfee7331b727012245bf1ca4704bff6aeb7
                                                • Instruction ID: 14868426572e1329b48918a118ff501bb3422ac05a79eea58c4fc271907d9fa6
                                                • Opcode Fuzzy Hash: da6adad1d2946ed4f41b648b76f48bfee7331b727012245bf1ca4704bff6aeb7
                                                • Instruction Fuzzy Hash: 6301D67190D7858FD3059B28941106ABFF0FB8A314F0506BFF4CDD7252DA289A058796
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 452b82c7f7249f300fdb7b0acd57d4dbe7653bf8955944e986c3a132625c6602
                                                • Instruction ID: 351307807e96d5670ca39f2cfd955b77374c6fcbb4fcefa71631eeb89ecdb015
                                                • Opcode Fuzzy Hash: 452b82c7f7249f300fdb7b0acd57d4dbe7653bf8955944e986c3a132625c6602
                                                • Instruction Fuzzy Hash: 16017C5190F7C74FF356A37848299A17FE49F57150B0985E7E088CB0E3D94CD94883D6
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6a973c46f05b0347d8d3e06729e71aa8a45ec8f08040e07e32c84cb19c1948db
                                                • Instruction ID: 17a8beacca98b7bc268b72ff6ef7e31682a21780bf6cdb39844521e1be589ef8
                                                • Opcode Fuzzy Hash: 6a973c46f05b0347d8d3e06729e71aa8a45ec8f08040e07e32c84cb19c1948db
                                                • Instruction Fuzzy Hash: E8F0287184D68E9FE345CF584C09AF63FE9EF56241F09416BF00DC7282CA249508C7D0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 360a15f70767583edad8fd1cd7659e0060a6827994d79918a50ccd701876ef33
                                                • Instruction ID: 06fd1e634a5908a61827f21927188094952b55ecffdd5f57b21ea30e9bee101c
                                                • Opcode Fuzzy Hash: 360a15f70767583edad8fd1cd7659e0060a6827994d79918a50ccd701876ef33
                                                • Instruction Fuzzy Hash: A6016D5188F3C25FE767977448698A17FE58E4312074A81EFD5C9CF4A3E84E844EC362
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3a8e735ce15ae871fca12549fae9309baff96ada0aa4a0dcfed11d93fbf9b7b4
                                                • Instruction ID: 92c296b64e55c230652bb9a95fab604db96175a1ea0406f5dc5ff306966f4329
                                                • Opcode Fuzzy Hash: 3a8e735ce15ae871fca12549fae9309baff96ada0aa4a0dcfed11d93fbf9b7b4
                                                • Instruction Fuzzy Hash: C40126A1D0D6CE9FE755DB7448594F97FF4EF6A210F0445E6E00EC7092DA389A488341
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3f4f5535f180219cacf7a7ff6d26f33e76e5a9a6a0107b79f7b29fa1751eafab
                                                • Instruction ID: b71b1b4a19b6cfaeab4a69b0561fd86626ee4feb1298d23e6116d138281440f5
                                                • Opcode Fuzzy Hash: 3f4f5535f180219cacf7a7ff6d26f33e76e5a9a6a0107b79f7b29fa1751eafab
                                                • Instruction Fuzzy Hash: 7FF059136CEC0F1BF244B68D6C815F1B784E791330F58413AD60DC2081D489E91A13D0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e12e5e2f0c878f536d0eeabe0dd3eb40f2cf32a808b4023d72f844a3503b795f
                                                • Instruction ID: 504cb8a60da59a667cbc9f4aa50645672c50d03c76f5cff79f797c935975482e
                                                • Opcode Fuzzy Hash: e12e5e2f0c878f536d0eeabe0dd3eb40f2cf32a808b4023d72f844a3503b795f
                                                • Instruction Fuzzy Hash: 5EF03C71D05A1E8EDB94EBA8D8056FEB7F4EF09304F40496AE01DD2191DF75A9448BC1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5cfcb122e203aaea4f11cd638be9b94a651274ab36c7090bd4959d0f313bbede
                                                • Instruction ID: cc3e347766097e05b0dafd95ab2eb1b3655d205a6e4874b6b1d1b842bc3e60fb
                                                • Opcode Fuzzy Hash: 5cfcb122e203aaea4f11cd638be9b94a651274ab36c7090bd4959d0f313bbede
                                                • Instruction Fuzzy Hash: F0F02813A4E6C78FE3628B386C591A57F55DF93014F4841BED18DCA1D3D855D84A8382
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a8050d1263b4db3cab38a15e8915b5814d6990969d43ba4d83c811adf7735af5
                                                • Instruction ID: 71507e5bb0714a6b3201ce357ecd4388b9f1ea7d326e68ddf5b4057f08b5beca
                                                • Opcode Fuzzy Hash: a8050d1263b4db3cab38a15e8915b5814d6990969d43ba4d83c811adf7735af5
                                                • Instruction Fuzzy Hash: AEF0F622F4DB0ADFE6A49A1D68491657386EF95600F58417ED00DC3586C835FD8583C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 188ec1ce979d61160e3dd02fe7151a89e013c0869198429b8deab6a75ca9887a
                                                • Instruction ID: eeecf2b7bd0950520470ab856a276572226a4acb71b1d1e8f9314248e4a0069a
                                                • Opcode Fuzzy Hash: 188ec1ce979d61160e3dd02fe7151a89e013c0869198429b8deab6a75ca9887a
                                                • Instruction Fuzzy Hash: 3FF05931A19F4A8BF7989B3C9005232B3D0EF45205F1044BDE84DC7592EF25EC424381
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f45842320e8a008e92d556ec9090f1b0b94ef3c758bf2c4e051be99783346e4d
                                                • Instruction ID: 6b6f21ff0004d84fbe0e21cc707c3a00ccb43ada5f50e5cb5e4ba13d19ed4c24
                                                • Opcode Fuzzy Hash: f45842320e8a008e92d556ec9090f1b0b94ef3c758bf2c4e051be99783346e4d
                                                • Instruction Fuzzy Hash: 88F08251B29D4B0BA689F77C9091AF992D2FFA4200754C1BAD00FC32AADD2CE84A4784
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3f2c9ee740e5a1b91874dc35f6e70183993cf520a9932ded02db3b08ea280210
                                                • Instruction ID: b6a32a69b6dab26339deb724ae221eba6a83f028889716d025b3a25beb23d1b0
                                                • Opcode Fuzzy Hash: 3f2c9ee740e5a1b91874dc35f6e70183993cf520a9932ded02db3b08ea280210
                                                • Instruction Fuzzy Hash: 22F0FC3190DF198AF785E72840546B9BAD2DBC9254F484A3DE44DC61A1CFA8D68983C6
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bc669d412db3c3a1b9e9b25ecd947f30f6857176d87b986fa5b385b3a6208703
                                                • Instruction ID: 410ffb5c73c19bb4fa6025fbf382afa4a20fc5896397846d4109e12ea1e22282
                                                • Opcode Fuzzy Hash: bc669d412db3c3a1b9e9b25ecd947f30f6857176d87b986fa5b385b3a6208703
                                                • Instruction Fuzzy Hash: 45F0E241B1EA5B5FE6D5B33C581A9A8A9D0DF8A260B4445F6E04EC72E7DC0CCC0543C5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 616d6431ddb6218e7c04f87f23ef0078ad985a1db7db0bbaffc0483f62c14c1d
                                                • Instruction ID: d264ac5b2e0a3127d57beb3f7d0bfda0929293138c79a793355fc0a699baa70b
                                                • Opcode Fuzzy Hash: 616d6431ddb6218e7c04f87f23ef0078ad985a1db7db0bbaffc0483f62c14c1d
                                                • Instruction Fuzzy Hash: 94F0273140D60DAFE748EF09EC4A9FA77A8FF86220F00013AF44D82052D671A867C790
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f1a9297b9cb825e1eb36c361f3ae7db5f5905e04c7a9d0a58c59a152c030901e
                                                • Instruction ID: 072820285bef2f82da286168053be2d41d6cd988d4afda2d14c219eff35a35e8
                                                • Opcode Fuzzy Hash: f1a9297b9cb825e1eb36c361f3ae7db5f5905e04c7a9d0a58c59a152c030901e
                                                • Instruction Fuzzy Hash: 4DE07D3155CA4C8BDB40A65CA8004D5BBA4FB89308F00009EF54CC3141C2168915C381
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 720605de119b6750813d6eb0220a370c8afb3166c4a410dff7e816ef2911e468
                                                • Instruction ID: d7cdc3a4f139ea75c9b1d0ec198df8ee107d5754f7db83f83d117d1843b648e5
                                                • Opcode Fuzzy Hash: 720605de119b6750813d6eb0220a370c8afb3166c4a410dff7e816ef2911e468
                                                • Instruction Fuzzy Hash: C2D0A753AAAE4F46FE809B1C78511F5A3C8FB97168F409375E44ED304ADE19E60B02C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594667646.00007FFAAC640000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC640000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac640000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 04d3bc571c529cc7607f19d6af6b332ab586e368318066a64f508379fc7a57e9
                                                • Instruction ID: a5807afec4e7b93cc9c00218f82eb3d8c44c98cdef9195142a4074e7cad8ac58
                                                • Opcode Fuzzy Hash: 04d3bc571c529cc7607f19d6af6b332ab586e368318066a64f508379fc7a57e9
                                                • Instruction Fuzzy Hash: EAD0C71571A82157F254228D68433B5B285DB89714F605436E90DC72CACCCEACC542E6
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d12d6c6f45bec0f05575d307bb233526c179d3aa551eb2ecaf9229646f4138d6
                                                • Instruction ID: 62289de4106e8296ae26462ee53e258f15ac2a675be1e2885582418a3016d3cd
                                                • Opcode Fuzzy Hash: d12d6c6f45bec0f05575d307bb233526c179d3aa551eb2ecaf9229646f4138d6
                                                • Instruction Fuzzy Hash: D2C01216B8680E496950635570021FCB204DBC6215BC154B5E10DC2082CD5F281402C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 071698123b5b2659ea59642cb8cb1d0272abbb1dfe4a355042d41a86ae84202c
                                                • Instruction ID: ffa3a20b99e6a84059f1f47cda9dba50b3f5eb8a791e4b5c7fc3e8c541bc0da8
                                                • Opcode Fuzzy Hash: 071698123b5b2659ea59642cb8cb1d0272abbb1dfe4a355042d41a86ae84202c
                                                • Instruction Fuzzy Hash: B9A00202ECB42F41A54421AD79420D9B28AC797171BC57EB2F90C8815AAC8F59DA02C1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 5&_^
                                                • API String ID: 0-1803669685
                                                • Opcode ID: 2ea1dac15246a36d5321080ee14c15b66aad95f8a10b16fc04e0fd229f3bb96e
                                                • Instruction ID: 3600208b51916a61ec6623aaefab6b70ac511f4c7a06db9463aa0e155a2ea794
                                                • Opcode Fuzzy Hash: 2ea1dac15246a36d5321080ee14c15b66aad95f8a10b16fc04e0fd229f3bb96e
                                                • Instruction Fuzzy Hash: 4B51B497D092634BE221B6BCF8624E63B90DF413397088173E2CD9E173DD19648A86D8
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 304ee79ffd2b02b18aa13e60ab5f796955346115faeb32fb85c453cd7ee430df
                                                • Instruction ID: 771ef33bc5d68b0611ef06c4b7d59001d3a2a0f9c72268a09dbe881698512a7a
                                                • Opcode Fuzzy Hash: 304ee79ffd2b02b18aa13e60ab5f796955346115faeb32fb85c453cd7ee430df
                                                • Instruction Fuzzy Hash: 31F12F57D0D1A34BE62177BDB4A24FB7FA48F4223970C81B3E28DDD1739E08554A82D9
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.2594223055.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_7ffaac580000_hKvlV6A1Rl.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5dfde25c8aee26255471de0eb025e391f72484caadf3e7cf46c21f661f2dd14f
                                                • Instruction ID: 5eac7731eed2ca4dc05a190cfb06c213e2555b4b011cb626ca23827aeaca5eb0
                                                • Opcode Fuzzy Hash: 5dfde25c8aee26255471de0eb025e391f72484caadf3e7cf46c21f661f2dd14f
                                                • Instruction Fuzzy Hash: F3918397D091634BE621B6BDF8624F63B90CF413397088177E2CD9A273DE18648A82DD