Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6ee7HCp9cD.exe

Overview

General Information

Sample name:6ee7HCp9cD.exe
renamed because original name is a hash value
Original sample name:57caa771cdc49a089b783f3df4e72f99.exe
Analysis ID:1581059
MD5:57caa771cdc49a089b783f3df4e72f99
SHA1:94609144f4752e594e6f569f05cea5c2f80473e0
SHA256:23d78defb24bc7e2496d016a368054df8f7f9b64988ffcba00dab9311b7329d4
Tags:exeQuasarRATRATuser-abuse_ch
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 6ee7HCp9cD.exe (PID: 6752 cmdline: "C:\Users\user\Desktop\6ee7HCp9cD.exe" MD5: 57CAA771CDC49A089B783F3DF4E72F99)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Version": "1.4.1", "Host:Port": "149.50.108.116:7332;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "41fce632-c870-4911-98d8-32bfb4cb74f3", "StartupKey": "Quasar Client Startup", "Tag": "7332", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
SourceRuleDescriptionAuthorStrings
6ee7HCp9cD.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    6ee7HCp9cD.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      6ee7HCp9cD.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28ee9d:$x1: Quasar.Common.Messages
      • 0x29f1c6:$x1: Quasar.Common.Messages
      • 0x2ab80a:$x4: Uninstalling... good bye :-(
      • 0x2acfff:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      6ee7HCp9cD.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aadbc:$f1: FileZilla\recentservers.xml
      • 0x2aadfc:$f2: FileZilla\sitemanager.xml
      • 0x2aae3e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab08a:$b1: Chrome\User Data\
      • 0x2ab0e0:$b1: Chrome\User Data\
      • 0x2ab3b8:$b2: Mozilla\Firefox\Profiles
      • 0x2ab4b4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd438:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab60c:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6c6:$b5: YandexBrowser\User Data\
      • 0x2ab734:$b5: YandexBrowser\User Data\
      • 0x2ab408:$s4: logins.json
      • 0x2ab13e:$a1: username_value
      • 0x2ab15c:$a2: password_value
      • 0x2ab448:$a3: encryptedUsername
      • 0x2fd37c:$a3: encryptedUsername
      • 0x2ab46c:$a4: encryptedPassword
      • 0x2fd39a:$a4: encryptedPassword
      • 0x2fd318:$a5: httpRealm
      6ee7HCp9cD.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab8f4:$s3: Process already elevated.
      • 0x28eb9c:$s4: get_PotentiallyVulnerablePasswords
      • 0x278c58:$s5: GetKeyloggerLogsDirectory
      • 0x29e925:$s5: GetKeyloggerLogsDirectory
      • 0x28ebbf:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea66:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.2027522922.00000000007C0000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000000.00000002.3273439411.0000000002C02000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000000.00000002.3273439411.0000000002A31000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000000.00000000.2027138086.00000000004A2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
              Process Memory Space: 6ee7HCp9cD.exe PID: 6752JoeSecurity_QuasarYara detected Quasar RATJoe Security
                SourceRuleDescriptionAuthorStrings
                0.0.6ee7HCp9cD.exe.4a0000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                  0.0.6ee7HCp9cD.exe.4a0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    0.0.6ee7HCp9cD.exe.4a0000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                    • 0x28ee9d:$x1: Quasar.Common.Messages
                    • 0x29f1c6:$x1: Quasar.Common.Messages
                    • 0x2ab80a:$x4: Uninstalling... good bye :-(
                    • 0x2acfff:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                    0.0.6ee7HCp9cD.exe.4a0000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                    • 0x2aadbc:$f1: FileZilla\recentservers.xml
                    • 0x2aadfc:$f2: FileZilla\sitemanager.xml
                    • 0x2aae3e:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                    • 0x2ab08a:$b1: Chrome\User Data\
                    • 0x2ab0e0:$b1: Chrome\User Data\
                    • 0x2ab3b8:$b2: Mozilla\Firefox\Profiles
                    • 0x2ab4b4:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                    • 0x2fd438:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                    • 0x2ab60c:$b4: Opera Software\Opera Stable\Login Data
                    • 0x2ab6c6:$b5: YandexBrowser\User Data\
                    • 0x2ab734:$b5: YandexBrowser\User Data\
                    • 0x2ab408:$s4: logins.json
                    • 0x2ab13e:$a1: username_value
                    • 0x2ab15c:$a2: password_value
                    • 0x2ab448:$a3: encryptedUsername
                    • 0x2fd37c:$a3: encryptedUsername
                    • 0x2ab46c:$a4: encryptedPassword
                    • 0x2fd39a:$a4: encryptedPassword
                    • 0x2fd318:$a5: httpRealm
                    0.0.6ee7HCp9cD.exe.4a0000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                    • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                    • 0x2ab8f4:$s3: Process already elevated.
                    • 0x28eb9c:$s4: get_PotentiallyVulnerablePasswords
                    • 0x278c58:$s5: GetKeyloggerLogsDirectory
                    • 0x29e925:$s5: GetKeyloggerLogsDirectory
                    • 0x28ebbf:$s6: set_PotentiallyVulnerablePasswords
                    • 0x2fea66:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-26T21:52:00.866529+010020355951Domain Observed Used for C2 Detected149.50.108.1167332192.168.2.549704TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-26T21:52:00.866529+010020276191Domain Observed Used for C2 Detected149.50.108.1167332192.168.2.549704TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 6ee7HCp9cD.exeAvira: detected
                    Source: 6ee7HCp9cD.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "149.50.108.116:7332;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "41fce632-c870-4911-98d8-32bfb4cb74f3", "StartupKey": "Quasar Client Startup", "Tag": "7332", "LogDirectoryName": "Logs", "ServerSignature": "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", "ServerCertificate": "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"}
                    Source: 6ee7HCp9cD.exeReversingLabs: Detection: 81%
                    Source: Yara matchFile source: 6ee7HCp9cD.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.6ee7HCp9cD.exe.4a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2027522922.00000000007C0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3273439411.0000000002C02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3273439411.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2027138086.00000000004A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 6ee7HCp9cD.exe PID: 6752, type: MEMORYSTR
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                    Source: 6ee7HCp9cD.exeJoe Sandbox ML: detected
                    Source: 6ee7HCp9cD.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.5:49706 version: TLS 1.2
                    Source: 6ee7HCp9cD.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2027619 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (Quasar CnC) : 149.50.108.116:7332 -> 192.168.2.5:49704
                    Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 149.50.108.116:7332 -> 192.168.2.5:49704
                    Source: Malware configuration extractorURLs: 149.50.108.116
                    Source: Yara matchFile source: 6ee7HCp9cD.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.6ee7HCp9cD.exe.4a0000.0.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.5:49704 -> 149.50.108.116:7332
                    Source: Joe Sandbox ViewIP Address: 108.181.61.49 108.181.61.49
                    Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: ipwho.is
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownTCP traffic detected without corresponding DNS query: 149.50.108.116
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: ipwho.is
                    Source: 6ee7HCp9cD.exe, 00000000.00000002.3275226379.000000001B673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                    Source: 6ee7HCp9cD.exe, 00000000.00000002.3273112987.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                    Source: 6ee7HCp9cD.exe, 00000000.00000002.3273439411.0000000002BB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ipwho.is
                    Source: 6ee7HCp9cD.exe, 00000000.00000002.3273439411.0000000002C02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                    Source: 6ee7HCp9cD.exe, 00000000.00000002.3273439411.0000000002A31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: 6ee7HCp9cD.exeString found in binary or memory: https://api.ipify.org/
                    Source: 6ee7HCp9cD.exe, 00000000.00000002.3273439411.0000000002B9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipwho.is
                    Source: 6ee7HCp9cD.exeString found in binary or memory: https://ipwho.is/
                    Source: 6ee7HCp9cD.exeString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: 6ee7HCp9cD.exeString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: 6ee7HCp9cD.exeString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                    Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.5:49706 version: TLS 1.2

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 6ee7HCp9cD.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.6ee7HCp9cD.exe.4a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2027522922.00000000007C0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3273439411.0000000002C02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3273439411.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2027138086.00000000004A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 6ee7HCp9cD.exe PID: 6752, type: MEMORYSTR

                    System Summary

                    barindex
                    Source: 6ee7HCp9cD.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 6ee7HCp9cD.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 6ee7HCp9cD.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: 0.0.6ee7HCp9cD.exe.4a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                    Source: 0.0.6ee7HCp9cD.exe.4a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                    Source: 0.0.6ee7HCp9cD.exe.4a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF849106A260_2_00007FF849106A26
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF8490F8A610_2_00007FF8490F8A61
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF84910EC900_2_00007FF84910EC90
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF8490F5BE10_2_00007FF8490F5BE1
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF8490F4DC60_2_00007FF8490F4DC6
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF84910A5CB0_2_00007FF84910A5CB
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF84910B07B0_2_00007FF84910B07B
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF84910B8E50_2_00007FF84910B8E5
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF8491077D20_2_00007FF8491077D2
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF8490FA7CD0_2_00007FF8490FA7CD
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF8490F97C00_2_00007FF8490F97C0
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF8491051FD0_2_00007FF8491051FD
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF8490F10D10_2_00007FF8490F10D1
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF8491C23910_2_00007FF8491C2391
                    Source: 6ee7HCp9cD.exe, 00000000.00000000.2027522922.00000000007C0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient.exe. vs 6ee7HCp9cD.exe
                    Source: 6ee7HCp9cD.exeBinary or memory string: OriginalFilenameClient.exe. vs 6ee7HCp9cD.exe
                    Source: 6ee7HCp9cD.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 6ee7HCp9cD.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 6ee7HCp9cD.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 6ee7HCp9cD.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: 0.0.6ee7HCp9cD.exe.4a0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                    Source: 0.0.6ee7HCp9cD.exe.4a0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                    Source: 0.0.6ee7HCp9cD.exe.4a0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@1/2
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeMutant created: \Sessions\1\BaseNamedObjects\Local\41fce632-c870-4911-98d8-32bfb4cb74f3
                    Source: 6ee7HCp9cD.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 6ee7HCp9cD.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 6ee7HCp9cD.exeReversingLabs: Detection: 81%
                    Source: 6ee7HCp9cD.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: cryptnet.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: cabinet.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeSection loaded: userenv.dllJump to behavior
                    Source: 6ee7HCp9cD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: 6ee7HCp9cD.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: 6ee7HCp9cD.exeStatic file information: File size 3265536 > 1048576
                    Source: 6ee7HCp9cD.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c400
                    Source: 6ee7HCp9cD.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF848D6D2A5 pushad ; iretd 0_2_00007FF848D6D2A6
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF848E87923 push ebx; retf 0_2_00007FF848E8796A
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF848E87500 push ebx; iretd 0_2_00007FF848E8756A
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF8491122F0 push esp; iretd 0_2_00007FF8491122F1
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF8490F2B90 push eax; ret 0_2_00007FF8490F2BFC
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeCode function: 0_2_00007FF849116DB1 push ebx; retf 0_2_00007FF84911796A

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeFile opened: C:\Users\user\Desktop\6ee7HCp9cD.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeMemory allocated: EF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeMemory allocated: 1AA30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeWindow / User API: threadDelayed 713Jump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeWindow / User API: threadDelayed 673Jump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exe TID: 7088Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: 6ee7HCp9cD.exe, 00000000.00000002.3274955426.000000001B351000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW ^m
                    Source: 6ee7HCp9cD.exe, 00000000.00000002.3275226379.000000001B673000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: 6ee7HCp9cD.exe, 00000000.00000002.3275226379.000000001B673000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW/Ih/
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeQueries volume information: C:\Users\user\Desktop\6ee7HCp9cD.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\6ee7HCp9cD.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 6ee7HCp9cD.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.6ee7HCp9cD.exe.4a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2027522922.00000000007C0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3273439411.0000000002C02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3273439411.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2027138086.00000000004A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 6ee7HCp9cD.exe PID: 6752, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 6ee7HCp9cD.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.6ee7HCp9cD.exe.4a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2027522922.00000000007C0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3273439411.0000000002C02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3273439411.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2027138086.00000000004A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 6ee7HCp9cD.exe PID: 6752, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    3
                    Virtualization/Sandbox Evasion
                    OS Credential Dumping1
                    Query Registry
                    Remote Services1
                    Archive Collected Data
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts2
                    Command and Scripting Interpreter
                    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    LSASS Memory11
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                    Hidden Files and Directories
                    Security Account Manager3
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Ingress Tool Transfer
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Obfuscated Files or Information
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput Capture2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    System Network Configuration Discovery
                    SSHKeylogging113
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials23
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    6ee7HCp9cD.exe82%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                    6ee7HCp9cD.exe100%AviraHEUR/AGEN.1307453
                    6ee7HCp9cD.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    149.50.108.1160%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    bg.microsoft.map.fastly.net
                    199.232.214.172
                    truefalse
                      high
                      ipwho.is
                      108.181.61.49
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://ipwho.is/false
                          high
                          149.50.108.116true
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/6ee7HCp9cD.exefalse
                            high
                            https://stackoverflow.com/q/14436606/233546ee7HCp9cD.exefalse
                              high
                              https://stackoverflow.com/q/2152978/23354sCannot6ee7HCp9cD.exefalse
                                high
                                http://schemas.datacontract.org/2004/07/6ee7HCp9cD.exe, 00000000.00000002.3273439411.0000000002C02000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name6ee7HCp9cD.exe, 00000000.00000002.3273439411.0000000002A31000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://ipwho.is6ee7HCp9cD.exe, 00000000.00000002.3273439411.0000000002BB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://stackoverflow.com/q/11564914/23354;6ee7HCp9cD.exefalse
                                        high
                                        https://ipwho.is6ee7HCp9cD.exe, 00000000.00000002.3273439411.0000000002B9A000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          108.181.61.49
                                          ipwho.isCanada
                                          852ASN852CAfalse
                                          149.50.108.116
                                          unknownUnited States
                                          174COGENT-174UStrue
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1581059
                                          Start date and time:2024-12-26 21:51:06 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 5m 5s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:4
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:6ee7HCp9cD.exe
                                          renamed because original name is a hash value
                                          Original Sample Name:57caa771cdc49a089b783f3df4e72f99.exe
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@1/2@1/2
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 85%
                                          • Number of executed functions: 174
                                          • Number of non-executed functions: 2
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                          • Excluded IPs from analysis (whitelisted): 199.232.214.172, 52.149.20.212, 13.107.246.63, 4.175.87.197
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • VT rate limit hit for: 6ee7HCp9cD.exe
                                          TimeTypeDescription
                                          15:52:03API Interceptor1x Sleep call for process: 6ee7HCp9cD.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          108.181.61.49888.exeGet hashmaliciousLuca StealerBrowse
                                          • /?output=json
                                          888.exeGet hashmaliciousLuca StealerBrowse
                                          • /?output=json
                                          Cracker.exeGet hashmaliciousLuca StealerBrowse
                                          • /?output=json
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ipwho.iswUSt04rfJ0.exeGet hashmaliciousQuasarBrowse
                                          • 108.181.61.49
                                          https://en.newsnowbangla.com/archives/69912Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                                          • 108.181.61.49
                                          StGx54oFh6.exeGet hashmaliciousQuasarBrowse
                                          • 108.181.61.49
                                          1AqzGcCKey.exeGet hashmaliciousQuasarBrowse
                                          • 108.181.61.49
                                          BJtvb5Vdhh.exeGet hashmaliciousQuasarBrowse
                                          • 108.181.61.49
                                          HquJT7q6xG.exeGet hashmaliciousQuasarBrowse
                                          • 108.181.61.49
                                          hKvlV6A1Rl.exeGet hashmaliciousQuasarBrowse
                                          • 108.181.61.49
                                          kqeGVKtpy2.exeGet hashmaliciousQuasarBrowse
                                          • 108.181.61.49
                                          LFLtlBAuf7.exeGet hashmaliciousQuasarBrowse
                                          • 108.181.61.49
                                          O9MV0lNEO5.exeGet hashmaliciousQuasarBrowse
                                          • 108.181.61.49
                                          bg.microsoft.map.fastly.netC8QT9HkXEb.exeGet hashmaliciousLummaCBrowse
                                          • 199.232.210.172
                                          P9UXlizXVS.exeGet hashmaliciousAsyncRATBrowse
                                          • 199.232.214.172
                                          Setup64v4.1.9.exeGet hashmaliciousUnknownBrowse
                                          • 199.232.214.172
                                          0Ty.png.exeGet hashmaliciousXmrigBrowse
                                          • 199.232.214.172
                                          0442.pdf.exeGet hashmaliciousUnknownBrowse
                                          • 199.232.210.172
                                          0442.pdf.exeGet hashmaliciousUnknownBrowse
                                          • 199.232.214.172
                                          yvaKqhmD4L.exeGet hashmaliciousUnknownBrowse
                                          • 199.232.210.172
                                          #U5b89#U88c5#U7a0b#U5e8f_1.1.1.exeGet hashmaliciousUnknownBrowse
                                          • 199.232.210.172
                                          IoIB9gQ6OQ.exeGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                                          • 199.232.210.172
                                          eCompleted_419z.pdfGet hashmaliciousHTMLPhisherBrowse
                                          • 199.232.214.172
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          COGENT-174USxd.arm7.elfGet hashmaliciousMiraiBrowse
                                          • 38.190.108.87
                                          xd.sh4.elfGet hashmaliciousMiraiBrowse
                                          • 38.4.108.178
                                          xd.mpsl.elfGet hashmaliciousMiraiBrowse
                                          • 38.93.54.69
                                          armv6l.elfGet hashmaliciousMiraiBrowse
                                          • 38.225.230.112
                                          telnet.x86.elfGet hashmaliciousUnknownBrowse
                                          • 38.162.177.172
                                          armv5l.elfGet hashmaliciousMiraiBrowse
                                          • 38.152.226.178
                                          armv6l.elfGet hashmaliciousMiraiBrowse
                                          • 38.84.119.173
                                          loligang.spc.elfGet hashmaliciousMiraiBrowse
                                          • 38.79.241.5
                                          loligang.ppc.elfGet hashmaliciousMiraiBrowse
                                          • 206.84.128.167
                                          loligang.sh4.elfGet hashmaliciousMiraiBrowse
                                          • 149.51.205.61
                                          ASN852CAtelnet.sh4.elfGet hashmaliciousUnknownBrowse
                                          • 75.155.196.115
                                          armv6l.elfGet hashmaliciousUnknownBrowse
                                          • 205.250.152.203
                                          wUSt04rfJ0.exeGet hashmaliciousQuasarBrowse
                                          • 108.181.61.49
                                          armv7l.elfGet hashmaliciousUnknownBrowse
                                          • 75.155.145.0
                                          jklspc.elfGet hashmaliciousUnknownBrowse
                                          • 50.99.243.16
                                          splsh4.elfGet hashmaliciousUnknownBrowse
                                          • 207.34.140.144
                                          splmips.elfGet hashmaliciousUnknownBrowse
                                          • 142.241.147.185
                                          splx86.elfGet hashmaliciousUnknownBrowse
                                          • 199.126.48.47
                                          arm5.elfGet hashmaliciousUnknownBrowse
                                          • 137.186.136.207
                                          https://en.newsnowbangla.com/archives/69912Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                                          • 108.181.61.49
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          3b5074b1b5d032e5620f69f9f700ff0ehttps://www.gglusa.us/Get hashmaliciousUnknownBrowse
                                          • 108.181.61.49
                                          ERTL09tA59.exeGet hashmaliciousLummaCBrowse
                                          • 108.181.61.49
                                          GtEVo1eO2p.exeGet hashmaliciousLummaCBrowse
                                          • 108.181.61.49
                                          TTsfmr1RWm.exeGet hashmaliciousLummaCBrowse
                                          • 108.181.61.49
                                          Dotc67890990.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 108.181.61.49
                                          ciwa.mp4.htaGet hashmaliciousLummaC, PureLog StealerBrowse
                                          • 108.181.61.49
                                          INQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                          • 108.181.61.49
                                          00000.ps1Get hashmaliciousLummaCBrowse
                                          • 108.181.61.49
                                          No context
                                          Process:C:\Users\user\Desktop\6ee7HCp9cD.exe
                                          File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                          Category:dropped
                                          Size (bytes):71954
                                          Entropy (8bit):7.996617769952133
                                          Encrypted:true
                                          SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                          MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                          SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                          SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                          SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                          Process:C:\Users\user\Desktop\6ee7HCp9cD.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):328
                                          Entropy (8bit):3.2539954282295116
                                          Encrypted:false
                                          SSDEEP:6:kKiPL9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:iiDImsLNkPlE99SNxAhUe/3
                                          MD5:A7C32FD162BC27C0899AF4E59A8359A3
                                          SHA1:ACB2F0EDEEEA10955F8A6D78B48B7DE00F9D14BF
                                          SHA-256:D1AF7C4B08E13392283D8985DF80E2D92CCA2D3A0FD6671DD128D5BA4F02DAA0
                                          SHA-512:BFEFDB176CAA7088584755F3A8FA52BAC3854F6EE51C1F366150DA834DE04C201C7D0BD2DC5A2343F657D509C67B7F50097D3F48959868BE3C14CDB4070BCE6B
                                          Malicious:false
                                          Reputation:low
                                          Preview:p...... ..........?..W..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):6.0841948056934365
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Windows Screen Saver (13104/52) 0.07%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          File name:6ee7HCp9cD.exe
                                          File size:3'265'536 bytes
                                          MD5:57caa771cdc49a089b783f3df4e72f99
                                          SHA1:94609144f4752e594e6f569f05cea5c2f80473e0
                                          SHA256:23d78defb24bc7e2496d016a368054df8f7f9b64988ffcba00dab9311b7329d4
                                          SHA512:f145321b4bf217ae71855a86619faf8f17ae8f3f1f13f4611f5e7809cba5c1fe71185d8227897fb7f83741b2cc348792ae918e45d98e9c0d647dcc0f7e3ea2f0
                                          SSDEEP:49152:CvWI22SsaNYfdPBldt698dBcjHM9RJ6DbR3LoGdRVTHHB72eh2NT:Cv722SsaNYfdPBldt6+dBcjHM9RJ61B
                                          TLSH:F9E56B143BF85E27E1BBE277A5B0041267F0FC1AF363EB0B6581677A1C53B5098426A7
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@................................
                                          Icon Hash:00928e8e8686b000
                                          Entrypoint:0x71e3ee
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3a00x4b.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xa93.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000x31c3f40x31c400fe773ce0c694de55e8a7496a66a8a5fdunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0x3200000xa930xc00cdeae95ac72e9e58017d2bcc89d2fbeaFalse0.36328125data4.653972105845318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x3220000xc0x200221440a5d95d2d9aec29428c5700ca78False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_VERSION0x3200a00x31cdata0.4484924623115578
                                          RT_MANIFEST0x3203bc0x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-12-26T21:52:00.866529+01002027619ET MALWARE Observed Malicious SSL Cert (Quasar CnC)1149.50.108.1167332192.168.2.549704TCP
                                          2024-12-26T21:52:00.866529+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert1149.50.108.1167332192.168.2.549704TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 26, 2024 21:51:59.247953892 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:51:59.367808104 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:51:59.368017912 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:51:59.379103899 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:51:59.498847008 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:52:00.741384029 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:52:00.741414070 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:52:00.741589069 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:52:00.747036934 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:52:00.866528988 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:52:01.176455021 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:52:01.230263948 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:52:04.439743042 CET49706443192.168.2.5108.181.61.49
                                          Dec 26, 2024 21:52:04.439811945 CET44349706108.181.61.49192.168.2.5
                                          Dec 26, 2024 21:52:04.439899921 CET49706443192.168.2.5108.181.61.49
                                          Dec 26, 2024 21:52:04.441334009 CET49706443192.168.2.5108.181.61.49
                                          Dec 26, 2024 21:52:04.441344023 CET44349706108.181.61.49192.168.2.5
                                          Dec 26, 2024 21:52:07.002856016 CET44349706108.181.61.49192.168.2.5
                                          Dec 26, 2024 21:52:07.002945900 CET49706443192.168.2.5108.181.61.49
                                          Dec 26, 2024 21:52:07.007972002 CET49706443192.168.2.5108.181.61.49
                                          Dec 26, 2024 21:52:07.007996082 CET44349706108.181.61.49192.168.2.5
                                          Dec 26, 2024 21:52:07.008246899 CET44349706108.181.61.49192.168.2.5
                                          Dec 26, 2024 21:52:07.035466909 CET49706443192.168.2.5108.181.61.49
                                          Dec 26, 2024 21:52:07.083343983 CET44349706108.181.61.49192.168.2.5
                                          Dec 26, 2024 21:52:07.659284115 CET44349706108.181.61.49192.168.2.5
                                          Dec 26, 2024 21:52:07.659379005 CET44349706108.181.61.49192.168.2.5
                                          Dec 26, 2024 21:52:07.659461975 CET49706443192.168.2.5108.181.61.49
                                          Dec 26, 2024 21:52:07.739475012 CET49706443192.168.2.5108.181.61.49
                                          Dec 26, 2024 21:52:07.943099976 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:52:08.062829971 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:52:08.062915087 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:52:08.182929993 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:52:08.512716055 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:52:08.558497906 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:52:08.722991943 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:52:08.777084112 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:52:33.730206966 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:52:33.849754095 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:52:58.858818054 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:52:58.978395939 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:53:23.980420113 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:53:24.100557089 CET733249704149.50.108.116192.168.2.5
                                          Dec 26, 2024 21:53:49.105273008 CET497047332192.168.2.5149.50.108.116
                                          Dec 26, 2024 21:53:49.224968910 CET733249704149.50.108.116192.168.2.5
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 26, 2024 21:52:04.292561054 CET6036153192.168.2.51.1.1.1
                                          Dec 26, 2024 21:52:04.430874109 CET53603611.1.1.1192.168.2.5
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Dec 26, 2024 21:52:04.292561054 CET192.168.2.51.1.1.10xa10Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Dec 26, 2024 21:52:02.282419920 CET1.1.1.1192.168.2.50xbde4No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                          Dec 26, 2024 21:52:02.282419920 CET1.1.1.1192.168.2.50xbde4No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                          Dec 26, 2024 21:52:04.430874109 CET1.1.1.1192.168.2.50xa10No error (0)ipwho.is108.181.61.49A (IP address)IN (0x0001)false
                                          • ipwho.is
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.549706108.181.61.494436752C:\Users\user\Desktop\6ee7HCp9cD.exe
                                          TimestampBytes transferredDirectionData
                                          2024-12-26 20:52:07 UTC150OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                          Host: ipwho.is
                                          Connection: Keep-Alive
                                          2024-12-26 20:52:07 UTC223INHTTP/1.1 200 OK
                                          Date: Thu, 26 Dec 2024 20:52:07 GMT
                                          Content-Type: application/json; charset=utf-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Server: ipwhois
                                          Access-Control-Allow-Headers: *
                                          X-Robots-Tag: noindex
                                          2024-12-26 20:52:07 UTC1021INData Raw: 33 66 31 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f
                                          Data Ascii: 3f1{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.189", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yo


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Target ID:0
                                          Start time:15:51:55
                                          Start date:26/12/2024
                                          Path:C:\Users\user\Desktop\6ee7HCp9cD.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\6ee7HCp9cD.exe"
                                          Imagebase:0x4a0000
                                          File size:3'265'536 bytes
                                          MD5 hash:57CAA771CDC49A089B783F3DF4E72F99
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.2027522922.00000000007C0000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.3273439411.0000000002C02000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.3273439411.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.2027138086.00000000004A2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:5.9%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:3
                                            Total number of Limit Nodes:0
                                            execution_graph 55296 7ff848e83569 55297 7ff848e83571 DeleteFileW 55296->55297 55299 7ff848e83616 55297->55299
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: H
                                            • API String ID: 0-2852464175
                                            • Opcode ID: 635309d6816fb509a6f257f9862ca192ae9c138f2d1a10c2d81a6113efbfde44
                                            • Instruction ID: 276ca89027579367aa6e20ec1ffef8dbb2642e5371ad2db306103770f6e9214c
                                            • Opcode Fuzzy Hash: 635309d6816fb509a6f257f9862ca192ae9c138f2d1a10c2d81a6113efbfde44
                                            • Instruction Fuzzy Hash: FA73A411F1CD8B5FF7B9BA2C045527956D2FF99681B9905BAD00EC32DAEE2CEC024748
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $
                                            • API String ID: 0-227171996
                                            • Opcode ID: 0760a60132ada1cfbef44180f5b16ff9eabcec0131571bea8e86aaa3883b1f0c
                                            • Instruction ID: d11a0c8f9a551166fdf2444883adf76dad205e7192ec65e38412b58a765dfc9f
                                            • Opcode Fuzzy Hash: 0760a60132ada1cfbef44180f5b16ff9eabcec0131571bea8e86aaa3883b1f0c
                                            • Instruction Fuzzy Hash: 6782A171A1C9894FEBB8EF2C845AA7437D1FF58340B5440F9D44EC76A2EE29EC458B41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4235c18cfb7f65be7dafcb799bbae1bf8186747e143e36768fca40f15c61291e
                                            • Instruction ID: 0fbfcc0f431659dd94b9cac3284b84ee22ccb31decf229a99a2f7d5f29cad749
                                            • Opcode Fuzzy Hash: 4235c18cfb7f65be7dafcb799bbae1bf8186747e143e36768fca40f15c61291e
                                            • Instruction Fuzzy Hash: 8F92AF70A1CA59CFDFA8EF18C494BA877E2FF58740F1441A8D44ED7296CA35E986CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c02115194ec155cf947def6fc4cf583dcb092f20ecdcd8342987d795a9476206
                                            • Instruction ID: 182a77dba67b4bd125991374fcaffaf6ff6d824de1a813bcc7cbae9a5d0db629
                                            • Opcode Fuzzy Hash: c02115194ec155cf947def6fc4cf583dcb092f20ecdcd8342987d795a9476206
                                            • Instruction Fuzzy Hash: 89620631B1C9898FEBA8FB2C9455A7973D1FF99350F1500B9D44EC72A6DE28EC428741
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 13e9b4c91132da925cd0c37e483ff7597c56bf30ad04d0e455e276113865c82c
                                            • Instruction ID: b1d41cbc39c5bad66e2ba105d51cf20fb4f8ea50e29aeb1053e805560ce73664
                                            • Opcode Fuzzy Hash: 13e9b4c91132da925cd0c37e483ff7597c56bf30ad04d0e455e276113865c82c
                                            • Instruction Fuzzy Hash: 53626F3060CA498FEBA8EF2CC495B6977E2FF99340F1445B9E44DC72A6DE74E8418B41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2015f30c90d2d4f54276a50a1a736cf35ad7069e05d3ddaf1f29ea49b17011d5
                                            • Instruction ID: d70104803afdaf6a4206aa91972498fd68b066f85a52d37dfb4096182302d1da
                                            • Opcode Fuzzy Hash: 2015f30c90d2d4f54276a50a1a736cf35ad7069e05d3ddaf1f29ea49b17011d5
                                            • Instruction Fuzzy Hash: 6F323A30A5DA8A4FE769EF2C9445AB977D1FF54380F4405F9D48EC3586EE29B8028781
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c8b8f41663a3b43a6d5112951c2c8020597625644faa38a10632e581eb624930
                                            • Instruction ID: 3d6954d07bc49e8c945f6b6f236833e769ac3b4ed81cc0f124bba562fb3e77bf
                                            • Opcode Fuzzy Hash: c8b8f41663a3b43a6d5112951c2c8020597625644faa38a10632e581eb624930
                                            • Instruction Fuzzy Hash: 02323671E5DACA4FEBA5AB284816AB47BD0FF55350F0801FAD04DC7593EE2D6C068B41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 24adc9f0bdcd43263f2da2ba46329fa81f6e09152b9b0c52926c7e9ce44a39ea
                                            • Instruction ID: 9a1230c699cceba17c5405a2af93cf008f07d96e669bb76ad80321fd6232d7a5
                                            • Opcode Fuzzy Hash: 24adc9f0bdcd43263f2da2ba46329fa81f6e09152b9b0c52926c7e9ce44a39ea
                                            • Instruction Fuzzy Hash: 0C32DA31A1CE8A8FDBA8EF28844567577E1FF54350F5405BEC44EC7686EE29F8428B81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ddf4fc4229cfb43228283a1bab076ec6c969ad9f2bb10ef3ac8b6d22c876dcdc
                                            • Instruction ID: eaf5fc3e4383e9468f948ac6e12e6f52ef2d18744292c35336de2d5e7bc46a9d
                                            • Opcode Fuzzy Hash: ddf4fc4229cfb43228283a1bab076ec6c969ad9f2bb10ef3ac8b6d22c876dcdc
                                            • Instruction Fuzzy Hash: 4322A130A1CA498FEBA8EF2888557B973E2FF98340F54417DD44EC3296DE78E9468744
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 715b1201c7732fd7bb53d8b91157e7164eb707ebcf6bb7be8c95a67512a33268
                                            • Instruction ID: 950cac12596bbec8d7e7516236b40fba14d0c9bffc8d7ca01bb8283e645bfd38
                                            • Opcode Fuzzy Hash: 715b1201c7732fd7bb53d8b91157e7164eb707ebcf6bb7be8c95a67512a33268
                                            • Instruction Fuzzy Hash: 12324E30A18A598FEFA4EF18C8857A9B3E1FFA8341F1045B9D44ED3295DB74E981CB41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 031633f4dc0e2cd14811a2226bf07722025939b955a7ca58469bffbdf0b6fa3c
                                            • Instruction ID: dd1017cbcc6ddd4787e23c34bfd4f743dc8283155ebe836968cf7f9b7b0d04ab
                                            • Opcode Fuzzy Hash: 031633f4dc0e2cd14811a2226bf07722025939b955a7ca58469bffbdf0b6fa3c
                                            • Instruction Fuzzy Hash: A7F1963090CA8D8FEBA8EF28C8557E937E1FF54350F04426EE84DC7695DB3999458B82
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9b3cb6a6fff7323e24767e7d09816d6b96bb6f9befc09ec0f18228874c1b1759
                                            • Instruction ID: 0353832c94c746f395e8104e8562cd812f70d7757d385b8de7ef319cd2bca93e
                                            • Opcode Fuzzy Hash: 9b3cb6a6fff7323e24767e7d09816d6b96bb6f9befc09ec0f18228874c1b1759
                                            • Instruction Fuzzy Hash: BCE1B43090CA8E8FEBA8EF28C8557E977D1FF94350F04426AD84DC7691DF79A9418B81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1567 7ff8490fc349-7ff8490fc3e1 1575 7ff8490fc3e3-7ff8490fc3e9 1567->1575 1576 7ff8490fc459-7ff8490fc461 1567->1576 1577 7ff8490fc3f0-7ff8490fc3fe 1575->1577 1579 7ff8490fc400-7ff8490fc408 1577->1579 1580 7ff8490fc478-7ff8490fc494 1577->1580 1582 7ff8490fc441-7ff8490fc457 1579->1582 1583 7ff8490fc40a-7ff8490fc42f 1579->1583 1584 7ff8490fc496-7ff8490fc4a0 1580->1584 1582->1575 1582->1576 1589 7ff8490fc431-7ff8490fc438 1583->1589 1587 7ff8490fc4a7-7ff8490fc4dd call 7ff8490f6690 1584->1587 1594 7ff8490fc4e4-7ff8490fc4e7 1587->1594 1589->1582 1595 7ff8490fc4f1-7ff8490fc52f 1594->1595
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: XQH$a%_H
                                            • API String ID: 0-2074433851
                                            • Opcode ID: cccf5022cac4fc8d36acfdc6324b6831e6ccc7138faf45d76b7d831c0c222cd3
                                            • Instruction ID: 5b25bed0597457eb257369cbddb5c87d42709f0449c04a8474821e9d27a880d1
                                            • Opcode Fuzzy Hash: cccf5022cac4fc8d36acfdc6324b6831e6ccc7138faf45d76b7d831c0c222cd3
                                            • Instruction Fuzzy Hash: 13512732E1CD8A9FEBA8EA2894526B573D1FF98790F54047DC04EC328ADE28F9464741

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1600 7ff849102a17-7ff849102a41 1604 7ff849102a43-7ff849102a5b 1600->1604 1605 7ff849102a5d-7ff849102c19 1600->1605 1604->1605 1607 7ff849102c3b-7ff849102c70 1605->1607 1608 7ff849102c1b-7ff849102c38 1605->1608 1613 7ff849102c72-7ff849102c97 1607->1613 1614 7ff849102c99-7ff849102c9b 1607->1614 1608->1607 1615 7ff849102c9e-7ff849102cb1 1613->1615 1614->1615 1619 7ff849102cb3-7ff849102cd8 1615->1619 1620 7ff849102cda-7ff849102cdc 1615->1620 1621 7ff849102cdf-7ff849102cf2 1619->1621 1620->1621 1626 7ff849102cf4-7ff849102d50 1621->1626 1627 7ff849102d52-7ff849102d54 1621->1627 1628 7ff849102d57-7ff849102d6a 1626->1628 1627->1628 1633 7ff849102dd0-7ff849102dd2 1628->1633 1634 7ff849102d6c-7ff849102dce 1628->1634 1635 7ff849102dd5-7ff849102de8 1633->1635 1634->1635 1641 7ff849102dea-7ff849102e46 1635->1641 1642 7ff849102e48-7ff849102e4a 1635->1642 1646 7ff849102e4d-7ff849102e60 1641->1646 1642->1646 1650 7ff849102e62-7ff849102eac 1646->1650 1651 7ff849102eae-7ff849102eb0 1646->1651 1654 7ff849102eb3-7ff849102f2b call 7ff849102308 call 7ff849102318 1650->1654 1651->1654 1669 7ff849102f30-7ff849102f3e 1654->1669 1671 7ff849102fb2-7ff849102fc3 1669->1671 1673 7ff849102f40-7ff849102f6b 1671->1673 1674 7ff849102fc9-7ff8491030c4 call 7ff84910313a call 7ff849103175 1671->1674 1673->1671 1694 7ff8491030c6-7ff8491030dd 1674->1694 1695 7ff8491030df-7ff8491030ef 1674->1695 1696 7ff8491030f6-7ff849103138 1694->1696 1695->1696
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: cbef29697112c3380d37be20ce688577cc10f79e904737bb74697b0118cace0f
                                            • Instruction ID: 8caa399b1edd0cbae587b4710a8bdbfe8c859f6254762848b4b109229ce320fc
                                            • Opcode Fuzzy Hash: cbef29697112c3380d37be20ce688577cc10f79e904737bb74697b0118cace0f
                                            • Instruction Fuzzy Hash: C7F1AD70D1DA5A9EEBA8EB3884457BD7BE1FF58340F5404B9D00EE7282DE39A9418F40

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1700 7ff8490f2440-7ff84910a074 1702 7ff84910a07a-7ff84910a07f 1700->1702 1703 7ff84910a373-7ff84910a37d 1700->1703 1704 7ff84910a08b-7ff84910a0a4 1702->1704 1705 7ff84910a081-7ff84910a086 call 7ff8490f2438 1702->1705 1710 7ff84910a37e-7ff84910a3ee 1703->1710 1708 7ff84910a0b8-7ff84910a0e5 1704->1708 1709 7ff84910a0a6-7ff84910a0b2 1704->1709 1705->1704 1708->1710 1713 7ff84910a0eb-7ff84910a0f6 1708->1713 1709->1708 1740 7ff84910a40b-7ff84910a41c 1710->1740 1741 7ff84910a3f0-7ff84910a3f6 1710->1741 1715 7ff84910a0fc-7ff84910a10a 1713->1715 1716 7ff84910a1b4-7ff84910a1b9 1713->1716 1715->1710 1718 7ff84910a110-7ff84910a121 1715->1718 1719 7ff84910a23e-7ff84910a248 1716->1719 1720 7ff84910a1bf-7ff84910a1c9 1716->1720 1721 7ff84910a189-7ff84910a1a0 1718->1721 1722 7ff84910a123-7ff84910a146 1718->1722 1723 7ff84910a26a-7ff84910a271 1719->1723 1724 7ff84910a24a-7ff84910a268 call 7ff8490f2458 1719->1724 1720->1710 1725 7ff84910a1cf-7ff84910a1e3 1720->1725 1721->1710 1729 7ff84910a1a6-7ff84910a1ae 1721->1729 1727 7ff84910a1e8-7ff84910a1ed 1722->1727 1728 7ff84910a14c-7ff84910a15f 1722->1728 1730 7ff84910a274-7ff84910a27e 1723->1730 1724->1723 1725->1730 1734 7ff84910a163-7ff84910a187 1727->1734 1728->1734 1729->1715 1729->1716 1730->1710 1735 7ff84910a284-7ff84910a29c 1730->1735 1734->1721 1748 7ff84910a1f2-7ff84910a1f5 1734->1748 1735->1710 1736 7ff84910a2a2-7ff84910a2ba 1735->1736 1736->1710 1739 7ff84910a2c0-7ff84910a2e5 1736->1739 1739->1710 1761 7ff84910a2eb-7ff84910a2fe 1739->1761 1746 7ff84910a42d-7ff84910a450 1740->1746 1747 7ff84910a41e-7ff84910a42b 1740->1747 1744 7ff84910a3f8-7ff84910a409 1741->1744 1745 7ff84910a451-7ff84910a494 call 7ff8490f6a10 1741->1745 1744->1740 1744->1741 1766 7ff84910a4b0 1745->1766 1767 7ff84910a496-7ff84910a4ae 1745->1767 1747->1746 1749 7ff84910a20b-7ff84910a218 1748->1749 1750 7ff84910a1f7-7ff84910a207 1748->1750 1749->1710 1753 7ff84910a21e-7ff84910a23d 1749->1753 1750->1749 1764 7ff84910a300-7ff84910a30b 1761->1764 1765 7ff84910a361-7ff84910a372 1761->1765 1764->1765 1771 7ff84910a30d-7ff84910a324 1764->1771 1770 7ff84910a4b7-7ff84910a4d9 1766->1770 1767->1766 1775 7ff84910a335-7ff84910a35c call 7ff8490f2458 1771->1775 1776 7ff84910a326-7ff84910a333 1771->1776 1775->1765 1776->1775
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: d
                                            • API String ID: 0-2564639436
                                            • Opcode ID: a1e344fd6b033197095050911502ad1d60e490a98d0783fa55703c696f9bce4f
                                            • Instruction ID: 120fa4fc487080df0a0f90c42457edf235210545d1d73e0ea656ab0a9cb9e186
                                            • Opcode Fuzzy Hash: a1e344fd6b033197095050911502ad1d60e490a98d0783fa55703c696f9bce4f
                                            • Instruction Fuzzy Hash: DCF1E130A1CA498FD768EF18C48957573E1FF98340B2445BED44AC769AEE39EC42CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1781 7ff8490f3f3d-7ff8490f3f3e 1782 7ff8490f3f40-7ff8490f3f47 1781->1782 1783 7ff8490f3f9f-7ff8490f3fa6 1781->1783 1784 7ff8490f3fab-7ff8490f3fbd 1783->1784 1785 7ff8490f3fa8-7ff8490f3fa9 1783->1785 1787 7ff8490f3fbf-7ff8490f3fc7 1784->1787 1788 7ff8490f400d-7ff8490f400e 1784->1788 1785->1784 1789 7ff8490f4002-7ff8490f4008 1787->1789 1790 7ff8490f3fc9-7ff8490f3fcc 1787->1790 1792 7ff8490f4015-7ff8490f401d 1788->1792 1791 7ff8490f4513-7ff8490f4525 1789->1791 1790->1789 1793 7ff8490f3fce-7ff8490f3fd9 1790->1793 1796 7ff8490f4526-7ff8490f4539 1791->1796 1794 7ff8490f401f-7ff8490f4034 1792->1794 1795 7ff8490f4038-7ff8490f403e 1792->1795 1797 7ff8490f3fdb-7ff8490f3ff6 1793->1797 1794->1795 1798 7ff8490f4044-7ff8490f4058 1795->1798 1799 7ff8490f4379-7ff8490f4380 1795->1799 1807 7ff8490f3ffd 1797->1807 1798->1799 1800 7ff8490f4387-7ff8490f4393 1799->1800 1801 7ff8490f4382-7ff8490f4385 1799->1801 1803 7ff8490f4395-7ff8490f4398 1800->1803 1801->1803 1804 7ff8490f43a5-7ff8490f43ad 1803->1804 1805 7ff8490f439a-7ff8490f43a0 1803->1805 1808 7ff8490f43b3-7ff8490f43d0 1804->1808 1809 7ff8490f450d 1804->1809 1805->1796 1807->1796 1811 7ff8490f43f7-7ff8490f4402 1808->1811 1812 7ff8490f43d2-7ff8490f43e2 call 7ff8490f3020 1808->1812 1809->1791 1814 7ff8490f44c2-7ff8490f44c5 1811->1814 1815 7ff8490f4408-7ff8490f440d 1811->1815 1812->1811 1822 7ff8490f43e4-7ff8490f43f2 1812->1822 1814->1809 1816 7ff8490f44c7-7ff8490f44cd 1814->1816 1818 7ff8490f4414-7ff8490f4417 1815->1818 1819 7ff8490f440f 1815->1819 1820 7ff8490f44d6 1816->1820 1821 7ff8490f44cf-7ff8490f44d4 1816->1821 1823 7ff8490f4427-7ff8490f442a 1818->1823 1824 7ff8490f4419-7ff8490f4423 1818->1824 1819->1818 1827 7ff8490f44db-7ff8490f450b 1820->1827 1821->1827 1822->1811 1825 7ff8490f442c-7ff8490f442f 1823->1825 1826 7ff8490f447a-7ff8490f447d 1823->1826 1824->1823 1828 7ff8490f4451-7ff8490f4454 1825->1828 1829 7ff8490f4431-7ff8490f444b 1825->1829 1831 7ff8490f447f-7ff8490f4488 1826->1831 1832 7ff8490f448a-7ff8490f448f 1826->1832 1827->1796 1833 7ff8490f4456-7ff8490f445c 1828->1833 1834 7ff8490f4464-7ff8490f446a 1828->1834 1829->1828 1841 7ff8490f453a-7ff8490f4561 1829->1841 1836 7ff8490f4493-7ff8490f44c0 1831->1836 1832->1836 1833->1834 1838 7ff8490f445e-7ff8490f4461 1833->1838 1834->1826 1839 7ff8490f446c-7ff8490f4476 1834->1839 1836->1796 1838->1834 1839->1826 1846 7ff8490f4563-7ff8490f4576 1841->1846 1847 7ff8490f4578-7ff8490f459c 1841->1847 1850 7ff8490f459e-7ff8490f4614 1846->1850 1847->1850 1855 7ff8490f4616-7ff8490f4618 1850->1855 1856 7ff8490f4619-7ff8490f4653 1850->1856 1855->1856 1859 7ff8490f4664-7ff8490f4676 1856->1859 1860 7ff8490f4655-7ff8490f465d 1856->1860 1864 7ff8490f4683-7ff8490f468c 1859->1864 1865 7ff8490f4678-7ff8490f4682 1859->1865 1860->1859 1861 7ff8490f465f 1860->1861 1863 7ff8490f46fc-7ff8490f4701 1861->1863 1864->1863
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: d0a54bb336d752aa7b4a4755fc489d76c9afae5c66f9b1460baf5a802b4d61e7
                                            • Instruction ID: 9db873db5381a450bf3e88494876e3294b7aa16ac62f3311d29ddd75b5047094
                                            • Opcode Fuzzy Hash: d0a54bb336d752aa7b4a4755fc489d76c9afae5c66f9b1460baf5a802b4d61e7
                                            • Instruction Fuzzy Hash: DDD11931A0DB8A8FEBA5EF28945937837D1EF46750F0401BAD889C72D7DE58ED468342

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1867 7ff84910e03f-7ff84910e0c7 1873 7ff84910e0cd-7ff84910e0d5 1867->1873 1874 7ff84910e314-7ff84910e31d 1867->1874 1877 7ff84910e0e4-7ff84910e0fb 1873->1877 1878 7ff84910e0d7-7ff84910e0dc 1873->1878 1875 7ff84910e1a1-7ff84910e1cf 1874->1875 1876 7ff84910e323-7ff84910e32b 1874->1876 1886 7ff84910e1d5-7ff84910e1f6 1875->1886 1887 7ff84910dd67-7ff84910dd73 1875->1887 1876->1875 1880 7ff84910e331-7ff84910e342 1876->1880 1884 7ff84910e24e-7ff84910e295 1877->1884 1885 7ff84910e101-7ff84910e193 1877->1885 1878->1877 1880->1875 1888 7ff84910e348-7ff84910e378 1880->1888 1894 7ff84910e2b2-7ff84910e2bb 1884->1894 1895 7ff84910e297-7ff84910e2a6 1884->1895 1896 7ff84910e19a-7ff84910e19b 1885->1896 1886->1887 1897 7ff84910dd79-7ff84910dd91 1887->1897 1898 7ff84910de22-7ff84910de29 1887->1898 1888->1875 1902 7ff84910e3e1-7ff84910e400 call 7ff84910e402 1888->1902 1901 7ff84910e2be-7ff84910e305 1894->1901 1905 7ff84910e2ad-7ff84910e2b0 1895->1905 1896->1875 1907 7ff84910e37d-7ff84910e395 1897->1907 1908 7ff84910dd97-7ff84910ddc2 1897->1908 1898->1902 1903 7ff84910de33-7ff84910de61 1898->1903 1906 7ff84910e30c-7ff84910e30f 1901->1906 1905->1901 1906->1875 1907->1903 1915 7ff84910e39b-7ff84910e3da 1907->1915 1916 7ff84910ddc9-7ff84910dddd 1908->1916 1915->1902 1922 7ff84910dddf-7ff84910ddf0 1916->1922 1923 7ff84910ddf2-7ff84910de20 1916->1923 1922->1898 1922->1923 1923->1898
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: H
                                            • API String ID: 0-2852464175
                                            • Opcode ID: 208a2414ad57dfc27d84edba4a8d65f1736aff08ad4a30a5b26f2fb2f145f345
                                            • Instruction ID: 00ad507edb6e821e4a2fe0c3702491de0856111bd81b3a8070b55a07783c5cb0
                                            • Opcode Fuzzy Hash: 208a2414ad57dfc27d84edba4a8d65f1736aff08ad4a30a5b26f2fb2f145f345
                                            • Instruction Fuzzy Hash: 1FD19370A1CA498FDB98EF1C84957B933E1FF98744F5401A9D84AC7286DE39EC52CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1929 7ff848e83525-7ff848e8352f 1930 7ff848e83571-7ff848e835d8 1929->1930 1931 7ff848e83531-7ff848e83562 1929->1931 1937 7ff848e835da-7ff848e835df 1930->1937 1938 7ff848e835e2-7ff848e83614 DeleteFileW 1930->1938 1931->1930 1937->1938 1939 7ff848e8361c-7ff848e8364a 1938->1939 1940 7ff848e83616 1938->1940 1940->1939
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3276173785.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff848e80000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID: DeleteFile
                                            • String ID:
                                            • API String ID: 4033686569-0
                                            • Opcode ID: 491ef5f0953b346cb2f12059c338ddb068e5f6bff0acd2c2b62b736ef5492a80
                                            • Instruction ID: 4ed740bad54b4521e1db6df516c5e2a323a317978d4e8e5607700c6048ae95ce
                                            • Opcode Fuzzy Hash: 491ef5f0953b346cb2f12059c338ddb068e5f6bff0acd2c2b62b736ef5492a80
                                            • Instruction Fuzzy Hash: F441013180DB9C9FDB19EB6888496E97FF0FF56310F0482ABD049D71A2DB346809CB91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1942 7ff848e83569-7ff848e835d8 1947 7ff848e835da-7ff848e835df 1942->1947 1948 7ff848e835e2-7ff848e83614 DeleteFileW 1942->1948 1947->1948 1949 7ff848e8361c-7ff848e8364a 1948->1949 1950 7ff848e83616 1948->1950 1950->1949
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3276173785.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff848e80000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID: DeleteFile
                                            • String ID:
                                            • API String ID: 4033686569-0
                                            • Opcode ID: 88b359e5c3c419f8fbffcfe6d47c201299e0cc5a58821431f4ee71b6cab0683b
                                            • Instruction ID: b59afe16d5ceda7914540f719f638d861f645694ee169095ad919aa532de35b8
                                            • Opcode Fuzzy Hash: 88b359e5c3c419f8fbffcfe6d47c201299e0cc5a58821431f4ee71b6cab0683b
                                            • Instruction Fuzzy Hash: 6131CF3190DA5C9FDB19EB6888496E9BBF0FF65310F04426BD049D3692DB74A805CB91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1952 7ff84910a021-7ff84910a074 1954 7ff84910a07a-7ff84910a07f 1952->1954 1955 7ff84910a373-7ff84910a37d 1952->1955 1956 7ff84910a08b-7ff84910a0a4 1954->1956 1957 7ff84910a081-7ff84910a086 call 7ff8490f2438 1954->1957 1962 7ff84910a37e-7ff84910a3ee 1955->1962 1960 7ff84910a0b8-7ff84910a0e5 1956->1960 1961 7ff84910a0a6-7ff84910a0b2 1956->1961 1957->1956 1960->1962 1965 7ff84910a0eb-7ff84910a0f6 1960->1965 1961->1960 1992 7ff84910a40b-7ff84910a41c 1962->1992 1993 7ff84910a3f0-7ff84910a3f6 1962->1993 1967 7ff84910a0fc-7ff84910a10a 1965->1967 1968 7ff84910a1b4-7ff84910a1b9 1965->1968 1967->1962 1970 7ff84910a110-7ff84910a121 1967->1970 1971 7ff84910a23e-7ff84910a248 1968->1971 1972 7ff84910a1bf-7ff84910a1c9 1968->1972 1973 7ff84910a189-7ff84910a1a0 1970->1973 1974 7ff84910a123-7ff84910a146 1970->1974 1975 7ff84910a26a-7ff84910a271 1971->1975 1976 7ff84910a24a-7ff84910a268 call 7ff8490f2458 1971->1976 1972->1962 1977 7ff84910a1cf-7ff84910a1e3 1972->1977 1973->1962 1981 7ff84910a1a6-7ff84910a1ae 1973->1981 1979 7ff84910a1e8-7ff84910a1ed 1974->1979 1980 7ff84910a14c-7ff84910a15f 1974->1980 1982 7ff84910a274-7ff84910a27e 1975->1982 1976->1975 1977->1982 1986 7ff84910a163-7ff84910a187 1979->1986 1980->1986 1981->1967 1981->1968 1982->1962 1987 7ff84910a284-7ff84910a29c 1982->1987 1986->1973 2000 7ff84910a1f2-7ff84910a1f5 1986->2000 1987->1962 1988 7ff84910a2a2-7ff84910a2ba 1987->1988 1988->1962 1991 7ff84910a2c0-7ff84910a2e5 1988->1991 1991->1962 2013 7ff84910a2eb-7ff84910a2fe 1991->2013 1998 7ff84910a42d-7ff84910a450 1992->1998 1999 7ff84910a41e-7ff84910a42b 1992->1999 1996 7ff84910a3f8-7ff84910a409 1993->1996 1997 7ff84910a451-7ff84910a494 call 7ff8490f6a10 1993->1997 1996->1992 1996->1993 2018 7ff84910a4b0 1997->2018 2019 7ff84910a496-7ff84910a4ae 1997->2019 1999->1998 2001 7ff84910a20b-7ff84910a218 2000->2001 2002 7ff84910a1f7-7ff84910a207 2000->2002 2001->1962 2005 7ff84910a21e-7ff84910a23d 2001->2005 2002->2001 2016 7ff84910a300-7ff84910a30b 2013->2016 2017 7ff84910a361-7ff84910a372 2013->2017 2016->2017 2023 7ff84910a30d-7ff84910a324 2016->2023 2022 7ff84910a4b7-7ff84910a4d9 2018->2022 2019->2018 2027 7ff84910a335-7ff84910a35c call 7ff8490f2458 2023->2027 2028 7ff84910a326-7ff84910a333 2023->2028 2027->2017 2028->2027
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: d
                                            • API String ID: 0-2564639436
                                            • Opcode ID: 3d5a4f518f24287e36eddfca397c0cdcf33e386f0f5a33ff78c827a95fb44fbe
                                            • Instruction ID: 7c1c932beeb8771254e36acd84cbcbe0058063fa35011ce74c14c48aa9643c37
                                            • Opcode Fuzzy Hash: 3d5a4f518f24287e36eddfca397c0cdcf33e386f0f5a33ff78c827a95fb44fbe
                                            • Instruction Fuzzy Hash: 5EA1C130A1CA498FDB68EF08C48553577E1FF99344B2441BED44ACB656DA39E843CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2033 7ff8490f3451-7ff8490f345b 2034 7ff8490f3462-7ff8490f3473 2033->2034 2035 7ff8490f345d 2033->2035 2037 7ff8490f3475 2034->2037 2038 7ff8490f347a-7ff8490f34a7 2034->2038 2035->2034 2036 7ff8490f345f 2035->2036 2036->2034 2037->2038 2039 7ff8490f3477 2037->2039 2041 7ff8490f34d5-7ff8490f34e2 2038->2041 2042 7ff8490f34a9-7ff8490f34b3 2038->2042 2039->2038 2043 7ff8490f34b5-7ff8490f34cc 2042->2043 2044 7ff8490f34ee-7ff8490f355b call 7ff8490f3490 2042->2044 2047 7ff8490f34e3-7ff8490f34ed 2043->2047 2048 7ff8490f34ce-7ff8490f34d3 2043->2048 2053 7ff8490f359f-7ff8490f35b0 2044->2053 2054 7ff8490f355d-7ff8490f3577 2044->2054 2048->2041 2048->2042 2055 7ff8490f35b7-7ff8490f35e0 call 7ff8490f3490 2053->2055 2056 7ff8490f35b2 2053->2056 2059 7ff8490f3590-7ff8490f359e 2054->2059 2060 7ff8490f3579-7ff8490f3586 2054->2060 2065 7ff8490f3622-7ff8490f3629 2055->2065 2066 7ff8490f35e2-7ff8490f35fc 2055->2066 2056->2055 2060->2059 2063 7ff8490f3588-7ff8490f358e 2060->2063 2063->2059 2068 7ff8490f3630-7ff8490f3632 2065->2068 2070 7ff8490f3615-7ff8490f361d 2066->2070 2071 7ff8490f35fe-7ff8490f360b 2066->2071 2072 7ff8490f3634-7ff8490f3636 2068->2072 2073 7ff8490f3638-7ff8490f3659 2068->2073 2075 7ff8490f36a7-7ff8490f36be call 7ff8490f36bf 2070->2075 2071->2070 2077 7ff8490f360d-7ff8490f3613 2071->2077 2076 7ff8490f3663-7ff8490f3666 2072->2076 2079 7ff8490f3660-7ff8490f3661 2073->2079 2080 7ff8490f36a3-7ff8490f36a4 2076->2080 2081 7ff8490f3668-7ff8490f369c 2076->2081 2077->2070 2079->2076 2080->2075 2081->2080
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %_L
                                            • API String ID: 0-1469106525
                                            • Opcode ID: 64e0ac51a3cf778523c28f600a65707e873457414216df860fecf8e4582e0000
                                            • Instruction ID: be036ed84e252fcfaac51ac3102fce7f445f68a40fbbd3b037c19e0576b6a0bc
                                            • Opcode Fuzzy Hash: 64e0ac51a3cf778523c28f600a65707e873457414216df860fecf8e4582e0000
                                            • Instruction Fuzzy Hash: 21912731A0DA898FDBB9EF2884446B5B7E1FF953A0F0441BAD00DC3296DE69F945C781

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2143 7ff8490f20e2-7ff8490f2149 2151 7ff8490f216e-7ff8490f2215 2143->2151 2152 7ff8490f214b-7ff8490f216d 2143->2152 2164 7ff8490f2217-7ff8490f2220 2151->2164 2165 7ff8490f222d-7ff8490f2235 2151->2165 2152->2151 2166 7ff8490f2227-7ff8490f222b 2164->2166 2166->2164 2166->2165
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: #&_^
                                            • API String ID: 0-519297270
                                            • Opcode ID: 4132b3929704423fe387bcc39419e025ebd18f14bb134baf1174eb101320dd65
                                            • Instruction ID: 9809b1b66d64ab04ba19c936b46781a1f3c7d589f1c89ad16cbda41b651ed1f3
                                            • Opcode Fuzzy Hash: 4132b3929704423fe387bcc39419e025ebd18f14bb134baf1174eb101320dd65
                                            • Instruction Fuzzy Hash: AA412A77A89915AED714BE7DF4810E87350FF85376B0C8277C18CCA083DB2864858AE8

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2167 7ff8490f20d7-7ff8490f20d9 2168 7ff8490f20fe-7ff8490f2149 2167->2168 2169 7ff8490f20db-7ff8490f20df 2167->2169 2173 7ff8490f216e-7ff8490f2215 2168->2173 2174 7ff8490f214b-7ff8490f216d 2168->2174 2169->2168 2186 7ff8490f2217-7ff8490f2220 2173->2186 2187 7ff8490f222d-7ff8490f2235 2173->2187 2174->2173 2188 7ff8490f2227-7ff8490f222b 2186->2188 2188->2186 2188->2187
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: #&_^
                                            • API String ID: 0-519297270
                                            • Opcode ID: c0df1f62aa5517c9d86568ce955ece38ff6bdb6bbcf3ae061e86c2045112db08
                                            • Instruction ID: 6f87af935f437fa84a461e22683001ac71b0ceff11cf1f0dbbe188b22945baa9
                                            • Opcode Fuzzy Hash: c0df1f62aa5517c9d86568ce955ece38ff6bdb6bbcf3ae061e86c2045112db08
                                            • Instruction Fuzzy Hash: 8E312A77A895196ED714BE7DF4850E87390FF84376B088277C1C8CE083DA28A4858AE8

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2189 7ff8490f20cf-7ff8490f2149 2195 7ff8490f216e-7ff8490f2215 2189->2195 2196 7ff8490f214b-7ff8490f216d 2189->2196 2208 7ff8490f2217-7ff8490f2220 2195->2208 2209 7ff8490f222d-7ff8490f2235 2195->2209 2196->2195 2210 7ff8490f2227-7ff8490f222b 2208->2210 2210->2208 2210->2209
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: #&_^
                                            • API String ID: 0-519297270
                                            • Opcode ID: 9ac8b27621e596cee14e08943bdbb92bcbf6b60d026a382755a285f7011f5e45
                                            • Instruction ID: 0b686ea42c52679338b5a0859715d8c8b18cd13ac779e2a95e882e5f6d37f861
                                            • Opcode Fuzzy Hash: 9ac8b27621e596cee14e08943bdbb92bcbf6b60d026a382755a285f7011f5e45
                                            • Instruction Fuzzy Hash: CF314C77A8D519AEC714BE7DF4850F87390FF85775B0C8277C188CE083DA28A4858AE8

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2211 7ff8491c01ba-7ff8491c01c1 2212 7ff8491c01c7-7ff8491c0203 2211->2212 2213 7ff8491c079d-7ff8491c0805 2211->2213 2216 7ff8491c0209-7ff8491c0212 2212->2216 2218 7ff8491c0214-7ff8491c0222 2216->2218 2219 7ff8491c022c-7ff8491c0266 2216->2219 2218->2219 2223 7ff8491c0224-7ff8491c022a 2218->2223 2219->2213 2223->2219
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$_L
                                            • API String ID: 0-1450318517
                                            • Opcode ID: d21d439f61d60b855e161976b8d85675d02c9117b0d288d4ca127d3898d49c2d
                                            • Instruction ID: 7f103301c2e2fd9fec3b9418a2db1e44371f120ed2c5d4585946b74f07949ebe
                                            • Opcode Fuzzy Hash: d21d439f61d60b855e161976b8d85675d02c9117b0d288d4ca127d3898d49c2d
                                            • Instruction Fuzzy Hash: 92310431E1CA894FEA9DEA2C681637477D1EB59760F1801BED08EC32D2DE1C9C42874A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2231 7ff8490fd6d4-7ff8490fd792 2240 7ff8490fd79a-7ff8490fd7a7 2231->2240
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: N%_H
                                            • API String ID: 0-556661792
                                            • Opcode ID: ee869e4b686616a3bda5ffa49dd0e9f5bd0f4c183ef58fbb4ef6bc9fea54602b
                                            • Instruction ID: ff5d8c18d6d919d1d973b8a3f40f3f499ac563ce07ff397d376276b6be93f4e7
                                            • Opcode Fuzzy Hash: ee869e4b686616a3bda5ffa49dd0e9f5bd0f4c183ef58fbb4ef6bc9fea54602b
                                            • Instruction Fuzzy Hash: 92213831A0D7454FE7286E2C6859075BBD2EF99750B19417FE44EC7387ED29EC428240
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: XQH
                                            • API String ID: 0-1025391702
                                            • Opcode ID: 13ea7ad898eab27ced60422af3163f610b9610e8e35b4eb5fce08a287deb8511
                                            • Instruction ID: f79112d518616945b10c4a6aa426159bf242846be470acae02056df1e5a7e120
                                            • Opcode Fuzzy Hash: 13ea7ad898eab27ced60422af3163f610b9610e8e35b4eb5fce08a287deb8511
                                            • Instruction Fuzzy Hash: 8A212262E2CDCA6FEBA9EA3844566B567D1FFA9340F0440BAC04EC7287DE6CF9054341
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: XUH
                                            • API String ID: 0-3365837462
                                            • Opcode ID: b9a5363c4b952c8f833fb60a8c853ea645a04544ec501a78ee42c3602f209ca0
                                            • Instruction ID: c360d1a47cda7d164da01b1f12e700fb3853ec3ffaaf5e18b61a18df5f1a0749
                                            • Opcode Fuzzy Hash: b9a5363c4b952c8f833fb60a8c853ea645a04544ec501a78ee42c3602f209ca0
                                            • Instruction Fuzzy Hash: 84018661E1DEDA8FEB69FF3840515BA63D2FF98680B4844B9C05EC318ACF58E9464701
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5d9c029b96d4c7c7480b7a54b488a2dd294fbc6fc42a5d3744f7cb1646aa7f00
                                            • Instruction ID: 19c6f196002bd8fc93d2758c08d10d4621f5959cae579d2b9aff1037650bc0a6
                                            • Opcode Fuzzy Hash: 5d9c029b96d4c7c7480b7a54b488a2dd294fbc6fc42a5d3744f7cb1646aa7f00
                                            • Instruction Fuzzy Hash: 5D82FB7191E6C54FE775EB2888565A43BE0FF56350F0401F9D48DC79A3EA2D6C0A8F41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6aa156004c5d0a236c925bfc372a19c4324058c033b2d562f9eb38490d51abef
                                            • Instruction ID: cc8346dd18975a9c55e8a27d350f70c047ef8e0dfbc495311220d23d8ce87eb6
                                            • Opcode Fuzzy Hash: 6aa156004c5d0a236c925bfc372a19c4324058c033b2d562f9eb38490d51abef
                                            • Instruction Fuzzy Hash: DA62A330A1D98A8FDBA4FF18C446AA977E1FF59340F1001B9D44DC7696EA39E846CF81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 72191cd6cc74ece8c8c5fbe2c36f283426a505c93773418a7e8f36752813230e
                                            • Instruction ID: 9d00a969f36a8d1e07a234f3c3b5937a1e58259db3bf65aa83ac06039e59a10b
                                            • Opcode Fuzzy Hash: 72191cd6cc74ece8c8c5fbe2c36f283426a505c93773418a7e8f36752813230e
                                            • Instruction Fuzzy Hash: E572E371C5D6C65FE3B5AF2444076A43BE0FF5A390F0545F9C48D8B9A3FA2DA80A8B41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: be5e6429d7d84251743977321217d957a12fbdcec96c26e8765d3d18905dfd96
                                            • Instruction ID: 6ff5eb300b88e4da4211d28e35ee9e5ae41b619eafe0bf5f1c98bf729f28652f
                                            • Opcode Fuzzy Hash: be5e6429d7d84251743977321217d957a12fbdcec96c26e8765d3d18905dfd96
                                            • Instruction Fuzzy Hash: DD424F30A1D98A8FDBA8FF18C455AA977E1FF58340F5001A9E40DC7696DE39EC52CB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6409577dbcacbeacc7e135d1b6fcd1abdbca2d7e8302ddc1facc0008c5cabc89
                                            • Instruction ID: c729b329c7aadb48a90acbf5719c901d2e99d9011eee8e09fb6b83162c7dba70
                                            • Opcode Fuzzy Hash: 6409577dbcacbeacc7e135d1b6fcd1abdbca2d7e8302ddc1facc0008c5cabc89
                                            • Instruction Fuzzy Hash: 71428430A1CA999FDBA8FF289455BA9B7E1FF59340F5041B9D00DC3296DE39AC41CB41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4fc88484c1d8e9953d2726cae011c68dae3db79aab9af76a123a04969d0d50fa
                                            • Instruction ID: 8fbe0574aef0cbc12b409f20e59f30ee817d0bfcef7ebd8133737dcb36db17d8
                                            • Opcode Fuzzy Hash: 4fc88484c1d8e9953d2726cae011c68dae3db79aab9af76a123a04969d0d50fa
                                            • Instruction Fuzzy Hash: BE423F30A1D98E8FDB95FF18C455AA977E1FF59340F5401A9E40DC7296DA39EC42CB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9b3247e1fdc026fc078817847d638c46cb1008085ab5d4334919710d74b0eec1
                                            • Instruction ID: 3826ddaf3424175d3593daed6c06345472b06fbaa7e25a492e2a36c28dcebee6
                                            • Opcode Fuzzy Hash: 9b3247e1fdc026fc078817847d638c46cb1008085ab5d4334919710d74b0eec1
                                            • Instruction Fuzzy Hash: 5EF11430A0CA895FEBA5FF2C944667477E2FF99350F0409B9D04DC7696EE2DAC428B41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4fd44d7083de2edd75b9058d705b7a57e72f1122eb3b671bf84448ea6b904181
                                            • Instruction ID: af006b05014f9a9a314c946e23adde65991b39f36f653bc7ccc1fb1649ff5303
                                            • Opcode Fuzzy Hash: 4fd44d7083de2edd75b9058d705b7a57e72f1122eb3b671bf84448ea6b904181
                                            • Instruction Fuzzy Hash: 5EF1D531E0C98E8FDBA5EF6C94656A977E1FF99350F1401BAD40DC7286DE29AC018B81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cac2b6140a221f4489845a7c3609568426d4a0d48339465544ca8630012ba727
                                            • Instruction ID: ce0cc9eb2aa052bcf3df8f1f44667a5e8bf9af244acdc6af799ef1e82426f43b
                                            • Opcode Fuzzy Hash: cac2b6140a221f4489845a7c3609568426d4a0d48339465544ca8630012ba727
                                            • Instruction Fuzzy Hash: 3EF18530A1CA599FDBA8FF289455BA9B7E1FF59340F4441B9D00DC3296DE39AC41CB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 042b0baa86fb49e532caa1fe076b8bda4f83c44926f2945d1361584065875897
                                            • Instruction ID: 7b97b4218ab8dce8b7d5ca5a287198e1887227c0c669d1e07a4f89cb6765201b
                                            • Opcode Fuzzy Hash: 042b0baa86fb49e532caa1fe076b8bda4f83c44926f2945d1361584065875897
                                            • Instruction Fuzzy Hash: 93F165B2D0D9864FE768BE6898825F477D0FF55394B0C41BAC04DCB583EE1DA8068B92
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 79e463b72276859bdc7f2e657d056c52d0a5c2f74cbf1599fe8f5019b4bdc408
                                            • Instruction ID: 22916f1733e4ac6f43825c4faf6e92864fe26c29631d49ed0ee50106a1e67660
                                            • Opcode Fuzzy Hash: 79e463b72276859bdc7f2e657d056c52d0a5c2f74cbf1599fe8f5019b4bdc408
                                            • Instruction Fuzzy Hash: 8FE12931E1D9CA8FEB75FA2C88562A977D0FF94390F1401BAC04DCB196DE68ED468741
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 22d8c5298477a2e73c9f4358d6cbb72b4a69a3076e185eb2035839772a379fb2
                                            • Instruction ID: d23947ce44f51442b69d010edc819715f1c974e014403bd1a54527fb82c8bcb7
                                            • Opcode Fuzzy Hash: 22d8c5298477a2e73c9f4358d6cbb72b4a69a3076e185eb2035839772a379fb2
                                            • Instruction Fuzzy Hash: D2D16C3061C9498FEBA9FF2CC459A7973E1FF99344B1500B9E45EC72A6DE24EC428781
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2542c139cc4edf4e79b6d3c41111164712e0c5ea18d767cb5852501db8331a70
                                            • Instruction ID: 07c6ee4a0b5193a3eb3f9ca13cf49c92f19b20c002cdcf1db4f81bd80264e548
                                            • Opcode Fuzzy Hash: 2542c139cc4edf4e79b6d3c41111164712e0c5ea18d767cb5852501db8331a70
                                            • Instruction Fuzzy Hash: D6D10320A0DA898FEBA9EB2884557B877D1FF55384F1401BDD48EC72D7DE78E8468740
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 104608749feb14da84ff9b092d1ffe5513298c70dd0f83d69f7729c6ac23b581
                                            • Instruction ID: bcc2ead2b260d59d8425b69b6db3529f2602a48a21a82785167a50d3da16770c
                                            • Opcode Fuzzy Hash: 104608749feb14da84ff9b092d1ffe5513298c70dd0f83d69f7729c6ac23b581
                                            • Instruction Fuzzy Hash: E2C1B430B1CA499FEB58FF2C9456AB977E1FF59740F044179E00EC7292DE29AC428B85
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 952c269e73b7599b17c6350169cd3930b7587e78553304b1a7807a7c31f552be
                                            • Instruction ID: 089ba24e1b8eb63689c49c75a2a6802ebed6244e162bff694a9f4c303d24817a
                                            • Opcode Fuzzy Hash: 952c269e73b7599b17c6350169cd3930b7587e78553304b1a7807a7c31f552be
                                            • Instruction Fuzzy Hash: 46D19231A1CA498FDBA8EF28C445AB9B7E1FF99350F0401B9D04EC3296EE34E9458B41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9f55601a58a2b7230e76da171911ba3affab17c9b627548fe80b97d857cca4b0
                                            • Instruction ID: ebe4c58dd974a9895573b6448a66d7aab08144d3934fa410d71451ddc64052e9
                                            • Opcode Fuzzy Hash: 9f55601a58a2b7230e76da171911ba3affab17c9b627548fe80b97d857cca4b0
                                            • Instruction Fuzzy Hash: 11D17F31A5C94A9FEBA4EF28C0547B577E2FF94340F5882B5D00DC319ADE79E9828781
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e6a32a61733156de5aaae7e9c0bcd6453f73d09cd8f512bfa3758941573a3e21
                                            • Instruction ID: cfdf91e9b92a6cf10a7f4b37e5d72839dc8688068280f35e3746005c094d38a4
                                            • Opcode Fuzzy Hash: e6a32a61733156de5aaae7e9c0bcd6453f73d09cd8f512bfa3758941573a3e21
                                            • Instruction Fuzzy Hash: 03C1F121A0CA8A8FEBA9EA2884557B877D1FF55390F1441BCD48FC72D7DE78E8468740
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 49a8916b90232ecd5acf7c0ce91b2c9fadb9383bea7f8d7514b8a0024511d84c
                                            • Instruction ID: dee6d2914a9b1311a79f40c5ddba23dd21bba76e71eb200cfa1620e7428b28bb
                                            • Opcode Fuzzy Hash: 49a8916b90232ecd5acf7c0ce91b2c9fadb9383bea7f8d7514b8a0024511d84c
                                            • Instruction Fuzzy Hash: 6EB18230B1CD5A5FEAA8FB28945667D77D2FF98780B104179E00EC3686DE2DEC024B85
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 02ec0541f27296037bf9e92c5d5ef13c0f1aa0062ff59749f546df34fbd31612
                                            • Instruction ID: c9b0945e5aeba5931a7d3e404c1401c56c6a379a3cafa808fcb98a4a5faacb41
                                            • Opcode Fuzzy Hash: 02ec0541f27296037bf9e92c5d5ef13c0f1aa0062ff59749f546df34fbd31612
                                            • Instruction Fuzzy Hash: 4BA1B230A1CA598FEBA8EF2C945977937D1FF99790F0400BAD04EC7296DE69EC418741
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 69b26330777612132b0cc108c96c54ca352e902bc1e40116c0e2da894ef7cb84
                                            • Instruction ID: e7a71c856954ad09e3112ba4779e3c683ac02b5471a16c8c3ca04118b048ea9a
                                            • Opcode Fuzzy Hash: 69b26330777612132b0cc108c96c54ca352e902bc1e40116c0e2da894ef7cb84
                                            • Instruction Fuzzy Hash: 83A1E671D0CA994FEB69EF28DC966E97BA0FF55350F0441AAD04DC7183EE3868858B81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1a9e698414088a45dcd89ae0bd736903bcb0fae08e967c099dd32e8d2ed5b245
                                            • Instruction ID: 1c51350047849482130c07406e7fd568e61d6e331e164bb46e2a6623389bf4f4
                                            • Opcode Fuzzy Hash: 1a9e698414088a45dcd89ae0bd736903bcb0fae08e967c099dd32e8d2ed5b245
                                            • Instruction Fuzzy Hash: 6EB10A30A1C95D8FDBA4FF28D891BA9B3A1FF59340F5041B9D00DD3286DE39AD868B41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 046389a19bb766e83d08d48976ae8ad03e3bd4f711fcb92e56c1f6378f209818
                                            • Instruction ID: fd22b4eee027aaa138b556ad4d16c47a3fee1c561322585827ce70acae98aef9
                                            • Opcode Fuzzy Hash: 046389a19bb766e83d08d48976ae8ad03e3bd4f711fcb92e56c1f6378f209818
                                            • Instruction Fuzzy Hash: 46A1F671D0CA894FEB69EF28DC966E97BA0FF55350F0441AAD04DC7183EE3868858B81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 07d67390790c600baeffaf6f4467287fc6d76598ce0a11c0134165022de9cdad
                                            • Instruction ID: 476d217ebc7d4fb9929f9bef22b5beee943cccbfc34ff60f6b84ebebd981548e
                                            • Opcode Fuzzy Hash: 07d67390790c600baeffaf6f4467287fc6d76598ce0a11c0134165022de9cdad
                                            • Instruction Fuzzy Hash: F0A17F31A1CA5A8FDFA8EF2894516BD73E1FF883A4F500179D45ED3286CE35E8029B44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dab096f486c645bf494a403756d4be23ac7d9ce73478bd6e4aac03b25fac58f1
                                            • Instruction ID: b8550fe32e2ba89d5149a6336a3b498910ce2aa559a92ad4f5bf99bc74b77743
                                            • Opcode Fuzzy Hash: dab096f486c645bf494a403756d4be23ac7d9ce73478bd6e4aac03b25fac58f1
                                            • Instruction Fuzzy Hash: 92A13471A1CA895FD798FF28D8462F977A0FF48344F0841BAE04DC7193DE2DA8018B55
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: af45d9f069526489f334f268f4ebec5fcb6335c5c26509593d23ae42551d81e5
                                            • Instruction ID: c7be5c999087a9105bc5c86ae541774308fe5d336dfb7fa8ccd02c52b0c65d06
                                            • Opcode Fuzzy Hash: af45d9f069526489f334f268f4ebec5fcb6335c5c26509593d23ae42551d81e5
                                            • Instruction Fuzzy Hash: 83A17130B1CE595FDBA8FF2C9456AA973E1FF59740F0401B9D04EC3696DE29AC428B81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 853b7ae858633de2fdf9d39c7d21cb6ee02f14e292d2989f7171dad56f36a01a
                                            • Instruction ID: 774afa04445d4dcf653a96a0c700cc6ccf0ff36361601ae42e3c2c1f6b5f87d4
                                            • Opcode Fuzzy Hash: 853b7ae858633de2fdf9d39c7d21cb6ee02f14e292d2989f7171dad56f36a01a
                                            • Instruction Fuzzy Hash: AEA19220A0CA498FEBA8EA2C84557B877E2FF98344F544178D48FC72D7DE78E9468744
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e81bd7516a83d9ce7724030506f91698caa786a25a7bc6e356b09f3b54b93bdd
                                            • Instruction ID: 24e89d7f6cbe84b1acf2ee693efbb68bcf5a45b11c78b5a60cf1db0d9647a111
                                            • Opcode Fuzzy Hash: e81bd7516a83d9ce7724030506f91698caa786a25a7bc6e356b09f3b54b93bdd
                                            • Instruction Fuzzy Hash: F3A14571A1C98A5FDB98FF28D8462F97390FF48358F0841BAE00DC7193DE2DA8018B55
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e9cc31cac7470c1a4f850697426226e1d689cb282a5e892bf22e4e5229fa08f2
                                            • Instruction ID: 0c6a10710b74f9aea7e73c857fc79772538acbbceb3176f8d2ac2546910e6604
                                            • Opcode Fuzzy Hash: e9cc31cac7470c1a4f850697426226e1d689cb282a5e892bf22e4e5229fa08f2
                                            • Instruction Fuzzy Hash: 8A914C30B1C95D9FEBA8FF68D45567D73E2FB98751F1041B9D00EC3296DE29A8428B80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: acd3ee27839142c3b32f76e336d1f25c54dcc29308fd2d52d78e79a9dd4532d0
                                            • Instruction ID: 412929a4fc0cca7ad55a16c3f27d491f5da16841b7ce6758ba45149bf9e1a3e7
                                            • Opcode Fuzzy Hash: acd3ee27839142c3b32f76e336d1f25c54dcc29308fd2d52d78e79a9dd4532d0
                                            • Instruction Fuzzy Hash: 53A13371A1C98A5FDB98FF28D8422F97391FF58344F08457AE01DC7183DE2DA8018B44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d85e8d65878aad24c3be4652ef22c4650d4f0ec6fe1631086ed976dca34e02eb
                                            • Instruction ID: f18ebb53a355069f5a7b7572a29ab5ff5047494fae1c8f5420923c7b1a8dacec
                                            • Opcode Fuzzy Hash: d85e8d65878aad24c3be4652ef22c4650d4f0ec6fe1631086ed976dca34e02eb
                                            • Instruction Fuzzy Hash: 9B81C421F1D9894FE7A9EA3D549A6782BD2FF95780B4800F9D08EC76D3ED1D9C028742
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 06f47633951a4d1fa5650ab50920a5d4984f961c8ae828f5fb5536c4ba4d2249
                                            • Instruction ID: cecc4cd813ba401ebb2bdb5b7af57407d7bb8b7a61d5671cf40b76587f488ea9
                                            • Opcode Fuzzy Hash: 06f47633951a4d1fa5650ab50920a5d4984f961c8ae828f5fb5536c4ba4d2249
                                            • Instruction Fuzzy Hash: 90916F20A0C9498FEBA8EA2D84957B873E2FF98344F544078D94FC36D7CE78E9468744
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 021913205d4f9e62ed7e021fc4ef44099c7b3c44a32836736593ba266c2846ff
                                            • Instruction ID: 6a13692cc7199f84e707f2e49f2f5a6943dc950443200818a018cac3c7addc91
                                            • Opcode Fuzzy Hash: 021913205d4f9e62ed7e021fc4ef44099c7b3c44a32836736593ba266c2846ff
                                            • Instruction Fuzzy Hash: 94916020A0C9498FEBA8EA2D84557B877E2FF98384F544078D94FC32D7DE78E9468744
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 27fe208e769d27c254db7dec4638da935a1f8481cfb2bf700e463ccd7051dbae
                                            • Instruction ID: f483efba05412a53f1e1618590260b66ab9c45aa647a81fea6b1ce9113539e19
                                            • Opcode Fuzzy Hash: 27fe208e769d27c254db7dec4638da935a1f8481cfb2bf700e463ccd7051dbae
                                            • Instruction Fuzzy Hash: E0916020A0C9498FEBA8EA2D84957B873E2FF98344F544078D94FC32D7DE78E9468744
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c8817167d3e829e1767f67d1e2379275842457cdc4813932ab3598c33ca4906e
                                            • Instruction ID: b0c5a49290d7003b05c846e00e67369ca731c1af649e58bc9178c6acdeb4ced7
                                            • Opcode Fuzzy Hash: c8817167d3e829e1767f67d1e2379275842457cdc4813932ab3598c33ca4906e
                                            • Instruction Fuzzy Hash: E5712731B1CD498FEBA8FA2CA85967577D1EF99360B0400BAD04EC7297DD25EC438782
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 32f4c45e9748db15ef9c2b39e4142abd056d81dd0cfbbb1d9987cb3359cb389e
                                            • Instruction ID: a75b33268d504ac6cb94617e8c3a35e7d0200054768623eb494c1a24d03b1cff
                                            • Opcode Fuzzy Hash: 32f4c45e9748db15ef9c2b39e4142abd056d81dd0cfbbb1d9987cb3359cb389e
                                            • Instruction Fuzzy Hash: 5D910130A189498FDB99FF2CD495AA977E2FF58340F5041A9E40DC7296DE35EC92CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5c0994d738682b3773b5d8ed2063f6cdd7cf774668ddd21e73bdfa051ec029f4
                                            • Instruction ID: 5e2d8dd927612b0c77b012ca8e488502ba4e679a6a304bd331c7a738f7ee2d32
                                            • Opcode Fuzzy Hash: 5c0994d738682b3773b5d8ed2063f6cdd7cf774668ddd21e73bdfa051ec029f4
                                            • Instruction Fuzzy Hash: 2D817A10B2CE9A1FE795BB6844A67796292FF9C680F4404BAD10DC72D7CE2CEC068745
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 268bee9c21a4656692e353656bc361ebc06c97bba94ae370377a5429e5f607f3
                                            • Instruction ID: 1519a79816f1a241e7b353bfca79eecc052114a04c75166ac6705a8346220bf8
                                            • Opcode Fuzzy Hash: 268bee9c21a4656692e353656bc361ebc06c97bba94ae370377a5429e5f607f3
                                            • Instruction Fuzzy Hash: 5471D561F1CA8A4FEB98EE1C94957B973D1FBA8740F5440B9D44EC7287ED29EC028781
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 899cfe47c05298876a50e9f3b6d8e16740a1bcf7aced952d96a049fae698467c
                                            • Instruction ID: 20c2332d4f3456a920448f99e4da6cf26e1f315018c5aa8b5bd4e6978986b9a0
                                            • Opcode Fuzzy Hash: 899cfe47c05298876a50e9f3b6d8e16740a1bcf7aced952d96a049fae698467c
                                            • Instruction Fuzzy Hash: DC71CE30B1CD995FE7A5FB2C949567977D2FF98390B4401BAE04DC32A6DE28EC428B41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bc823731666b635dfaac9fb03c6e411705545000c999318c34c547f751442e36
                                            • Instruction ID: 41a2b23ad4ab01bbe5ad8b7fbe206f943daddba83253256f87e567707bdd67aa
                                            • Opcode Fuzzy Hash: bc823731666b635dfaac9fb03c6e411705545000c999318c34c547f751442e36
                                            • Instruction Fuzzy Hash: C271B271A1C9898FDF98EF2CC455AA97BE2FF99340F0401B9E44EC3296DE24EC418741
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3dc6eeb60c3d7aedbd36f34cfb8b933ccd1e71fbe147149b2e59211a13876c4e
                                            • Instruction ID: 3fe29b9b906eeefad21cb29b7b033185eed2a91e10f5a40d94875fca7f2d7e3f
                                            • Opcode Fuzzy Hash: 3dc6eeb60c3d7aedbd36f34cfb8b933ccd1e71fbe147149b2e59211a13876c4e
                                            • Instruction Fuzzy Hash: AB71F761C1E7D62FE376AA2458572A57FE0EF8A244F1844FEC4C9CB193FD1C580A8792
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dea8871952d7c0c7414e61fb2f3e603dff6bec79909f402f06dd909eb42b2479
                                            • Instruction ID: 6c493b3c7c23098baf1b3410d93aecb7b4a881fc382d4e08707e93ae472a1a6f
                                            • Opcode Fuzzy Hash: dea8871952d7c0c7414e61fb2f3e603dff6bec79909f402f06dd909eb42b2479
                                            • Instruction Fuzzy Hash: E561B871E1DD4A8FEAA9FB2C941567977D2FF99790B4400B9D00EC368ACE69FD028344
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bf400744cc28b66f490210a09b30c285d58038cf0e2ec9892f973d4f6fc04ac4
                                            • Instruction ID: 5c0c59d1e15725e75929d5eedf6f21f1f83f15a5978a628d8a92694a0ac808e5
                                            • Opcode Fuzzy Hash: bf400744cc28b66f490210a09b30c285d58038cf0e2ec9892f973d4f6fc04ac4
                                            • Instruction Fuzzy Hash: 1361B130A1CA898FEBA1EF2898546B577E1FF49340F0904F6D44DC72A6DE68ED45CB41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cf9799bcc1612d77c01f82be016a27eab0969853b38d2ea7100f478f7c97a720
                                            • Instruction ID: d42209fba8ae28d09b55bc223557d56dcecd03277fd7afd552746034aa0d4f8b
                                            • Opcode Fuzzy Hash: cf9799bcc1612d77c01f82be016a27eab0969853b38d2ea7100f478f7c97a720
                                            • Instruction Fuzzy Hash: B6718321A5C987DFEBA8EB15C050675A2E2FF94380F6882B5C10DC35DADF78E9818781
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 97b438e324f01b4fed5631b33f4ffaa037dac742896fd7175c4777cda39be376
                                            • Instruction ID: 60b495431975dba26421a00a127559913dbabc110477f21aaaf34b4abdc800bd
                                            • Opcode Fuzzy Hash: 97b438e324f01b4fed5631b33f4ffaa037dac742896fd7175c4777cda39be376
                                            • Instruction Fuzzy Hash: 7C6184E788E9927ED21D7BB8F8521F43750EF112B8F0CD576D0DC89093DE1C64868AA9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1d780941cc565c31f0837428ef690fbd9bf61a7c023285d18457c014ad394e0c
                                            • Instruction ID: 56c333f287a01ca66bbac89b464fc9d7eaf5433f5ff348ff5d470271a7f92e56
                                            • Opcode Fuzzy Hash: 1d780941cc565c31f0837428ef690fbd9bf61a7c023285d18457c014ad394e0c
                                            • Instruction Fuzzy Hash: 76514832D1CD9A8FDBB8AF2858161B537D1FF55790F0441BAC44DC718ADD58E98A83C1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9338015d7e98cd892f0e331e5000d339e15f67e27c4cdd862cefece76b820fcf
                                            • Instruction ID: d40ee085d836755e90e89c2e6d1f2f166156f363bc05f335aef6ee6b120807ae
                                            • Opcode Fuzzy Hash: 9338015d7e98cd892f0e331e5000d339e15f67e27c4cdd862cefece76b820fcf
                                            • Instruction Fuzzy Hash: 72517D21E1EECA0FE76AAB3854252B57BD1FF51390B0941FAC04DC75C7EE1DA8068792
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7c1508bdcc1c0d137e6656bf4b477d8af22421581b062c4aed10820497cb290e
                                            • Instruction ID: 011e525ddb96c7e46e6a5ab3c88e9a22fb3e750d0968a6ede71a3c47dbf05063
                                            • Opcode Fuzzy Hash: 7c1508bdcc1c0d137e6656bf4b477d8af22421581b062c4aed10820497cb290e
                                            • Instruction Fuzzy Hash: 8251A130B1CD595FEB98FB2C945AB7577D1FB98750B1401B9E04EC32A6DE29EC428B80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8df11f1076a9f5a8f2df974354354f6ae6eac570696112b8d3636ab4af342743
                                            • Instruction ID: 85c42d907c5a5b43efbcd90b58b92b81dbbdf4acd1ece78d973a2be02a11df2a
                                            • Opcode Fuzzy Hash: 8df11f1076a9f5a8f2df974354354f6ae6eac570696112b8d3636ab4af342743
                                            • Instruction Fuzzy Hash: 53619D31A18A8E8FDB94EF28C851BA977A1FF49384F4400B9E40EC71C6DB29E956C700
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9d9783608b1acbe3d922fcf3f32f9028e9e86a4ea0d2427cc86d5ec83ed2e2c2
                                            • Instruction ID: c5e1fb843a5391b5e752495a7f07885a4f1adafedbbeeb7571c22f08fc935218
                                            • Opcode Fuzzy Hash: 9d9783608b1acbe3d922fcf3f32f9028e9e86a4ea0d2427cc86d5ec83ed2e2c2
                                            • Instruction Fuzzy Hash: DF51F630B0CAC95FD756FB3888556697BD1EF9A390F0801EAD049C72D7DE2DAC428B81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3b74650ab446673f6706001c8ae068b6b64e47b5c93bbc89966516a5fde77c86
                                            • Instruction ID: bf00042e10aa20fd750f072e11b5e8bc907260bf7ab1909d9d04643cb89e0d59
                                            • Opcode Fuzzy Hash: 3b74650ab446673f6706001c8ae068b6b64e47b5c93bbc89966516a5fde77c86
                                            • Instruction Fuzzy Hash: 8E516671E1D98ADFEBA9FB2854526B47392FF94784F5404BDC40EC328BDD29E9428B40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a66c7917b533359baa5e21a8992b09062c5f167e682c199059c4abbcdf2452ff
                                            • Instruction ID: c0ee5b21c310d455b67c999836413c69accc10d5e07761d65e122d0ff03cb5b7
                                            • Opcode Fuzzy Hash: a66c7917b533359baa5e21a8992b09062c5f167e682c199059c4abbcdf2452ff
                                            • Instruction Fuzzy Hash: 5B51157190CB898FEBA4FB2898416767BD0EF563A4F10057ED48DC319BEE58E8438381
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1d608ab684ef52753e6af55cebdcc56c13ff0a5d2303f90015c5feff68559a42
                                            • Instruction ID: 7a4eca90318e9f4c70e09a362bc8770256d505c7422334136b254013b3c2421c
                                            • Opcode Fuzzy Hash: 1d608ab684ef52753e6af55cebdcc56c13ff0a5d2303f90015c5feff68559a42
                                            • Instruction Fuzzy Hash: 1341E321A0EBC50FD7569B289C65A753FA0DB27250B0901FFC08DCB1E3D91DA80AC756
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7f713586fd2a51d48a21aff3838806497bfd7388f48f0a4fbcd19093f00b6553
                                            • Instruction ID: fb56fc4aeb5b199df91a838f443e1e0e115f24de2eb23ddae939a4bda7cd1ea9
                                            • Opcode Fuzzy Hash: 7f713586fd2a51d48a21aff3838806497bfd7388f48f0a4fbcd19093f00b6553
                                            • Instruction Fuzzy Hash: 10511AB798E9956ED718BB68E8421F83720FF40368F099177D09D8A093DE2C64468A99
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4c38d13d68221eb8c14573c670197539b611516563530efcdbfa5cb33bf4dfb2
                                            • Instruction ID: bdaeb85d1a3fb24974df41fd4e1af64ef75f26ef9a7434477e2c63055a1ad213
                                            • Opcode Fuzzy Hash: 4c38d13d68221eb8c14573c670197539b611516563530efcdbfa5cb33bf4dfb2
                                            • Instruction Fuzzy Hash: DF414621E1DA850FDB69AF2D94595767BE0FB96250B0801FFD04EC3587EE29EC06C781
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 373416c94a1ec94d505143701fccb1a6ce36948118f13b69db895abe63f86e1c
                                            • Instruction ID: 5886f4a9e7e1af69b21a6710a460ee61f32d80fc628bad9d321c13b9cd15ecd3
                                            • Opcode Fuzzy Hash: 373416c94a1ec94d505143701fccb1a6ce36948118f13b69db895abe63f86e1c
                                            • Instruction Fuzzy Hash: D6415B21E0DE8A8FEBA8AA3C94455B577D1FFD9B50B1901FAD00DC728BDD58EC428342
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 464b7981982cf6d7579976e4e26fd9ba8d79ca158c7658e422ad3662894fa651
                                            • Instruction ID: 5384feb0be6257fcc28a0c9ec998f64e66ba448b5252ef0b81fa694f6ef2ec47
                                            • Opcode Fuzzy Hash: 464b7981982cf6d7579976e4e26fd9ba8d79ca158c7658e422ad3662894fa651
                                            • Instruction Fuzzy Hash: A2412A2191DAC98FEB55AB3C94646B17FE0DF6A350F0804FED089C71A7D859DD49C301
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c5edfec9213d444c97288b9775c3ab11c3807fba0e14814c313bc515e7565b99
                                            • Instruction ID: c1e79a9eb818d89f39ea0570d7c9e07add5f4cf8eb5d38543ab2d00617eab311
                                            • Opcode Fuzzy Hash: c5edfec9213d444c97288b9775c3ab11c3807fba0e14814c313bc515e7565b99
                                            • Instruction Fuzzy Hash: F2416C31A1DA598FEB94FF6884596B977E1FF08341F4005BAD00ED7292EF3AA841CB41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e9d4f065f9aaa5707b96619067c86818c778ee96d0b2bae1755e9d5948e12795
                                            • Instruction ID: 194d14df3446d696cea6913f3ee89dc0aef2e8ce79196442a4b496681b9a7cb1
                                            • Opcode Fuzzy Hash: e9d4f065f9aaa5707b96619067c86818c778ee96d0b2bae1755e9d5948e12795
                                            • Instruction Fuzzy Hash: 8141E43192D98A9FDF49FF28C8959F937A0FF55340F4401B6E40AC318BDE29E9428781
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b6721c895400e768b438eebe9fb7a6110aad667b19c1eee53689486b5f28f2fc
                                            • Instruction ID: 8a36dc666241d2e578bbfe28055abe058b89ed7ffb218d098a983b3bcaa66d1d
                                            • Opcode Fuzzy Hash: b6721c895400e768b438eebe9fb7a6110aad667b19c1eee53689486b5f28f2fc
                                            • Instruction Fuzzy Hash: F241493150DAC95FD71AEB289C45AF67FA0EF47264F0802EED08AC7193DE6AA406C355
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3e1095075e8e88dee93ce234a3585a115401feac1797c7beed1a313291eaed37
                                            • Instruction ID: 7ee1f57a8e7cbe710b7c4fb59ab5ebe3dbc0ca4b0bc2f07df9005435a87bb5bb
                                            • Opcode Fuzzy Hash: 3e1095075e8e88dee93ce234a3585a115401feac1797c7beed1a313291eaed37
                                            • Instruction Fuzzy Hash: 624146B294D6855FD35DAF28A8151F97BE0EF06364F08817FE08DC61C3DE2958448B59
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f5fab43fc642ea992036a9143a1e5e378c6609eabeee7c7f5e71f8f572b186b4
                                            • Instruction ID: 6c75cc7439c0a76916facd7c294b04691f6647f7d3252e6d5e8eb52da3931ed1
                                            • Opcode Fuzzy Hash: f5fab43fc642ea992036a9143a1e5e378c6609eabeee7c7f5e71f8f572b186b4
                                            • Instruction Fuzzy Hash: 68310721B0D9454FEAA8EE2E589977823C2FF85784F4440F9E08DC72D3ED2DAC028B41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1ce47bafa55ba0e26b43bdb8a09dc3f1c056d11bf6980e80ba0c5245608f59fc
                                            • Instruction ID: f0d2ee8948be31ca37f43a0d15163cfa816782da052819b60180e5f8e5e16965
                                            • Opcode Fuzzy Hash: 1ce47bafa55ba0e26b43bdb8a09dc3f1c056d11bf6980e80ba0c5245608f59fc
                                            • Instruction Fuzzy Hash: A9314A21E0DE899FEBA8AB3C94455B437D1EFDAB5071900FAD00DC7287DD18EC468342
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3275990486.00007FF848D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D6D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff848d6d000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3d22cbf443439edce71e36767e13b2a70a9bc178f07eacc8968dd6c16e7864dd
                                            • Instruction ID: 6f7aa6556b84bf3684b4208cccd48346e7a215f920ed7e37b99d0f62ed2be4ea
                                            • Opcode Fuzzy Hash: 3d22cbf443439edce71e36767e13b2a70a9bc178f07eacc8968dd6c16e7864dd
                                            • Instruction Fuzzy Hash: DC41B43180DBC44FD756DB289845A563FF0EF56360B1506DFE088CB1A7D729A84ACBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f2f2ca92e2a521593129a8669f597f6e726819607c5e38c919e1eac31080be27
                                            • Instruction ID: c9a2dd19fa3cad95b9cc09227fccf5998178a2b2607275ac10908d0964760279
                                            • Opcode Fuzzy Hash: f2f2ca92e2a521593129a8669f597f6e726819607c5e38c919e1eac31080be27
                                            • Instruction Fuzzy Hash: E741B07190CA488FDB09DF6888056E9BBE0FF99310F04426FE04DD3252DB78A945CB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 646fa5c16495fdbc8234d85c3dd3e735f10e303e1036f9aabc784fca1c3f3191
                                            • Instruction ID: 7db8e519128502da915e4222a082745795c51a0625b945cf14641ee062f18277
                                            • Opcode Fuzzy Hash: 646fa5c16495fdbc8234d85c3dd3e735f10e303e1036f9aabc784fca1c3f3191
                                            • Instruction Fuzzy Hash: E531C772E1CFC54FEA9CEA2C585637477C1EB59751F44017ED08EC3293DE1D68068A8A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 95d2f38f760dbb07172fde155aefec2f734c494f477a4d2276d71fa843dd56d9
                                            • Instruction ID: 9bf5d5e78fd90cf42712c64e1719ff2b9ba374ee713d521d1cd093701637d1ee
                                            • Opcode Fuzzy Hash: 95d2f38f760dbb07172fde155aefec2f734c494f477a4d2276d71fa843dd56d9
                                            • Instruction Fuzzy Hash: 57310621A1DACA4FEB65BB2894515A977E1FF59340F4440BBD04EC3187DE28AD0A8352
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e16516dde790c64a9c7e2e48fab58f297dd9e4f8d3d2deb2896dc3a256d2da0b
                                            • Instruction ID: 9d9a24b469fab08e4b206c4ce86a351f811824f9813564b5d69d8745b82e8dba
                                            • Opcode Fuzzy Hash: e16516dde790c64a9c7e2e48fab58f297dd9e4f8d3d2deb2896dc3a256d2da0b
                                            • Instruction Fuzzy Hash: E8314B3191DAC68FD7AAAB3C88515A17BE1EF56350B0840FEC409CB197DD6D984AC341
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 60fade232d81bf4c473103a2f913366766a62db5c4a5125bf52679cdca5776be
                                            • Instruction ID: b9db3e32d1d6b2086d62ddc5b39719f941146016911daa77dfebf1858fa420f3
                                            • Opcode Fuzzy Hash: 60fade232d81bf4c473103a2f913366766a62db5c4a5125bf52679cdca5776be
                                            • Instruction Fuzzy Hash: CF318931A1C9598FEBA5FF2C84497B977E1FF58341B8401F6D00DD76A2EE2AA8418B50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4749930c43de3c965edd4d8f3e68e94457d5c91188d47f96b4a6141a7fbeba25
                                            • Instruction ID: 391189dd1d7edaddad9f6143f9926d602b40b0c18b494cc533e929586c73d1d0
                                            • Opcode Fuzzy Hash: 4749930c43de3c965edd4d8f3e68e94457d5c91188d47f96b4a6141a7fbeba25
                                            • Instruction Fuzzy Hash: D6316B31E1DA5D8FEBA4EF6884596B977E1FF18341F8505BAD009C7692EF3A9840CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9096b730130aeec3c988c925dca460f9b1d74db973b9a0114cef3fc5aa53570a
                                            • Instruction ID: 4c96f9d2e3c18071174e2ac5c841118632356f415e236e0fe5d9e58a7cb7fd64
                                            • Opcode Fuzzy Hash: 9096b730130aeec3c988c925dca460f9b1d74db973b9a0114cef3fc5aa53570a
                                            • Instruction Fuzzy Hash: 0331F53070CA895FD794EF2C9495AA577D1FF99310B0405BEE04DC76A2DE29DC42CB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8c7fa3bb7251d6e36d0d08a3544d28679fd7844406f555338146fd2487e01a2a
                                            • Instruction ID: da6989ad743702858c2780d5313170699de8b0caa8e3e8a0241ad2f143f9fff9
                                            • Opcode Fuzzy Hash: 8c7fa3bb7251d6e36d0d08a3544d28679fd7844406f555338146fd2487e01a2a
                                            • Instruction Fuzzy Hash: C031C37161CA099FEFA8FA2C9445A7677C1EF993A0B100579D94EC3296EE69E80247C0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4e117c5f45c9125e3120a122ff9269f4a71158977bcdc001bf90ea2944c9deb7
                                            • Instruction ID: eb824e2eb1f2cc177fb2d1a45a47a32fa9bc99ad68145d758311f04065a35d9d
                                            • Opcode Fuzzy Hash: 4e117c5f45c9125e3120a122ff9269f4a71158977bcdc001bf90ea2944c9deb7
                                            • Instruction Fuzzy Hash: 06315831A1CD198FEBA5FB2C84487BC76E1FF58341B4405B9E40DD7692EE2AA8418B80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2ee1eb0371635503bd5c05168f08bff3ac68bc21afa2ef0210a1275dc8276bfd
                                            • Instruction ID: 3b93a66629a9bcbba978cc1e221467a716d4a2865835853c06f7b779b04f6e82
                                            • Opcode Fuzzy Hash: 2ee1eb0371635503bd5c05168f08bff3ac68bc21afa2ef0210a1275dc8276bfd
                                            • Instruction Fuzzy Hash: 2831263190DEC98FD7A5EB389494AA4BBE0FF59244B0805FEC44DCB593ED2EA845CB41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 06080a185e414651c04967135672985f0a294ee583a2d90b480b9c786da4390d
                                            • Instruction ID: 5bea68e592e921d61de39bf79e73b3aa12f0fbadde7b4b32047df508394a95b5
                                            • Opcode Fuzzy Hash: 06080a185e414651c04967135672985f0a294ee583a2d90b480b9c786da4390d
                                            • Instruction Fuzzy Hash: 2721A511F0CD8A4FF7B9BA2D145527956C3EFD8695B5805BAD00EC72D6DD2CDC024344
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 34b01e6e9e0622e07d222a980a8053d8e60d03628b0a2c19fe626f777a156db2
                                            • Instruction ID: 789bed138e8234118cfd8b7f3a4c8f33c4d91868182556d10f15e50656e8ae30
                                            • Opcode Fuzzy Hash: 34b01e6e9e0622e07d222a980a8053d8e60d03628b0a2c19fe626f777a156db2
                                            • Instruction Fuzzy Hash: 3B21B611F0CD8B0FF7B9BA3C045517956D2EF98A80B9904BAD50EC72DAED2CEC064749
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 02add98116b0667621c42d1288e7d874133bebfcfee9568f642365ed89da932f
                                            • Instruction ID: ad1511dcc41e7e5b7dfb3090adffc24f8d479e931859df9544dd570d163dfc00
                                            • Opcode Fuzzy Hash: 02add98116b0667621c42d1288e7d874133bebfcfee9568f642365ed89da932f
                                            • Instruction Fuzzy Hash: 9C21D621F0DD8B4FF3E9BA2C145427856D2FF98691B9805BAD40EC72D6ED2CEC024348
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 63d619d6d1a16a738b27913427e0f1fe0aa7a49e0b9e8f3398e3c07699228ebf
                                            • Instruction ID: aa69f2b11908ee19328fdf20a0909daf0422a47ed3b972797428ca8140851905
                                            • Opcode Fuzzy Hash: 63d619d6d1a16a738b27913427e0f1fe0aa7a49e0b9e8f3398e3c07699228ebf
                                            • Instruction Fuzzy Hash: 3321D611F0CD8B1FF3B9BA3C145523956C2EF98590B9805BAD00EC72DADD2CEC464348
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6756a3784d2ddd143218e2691f2abd344fca170ac3a63285fad9ddfb5f8eb873
                                            • Instruction ID: bd0beb55c830c6dafa424cf3457ff5f0352d29ba884f4a08f596725880e92c9f
                                            • Opcode Fuzzy Hash: 6756a3784d2ddd143218e2691f2abd344fca170ac3a63285fad9ddfb5f8eb873
                                            • Instruction Fuzzy Hash: 1531F521A1DA894FEF91FB28945457973D1FF98250F4402BAE84CC32A6DE6CEA418302
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c69b319930ec6dd57009a95285c1119da894e055b495ed674648b7a5303202a7
                                            • Instruction ID: 6de85424612b3fbbedd2b929f3129cb39e836f359c14b0469077bd78083e65fe
                                            • Opcode Fuzzy Hash: c69b319930ec6dd57009a95285c1119da894e055b495ed674648b7a5303202a7
                                            • Instruction Fuzzy Hash: 1A21A622F0CD8B4FE7F9BA2C145527956C2EF99680B9845BAD40EC32DAED2DEC024744
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a6a27834e87e128f10728cab7a5503054d5316a95aefb79c40ba149c9a069629
                                            • Instruction ID: de12134b1de0db428f4f89e4df577e17a9ab45eff8d3bf12c9d7761f4e896c2b
                                            • Opcode Fuzzy Hash: a6a27834e87e128f10728cab7a5503054d5316a95aefb79c40ba149c9a069629
                                            • Instruction Fuzzy Hash: 6B21A611F0CD8B5FF7BAB62C045523956C2EF98694B9800BAD40FC72DAED6CEC028748
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bda5e88e28ef14f6519b3d1c203661c8b484db25aa5e9db170346076dceacda4
                                            • Instruction ID: bb68dd355c6c7d0e03890b5d5c28c157651fc54467fa06733ffa80b30887e7ea
                                            • Opcode Fuzzy Hash: bda5e88e28ef14f6519b3d1c203661c8b484db25aa5e9db170346076dceacda4
                                            • Instruction Fuzzy Hash: 31210A31A0CA854FE768AA1C684A7B977D1EF962B0F0401BFD88DC3197DD58EC478382
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 46f61aaab3c7986b8c3643210ca355a5c630087b4df2218df872157034b7fefb
                                            • Instruction ID: 008443f1077887d83d4b4aac9dcfdec158368896d8d705ed700649439ba24e35
                                            • Opcode Fuzzy Hash: 46f61aaab3c7986b8c3643210ca355a5c630087b4df2218df872157034b7fefb
                                            • Instruction Fuzzy Hash: B021B511F1CD8B1FF7BABA2D145523956D2EFD8590BA904BAD40EC32DAED6CEC024349
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5089c8cf5e47ebbecc98e9d5a253c87a839ac054f48d3cafd7f4b026f27d3ed7
                                            • Instruction ID: 441452c765ec603b7e89182f8f1a4f6293d0ac5081ba18243b7fd68cefdd2305
                                            • Opcode Fuzzy Hash: 5089c8cf5e47ebbecc98e9d5a253c87a839ac054f48d3cafd7f4b026f27d3ed7
                                            • Instruction Fuzzy Hash: BD21E221F0CD8B5FE2BABA2C142527952C2EFD8690B9805BAD40EC32DADD2CDC064348
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d941e16c92c9d7d097c0ece8330b164d2d48fd859d42a29709add40a29621e5c
                                            • Instruction ID: 1fa3576ce9e1d6189b31e48fd31101e2cf7dee7a7c1bada7ac6886fe1b54c1d8
                                            • Opcode Fuzzy Hash: d941e16c92c9d7d097c0ece8330b164d2d48fd859d42a29709add40a29621e5c
                                            • Instruction Fuzzy Hash: 5D31E331A0DA8D4FEB91EF3C88995A9BBF1FF5932070501EAD049C7262DE259C41CB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35f76a3ba7b3ceb3f2cfee5fc0371a685f0f8690cac879551170c9b607a458d6
                                            • Instruction ID: 24937d9a1ea849b892f065aba9e31677432eacfde94de356bafc96fff1bd728b
                                            • Opcode Fuzzy Hash: 35f76a3ba7b3ceb3f2cfee5fc0371a685f0f8690cac879551170c9b607a458d6
                                            • Instruction Fuzzy Hash: 1F31CE31A1CA898FCB58EF28C8456A977E1FF893A5F10017EE44DD7286DB35E852CB00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bb0f714b9310260ae4212bb1b243d4984b005efb1a6f0864915b1d5866b5d38e
                                            • Instruction ID: 71692955753023e94b85c95882e2732f5bd10395620d6d2815a08661aa77fc67
                                            • Opcode Fuzzy Hash: bb0f714b9310260ae4212bb1b243d4984b005efb1a6f0864915b1d5866b5d38e
                                            • Instruction Fuzzy Hash: A131213090C9C79FEFB9AA28A85427076D4FF55391F1841B9C44EC719ADF58EA81C781
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1a364cc029e3aa8831f010fc327a94966d6715a7c54b67e73bb243cbc327ecf2
                                            • Instruction ID: b6d9a8e2017b031352f435e711edcbc91be54ff8efbcdfa962e81743ccf3aafd
                                            • Opcode Fuzzy Hash: 1a364cc029e3aa8831f010fc327a94966d6715a7c54b67e73bb243cbc327ecf2
                                            • Instruction Fuzzy Hash: BA21CF11F0CD8A0FF7A9BA2C145523956C2EFD8690B9905BAD00EC72DBDE3CEC424348
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a6013f6d4921a484dab59a6fa23106361fd80491da4c8a8bf5d5cbd7c88ef410
                                            • Instruction ID: 76ec7ac2b972339bd3e84683e4906de893c9d54278e1577e98487871244eea31
                                            • Opcode Fuzzy Hash: a6013f6d4921a484dab59a6fa23106361fd80491da4c8a8bf5d5cbd7c88ef410
                                            • Instruction Fuzzy Hash: 1721257294DA8A5FD719BF18E8910ED37A0FF85324F0851B7E01DC7083DA286856CB95
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1623850c968f823b29321162c355b05df35dc8108c32f3fbdba5493c9a5dfd2f
                                            • Instruction ID: ad830e1fcd3f052af2acbd2d4fc562320e57e962ed71c318cf065072338846d0
                                            • Opcode Fuzzy Hash: 1623850c968f823b29321162c355b05df35dc8108c32f3fbdba5493c9a5dfd2f
                                            • Instruction Fuzzy Hash: 4E219211F0DE8A4FF7AABA2C145523956C2EF98590B9905BAD40FC73DBED2CDC424748
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 77de358082b35b4dddf87de9e0d12d0298b1264318b9fc0b78bba5c3c47bca7d
                                            • Instruction ID: ba55028f72a2c53226bbfd98b71a5d2e570ed432af9dc3c934f629c05f848fbe
                                            • Opcode Fuzzy Hash: 77de358082b35b4dddf87de9e0d12d0298b1264318b9fc0b78bba5c3c47bca7d
                                            • Instruction Fuzzy Hash: A2219511F1CD8A4FE7A9BA2C145527956C2EF98680B9905BAE00FC72DAED7CDC024344
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e32518ca4f1d06f17ee7f654bf2708d54aceee6fdd0993168a6541728d71307e
                                            • Instruction ID: add4d69881da6161fd8e4568a9e764e91e8e1c503103056e3c20c5c10bed1077
                                            • Opcode Fuzzy Hash: e32518ca4f1d06f17ee7f654bf2708d54aceee6fdd0993168a6541728d71307e
                                            • Instruction Fuzzy Hash: B0219221F0CD8A4FF7B9BA2C145527956C2EFD8681B9905BAD00EC73DAED2CDC424345
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0d696d7b98dfacf7135aa5f2edcf3183bfd68af6f59dd6c3c9198057249c2f97
                                            • Instruction ID: a6158ce9c15d6a3c2837f7f19f133dbee5e3799bf4a6781ad2cda6bd960699b1
                                            • Opcode Fuzzy Hash: 0d696d7b98dfacf7135aa5f2edcf3183bfd68af6f59dd6c3c9198057249c2f97
                                            • Instruction Fuzzy Hash: 7821D721F0CD8B4FF7B9BA2C145527956D2EF99680BA905BAD00EC32DADE2DDC024704
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 16e9034be638fb0c999a2e6446f1c917c3c8ab8f43312a6a871c4be27d622b89
                                            • Instruction ID: 32abf5c0149512bb4aae549a291523c29c5f015255c59ac254b95a6d564c843d
                                            • Opcode Fuzzy Hash: 16e9034be638fb0c999a2e6446f1c917c3c8ab8f43312a6a871c4be27d622b89
                                            • Instruction Fuzzy Hash: D621B611F1CD8B0FE3B9B62C045523956C2FF99640B9805B9D40EC729BEE2CDC024344
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fe9b4bf3051b5045180f495f797672b33d3b8d86b2c66eb33e7a123bb2776bc4
                                            • Instruction ID: 172ab7c827db85480855274a7df14a4729f3f89717305a108ae473939054374c
                                            • Opcode Fuzzy Hash: fe9b4bf3051b5045180f495f797672b33d3b8d86b2c66eb33e7a123bb2776bc4
                                            • Instruction Fuzzy Hash: 2021CC21F0CD4A4FF3F9BA2C145523966D2FF98691B9945BAD00EC72DAED2DDC024349
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ec1806b7944de9c5806a07e6d58c2146bedbf2bf8fb2bb1d40888a241daa8b65
                                            • Instruction ID: 382af46ee730cc62d5282de94ec1adb3e3acf501880ce74bcaa3ac2905638efb
                                            • Opcode Fuzzy Hash: ec1806b7944de9c5806a07e6d58c2146bedbf2bf8fb2bb1d40888a241daa8b65
                                            • Instruction Fuzzy Hash: BB21D421F1CD8A0FE3B9BA3C145527956C2EFC8691BA905BAD00EC72DADD2DDC424348
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 64f82d05995391795a671204e9cf3527a1c9e32d3a574f84be3ede466b1d906d
                                            • Instruction ID: 2ae2fcfe06983de425ec51ba8b34d6d5306adbdfff681a862c40526db98aa502
                                            • Opcode Fuzzy Hash: 64f82d05995391795a671204e9cf3527a1c9e32d3a574f84be3ede466b1d906d
                                            • Instruction Fuzzy Hash: 3421D121F0CE9B0FE2B9BA2D145523951C3EFD8680BA904BAD40EC32DADD3CDC020348
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 62f8a0ae365fd79f1525cfd3781d003399c03885a7a230feac5ccb3df79fd496
                                            • Instruction ID: 06ce5ea174a43eb216a640cf51525fa1227622d46130212278f7240f75961dd9
                                            • Opcode Fuzzy Hash: 62f8a0ae365fd79f1525cfd3781d003399c03885a7a230feac5ccb3df79fd496
                                            • Instruction Fuzzy Hash: 1521537190CA1C4FDB68EE58DC4A9F9B7E4EBA5321F00413FD44AD3251EA71B5458B82
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d9907b4afdabf63fe75140f231110cbed73300f2dd68c0c7ba03e1d954d1eed5
                                            • Instruction ID: aa1b6f463025063408fe9b7fc726f0a30a124ac72117063c7405b534e4a9eb6f
                                            • Opcode Fuzzy Hash: d9907b4afdabf63fe75140f231110cbed73300f2dd68c0c7ba03e1d954d1eed5
                                            • Instruction Fuzzy Hash: C221F631A0CA994FE76CFE1D94512B676D1FB89760F00017EE54EC3282ED29AD024695
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 52fc9b8d913a64d75ffcc5675086cb0650cf0238bfda7c4583a54cbc0e735b2d
                                            • Instruction ID: 6de0e0c7f9b92e5a78e280e6db439620aea7b24052738b3f7bbbb0c526a01dd0
                                            • Opcode Fuzzy Hash: 52fc9b8d913a64d75ffcc5675086cb0650cf0238bfda7c4583a54cbc0e735b2d
                                            • Instruction Fuzzy Hash: C9110B3170CA495FE6A8BA1C684E7B933D5EB89260F44017EE88DC3296DD54FC428282
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7258eac1dd74e64251731683af1fd147a6d46557392f31b17d4e963496a8e9ef
                                            • Instruction ID: 7e3bba2620a72f8be57cc39d85655fcdbef1f3301dd65d63b430e499ced0197c
                                            • Opcode Fuzzy Hash: 7258eac1dd74e64251731683af1fd147a6d46557392f31b17d4e963496a8e9ef
                                            • Instruction Fuzzy Hash: 1021AF31B0D9498FD799EB3C945966877E1FF99340B0441FAD009C7696DE2AA8428B40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1fd40e931ccb90f16fe08bcc80d22fd8164cae5b104209f25a37887e079630bf
                                            • Instruction ID: e9c7b6b47afa575220cc1747e3e4207fa09ab8f8a30d017d2c46702cfbc81938
                                            • Opcode Fuzzy Hash: 1fd40e931ccb90f16fe08bcc80d22fd8164cae5b104209f25a37887e079630bf
                                            • Instruction Fuzzy Hash: F4117B22F1DD4A5FE6BCBA1CA8465B573D1EFD9BA071901F9D00DC328ADD18FC424292
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c6760980053f2624f70dda2bb70345ea391370e2e932836ba921ec4251b9090c
                                            • Instruction ID: 7245ea215c0ed347730f287efeed8764ed50af3f05aea5730f2ff4812f28db77
                                            • Opcode Fuzzy Hash: c6760980053f2624f70dda2bb70345ea391370e2e932836ba921ec4251b9090c
                                            • Instruction Fuzzy Hash: A011D631B1DE585FDB69EA1CAC1A4AC77E1FB95760B4402BBE009C3293DD296C068785
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 14d871ae35faa6a028ac35e525da9cd73f6e31cba62ac49e0010600aed7db2ee
                                            • Instruction ID: 7c27f153c7651f1944199f4607ea31c84faaaa600708278eeb3b1b81c6358d5d
                                            • Opcode Fuzzy Hash: 14d871ae35faa6a028ac35e525da9cd73f6e31cba62ac49e0010600aed7db2ee
                                            • Instruction Fuzzy Hash: E8215B3061CA098FDB98EF1CD4456A9B7E1FF98351F50117EE48AD3262CB35E8428B45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2b925bc876dd21c9e2673b37074bd0b484ec12983a902a1b24d59b355e7e3f00
                                            • Instruction ID: 35a36c8b15446433b6da2b93ce2e62b0930986a31bfd074d744501f78ee0d145
                                            • Opcode Fuzzy Hash: 2b925bc876dd21c9e2673b37074bd0b484ec12983a902a1b24d59b355e7e3f00
                                            • Instruction Fuzzy Hash: 29313A70D0CA8E8FEB94EF6484457ED7BA1FF58340F5045BAE41DC3282EB3AA8418B41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ae6131ccb235eea31940da8107c5940c7f8070fd823c7a0edbc3c69fa7375e30
                                            • Instruction ID: dd8cec5e9991ab3355f4e3fdd7fe65bb28c102dcc9a40b3eb0cc7923f6c6f5b9
                                            • Opcode Fuzzy Hash: ae6131ccb235eea31940da8107c5940c7f8070fd823c7a0edbc3c69fa7375e30
                                            • Instruction Fuzzy Hash: 0511B711F0CE8B4FE7BAB62C145517456C2EF98694B9901B9D00FC76CAED7DD8024748
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cfe4759e64dfc712725bbb8133cddb510c162f9739598d698c0c8325530bbb25
                                            • Instruction ID: ed6e4d14d19fab38a4806b92632b9fa4b1bb0ba3c723bdb4ccd19e379dfe0916
                                            • Opcode Fuzzy Hash: cfe4759e64dfc712725bbb8133cddb510c162f9739598d698c0c8325530bbb25
                                            • Instruction Fuzzy Hash: FB21AF21F0CD8B5FF7BABA2C145527856C2EF98680BA905B9D00EC72DAED2DD8424709
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 19170511169a56171bc7ff051ab4e1390bb7dabd869b5558d89310100cd4571f
                                            • Instruction ID: e127ddfd1396ce22b505b7c0b5202e63952f78bd9c2afdfb962a8688e05057a4
                                            • Opcode Fuzzy Hash: 19170511169a56171bc7ff051ab4e1390bb7dabd869b5558d89310100cd4571f
                                            • Instruction Fuzzy Hash: 58212775D0C68A4FEB68AF2488425B836D0FF49391F5405FDE04AD7A81EE2DE4058E51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7abae170860ba33bac2f41dfb31f3f32ebec69a55b7ae2c72f1e80f73919edeb
                                            • Instruction ID: 33c2d46dd9e857cdfe8e8840535542c434a595bdae86d0a7be3f0d504edc25f1
                                            • Opcode Fuzzy Hash: 7abae170860ba33bac2f41dfb31f3f32ebec69a55b7ae2c72f1e80f73919edeb
                                            • Instruction Fuzzy Hash: 0421A421A2CD5A4EEB58BB1894526FA72D1FB58380F90847AD44FC3187CE78F9068791
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d35e27b35bcaf168691864fc4355f774c40688f65e0c3b7bf3bc91f736182608
                                            • Instruction ID: d9cb8e8a83a8407fc6a5a1fc8ec5564364a551ead954f73602e1576935e83dcf
                                            • Opcode Fuzzy Hash: d35e27b35bcaf168691864fc4355f774c40688f65e0c3b7bf3bc91f736182608
                                            • Instruction Fuzzy Hash: 93216F30A0CA498FDF95FF2CD891AAE37E1FF69384F4501A4E409C7296DA35E841CB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4df00599d29c4778dedc6b5a4d53f0bed1637885d98c82f4b4a6af33f861f60f
                                            • Instruction ID: a00d930f676b18c351e3e71a1875a37111133f0fb992d94ee9ee78970227edd6
                                            • Opcode Fuzzy Hash: 4df00599d29c4778dedc6b5a4d53f0bed1637885d98c82f4b4a6af33f861f60f
                                            • Instruction Fuzzy Hash: 8311EB21B0DE8A4FF7BABA2C145423866D2EFD9190F5905BAD40EC72DADD2CDC414704
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4e6a31309e47e7d46ae5b068ea5308b9aebe5a7de92cf4d6b71625b4da98172b
                                            • Instruction ID: 2b03cff29eb086650bb193775c3c76798cd1dba3458bbaf7a73a235a965aa7a4
                                            • Opcode Fuzzy Hash: 4e6a31309e47e7d46ae5b068ea5308b9aebe5a7de92cf4d6b71625b4da98172b
                                            • Instruction Fuzzy Hash: 2011A00148EAD61FE3466BB44C299E63FA5DF8715071D42E7E085CB4A7C85C598A8362
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c92e0a4ac9be74b9c20129c0f5d0948c7826a55c62f02e9e5f9e86ea736828b3
                                            • Instruction ID: abb1974b06e1dc7de1327f7e7f68cb0ed5c5821d96be98a1148ad4bd65056fa5
                                            • Opcode Fuzzy Hash: c92e0a4ac9be74b9c20129c0f5d0948c7826a55c62f02e9e5f9e86ea736828b3
                                            • Instruction Fuzzy Hash: BC114C31A0CA8E8FDB95FB1C94512AD7BA1FF89350F4001FAD01DC3286CE3A9C458781
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bda711eb7339e0bcf9e47e5aae507003d8bfd3289141059ade3bfc5bc328f012
                                            • Instruction ID: ef9a6b55f2bf395ba3348d41c21fa36d3c285246871e817659c3ad0e73204d4a
                                            • Opcode Fuzzy Hash: bda711eb7339e0bcf9e47e5aae507003d8bfd3289141059ade3bfc5bc328f012
                                            • Instruction Fuzzy Hash: E111A12158E6C61FC34697748C20AD57BE5EECB19030941F6E089CB5A3C91D9987C761
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b55d581d62960fd0ad5554e6496c52a1479b83a607cf0f019ab66832271a69d4
                                            • Instruction ID: e7ff0381bd14aa2f83619be825a85dab99080ed22b67dfecf6c080151d262ad3
                                            • Opcode Fuzzy Hash: b55d581d62960fd0ad5554e6496c52a1479b83a607cf0f019ab66832271a69d4
                                            • Instruction Fuzzy Hash: 80110A2181E5D61EE3257B3458149E57BE0FF413A1F4802FAD558CB497FE1EA8828784
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 301944ba731d1d4afd94829a2313d21e96ca1b880d404944d062d2e12b74bc9d
                                            • Instruction ID: b0e823096b479b3228a5ca5b4e78a91f1815dc5d747db5433e59c334f69468e2
                                            • Opcode Fuzzy Hash: 301944ba731d1d4afd94829a2313d21e96ca1b880d404944d062d2e12b74bc9d
                                            • Instruction Fuzzy Hash: 01014821A2CE480FDB58F71894446FBB3D1FBA4354F0406BEE44EC3196DF2AA9068385
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bc8e3e1d5ca9d9025c912f074f15095bac910229b972336618d8d14131b55468
                                            • Instruction ID: dac7906c1b1503771413f9654d77f5224c79f18115713a6393a8dcc89273300f
                                            • Opcode Fuzzy Hash: bc8e3e1d5ca9d9025c912f074f15095bac910229b972336618d8d14131b55468
                                            • Instruction Fuzzy Hash: DC11AC3180C6898FEB49EFAC94546EA7FE0FF59340F1405BEE08AC3286DA7495448B85
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3a84d2535c0a4266371d5253fe39146bd625b2c0ae6391db975d5f86e1f7e88c
                                            • Instruction ID: adc3fbc2726c249ce3806568722d98f304d7138a7f3ff20acf62486918a77e0d
                                            • Opcode Fuzzy Hash: 3a84d2535c0a4266371d5253fe39146bd625b2c0ae6391db975d5f86e1f7e88c
                                            • Instruction Fuzzy Hash: 8E11390048F7D21FD39353B898655927FF59E4B12070E40EBD584CE0A7D54E4C4AC362
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 622232edc334e1aceba3b8c7ef208ab9111f99f2d65617ecab857ea1560af628
                                            • Instruction ID: 983d9d3f9ab79d78e87c8b0dd5723c64ef22c60db1cd12a68dca1919e235d867
                                            • Opcode Fuzzy Hash: 622232edc334e1aceba3b8c7ef208ab9111f99f2d65617ecab857ea1560af628
                                            • Instruction Fuzzy Hash: DD11E47191DFC98FD7AAEB3484A4A647BE0FF19244B4804EDD489CB5D3DD19E808CB51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a3142ee0fe5fdb57bb982ede8360233b4b161dbd4765fdf76ae1017cbb02b585
                                            • Instruction ID: 8210f47a86e382e95a09b1e5b69e04033542c7cdbe3724da7326a638cc833f86
                                            • Opcode Fuzzy Hash: a3142ee0fe5fdb57bb982ede8360233b4b161dbd4765fdf76ae1017cbb02b585
                                            • Instruction Fuzzy Hash: AB117911A1EAC61FE753A37C18251A86FF0EF56280B8900F7D488CB197EE1D9846C392
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 60f5e6ee0c65513d52262d80e8c7c24d584e075aa658aea24e281f97b6eabb20
                                            • Instruction ID: e3b2fabfc083d8655669c30e6cab9c4687cfd05876f579f8f6e368f31376d3a1
                                            • Opcode Fuzzy Hash: 60f5e6ee0c65513d52262d80e8c7c24d584e075aa658aea24e281f97b6eabb20
                                            • Instruction Fuzzy Hash: A7118E2148E6D20FD3539BA48C24AD27FE4AF8715070E41E6E088CB4A3D50D894BC762
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f9a8131d5eb75e591222096f503fad8f94f8a7ae1723202927d935fa4a562a2e
                                            • Instruction ID: 09c4edcc7037494c9a2498ee9d7c3834f443e1d7108caa0a09f3feae7647c4bb
                                            • Opcode Fuzzy Hash: f9a8131d5eb75e591222096f503fad8f94f8a7ae1723202927d935fa4a562a2e
                                            • Instruction Fuzzy Hash: D8110A3185D5C11FE326673028219E57BA4FF423A0B1D01F6D088CB4D3D80E6982C7A1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: de38b1007952ace330e1887ac1ebda7c6d55225c6c2dfc35c77b165715d5815e
                                            • Instruction ID: c1db559b8f3b7d1508945a98f29d488870fa20818f6061438a365b7c4d0a04af
                                            • Opcode Fuzzy Hash: de38b1007952ace330e1887ac1ebda7c6d55225c6c2dfc35c77b165715d5815e
                                            • Instruction Fuzzy Hash: 7C11FE31A68D4A9FDB98EB24C051AE6F7B1FF68350B4456B6C00EC3596DF24F94187C0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1cebe929962355dbed110a7379b10237278f48eaac4b487f32b6de05e994bb6b
                                            • Instruction ID: e0e78c64a6ead3721d32582857fd395b9b8228b348600a5fa7ba341894752e98
                                            • Opcode Fuzzy Hash: 1cebe929962355dbed110a7379b10237278f48eaac4b487f32b6de05e994bb6b
                                            • Instruction Fuzzy Hash: 7111233190DBC94FD756DB3888650E97FB0EF86210F4901FBD085CB097DB28A94A8351
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 78f79df9813232516467fbdf4aca89f99abec9e2d4be671c606de41a86eb43ba
                                            • Instruction ID: 26d02b27cabe5b05a7524d9506dae4036648ac16cc53664e19e97eb4d3655017
                                            • Opcode Fuzzy Hash: 78f79df9813232516467fbdf4aca89f99abec9e2d4be671c606de41a86eb43ba
                                            • Instruction Fuzzy Hash: AD012611E0DBDA1FD766B634182A2B86FE0AF4A150B0840FBC048C71E3ED1D5C458352
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8eb1fb17c0f6342ea93310412b7067dea0baaff4eb14d6e7374faf7e4b58651a
                                            • Instruction ID: 73dc14c325e08288cbbb0df3c7c5fa40f9d0b5465a6aba4b467570deddc618b8
                                            • Opcode Fuzzy Hash: 8eb1fb17c0f6342ea93310412b7067dea0baaff4eb14d6e7374faf7e4b58651a
                                            • Instruction Fuzzy Hash: 30110230A18E888FD7A9EF388094A757BE0FF68344B0404ECD44ECB682DD28E804CB50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8fb1fd4c9da3a8a20fe8603973f2abf1e5ffde664c1fc97d4e85fa00dd07ec29
                                            • Instruction ID: f5871082681f373fed0ad16da93f4d85b4c8d400d772725c5ee45ff5cfd2ec0d
                                            • Opcode Fuzzy Hash: 8fb1fd4c9da3a8a20fe8603973f2abf1e5ffde664c1fc97d4e85fa00dd07ec29
                                            • Instruction Fuzzy Hash: AFF0C87260C6186EA71CA929AC0B5F673D5E796671B00013FF58AC3552ED21B81386D5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c33ccfe0d52a34198161e2b5256abf7374fdbb0fc8d6fd04c1752385a82fde93
                                            • Instruction ID: a3ad7dee59a9aaf7c15580ed4ca6c188cb000551de6e06add6c417a0314af03a
                                            • Opcode Fuzzy Hash: c33ccfe0d52a34198161e2b5256abf7374fdbb0fc8d6fd04c1752385a82fde93
                                            • Instruction Fuzzy Hash: 36F0CD72B1CA584FEB58BA2CB8465E873D1E759730700017BE14AC3196DD21EC438784
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fde2701db0c75da303bf05eb1f3dbd85d48916cea8c3a2d153bc182f4cbd4723
                                            • Instruction ID: c25f84947a97c451dd869c5a9be1a02b901feee0918b091516df5443b4841085
                                            • Opcode Fuzzy Hash: fde2701db0c75da303bf05eb1f3dbd85d48916cea8c3a2d153bc182f4cbd4723
                                            • Instruction Fuzzy Hash: 4301F731B0CE888FCBA9FA3C8459939B7E1FFA931030445AEC04EC76A2DE25EC058741
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5d1849619df7ae8e4c5c64bb3e27ba312868785b6be9d0a7a69599d907f8647c
                                            • Instruction ID: 45a565f261bfeb01a795e7698ed7f16489767fe740424d4eb944ffbb4493a186
                                            • Opcode Fuzzy Hash: 5d1849619df7ae8e4c5c64bb3e27ba312868785b6be9d0a7a69599d907f8647c
                                            • Instruction Fuzzy Hash: E2014911F1DF890FDB9AF67C50915F677E1EF9A210B5842FBD00AC318BED2898098381
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e0ba74fd8afcf7a23791a167eadabe84cd5ae29e0167ebfc94d30396ddddd69c
                                            • Instruction ID: 1e5f4717ddd36b9843ba68f59877b62b0c3742e11f106a2db52e84c776fc5622
                                            • Opcode Fuzzy Hash: e0ba74fd8afcf7a23791a167eadabe84cd5ae29e0167ebfc94d30396ddddd69c
                                            • Instruction Fuzzy Hash: 9401F93591C98C8FDB50FF59D8005EA77A4FF89314F00017AE92CC3181DA36A911C791
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8232bde69e893494633c19d356b28e1e9d178d30d3a9b34a00fc7541b13ce74d
                                            • Instruction ID: 2e98fef0f468fca8007900cd60497c537024519a9ee0d1f0ac84242460bde968
                                            • Opcode Fuzzy Hash: 8232bde69e893494633c19d356b28e1e9d178d30d3a9b34a00fc7541b13ce74d
                                            • Instruction Fuzzy Hash: 56012D2140DA954FD792F73884592B97FD1EFC5290F084ABED88CC60E2CE6886C68387
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e14a65038bf49b42adeed137fa0be096953a9455c76b799375de113c514faa53
                                            • Instruction ID: 3dbe101de7d6581ab7211b33f60a9e2473fdd913f2bf00ba804dfecbd13b569e
                                            • Opcode Fuzzy Hash: e14a65038bf49b42adeed137fa0be096953a9455c76b799375de113c514faa53
                                            • Instruction Fuzzy Hash: CAF0223080CACD6FEBA2AB3C94092EA7FF0EF46300F4540E7D848D7253CA2867448342
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 287449ee91756dc71bea1f1f684335bbec4a4b8ae3ab29d786814afd0cfe79ee
                                            • Instruction ID: 4a9e8e471c77bcef2c68d9c0a8945b9c941ad65907ff26cb4b9c89d63aa0eac8
                                            • Opcode Fuzzy Hash: 287449ee91756dc71bea1f1f684335bbec4a4b8ae3ab29d786814afd0cfe79ee
                                            • Instruction Fuzzy Hash: BAF07853E0E3CA0FE3726E382CA61A4BF61DF52164F8801FEC08C8B193F8699442C742
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3d05b5a90bc5596f9ce70ebb9280a42daa6bb02944ef38ff3357157d52e38193
                                            • Instruction ID: e3d79d2d93bff49c6e7ad01b9356fbeb3504da74c2e3cf4aacd59fb9a1bef260
                                            • Opcode Fuzzy Hash: 3d05b5a90bc5596f9ce70ebb9280a42daa6bb02944ef38ff3357157d52e38193
                                            • Instruction Fuzzy Hash: D8F02432F0CB594FD6B0B92D6C961B9B7C2FB88650F5001BAC00D8324ADA39A8864782
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c05a2b7b08e562c5d2b7af68046c44eca96a6e41de18ba786a610577053a1c72
                                            • Instruction ID: 60bd2d8677dff7f63c2aea6a77483291c158200228168f7b2ef860f0824f0043
                                            • Opcode Fuzzy Hash: c05a2b7b08e562c5d2b7af68046c44eca96a6e41de18ba786a610577053a1c72
                                            • Instruction Fuzzy Hash: 63F0A711F2DD4B1FDA89F75C50856F95292FFA4250B5442B6D00EC328ADF2CE8464785
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ad257a63f2fec0a970f81ac2382541f00c618d848f3b78db0f3f9557c33f9316
                                            • Instruction ID: ae9e41e8beeb66107d41723ae0d313c36385b787874f32eab4f53410364015e6
                                            • Opcode Fuzzy Hash: ad257a63f2fec0a970f81ac2382541f00c618d848f3b78db0f3f9557c33f9316
                                            • Instruction Fuzzy Hash: 66F0272664D98E1FEA94BC9DA8815F57384FB80371B88013ACA18C358AD9C9E96642D4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 51413ec4655e8d615ab6376341545a12d3c5f6d6a704acc31b036ca31f581349
                                            • Instruction ID: fa5ffe9a05799c4767eb8a5f540af2d5ea9d89835267f27ef6034ebaa57de2fc
                                            • Opcode Fuzzy Hash: 51413ec4655e8d615ab6376341545a12d3c5f6d6a704acc31b036ca31f581349
                                            • Instruction Fuzzy Hash: 46F0674148F3C60EE76357B448694867FB09E47070B5E82EFC6C5CA4A3D45E488BD722
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d6345978a852328ea328ea0fc1a8f8b0208a341fd1c0f95a38c33b9cdab44ef5
                                            • Instruction ID: 5dba0dd4c23ea5ebf3c4ed9c766bb4d57eb76b24bb183ad6079b26330a4acb1b
                                            • Opcode Fuzzy Hash: d6345978a852328ea328ea0fc1a8f8b0208a341fd1c0f95a38c33b9cdab44ef5
                                            • Instruction Fuzzy Hash: 9BF02E21E2C98A4FE754BA3C541127A73C1FF45255F4108BAD88DC7295DF38DC524345
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 879c6814db9fcc7c273fba7b0b65e43b42a9fc5062338e79fe7079c6dac481f4
                                            • Instruction ID: 60f517a99532b3b53baa3d80fda12841a75fbcc5484d718a780de76a568e52ba
                                            • Opcode Fuzzy Hash: 879c6814db9fcc7c273fba7b0b65e43b42a9fc5062338e79fe7079c6dac481f4
                                            • Instruction Fuzzy Hash: 42F08C3190D61C5FDA58EE59EC46AEA37A8FF85264F00013AF85D82192D635A863CB50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 27ad53bdaf9e5a762ec7ea02c18b77bfde7eec04e2eddd01311d294be8c59fcb
                                            • Instruction ID: 3758285308a7cfadef0808cabcf1d1967eca78feed09045c97c0ae4a6f122ca4
                                            • Opcode Fuzzy Hash: 27ad53bdaf9e5a762ec7ea02c18b77bfde7eec04e2eddd01311d294be8c59fcb
                                            • Instruction Fuzzy Hash: 51F02B1054D8A64FD762AB6C5C406E13BE0EF46280B8940F2E008C718BEA0D9C5147A2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f9b20fff6a0441e7d6843de5a000719a281437728fd666fb80f4a0caed7410d1
                                            • Instruction ID: fa22068e141e4486243814c28727d595fe0b5900d5782b1a39249de2708a6bc1
                                            • Opcode Fuzzy Hash: f9b20fff6a0441e7d6843de5a000719a281437728fd666fb80f4a0caed7410d1
                                            • Instruction Fuzzy Hash: 3CE012A291E3C59FC756AA3849268957F90DE2365071A49FFC045CB5B3E149880D8712
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 511450ad6d7d6f7c6bcdfaa9a267450c06e5f83014401bef3604ce11e8f099e9
                                            • Instruction ID: 3aab65cb9a47ec8fb7c5f4b840e0b53d609e76a79be32bd574ebd191a33a8480
                                            • Opcode Fuzzy Hash: 511450ad6d7d6f7c6bcdfaa9a267450c06e5f83014401bef3604ce11e8f099e9
                                            • Instruction Fuzzy Hash: 5AD05E13E4D94E8EE990A9087C921B5A380FB952B9BA002B3C44A8208ACD3B968B0241
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277804501.00007FF8491C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8491C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8491c0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9dc35dd4d8490d637ac1b2a2c773f8fd7d41bafeefe7f28d66f1b021f890cba6
                                            • Instruction ID: 8f95eb6271b40f606960e8ad9d60b4dd0410c68f8f7caddf38bf3987c15ac6fc
                                            • Opcode Fuzzy Hash: 9dc35dd4d8490d637ac1b2a2c773f8fd7d41bafeefe7f28d66f1b021f890cba6
                                            • Instruction Fuzzy Hash: 56D0C91172D4224FF21435CC685A3F8B285EF88758F904537E409C72E7C89EACC142C6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b158f60b14bc1a99559828326d6c74ee98f1169aae11813d224a5b5a031517e4
                                            • Instruction ID: 003fabf710b76f7ce7653bbec12cfb0fc732586c25e446f7758c4bb32db5bfb7
                                            • Opcode Fuzzy Hash: b158f60b14bc1a99559828326d6c74ee98f1169aae11813d224a5b5a031517e4
                                            • Instruction Fuzzy Hash: 8AC08C2240F2D02FC3238B70AC28EA13FF51E8719030F81D3C088CB4A3EA1D990A8731
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9b874736efbbbdd103f55d2e33316ecf1d4f518077b34c4206e8d2c2f0b94a09
                                            • Instruction ID: 233386a53542265df42d180158332533a12efc1ba27a8135a5d328106b802a64
                                            • Opcode Fuzzy Hash: 9b874736efbbbdd103f55d2e33316ecf1d4f518077b34c4206e8d2c2f0b94a09
                                            • Instruction Fuzzy Hash: 04C08011F4E80E4ED950765430132FCB300FFC5250FC114B1D11DC1883EC4F291006C1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 90e4e32d4db2f455517bb870f4655b0e202980e64083c3664bda339e7cb71ae7
                                            • Instruction ID: 9fb7a0703bab78266fb558ca8f807d67a2906be724c2e3da63fd555e1c4a04ba
                                            • Opcode Fuzzy Hash: 90e4e32d4db2f455517bb870f4655b0e202980e64083c3664bda339e7cb71ae7
                                            • Instruction Fuzzy Hash: CFA00202ACE45E05D554789D78824D8B248E7852B5BD527B2E90CC464AA88F19D20681
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 38eab4a2f8440704734db5dbeed64adb4956e6f615e9f5be28bac933257ef7ea
                                            • Instruction ID: 923fbc690653d39a70a79ee739e4bbb140fefbdd1348a411c93d4f18d03f01d8
                                            • Opcode Fuzzy Hash: 38eab4a2f8440704734db5dbeed64adb4956e6f615e9f5be28bac933257ef7ea
                                            • Instruction Fuzzy Hash: 29F1199798E5E26FD719B77CF4910F97F50EF422B9B0C91B7D1CC490839E08648B86A8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3277412194.00007FF8490F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff8490f0000_6ee7HCp9cD.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4af5a908a8e16bfb7955a05cc8e70c3f5619fc9c11f71b19549b0620194fa5e4
                                            • Instruction ID: 770cea88a411cbd7a5f674883be6595eef335fd94feb369d1e84ecefd51ba318
                                            • Opcode Fuzzy Hash: 4af5a908a8e16bfb7955a05cc8e70c3f5619fc9c11f71b19549b0620194fa5e4
                                            • Instruction Fuzzy Hash: 91C1E731D0CB8C4FDB19EBA898466EDBBE1FF56321F0442AED049C3292DE756845CB91