Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nXNMsYXFFc.exe

Overview

General Information

Sample name:nXNMsYXFFc.exe
renamed because original name is a hash value
Original sample name:be2edcf02f80b8d9ab65724911e3f2e6.exe
Analysis ID:1581187
MD5:be2edcf02f80b8d9ab65724911e3f2e6
SHA1:ad9a05ddee4f70214bfae228f6a974924bcb2f90
SHA256:3df79f238f056cabc4083c1970b1bc5f2e7e6200c364c0d542b484be20a08e73
Tags:exeuser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Tries to harvest and steal Bitcoin Wallet information
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • nXNMsYXFFc.exe (PID: 7280 cmdline: "C:\Users\user\Desktop\nXNMsYXFFc.exe" MD5: BE2EDCF02F80B8D9AB65724911E3F2E6)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x5c05a:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x5f5f0:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.4525181188.0000000002C30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: nXNMsYXFFc.exe PID: 7280JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.nXNMsYXFFc.exe.23927ce.0.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
        • 0x57a8c:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
        0.2.nXNMsYXFFc.exe.23927ce.0.raw.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
        • 0x5988c:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
        • 0x5ce22:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-27T08:10:15.343893+010020355951Domain Observed Used for C2 Detected185.156.175.4321411192.168.2.549705TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: nXNMsYXFFc.exeVirustotal: Detection: 22%Perma Link
        Source: nXNMsYXFFc.exeReversingLabs: Detection: 28%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
        Source: nXNMsYXFFc.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 185.156.175.43:21411 -> 192.168.2.5:49705
        Source: global trafficTCP traffic: 192.168.2.5:49705 -> 185.156.175.43:21411
        Source: Joe Sandbox ViewASN Name: M247GB M247GB
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
        Source: nXNMsYXFFc.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
        Source: nXNMsYXFFc.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
        Source: nXNMsYXFFc.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
        Source: nXNMsYXFFc.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
        Source: nXNMsYXFFc.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
        Source: nXNMsYXFFc.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
        Source: nXNMsYXFFc.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
        Source: nXNMsYXFFc.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
        Source: nXNMsYXFFc.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
        Source: nXNMsYXFFc.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
        Source: nXNMsYXFFc.exe, 00000000.00000002.4520753410.0000000000814000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
        Source: nXNMsYXFFc.exe, 00000000.00000002.4520753410.0000000000814000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
        Source: nXNMsYXFFc.exe, 00000000.00000003.2223769206.00000000053C3000.00000004.00000020.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000000.00000003.2223110818.00000000053C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?2916544ccc4dd
        Source: nXNMsYXFFc.exeString found in binary or memory: http://ocsp.digicert.com0A
        Source: nXNMsYXFFc.exeString found in binary or memory: http://ocsp.digicert.com0C
        Source: nXNMsYXFFc.exeString found in binary or memory: http://ocsp.digicert.com0X
        Source: nXNMsYXFFc.exeString found in binary or memory: http://ocsp.sectigo.com0
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: nXNMsYXFFc.exeString found in binary or memory: http://www.toolwiz.com
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/WebDriver.dll
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/chromedriver.exe
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/msedgedriver.exe
        Source: nXNMsYXFFc.exeString found in binary or memory: https://sectigo.com/CPS0
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354rCannot

        System Summary

        barindex
        Source: 0.2.nXNMsYXFFc.exe.23927ce.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
        Source: 0.2.nXNMsYXFFc.exe.23927ce.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
        Source: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
        Source: 0.2.nXNMsYXFFc.exe.23927ce.0.raw.unpack, ImIFiiaFZW8NwtFyyJ.csLarge array initialization: pnTWmaVul: array initializer size 304704
        Source: 0.2.nXNMsYXFFc.exe.4f30000.4.raw.unpack, ImIFiiaFZW8NwtFyyJ.csLarge array initialization: pnTWmaVul: array initializer size 304704
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_023907510_2_02390751
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_023F0E060_2_023F0E06
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_023996A30_2_023996A3
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_023ED6D60_2_023ED6D6
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_023EDB0E0_2_023EDB0E
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_023ED3060_2_023ED306
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_023EC4120_2_023EC412
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_023900000_2_02390000
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_023EE5AE0_2_023EE5AE
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_028553D00_2_028553D0
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_02855B300_2_02855B30
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_02851D800_2_02851D80
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_02851AF70_2_02851AF7
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_02854A300_2_02854A30
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_028553C00_2_028553C0
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_02851B080_2_02851B08
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_02851D800_2_02851D80
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_028549810_2_02854981
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_0285AF800_2_0285AF80
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_050DC0080_2_050DC008
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_050D4E580_2_050D4E58
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_050D53450_2_050D5345
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_050D6D000_2_050D6D00
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_050D9CC00_2_050D9CC0
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_050DBB500_2_050DBB50
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_051B50A00_2_051B50A0
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_051B00400_2_051B0040
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_051EA7100_2_051EA710
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_051E1AA00_2_051E1AA0
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_051E8E280_2_051E8E28
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_051EA6FF0_2_051EA6FF
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_051EE3300_2_051EE330
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_051EE3200_2_051EE320
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_05209C380_2_05209C38
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_0520D7A00_2_0520D7A0
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_05209F800_2_05209F80
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_0520A8500_2_0520A850
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_0520FA910_2_0520FA91
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_0520F54E0_2_0520F54E
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_0520F5570_2_0520F557
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_05201F600_2_05201F60
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_05201F500_2_05201F50
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_0520D7900_2_0520D790
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_0520F63D0_2_0520F63D
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_052000070_2_05200007
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_052000400_2_05200040
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_052040A80_2_052040A8
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_0520D0E50_2_0520D0E5
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_0520FB660_2_0520FB66
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_0520FA9A0_2_0520FA9A
        Source: nXNMsYXFFc.exeStatic PE information: invalid certificate
        Source: nXNMsYXFFc.exeBinary or memory string: OriginalFilename vs nXNMsYXFFc.exe
        Source: nXNMsYXFFc.exe, 00000000.00000002.4532614719.0000000004FC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameIcgrxeqruy.dll" vs nXNMsYXFFc.exe
        Source: nXNMsYXFFc.exe, 00000000.00000000.2057264690.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: WM/OriginalFilename vs nXNMsYXFFc.exe
        Source: nXNMsYXFFc.exe, 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSojzzarduxj.exe" vs nXNMsYXFFc.exe
        Source: nXNMsYXFFc.exe, 00000000.00000002.4530088175.0000000003B50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIcgrxeqruy.dll" vs nXNMsYXFFc.exe
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIcgrxeqruy.dll" vs nXNMsYXFFc.exe
        Source: nXNMsYXFFc.exeBinary or memory string: WM/OriginalFilename vs nXNMsYXFFc.exe
        Source: nXNMsYXFFc.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: 0.2.nXNMsYXFFc.exe.23927ce.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
        Source: 0.2.nXNMsYXFFc.exe.23927ce.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
        Source: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
        Source: 0.2.nXNMsYXFFc.exe.23927ce.0.raw.unpack, XxHkOWpffRyD2rf8x9.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.nXNMsYXFFc.exe.23927ce.0.raw.unpack, XxHkOWpffRyD2rf8x9.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.nXNMsYXFFc.exe.23927ce.0.raw.unpack, ImIFiiaFZW8NwtFyyJ.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.nXNMsYXFFc.exe.4f30000.4.raw.unpack, XxHkOWpffRyD2rf8x9.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.nXNMsYXFFc.exe.4f30000.4.raw.unpack, XxHkOWpffRyD2rf8x9.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.nXNMsYXFFc.exe.4f30000.4.raw.unpack, ImIFiiaFZW8NwtFyyJ.csCryptographic APIs: 'CreateDecryptor'
        Source: classification engineClassification label: mal100.spyw.evad.winEXE@1/2@0/1
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_02390E61 CreateToolhelp32Snapshot,Thread32First,Wow64SuspendThread,CloseHandle,CloseHandle,0_2_02390E61
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeMutant created: NULL
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeMutant created: \Sessions\1\BaseNamedObjects\f2d06879d699
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: nXNMsYXFFc.exeVirustotal: Detection: 22%
        Source: nXNMsYXFFc.exeReversingLabs: Detection: 28%
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: cryptnet.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: cabinet.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: nXNMsYXFFc.exeStatic file information: File size 2174904 > 1048576
        Source: nXNMsYXFFc.exeStatic PE information: Raw size of CODE is bigger than: 0x100000 < 0x127600

        Data Obfuscation

        barindex
        Source: 0.2.nXNMsYXFFc.exe.23927ce.0.raw.unpack, XxHkOWpffRyD2rf8x9.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
        Source: 0.2.nXNMsYXFFc.exe.4f30000.4.raw.unpack, XxHkOWpffRyD2rf8x9.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
        Source: nXNMsYXFFc.exeStatic PE information: real checksum: 0xff4012 should be: 0x21a706
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_023977B6 push ebx; retf 0_2_023977BE
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_050A7940 push eax; retf 007Ch0_2_050A7959
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_050D89B8 push eax; ret 0_2_050D89B9
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_050D8A4A pushfd ; ret 0_2_050D8A51
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_050D9ACA push eax; iretd 0_2_050D9AD1
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_051BA7BB push eax; iretd 0_2_051BA7C1
        Source: 0.2.nXNMsYXFFc.exe.23927ce.0.raw.unpack, XxHkOWpffRyD2rf8x9.csHigh entropy of concatenated method names: 'kM5C10wM8a7nJUq9YQn', 'UMrXMFw6rY39JRAnjo4', 'kQNfG0h0et', 'vh0ry9Sq2v', 'vMdfsjNtiP', 'c1Tf9G3hPh', 'WT5fI1NDIY', 'yWLfLFR0VC', 'kIMNxe4OdN', 'L5YC0OdQI'
        Source: 0.2.nXNMsYXFFc.exe.4f30000.4.raw.unpack, XxHkOWpffRyD2rf8x9.csHigh entropy of concatenated method names: 'kM5C10wM8a7nJUq9YQn', 'UMrXMFw6rY39JRAnjo4', 'kQNfG0h0et', 'vh0ry9Sq2v', 'vMdfsjNtiP', 'c1Tf9G3hPh', 'WT5fI1NDIY', 'yWLfLFR0VC', 'kIMNxe4OdN', 'L5YC0OdQI'
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeMemory allocated: 2850000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeMemory allocated: 2A30000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeMemory allocated: 4A30000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWindow / User API: threadDelayed 2935Jump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWindow / User API: threadDelayed 6852Jump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exe TID: 7444Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exe TID: 7524Thread sleep count: 31 > 30Jump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exe TID: 7524Thread sleep time: -28592453314249787s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exe TID: 7536Thread sleep count: 2935 > 30Jump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exe TID: 7536Thread sleep count: 6852 > 30Jump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: nXNMsYXFFc.exe, 00000000.00000002.4520753410.000000000079B000.00000004.00000020.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000000.00000003.2223110818.00000000053D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: nXNMsYXFFc.exe, 00000000.00000003.2223110818.00000000053C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnW
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_02390751 mov edx, dword ptr fs:[00000030h]0_2_02390751
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_02390D11 mov eax, dword ptr fs:[00000030h]0_2_02390D11
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_02391361 mov eax, dword ptr fs:[00000030h]0_2_02391361
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_02391360 mov eax, dword ptr fs:[00000030h]0_2_02391360
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 0_2_023910C1 mov eax, dword ptr fs:[00000030h]0_2_023910C1
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeMemory allocated: page read and write | page guardJump to behavior
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000003041000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]qD
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000003069000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002DBE000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002D96000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002F2A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]q@
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002E8A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]q`
        Source: nXNMsYXFFc.exeBinary or memory string: ProgMan
        Source: nXNMsYXFFc.exeBinary or memory string: ProgManU
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000003069000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002DBE000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002D20000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager*
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]qP
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000003069000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002DBE000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002D96000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]q
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: nXNMsYXFFc.exe, 00000000.00000002.4520753410.000000000079B000.00000004.00000020.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000000.00000003.2434678081.0000000000846000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Electrum
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: tibnejdfjmmkpcnlpebklmnkoeoihofecuTronLinkvnkbihfbeogaeaoehlefnkodbefgpgknnwMetaMaskxfhbohimaelbohpjbbldcngcnapndodjpyBinance Chain Walletzffnbelfdoeiohenkjibnmadjiehjhajb{Yoroi|cjelfplplebdjjenllpjcblmjkfcffne}Jaxx Liberty~fihkakfobkmkjojpchpfgcmhfjnmnfpi
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002C30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $]q4C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002C30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $]q1C:\Users\user\AppData\Roaming\Ethereum\keystore
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus Web3
        Source: nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
        Source: nXNMsYXFFc.exe, 00000000.00000002.4520753410.0000000000814000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*/e?
        Source: nXNMsYXFFc.exeString found in binary or memory: set_UseMachineKeyStore
        Source: C:\Users\user\Desktop\nXNMsYXFFc.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
        Source: Yara matchFile source: 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.4525181188.0000000002C30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: nXNMsYXFFc.exe PID: 7280, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts321
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Process Injection
        1
        Disable or Modify Tools
        OS Credential Dumping1
        Query Registry
        Remote Services11
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        341
        Virtualization/Sandbox Evasion
        LSASS Memory431
        Security Software Discovery
        Remote Desktop Protocol1
        Data from Local System
        1
        Non-Standard Port
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Process Injection
        Security Account Manager341
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Deobfuscate/Decode Files or Information
        NTDS3
        Process Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Obfuscated Files or Information
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Software Packing
        Cached Domain Credentials23
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        DLL Side-Loading
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        nXNMsYXFFc.exe23%VirustotalBrowse
        nXNMsYXFFc.exe29%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.toolwiz.com0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
        217.20.58.100
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://sectigo.com/CPS0nXNMsYXFFc.exefalse
            high
            https://stackoverflow.com/q/14436606/23354nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0ynXNMsYXFFc.exefalse
                high
                http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0nXNMsYXFFc.exefalse
                  high
                  http://ocsp.sectigo.com0nXNMsYXFFc.exefalse
                    high
                    https://github.com/DFfe9ewf/test3/raw/refs/heads/main/WebDriver.dllnXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://stackoverflow.com/q/2152978/23354rCannotnXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://stackoverflow.com/q/11564914/23354;nXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.toolwiz.comnXNMsYXFFc.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          https://github.com/DFfe9ewf/test3/raw/refs/heads/main/chromedriver.exenXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://github.com/DFfe9ewf/test3/raw/refs/heads/main/msedgedriver.exenXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#nXNMsYXFFc.exefalse
                                high
                                http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#nXNMsYXFFc.exefalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namenXNMsYXFFc.exe, 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    185.156.175.43
                                    unknownRomania
                                    9009M247GBtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1581187
                                    Start date and time:2024-12-27 08:09:06 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 8m 27s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:4
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:nXNMsYXFFc.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:be2edcf02f80b8d9ab65724911e3f2e6.exe
                                    Detection:MAL
                                    Classification:mal100.spyw.evad.winEXE@1/2@0/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 90%
                                    • Number of executed functions: 315
                                    • Number of non-executed functions: 34
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                    • Excluded IPs from analysis (whitelisted): 217.20.58.100, 13.107.246.63, 4.175.87.197
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                    • Report size getting too big, too many NtOpenFile calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    TimeTypeDescription
                                    02:10:17API Interceptor10101554x Sleep call for process: nXNMsYXFFc.exe modified
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com5RaYXoKFn9.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                                    • 217.20.58.98
                                    msgde.exeGet hashmaliciousQuasarBrowse
                                    • 217.20.58.99
                                    atw3.dllGet hashmaliciousGozi, UrsnifBrowse
                                    • 217.20.58.100
                                    WRD1792.docx.docGet hashmaliciousDynamerBrowse
                                    • 217.20.58.99
                                    GtEVo1eO2p.exeGet hashmaliciousLummaCBrowse
                                    • 217.20.58.98
                                    0442.pdf.exeGet hashmaliciousUnknownBrowse
                                    • 217.20.58.100
                                    #U5b89#U88c5#U7a0b#U5e8f_1.1.0.exeGet hashmaliciousUnknownBrowse
                                    • 217.20.58.100
                                    wUSt04rfJ0.exeGet hashmaliciousQuasarBrowse
                                    • 217.20.58.101
                                    #U5b89#U88c5#U52a9#U624b1.0.2.exeGet hashmaliciousUnknownBrowse
                                    • 217.20.58.99
                                    AxoPac.exeGet hashmaliciousLummaCBrowse
                                    • 217.20.58.100
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    M247GBub8ehJSePAfc9FYqZIT6.arm6.elfGet hashmaliciousUnknownBrowse
                                    • 92.118.56.167
                                    ub8ehJSePAfc9FYqZIT6.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 92.118.56.167
                                    ub8ehJSePAfc9FYqZIT6.x86_64.elfGet hashmaliciousUnknownBrowse
                                    • 92.118.56.167
                                    ub8ehJSePAfc9FYqZIT6.ppc.elfGet hashmaliciousUnknownBrowse
                                    • 92.118.56.167
                                    ub8ehJSePAfc9FYqZIT6.mips.elfGet hashmaliciousUnknownBrowse
                                    • 92.118.56.167
                                    ub8ehJSePAfc9FYqZIT6.mpsl.elfGet hashmaliciousUnknownBrowse
                                    • 92.118.56.167
                                    ub8ehJSePAfc9FYqZIT6.arm.elfGet hashmaliciousMiraiBrowse
                                    • 92.118.56.167
                                    ub8ehJSePAfc9FYqZIT6.m68k.elfGet hashmaliciousMiraiBrowse
                                    • 92.118.56.167
                                    ub8ehJSePAfc9FYqZIT6.sh4.elfGet hashmaliciousUnknownBrowse
                                    • 92.118.56.167
                                    ub8ehJSePAfc9FYqZIT6.i686.elfGet hashmaliciousUnknownBrowse
                                    • 92.118.56.167
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\nXNMsYXFFc.exe
                                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                    Category:dropped
                                    Size (bytes):71954
                                    Entropy (8bit):7.996617769952133
                                    Encrypted:true
                                    SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                    MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                    SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                    SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                    SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                    Process:C:\Users\user\Desktop\nXNMsYXFFc.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):328
                                    Entropy (8bit):3.1303968885382334
                                    Encrypted:false
                                    SSDEEP:6:kKyJDL9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:aJ2DnLNkPlE99SNxAhUe/3
                                    MD5:52F3298A72F2963EAFC60BAE21C46E76
                                    SHA1:CAD2AFE0205F74391041BDAC04340498A74CF34F
                                    SHA-256:36FF06C9F3EA5A05BDD48049C73211D2C5F78F6759F9FFEFFAC74AFDEF9A51DF
                                    SHA-512:1CF726B022FBE0CA46ABC08CA825B2EA7C7295FBAB3E5CBC2EC5E96CF2CB41137AC5077276441690458327F5F972ACB58BD0EDC04CB1DCC16B5954888143ECFB
                                    Malicious:false
                                    Reputation:low
                                    Preview:p...... ........].Bb.X..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):7.156429765941512
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.79%
                                    • Win32 Executable Delphi generic (14689/80) 0.15%
                                    • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    File name:nXNMsYXFFc.exe
                                    File size:2'174'904 bytes
                                    MD5:be2edcf02f80b8d9ab65724911e3f2e6
                                    SHA1:ad9a05ddee4f70214bfae228f6a974924bcb2f90
                                    SHA256:3df79f238f056cabc4083c1970b1bc5f2e7e6200c364c0d542b484be20a08e73
                                    SHA512:950a60d17efebe1b61f96be5e4947d128c15d812e2e895f4d3d1d1ef5607b5931c7919696ac71c4fd7160c3dcb9f0fa724b0ae0d42b8db3cb6e8b6d171a0a61e
                                    SSDEEP:49152:4uG6knvVDK8YcrWaCyqp1uw/0L5QiHzROaBoKxcMH:LG6knvVe8Yzacp50Lx5BoYc8
                                    TLSH:BFA5BE52B74348B3F25716B81C4EABD8953A7F105EF1648B3BFC8A4C0FB661139152AB
                                    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                    Icon Hash:3e5fcdce1f0c2813
                                    Entrypoint:0x52859c
                                    Entrypoint Section:CODE
                                    Digitally signed:true
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                    DLL Characteristics:
                                    Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:ba8c1dbdc3c38ecddecbc436d980538f
                                    Signature Valid:false
                                    Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                    Signature Validation Error:The digital signature of the object did not verify
                                    Error Number:-2146869232
                                    Not Before, Not After
                                    • 21/04/2022 02:00:00 21/04/2025 01:59:59
                                    Subject Chain
                                    • CN=Musecy SM Ltd., O=Musecy SM Ltd., S=Lemesos, C=CY
                                    Version:3
                                    Thumbprint MD5:BD369706380B543F3116644C27E8A343
                                    Thumbprint SHA-1:2162556B51EFF0F55949EEDD6D0B270E412C27B0
                                    Thumbprint SHA-256:90FD858CBC4F0C292C17D50C323FD0B5704D87EFD7DB4B80AF74D76CCAE868E7
                                    Serial:00C134B2A3AE7F9BD5A260DC5FCC04087C
                                    Instruction
                                    push ebp
                                    mov ebp, esp
                                    add esp, FFFFFFF0h
                                    mov eax, 00528184h
                                    call 00007FC50CAFBC21h
                                    mov eax, dword ptr [0052C484h]
                                    mov eax, dword ptr [eax]
                                    call 00007FC50CB6202Dh
                                    mov ecx, dword ptr [0052C1D8h]
                                    mov eax, dword ptr [0052C484h]
                                    mov eax, dword ptr [eax]
                                    mov edx, dword ptr [005263B0h]
                                    call 00007FC50CB6202Dh
                                    mov ecx, dword ptr [0052C15Ch]
                                    mov eax, dword ptr [0052C484h]
                                    mov eax, dword ptr [eax]
                                    mov edx, dword ptr [00525E40h]
                                    call 00007FC50CB62015h
                                    mov eax, dword ptr [0052C484h]
                                    mov eax, dword ptr [eax]
                                    call 00007FC50CB62089h
                                    call 00007FC50CAF94B8h
                                    lea eax, dword ptr [eax+00h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x12f0000x295e.idata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x14f0000xc8400.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x2104000x2bb8.rsrc
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1340000x1a13c.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x1330000x18.rdata
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    CODE0x10000x1275fc0x127600d8787007bbfa6c50dc285c2ae43d7862False0.45226126084426577data6.569236214754046IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    DATA0x1290000x36c00x3800f15602958cfed3b9c1fa839de845894eFalse0.35498046875data4.044626185990053IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    BSS0x12d0000x1d210x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .idata0x12f0000x295e0x2a007d48f980de0ab1b669d230f1aad47239False0.3625372023809524data5.0281993778896545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .tls0x1320000x100x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rdata0x1330000x180x200b90be1293225713fd61560e123c5aa47False0.05078125MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "S"0.2069200177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                    .reloc0x1340000x1a13c0x1a200c839772e1a25c7cda4d2220521452f23False0.39902624102870815data6.531022351368505IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                    .rsrc0x14f0000xc84000xc840042c657d12ed380130e9a41c474fadbb6False0.7004172031054932data7.557370194206266IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_CURSOR0x14fe040x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
                                    RT_CURSOR0x14ff380x134data0.4642857142857143
                                    RT_CURSOR0x15006c0x134data0.4805194805194805
                                    RT_CURSOR0x1501a00x134data0.38311688311688313
                                    RT_CURSOR0x1502d40x134data0.36038961038961037
                                    RT_CURSOR0x1504080x134data0.4090909090909091
                                    RT_CURSOR0x15053c0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                    RT_BITMAP0x1506700x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                    RT_BITMAP0x1508400x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
                                    RT_BITMAP0x150a240x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                    RT_BITMAP0x150bf40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
                                    RT_BITMAP0x150dc40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
                                    RT_BITMAP0x150f940x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
                                    RT_BITMAP0x1511640x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
                                    RT_BITMAP0x1513340x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                    RT_BITMAP0x1515040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
                                    RT_BITMAP0x1516d40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                    RT_BITMAP0x1518a40xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
                                    RT_ICON0x15198c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0ChineseChina0.2980894357033006
                                    RT_ICON0x1621b40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0ChineseChina0.43776570618800187
                                    RT_ICON0x1663dc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0ChineseChina0.5142116182572614
                                    RT_ICON0x1689840x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0ChineseChina0.5811444652908068
                                    RT_ICON0x169a2c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 0ChineseChina0.6598360655737705
                                    RT_ICON0x16a3b40x468Device independent bitmap graphic, 16 x 32 x 32, image size 0ChineseChina0.749113475177305
                                    RT_DIALOG0x16a81c0x52data0.7682926829268293
                                    RT_STRING0x16a8700xe4data0.5789473684210527
                                    RT_STRING0x16a9540x1e4data0.38016528925619836
                                    RT_STRING0x16ab380x1a4data0.4714285714285714
                                    RT_STRING0x16acdc0x11cdata0.5880281690140845
                                    RT_STRING0x16adf80x38cdata0.4251101321585903
                                    RT_STRING0x16b1840xc4data0.6071428571428571
                                    RT_STRING0x16b2480xecdata0.597457627118644
                                    RT_STRING0x16b3340x130data0.5625
                                    RT_STRING0x16b4640x3c0data0.4
                                    RT_STRING0x16b8240x400data0.3876953125
                                    RT_STRING0x16bc240x314data0.4022842639593909
                                    RT_STRING0x16bf380x334data0.3426829268292683
                                    RT_STRING0x16c26c0x404data0.3754863813229572
                                    RT_STRING0x16c6700x114data0.5
                                    RT_STRING0x16c7840xe4data0.5482456140350878
                                    RT_STRING0x16c8680x24cdata0.477891156462585
                                    RT_STRING0x16cab40x3ccdata0.30246913580246915
                                    RT_STRING0x16ce800x3acdata0.37553191489361704
                                    RT_STRING0x16d22c0x2d4data0.4046961325966851
                                    RT_RCDATA0x16d5000x242bfDelphi compiled form 'TvgBackground'EnglishUnited States0.2749883571028422
                                    RT_RCDATA0x1917c00x10data1.5
                                    RT_RCDATA0x1917d00x670data0.6037621359223301
                                    RT_RCDATA0x191e400xa2aDelphi compiled form 'TfrmAbout'0.23904688700999233
                                    RT_RCDATA0x19286c0x817Delphi compiled form 'TfrmControlBox'0.3896668276195075
                                    RT_RCDATA0x1930840x1ce81Delphi compiled form 'TfrmPlayer'0.9742231906825112
                                    RT_RCDATA0x1aff080x1809Delphi compiled form 'TvgBitmapEditor'0.3528360149520559
                                    RT_RCDATA0x1b17140x3144Delphi compiled form 'TvgBrushDesign'0.20480494766888677
                                    RT_RCDATA0x1b48580x80eDelphi compiled form 'TvgPathDataDesigner'0.4010669253152279
                                    RT_GROUP_CURSOR0x1b50680x14Lotus unknown worksheet or configuration, revision 0x11.25
                                    RT_GROUP_CURSOR0x1b507c0x14Lotus unknown worksheet or configuration, revision 0x11.25
                                    RT_GROUP_CURSOR0x1b50900x14Lotus unknown worksheet or configuration, revision 0x11.3
                                    RT_GROUP_CURSOR0x1b50a40x14Lotus unknown worksheet or configuration, revision 0x11.3
                                    RT_GROUP_CURSOR0x1b50b80x14Lotus unknown worksheet or configuration, revision 0x11.3
                                    RT_GROUP_CURSOR0x1b50cc0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                    RT_GROUP_CURSOR0x1b50e00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                    RT_GROUP_ICON0x1b50f40x5adataChineseChina0.7888888888888889
                                    DLLImport
                                    kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                    user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                                    advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                    oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                    kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                    advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                    kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, SystemTimeToFileTime, Sleep, SizeofResource, SetThreadLocale, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEnvironmentVariableW, SetEnvironmentVariableA, SetEndOfFile, SetCurrentDirectoryW, ResumeThread, ResetEvent, ReleaseMutex, ReadFile, OutputDebugStringA, MulDiv, LockResource, LocalFileTimeToFileTime, LoadResource, LoadLibraryExW, LoadLibraryW, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProfileStringA, GetProcAddress, GetModuleHandleA, GetModuleFileNameW, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameW, GetFullPathNameA, GetFileSize, GetFileAttributesW, GetFileAttributesA, GetExitCodeThread, GetEnvironmentVariableW, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCurrentDirectoryW, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileW, FindFirstFileW, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateMutexA, CreateFileW, CreateFileA, CreateEventA, CompareStringW, CompareStringA, CloseHandle
                                    version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                    gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRegionData, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExcludeClipRect, EndPage, EndDoc, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICA, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, BitBlt
                                    user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, SendDlgItemMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsClipboardFormatAvailable, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetUpdateRgn, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowExA, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharLowerBuffW, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                    kernel32.dllSleep
                                    oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                    ole32.dllReleaseStgMedium, RevokeDragDrop, RegisterDragDrop, OleInitialize, CoCreateInstance
                                    comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                                    imm32.dllImmSetCompositionWindow, ImmSetCompositionFontA, ImmGetCompositionStringW, ImmReleaseContext, ImmGetContext
                                    winspool.drvOpenPrinterA, EnumPrintersA, DocumentPropertiesA, ClosePrinter
                                    shell32.dllDragQueryFileW, DragQueryFileA
                                    comdlg32.dllChooseFontA, ChooseColorA, GetSaveFileNameA, GetOpenFileNameA
                                    Language of compilation systemCountry where language is spokenMap
                                    ChineseChina
                                    EnglishUnited States
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-12-27T08:10:15.343893+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert1185.156.175.4321411192.168.2.549705TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 27, 2024 08:10:13.472166061 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:13.591872931 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:13.591978073 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:13.594130039 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:13.713654041 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:13.713804960 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:13.833369017 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:15.216209888 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:15.216270924 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:15.216375113 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:15.224344015 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:15.343893051 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:15.752396107 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:15.803476095 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:19.274139881 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:19.393747091 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:19.393949032 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:19.515824080 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:39.572520971 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:39.692069054 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:39.692146063 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:39.812643051 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:40.331923962 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:40.381675005 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:41.014213085 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:41.061036110 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:41.180548906 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:10:41.183578014 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:10:41.303159952 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:00.561644077 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:00.684504032 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:00.684581041 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:00.804094076 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:01.326750994 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:01.381694078 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:01.569469929 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:01.597057104 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:01.716559887 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:01.716614008 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:01.837166071 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:21.560831070 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:21.680290937 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:21.680344105 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:21.799802065 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:22.645401001 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:22.694230080 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:22.880362988 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:22.888413906 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:23.007844925 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:23.007924080 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:23.127388000 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:42.558257103 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:42.677826881 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:42.677923918 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:42.797454119 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:43.325750113 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:43.382730007 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:43.569128990 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:43.616163015 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:43.645165920 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:43.764848948 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:43.764971972 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:43.884546041 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:52.599872112 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:52.719475031 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:52.719594955 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:52.839171886 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:53.358136892 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:53.413038015 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:53.598963022 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:53.606672049 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:53.726285934 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:53.726556063 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:53.846036911 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:57.474384069 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:57.593941927 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:57.594131947 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:57.713860989 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:57.713956118 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:57.833619118 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:58.248722076 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:58.431643963 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:58.551515102 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:58.572871923 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:58.692435026 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:11:58.692549944 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:11:58.812006950 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:01.353427887 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:01.472897053 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:01.472975016 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:01.592540979 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:06.140067101 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:06.194381952 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:06.382286072 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:06.400512934 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:06.520064116 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:06.523751020 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:06.643224001 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:06.916157961 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:07.035612106 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:07.035693884 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:07.155138969 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:08.446321964 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:08.565762043 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:08.565983057 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:08.685456038 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:14.585057974 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:14.633725882 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:14.840033054 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:14.854722977 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:14.974193096 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:14.974260092 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:15.093734026 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:29.461585999 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:29.581074953 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:29.581152916 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:29.700704098 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:30.231230021 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:30.428797007 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:30.778136015 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:30.784826994 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:30.904306889 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:30.904369116 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:31.023766994 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:44.622004032 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:44.741497993 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:44.742150068 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:44.861566067 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:45.396610022 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:45.444408894 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:45.631097078 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:45.638375044 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:45.757931948 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:45.758055925 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:45.877834082 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:57.946168900 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:58.065759897 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:58.065824986 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:58.185264111 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:58.709168911 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:58.758805990 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:58.944863081 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:58.965647936 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:59.085237980 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:12:59.085294008 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:12:59.204838037 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:04.963099003 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:05.082570076 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:05.082659006 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:05.202069998 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:05.729971886 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:05.772622108 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:06.389305115 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:06.409140110 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:06.528676033 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:06.531900883 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:06.651310921 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:10.495867968 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:10.615331888 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:10.618228912 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:10.737745047 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:11.159691095 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:11.210081100 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:11.384576082 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:11.391737938 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:11.511305094 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:11.511413097 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:11.632536888 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:12.511847019 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:12.631326914 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:12.631401062 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:12.750943899 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:13.289839983 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:13.335108042 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:13.552242994 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:13.560398102 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:13.680794954 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:13.680871010 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:13.800381899 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:15.649713993 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:15.769309044 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:15.769364119 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:15.897618055 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:16.411477089 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:16.462264061 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:16.645986080 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:16.694457054 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:16.735522985 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:16.854919910 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:16.856010914 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:16.975503922 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:29.853089094 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:29.972773075 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:29.972979069 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:30.092506886 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:30.640506029 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:30.695899963 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:30.852072954 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:30.889837980 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:31.009367943 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:31.009530067 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:31.129049063 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:38.487611055 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:38.607333899 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:38.608097076 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:38.727654934 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:39.255800962 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:39.303874016 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:39.493892908 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:39.528032064 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:39.647653103 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:39.647779942 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:39.767384052 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:59.461323977 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:59.582289934 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:13:59.582350969 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:13:59.703022003 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:14:00.224555969 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:14:00.272808075 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:14:00.463821888 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:14:00.483338118 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:14:00.602874041 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:14:00.606167078 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:14:00.725801945 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:14:09.680788040 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:14:09.803210020 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:14:09.806111097 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:14:09.926609993 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:14:10.503599882 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:14:10.553924084 CET4970521411192.168.2.5185.156.175.43
                                    Dec 27, 2024 08:14:10.744494915 CET2141149705185.156.175.43192.168.2.5
                                    Dec 27, 2024 08:14:10.788292885 CET4970521411192.168.2.5185.156.175.43
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 27, 2024 08:10:16.312997103 CET1.1.1.1192.168.2.50x5475No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
                                    Dec 27, 2024 08:10:16.312997103 CET1.1.1.1192.168.2.50x5475No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.100A (IP address)IN (0x0001)false
                                    Dec 27, 2024 08:10:16.312997103 CET1.1.1.1192.168.2.50x5475No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.101A (IP address)IN (0x0001)false
                                    Dec 27, 2024 08:10:16.312997103 CET1.1.1.1192.168.2.50x5475No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.99A (IP address)IN (0x0001)false
                                    Dec 27, 2024 08:10:16.312997103 CET1.1.1.1192.168.2.50x5475No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.98A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Target ID:0
                                    Start time:02:10:01
                                    Start date:27/12/2024
                                    Path:C:\Users\user\Desktop\nXNMsYXFFc.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\nXNMsYXFFc.exe"
                                    Imagebase:0x400000
                                    File size:2'174'904 bytes
                                    MD5 hash:BE2EDCF02F80B8D9AB65724911E3F2E6
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:Borland Delphi
                                    Yara matches:
                                    • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4525181188.0000000002A54000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4525181188.0000000002C30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:6.2%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:26.8%
                                      Total number of Nodes:97
                                      Total number of Limit Nodes:10
                                      execution_graph 56275 2390751 56276 239075f 56275->56276 56289 23910a1 56276->56289 56278 2390be5 56279 23908f7 GetPEB 56281 2390974 56279->56281 56280 23908b2 56280->56278 56280->56279 56292 2390e61 56281->56292 56284 23909d5 CreateThread 56285 23909ad 56284->56285 56304 2390d11 GetPEB 56284->56304 56285->56278 56301 2391361 GetPEB 56285->56301 56287 2390e61 5 API calls 56287->56278 56288 2390a2f 56288->56278 56288->56287 56302 23910c1 GetPEB 56289->56302 56291 23910ae 56291->56280 56293 2390e77 CreateToolhelp32Snapshot 56292->56293 56295 23909a7 56293->56295 56296 2390eae Thread32First 56293->56296 56295->56284 56295->56285 56297 2390f6a CloseHandle 56296->56297 56298 2390ed5 56296->56298 56297->56295 56298->56297 56299 2390f0c Wow64SuspendThread 56298->56299 56300 2390f36 CloseHandle 56298->56300 56299->56300 56300->56298 56301->56288 56303 23910dc 56302->56303 56303->56291 56307 2390d6a 56304->56307 56305 2390dca CreateThread 56305->56307 56308 2391541 56305->56308 56306 2390e17 56307->56305 56307->56306 56311 23ebf06 56308->56311 56310 2391546 56312 23ef3fc 56311->56312 56313 23ebf10 56311->56313 56314 23ef50a 56312->56314 56315 23ef420 56312->56315 56313->56310 56325 23f06d6 56314->56325 56349 23f1c7d 56315->56349 56318 23ef438 56319 23f1c7d LoadLibraryA 56318->56319 56324 23ef4b0 56318->56324 56320 23ef47a 56319->56320 56321 23f1c7d LoadLibraryA 56320->56321 56322 23ef496 56321->56322 56323 23f1c7d LoadLibraryA 56322->56323 56323->56324 56324->56310 56326 23f1c7d LoadLibraryA 56325->56326 56327 23f06f9 56326->56327 56328 23f1c7d LoadLibraryA 56327->56328 56329 23f0711 56328->56329 56330 23f1c7d LoadLibraryA 56329->56330 56331 23f072f 56330->56331 56332 23f0758 56331->56332 56333 23f0744 VirtualAlloc 56331->56333 56332->56324 56333->56332 56335 23f0772 56333->56335 56334 23f1c7d LoadLibraryA 56338 23f07f0 56334->56338 56335->56332 56335->56334 56336 23f0846 56336->56332 56337 23f1c7d LoadLibraryA 56336->56337 56340 23f08a8 56336->56340 56337->56336 56338->56332 56338->56336 56353 23f1a84 56338->56353 56340->56332 56348 23f090a 56340->56348 56357 23ef866 56340->56357 56343 23f0a16 56384 23f0e06 LoadLibraryA 56343->56384 56344 23f09cb 56344->56332 56380 23f04c7 56344->56380 56348->56332 56348->56343 56348->56344 56350 23f1c94 56349->56350 56351 23f1cbb 56350->56351 56390 23efd82 LoadLibraryA 56350->56390 56351->56318 56354 23f1a99 56353->56354 56355 23f1b0f LoadLibraryA 56354->56355 56356 23f1b19 56354->56356 56355->56356 56356->56338 56358 23f1a84 LoadLibraryA 56357->56358 56359 23ef87a 56358->56359 56362 23ef882 56359->56362 56385 23f1b22 56359->56385 56362->56332 56371 23ef961 56362->56371 56363 23ef8b8 VirtualProtect 56363->56362 56364 23ef8cc 56363->56364 56365 23ef8e6 VirtualProtect 56364->56365 56366 23f1b22 LoadLibraryA 56365->56366 56367 23ef907 56366->56367 56367->56362 56368 23ef91e VirtualProtect 56367->56368 56368->56362 56369 23ef92e 56368->56369 56370 23ef943 VirtualProtect 56369->56370 56370->56362 56372 23f1a84 LoadLibraryA 56371->56372 56373 23ef977 56372->56373 56374 23f1b22 LoadLibraryA 56373->56374 56375 23ef987 56374->56375 56376 23ef9c4 56375->56376 56377 23ef990 VirtualProtect 56375->56377 56376->56348 56377->56376 56378 23ef9a0 56377->56378 56379 23ef9af VirtualProtect 56378->56379 56379->56376 56381 23f04fa 56380->56381 56382 23f0640 SafeArrayCreate 56381->56382 56383 23f05a5 56381->56383 56382->56383 56383->56332 56384->56332 56386 23f1b3d 56385->56386 56388 23ef89a 56385->56388 56386->56388 56389 23eff27 LoadLibraryA 56386->56389 56388->56362 56388->56363 56389->56388 56390->56350
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,aq$4$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                      • API String ID: 0-3443518476
                                      • Opcode ID: e2542d67e29e1475222b7367acf797ec864c02056bbb99bd87ec6262e06fdb8d
                                      • Instruction ID: 919242c8f8c692c160169918dec4d7e6ee8b018ed17ce0f2e463334359f6f751
                                      • Opcode Fuzzy Hash: e2542d67e29e1475222b7367acf797ec864c02056bbb99bd87ec6262e06fdb8d
                                      • Instruction Fuzzy Hash: 22E23374A01218CFDB55EF58E894BAEBBF6FB89300F108199E9069B358DB349D42CF51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,aq$4$$]q$$]q$$]q$$]q
                                      • API String ID: 0-324474496
                                      • Opcode ID: a434c04251573de6bf1177b28edc1cde2874b3523f40f546376f50f9b34cb397
                                      • Instruction ID: 4e822924291b088dbb65f2983a7d4419a41477f47b27ee8f33c66243b793a7f3
                                      • Opcode Fuzzy Hash: a434c04251573de6bf1177b28edc1cde2874b3523f40f546376f50f9b34cb397
                                      • Instruction Fuzzy Hash: C2622374A05218CFDB65EF58E884BAEB7F6FB89300F508099D90A9B358DB349D42CF51

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 778 2855b30-2855b62 780 2855f94-2855fb2 778->780 781 2855b68-2855b7c 778->781 785 28563bf-28563cb 780->785 782 2855b83-2855c3a 781->782 783 2855b7e 781->783 827 2855ed6-2855efa 782->827 828 2855c40-2855c48 782->828 783->782 787 28563d1-28563e5 785->787 788 2855fc0-2855fcc 785->788 789 2855fd2-2856052 788->789 790 28563ac-28563b1 788->790 809 2856054-285605a 789->809 810 285606a-2856083 789->810 797 28563bc 790->797 797->785 811 285605c 809->811 812 285605e-2856060 809->812 815 2856085-28560ae 810->815 816 28560b3-28560f1 810->816 811->810 812->810 815->797 834 2856116-2856123 816->834 835 28560f3-2856114 816->835 837 2855f7e-2855f84 827->837 829 2855c4f-2855c57 828->829 830 2855c4a-2855c4e 828->830 832 2855c5c-2855c7e 829->832 833 2855c59 829->833 830->829 843 2855c80 832->843 844 2855c83-2855c89 832->844 833->832 845 285612a-2856130 834->845 835->845 839 2855f86 837->839 840 2855f91 837->840 839->840 840->780 843->844 847 2855e43-2855e4e 844->847 848 2855c8f-2855ca9 844->848 849 2856132-285614d 845->849 850 285614f-28561a1 845->850 851 2855e50 847->851 852 2855e53-2855e9d call 285013c 847->852 853 2855ce9-2855cf2 848->853 854 2855cab-2855caf 848->854 849->850 890 28561a7-28561ac 850->890 891 28562bc-28562fb 850->891 851->852 902 2855e9f-2855ec9 852->902 903 2855ecb-2855ed0 852->903 855 2855f79 853->855 856 2855cf8-2855d08 853->856 854->853 858 2855cb1-2855cb9 854->858 855->837 856->855 860 2855d0e-2855d1f 856->860 863 2855d42-2855ddb 858->863 864 2855cbf 858->864 860->855 866 2855d25-2855d35 860->866 876 2855de1-2855de5 863->876 877 2855eff-2855f13 863->877 865 2855cc2-2855cc4 864->865 868 2855cc6 865->868 869 2855cc9-2855cd4 865->869 866->855 871 2855d3b-2855d40 866->871 868->869 869->855 875 2855cda-2855ce5 869->875 871->863 875->865 879 2855ce7 875->879 876->877 882 2855deb-2855df9 876->882 877->855 878 2855f15-2855f2f 877->878 878->855 883 2855f31-2855f4e 878->883 879->863 884 2855e39-2855e3d 882->884 885 2855dfb 882->885 883->855 888 2855f50-2855f6e 883->888 884->847 884->848 887 2855e01-2855e03 885->887 892 2855e05-2855e09 887->892 893 2855e0d-2855e29 887->893 888->855 894 2855f70 888->894 897 28561b6-28561b9 890->897 910 2856317-2856326 891->910 911 28562fd-2856315 891->911 892->893 893->855 896 2855e2f-2855e37 893->896 894->855 896->884 896->887 900 2856284-28562ac 897->900 901 28561bf 897->901 909 28562b2-28562b6 900->909 904 28561f7-2856223 901->904 905 28561c6-28561f2 901->905 906 2856256-2856282 901->906 907 2856228-2856254 901->907 902->903 903->827 904->909 905->909 906->909 907->909 909->891 909->897 916 285632f-2856391 910->916 911->916 922 285639c-28563aa 916->922 922->797
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$TJbq$TJbq$Te]q$paq$xb`q
                                      • API String ID: 0-2757515195
                                      • Opcode ID: 126caebdf1f06d6491c6c3e7449a2b7c630fed85c68d426c2111a289f3fa4062
                                      • Instruction ID: 550ef991ff9958ad4f5c56cfb042972021fdb53fc39d23df8115e2f6296745bb
                                      • Opcode Fuzzy Hash: 126caebdf1f06d6491c6c3e7449a2b7c630fed85c68d426c2111a289f3fa4062
                                      • Instruction Fuzzy Hash: AF520239A005249FDB19DFA8C984E69BBB2FF48304F5581A8E50ADB276DB35EC51CF40

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 924 2390e61-2390ea8 CreateToolhelp32Snapshot 927 2390f7e-2390f81 924->927 928 2390eae-2390ecf Thread32First 924->928 929 2390f6a-2390f7c CloseHandle 928->929 930 2390ed5-2390edb 928->930 929->927 931 2390f4a-2390f64 930->931 932 2390edd-2390ee3 930->932 931->929 931->930 932->931 933 2390ee5-2390f04 932->933 933->931 936 2390f06-2390f0a 933->936 937 2390f0c-2390f20 Wow64SuspendThread 936->937 938 2390f22-2390f31 936->938 939 2390f36-2390f48 CloseHandle 937->939 938->939 939->931
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000,?,?,?,?,?,023909A7,?,00000001,?,81EC8B55,000000FF), ref: 02390E9F
                                      • Thread32First.KERNEL32(00000000,0000001C), ref: 02390ECB
                                      • Wow64SuspendThread.KERNEL32(00000000), ref: 02390F1E
                                      • CloseHandle.KERNEL32(00000000), ref: 02390F48
                                      • CloseHandle.KERNEL32(00000000), ref: 02390F7C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandle$CreateFirstSnapshotSuspendThreadThread32Toolhelp32Wow64
                                      • String ID:
                                      • API String ID: 2720937676-0
                                      • Opcode ID: ed4f7e93d5c748d87e273fbd072de27cfcb41b6612c19f34ce8dd7f2a24eca5e
                                      • Instruction ID: 5f14b83e2e514037738c20f73fb943ac466c7410028756094acae6c9bb5e2b7d
                                      • Opcode Fuzzy Hash: ed4f7e93d5c748d87e273fbd072de27cfcb41b6612c19f34ce8dd7f2a24eca5e
                                      • Instruction Fuzzy Hash: AF410C71A00109AFDB18DF98C494BADB7F6EF89300F10C168EA159B794DB34AE45CB54

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2758 520d7a0-520d7c2 2759 520ffa0-520ffac 2758->2759 2760 520d7c8-520f0c3 2758->2760 3064 520f0c5 call 51bf998 2760->3064 3065 520f0c5 call 51bf9a8 2760->3065 3027 520f0cb-520f1a1 3038 520f1e3-520f243 3027->3038 3039 520f1a3-520f1d6 3027->3039 3045 520f249-520f32a call 5207080 3038->3045 3046 520f35f-520f37b 3038->3046 3039->3038 3045->3046 3062 520f32c-520f358 3045->3062 3048 520f37d-520f383 3046->3048 3049 520f38e 3046->3049 3048->3049 3049->2759 3062->3046 3064->3027 3065->3027
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: fbq$ fbq$4']q$7[IS
                                      • API String ID: 0-4157277258
                                      • Opcode ID: 21b766a248da6da10f9e364eacaac5540fc0ec9d18901f93ce778aa1717fe325
                                      • Instruction ID: 68b5c930aff2eea97184cfd48bfdcafa6ef0bd8f38ba5ffbaf0ed5ed9d52e6b8
                                      • Opcode Fuzzy Hash: 21b766a248da6da10f9e364eacaac5540fc0ec9d18901f93ce778aa1717fe325
                                      • Instruction Fuzzy Hash: 5CF2D4786010148FD744EF28E5A4EAE73F6EB9C304B1181AAD50BDB359CB34AD56CF92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3066 520d790-520d7c2 3067 520ffa0-520ffac 3066->3067 3068 520d7c8-520d7fe 3066->3068 3073 520d806-520d816 3068->3073 3075 520d820-520f0b0 3073->3075 3334 520f0b7-520f0c3 3075->3334 3372 520f0c5 call 51bf998 3334->3372 3373 520f0c5 call 51bf9a8 3334->3373 3335 520f0cb-520f1a1 3346 520f1e3-520f243 3335->3346 3347 520f1a3-520f1d6 3335->3347 3353 520f249-520f32a call 5207080 3346->3353 3354 520f35f-520f37b 3346->3354 3347->3346 3353->3354 3370 520f32c-520f358 3353->3370 3356 520f37d-520f383 3354->3356 3357 520f38e 3354->3357 3356->3357 3357->3067 3370->3354 3372->3335 3373->3335
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: fbq$ fbq$4']q$7[IS
                                      • API String ID: 0-4157277258
                                      • Opcode ID: 0951c72372e8377d7419f825c52027350e3e4547a2562d3ce119d279e6d35587
                                      • Instruction ID: eae30d2b99ec644f8d0d15cda7673b337fdcdc003bc3a7491c7912ebd2880479
                                      • Opcode Fuzzy Hash: 0951c72372e8377d7419f825c52027350e3e4547a2562d3ce119d279e6d35587
                                      • Instruction Fuzzy Hash: 95F2D4786010148FD744EF28E5A4EAE73F6EB9C304B1181A9D50BDB359CB34AD96CF92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3429 51b50a0-51b50d1 3431 51b5157-51b517b 3429->3431 3432 51b50d7-51b5152 3429->3432 3437 51b517d-51b5191 3431->3437 3438 51b5193-51b5195 3431->3438 3481 51b5850-51b5857 3432->3481 3439 51b5198-51b51a2 3437->3439 3438->3439 3442 51b51a8-51b51ac 3439->3442 3443 51b52b6-51b52ba 3439->3443 3446 51b5858-51b5895 3442->3446 3447 51b51b2-51b51b6 3442->3447 3444 51b531e-51b533d 3443->3444 3445 51b52bc-51b52cf 3443->3445 3465 51b533f-51b5357 3444->3465 3466 51b5381-51b53b6 3444->3466 3456 51b52d3-51b52d8 3445->3456 3458 51b589d-51b58d7 3446->3458 3449 51b51b8-51b51c8 3447->3449 3450 51b51ce-51b5233 3447->3450 3449->3450 3449->3458 3485 51b595b-51b599b 3450->3485 3486 51b5239-51b52b1 3450->3486 3462 51b52da-51b5319 call 51b4aa0 3456->3462 3463 51b52d1 3456->3463 3478 51b58df-51b58f5 3458->3478 3462->3481 3463->3456 3465->3478 3479 51b535d-51b537c 3465->3479 3492 51b53ca 3466->3492 3493 51b53b8-51b53c8 3466->3493 3498 51b58fd-51b5953 3478->3498 3479->3481 3486->3481 3496 51b53cc-51b53fd 3492->3496 3493->3496 3506 51b5403-51b5430 3496->3506 3507 51b5570-51b5574 3496->3507 3498->3485 3506->3507 3521 51b5436-51b5446 3506->3521 3510 51b557a-51b55a7 3507->3510 3511 51b5659-51b5687 3507->3511 3510->3511 3523 51b55ad-51b55bd 3510->3523 3524 51b576d-51b5777 3511->3524 3525 51b568d-51b56ac 3511->3525 3530 51b5448-51b544e 3521->3530 3531 51b545e-51b54a6 3521->3531 3533 51b55bf-51b55c5 3523->3533 3534 51b55d5-51b5607 3523->3534 3527 51b5779-51b57d3 3524->3527 3528 51b57df-51b5846 3524->3528 3543 51b56b8-51b56fc 3525->3543 3544 51b56ae-51b56b6 3525->3544 3527->3528 3563 51b584e 3528->3563 3536 51b5452-51b5454 3530->3536 3537 51b5450 3530->3537 3567 51b54f8-51b5520 3531->3567 3568 51b54a8-51b54f2 3531->3568 3540 51b55c9-51b55cb 3533->3540 3541 51b55c7 3533->3541 3534->3485 3559 51b560d-51b5653 3534->3559 3536->3531 3537->3531 3540->3534 3541->3534 3549 51b5702-51b5709 3543->3549 3544->3549 3553 51b570b-51b570d 3549->3553 3554 51b5746-51b5767 3549->3554 3557 51b570f-51b572b 3553->3557 3558 51b5733-51b573b 3553->3558 3554->3524 3554->3525 3557->3558 3558->3554 3559->3511 3559->3523 3563->3481 3567->3485 3579 51b5526-51b556a 3567->3579 3568->3498 3568->3567 3579->3507 3579->3521
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq$Haq$Haq
                                      • API String ID: 0-3013282719
                                      • Opcode ID: 31910d6553ec1d1486bdf0b1b4cec0613734b8045c7ceff349a9ad07d38b3564
                                      • Instruction ID: b53f8f2513fe9bd5aee6d9b87bbda28841407b7e6a072d70b39d464347fdce9b
                                      • Opcode Fuzzy Hash: 31910d6553ec1d1486bdf0b1b4cec0613734b8045c7ceff349a9ad07d38b3564
                                      • Instruction Fuzzy Hash: 6F326E74B002088FDB65EF64E894AAEB7B3FF88300F518569D54A97398DB70AC46CF51

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3641 2390d11-2390d68 GetPEB 3642 2390d73-2390d77 3641->3642 3643 2390d7d-2390d88 3642->3643 3644 2390e17-2390e1e 3642->3644 3646 2390d8e-2390da5 3643->3646 3647 2390e12 3643->3647 3645 2390e29-2390e2d 3644->3645 3649 2390e2f-2390e3c 3645->3649 3650 2390e3e-2390e45 3645->3650 3651 2390dca-2390de2 CreateThread 3646->3651 3652 2390da7-2390dc8 3646->3652 3647->3642 3649->3645 3655 2390e4e-2390e53 3650->3655 3656 2390e47-2390e49 3650->3656 3653 2390de6-2390dee 3651->3653 3652->3653 3653->3647 3657 2390df0-2390e0d 3653->3657 3656->3655 3657->3647
                                      APIs
                                      • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 02390DDD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateThread
                                      • String ID: ,
                                      • API String ID: 2422867632-3772416878
                                      • Opcode ID: fc60953fbf7661c618888493d7684cefa6d88d8934743e077e5b29c3addb46ae
                                      • Instruction ID: c4a3997ab9fe0e4c12e86171b4caf48b3d52e2c5e9c4a6850bf86fd5d0da75ab
                                      • Opcode Fuzzy Hash: fc60953fbf7661c618888493d7684cefa6d88d8934743e077e5b29c3addb46ae
                                      • Instruction Fuzzy Hash: DB41C374E00208EFDB18CF98C994BAEB7B5BF89714F208198D5156B381C771AE81CF94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q
                                      • API String ID: 0-3120983240
                                      • Opcode ID: bc007083e583fb4b6453b95a27ac18e3f19b4548a382ba1d5e781b35827a3498
                                      • Instruction ID: d5b494950c4cbf82f89b1cd0d5d910268f54d44e6dffe03cb91d02466dca7285
                                      • Opcode Fuzzy Hash: bc007083e583fb4b6453b95a27ac18e3f19b4548a382ba1d5e781b35827a3498
                                      • Instruction Fuzzy Hash: F2517970A116448FD70DEF6AE951AAE7FE7FFC8700B04C96AD0459B268EF784806CB50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q
                                      • API String ID: 0-3120983240
                                      • Opcode ID: db7879a95be75fdeead04a8325087d40204474f817d313f000340229675b8c7a
                                      • Instruction ID: bc8b5ec8f28fdf624547e3ba31fc4d35c8fefcfb2c9ae7940db893a73710a5ad
                                      • Opcode Fuzzy Hash: db7879a95be75fdeead04a8325087d40204474f817d313f000340229675b8c7a
                                      • Instruction Fuzzy Hash: C2516C70A116448FD74CEF6AE951AAE7FE7FFC8700F04C969D0459B268EF7848068B50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (_]q
                                      • API String ID: 0-188044275
                                      • Opcode ID: dbede390e057a77c52cef51655533e9cae1eb5121b1032c0ea8048756a0fc0fd
                                      • Instruction ID: d1f9e4fd3226effd19ff9a5342aaf3952ef568b3123f9ec89300ee08c2412919
                                      • Opcode Fuzzy Hash: dbede390e057a77c52cef51655533e9cae1eb5121b1032c0ea8048756a0fc0fd
                                      • Instruction Fuzzy Hash: B2525074B04244CBD755EFA8E494AAEB7F7FB88700F148169E9069B358DF349C42CB90
                                      APIs
                                      • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,?,00000001,?,81EC8B55,000000FF), ref: 023909F4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateThread
                                      • String ID:
                                      • API String ID: 2422867632-0
                                      • Opcode ID: ab5d47d79a2d43a5b885d4cd1ac6413eb39dbc8d65d1c3a23088184392affe3b
                                      • Instruction ID: 05badc0d38955aa78de386ebe0045093aa7fe1b1aa058ddc955b1c3e19041ef1
                                      • Opcode Fuzzy Hash: ab5d47d79a2d43a5b885d4cd1ac6413eb39dbc8d65d1c3a23088184392affe3b
                                      • Instruction Fuzzy Hash: B112D2B0E00219DFDB18CF98C990BADBBB2FF49304F2482A9D515AB385D735AA45CF54
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Ddq
                                      • API String ID: 0-562783569
                                      • Opcode ID: 58c724a01cbcd7420e371be56412a1cc65e122aa00c9207e853237d6675c3f51
                                      • Instruction ID: 5473766d33ea610eccd8100838d9d352f2a82427b64f92146c3cdbbc67be30ae
                                      • Opcode Fuzzy Hash: 58c724a01cbcd7420e371be56412a1cc65e122aa00c9207e853237d6675c3f51
                                      • Instruction Fuzzy Hash: 0FE1B138A04352CFCB16DF78D455A9ABBF2FF49310F1581A9E845DB296DB35A842CF80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: E=p
                                      • API String ID: 0-1742960607
                                      • Opcode ID: cfe05a6cd305c5a2bbe07850e80e9b48d7a0ddab02393bf380e4ace009c77311
                                      • Instruction ID: 5e85dbe353cd90a45026a18c3695a3ea8a9f09c89b9fe09b0e211c23cf24fa8b
                                      • Opcode Fuzzy Hash: cfe05a6cd305c5a2bbe07850e80e9b48d7a0ddab02393bf380e4ace009c77311
                                      • Instruction Fuzzy Hash: F1C135787111158FC755FB28E998A6E77F3EB88304F1081A9D90BDB399CF34AC428B81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: \VBm
                                      • API String ID: 0-971115878
                                      • Opcode ID: 88f381f7a30306e89969c10e7db7890a38899b97f47c7ba2bc50b8b327001495
                                      • Instruction ID: d9087ba43e201944ac38b7ce6cb91a2b97f9edb1d237b06de5d03a43632c0fc1
                                      • Opcode Fuzzy Hash: 88f381f7a30306e89969c10e7db7890a38899b97f47c7ba2bc50b8b327001495
                                      • Instruction Fuzzy Hash: C6B16070E11309DFDF10CFA8C8857AEBBF2BF88304F549129D419A7295EB759882CB41
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: E=p
                                      • API String ID: 0-1742960607
                                      • Opcode ID: 3ca995cdd4cbd70195fbcb090946a1a6c1d109123246aa6196fcb91a9b5536b5
                                      • Instruction ID: f9cb53ca68bb13dd42d5c49ba1e8b607a06a067458bcaa5e4795e01459db90e3
                                      • Opcode Fuzzy Hash: 3ca995cdd4cbd70195fbcb090946a1a6c1d109123246aa6196fcb91a9b5536b5
                                      • Instruction Fuzzy Hash: BFC135787111548FC755FB28E998A6E77F3EB88304F1081A9D90BDB399CF34AC428B81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: \VBm
                                      • API String ID: 0-971115878
                                      • Opcode ID: bed62bf4fbb1d5950ca7df32849247602d0b916239a1f99e8bc9c70c8fc49460
                                      • Instruction ID: 435ca21ed9ea99e87db62622dcc80d5e7e3e45a6b135b9c33f96460ea18132c7
                                      • Opcode Fuzzy Hash: bed62bf4fbb1d5950ca7df32849247602d0b916239a1f99e8bc9c70c8fc49460
                                      • Instruction Fuzzy Hash: 73918470E11209DFDF10DFA9C9857EDBBF2BF88314F149129D40AA7296DB749886CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: E=p
                                      • API String ID: 0-1742960607
                                      • Opcode ID: 17a10320aaf42045a9dc128b6fed2edfba91258d674297115f1f116ff9c0c28c
                                      • Instruction ID: 6bb44b44b0b196918c618e98993d2a667b7722f866dd441b067927eb84d10257
                                      • Opcode Fuzzy Hash: 17a10320aaf42045a9dc128b6fed2edfba91258d674297115f1f116ff9c0c28c
                                      • Instruction Fuzzy Hash: D4A124787111518FC755FB28E998A6E77F3EB88304F1181A9D90BDB399CF34AC428B81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7cb39f38500bd75f4224873ed02bd41b9e7b97bec1f81eb34d51f545abe12ac3
                                      • Instruction ID: 5bdfc0d01416ca2fc8c4df390004710f380f235a7c9816ae57b449b8077ece6b
                                      • Opcode Fuzzy Hash: 7cb39f38500bd75f4224873ed02bd41b9e7b97bec1f81eb34d51f545abe12ac3
                                      • Instruction Fuzzy Hash: 53122A34B002049FDB15FFA8E9949AEB7B7FB89300B50852CD506AB399DF349D56CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d9d0b97a2e7bb4249d85e3ec7baf83b7bfb8b2ccc6d38aab28e9828139cc410
                                      • Instruction ID: 8ee1091713a410bf15f4962df102b9378824b5372772aad57d8a5b902516fc7a
                                      • Opcode Fuzzy Hash: 9d9d0b97a2e7bb4249d85e3ec7baf83b7bfb8b2ccc6d38aab28e9828139cc410
                                      • Instruction Fuzzy Hash: 12124F74704244CBD755EFA9E494A6EB7B7FB88700F248169EA079B348DF749C02CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fab6218f09757b488e90f4c414d75d4b85f2bb78283bfe7ee1dd4e7ef02703a7
                                      • Instruction ID: dc38bdeff05c22369faec9954f81bd23f966102ac79f748f5c2b5c08e1bec279
                                      • Opcode Fuzzy Hash: fab6218f09757b488e90f4c414d75d4b85f2bb78283bfe7ee1dd4e7ef02703a7
                                      • Instruction Fuzzy Hash: 15D14B38B015159FDB09BF68E8549AE7BB7EB89300B50851DD806AB398DF349963CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 62ec92ff8fc3d7d6b394f8d9d74be3104fb690d2bed4540189f7081f62262b28
                                      • Instruction ID: feb7122e64f52db0de578d3f4c02ebe6d71d7ad7a2529635d012fd1502b7d2da
                                      • Opcode Fuzzy Hash: 62ec92ff8fc3d7d6b394f8d9d74be3104fb690d2bed4540189f7081f62262b28
                                      • Instruction Fuzzy Hash: ACD15C38B015159FDB09BF68E8949AE7BB7EB89300B50451DD807AB398DF349D63CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9dd822b3e24ca590af993be6281fe7c6bcca71135d798638cca06cfe1b2c8f30
                                      • Instruction ID: 354b7e71fc230ed924e270b156ebabf6b4ad2b987531d903fd5aa724e9fd2649
                                      • Opcode Fuzzy Hash: 9dd822b3e24ca590af993be6281fe7c6bcca71135d798638cca06cfe1b2c8f30
                                      • Instruction Fuzzy Hash: 53B17D70E1130ADFDF10CFA9C9857AEBBF2BF88314F549129D419A7295EB749842CB81

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 940 6090448-609045e 941 609049a-60904bf 940->941 942 6090460-6090466 940->942 944 60904c6-60904f8 941->944 943 6090468-6090470 942->943 942->944 946 609047c-6090497 943->946 947 6090472 943->947 956 60904fa-6090500 944->956 957 609050d-6090513 944->957 947->946 958 6090502-6090504 956->958 959 6090515-6090573 956->959 957->959 960 6090575-6090578 958->960 961 6090506 958->961 959->960 965 609057a-609057c 960->965 966 6090586-60905f2 960->966 962 6090508-6090509 961->962 963 609050a-609050b 961->963 962->963 963->957 965->966 976 6090600-609061f 966->976 977 60905f4-60905f6 966->977 981 6090ab3-6090ade 976->981 982 6090625-6090632 976->982 977->976 988 6090ae5-6090b21 981->988 983 6090643 982->983 984 6090634-6090641 982->984 986 6090645-6090647 983->986 984->986 987 609064d-609066e 986->987 986->988 992 60906fc-609076e 987->992 993 6090674-60906ae 987->993 1004 6090b28-6090b53 988->1004 1008 6090781 992->1008 1009 6090770-609077f 992->1009 1002 60906b0-60906c0 993->1002 1003 60906c2-60906cf 993->1003 1011 60906d1-60906d5 1002->1011 1003->1011 1031 6090b5a-6090b9e 1004->1031 1012 6090783-6090785 1008->1012 1009->1012 1016 60906db 1011->1016 1017 60906d7-60906d9 1011->1017 1018 60907bd-60907c9 1012->1018 1019 6090787-60907b5 1012->1019 1022 60906e3-60906f5 1016->1022 1017->1022 1020 6090809-6090820 1018->1020 1021 60907cb-60907d0 1018->1021 1019->1018 1020->1031 1033 6090826 1020->1033 1110 60907d3 call 6090448 1021->1110 1111 60907d3 call 6090548 1021->1111 1112 60907d3 call 6090c78 1021->1112 1022->992 1026 60907d5-60907e1 1026->1004 1034 60907e7-609085f 1026->1034 1045 6090ba0 1031->1045 1046 6090ba2-6090bb8 1031->1046 1033->1034 1055 6090866-6090887 1034->1055 1045->1046 1048 6090bba-6090bbe 1046->1048 1049 6090bdf 1046->1049 1051 6090bc0-6090bc1 1048->1051 1052 6090bc2-6090bd9 1048->1052 1054 6090be5-6090c02 1049->1054 1051->1052 1053 6090bdb 1052->1053 1052->1054 1053->1049 1058 6090c0e-6090c1e 1054->1058 1059 6090c04 1054->1059 1064 6090889 1055->1064 1065 6090891-6090895 1055->1065 1113 6090c20 call 6090ee8 1058->1113 1114 6090c20 call 6090ecd 1058->1114 1115 6090c20 call 6090eb5 1058->1115 1059->1058 1063 6090c26-6090c2d 1064->1065 1066 60908af-60908d6 1065->1066 1067 6090897-60908aa 1065->1067 1078 60908d8 1066->1078 1079 60908e0-609091e 1066->1079 1068 609092d-6090964 1067->1068 1074 60909a4-60909ab 1068->1074 1075 6090966-609099f 1068->1075 1076 60909cb-60909d2 1074->1076 1077 60909ad-60909bc 1074->1077 1075->1074 1080 60909d4-60909e4 1076->1080 1081 60909e6-60909ec 1076->1081 1077->1076 1085 60909be-60909c4 1077->1085 1078->1079 1101 6090928 1079->1101 1102 6090920 1079->1102 1087 60909f6-60909f8 1080->1087 1081->1087 1085->1076 1090 60909fa 1087->1090 1091 6090a02-6090a24 1087->1091 1090->1091 1096 6090a7b 1091->1096 1097 6090a26-6090a30 1091->1097 1096->981 1099 6090a32-6090a42 1097->1099 1100 6090a44-6090a51 1097->1100 1105 6090a53-6090a57 1099->1105 1100->1105 1101->1068 1102->1101 1107 6090a59-6090a5b 1105->1107 1108 6090a5d 1105->1108 1109 6090a65-6090a74 1107->1109 1108->1109 1109->1096 1110->1026 1111->1026 1112->1026 1113->1063 1114->1063 1115->1063
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Hcq$(aq$PH]q$PH]q$aq
                                      • API String ID: 0-3860502609
                                      • Opcode ID: 38a3d3afa7c4229230048b7951eed327b00bf34a040b35d69e7269f1e0338096
                                      • Instruction ID: 41a0be75c3a8b16aa3ffdca1153d0991f4fd834fab8a73df84d299a0fffd8e2c
                                      • Opcode Fuzzy Hash: 38a3d3afa7c4229230048b7951eed327b00bf34a040b35d69e7269f1e0338096
                                      • Instruction Fuzzy Hash: 6C328C30A442458FDB95DF78C450AAEBBF2EF85310F24856DD44A9B3A5DB34EC46CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533290935.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50a0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q
                                      • API String ID: 0-3120983240
                                      • Opcode ID: c255b3abdbd2849192489fcb399ccc4415a45c272c71c8c6aa4195b4cdcdf1e1
                                      • Instruction ID: b3eb108dd2c048b0d116f5def7c5744096b2c149245e3edb647506fa5ab52f32
                                      • Opcode Fuzzy Hash: c255b3abdbd2849192489fcb399ccc4415a45c272c71c8c6aa4195b4cdcdf1e1
                                      • Instruction Fuzzy Hash: 2063AE72F002258FCBB55BB8A86867E7DF7AF89640F54849ED90AD7344DE348C428F91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3374 23ef866-23ef880 call 23f1a84 3377 23ef888-23ef8a1 call 23f1b22 3374->3377 3378 23ef882-23ef883 3374->3378 3382 23ef959 3377->3382 3383 23ef8a7-23ef8b2 3377->3383 3379 23ef95d-23ef960 3378->3379 3384 23ef95b-23ef95c 3382->3384 3383->3382 3385 23ef8b8-23ef8c6 VirtualProtect 3383->3385 3384->3379 3385->3382 3386 23ef8cc-23ef90e call 23f1a7a call 23f20f2 VirtualProtect call 23f1b22 3385->3386 3386->3382 3393 23ef910-23ef91c 3386->3393 3393->3382 3394 23ef91e-23ef92c VirtualProtect 3393->3394 3394->3382 3395 23ef92e-23ef957 call 23f1a7a call 23f20f2 VirtualProtect 3394->3395 3395->3384
                                      APIs
                                        • Part of subcall function 023F1A84: LoadLibraryA.KERNEL32(00000000,?,?), ref: 023F1B16
                                      • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?), ref: 023EF8C1
                                      • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 023EF8F4
                                      • VirtualProtect.KERNEL32(00000000,0040145E,00000040,?), ref: 023EF927
                                      • VirtualProtect.KERNEL32(00000000,0040145E,?,?), ref: 023EF951
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProtectVirtual$LibraryLoad
                                      • String ID:
                                      • API String ID: 895956442-0
                                      • Opcode ID: 2e97600cb857c96b3e27a7ca78dc6b50189988e4741ea1636e9ebab3cfc04358
                                      • Instruction ID: 46367cb051ef62116737e1fa95c73952d66f5a1dc5522031880ff27c8a45287f
                                      • Opcode Fuzzy Hash: 2e97600cb857c96b3e27a7ca78dc6b50189988e4741ea1636e9ebab3cfc04358
                                      • Instruction Fuzzy Hash: 2321A973104356BFEB20A965AC44FB776ACDB55304F04043EFB86D1491FBA9A90987B1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3400 6090ecd-6090ed2 3401 6090f45-60910c5 3400->3401 3402 6090ed4-6090edf 3400->3402 3413 609112b-6091131 3401->3413 3414 60910c7 3401->3414 3402->3401 3415 6091150-6091158 3413->3415 3416 6091133-609114d 3413->3416 3417 60910cc-60910cf 3414->3417 3418 60910d8 3417->3418 3419 60910d1-60910d6 3417->3419 3421 60910dd-60910e9 3418->3421 3419->3421 3422 60910eb 3421->3422 3423 60910f5-609110e 3421->3423 3422->3423 3426 609111a-6091123 3423->3426 3427 6091110 3423->3427 3426->3413 3427->3426
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$T3qq$|>dq$|>dq
                                      • API String ID: 0-4155002147
                                      • Opcode ID: 215be0312d493fc14cc670cd32012ca4abfb05a455ac129873f94e92f70f71e1
                                      • Instruction ID: 7f77b6c03fb0a978ab0e7c3a97a7de8f61c71431331a4e361d6c0b5c74e2909a
                                      • Opcode Fuzzy Hash: 215be0312d493fc14cc670cd32012ca4abfb05a455ac129873f94e92f70f71e1
                                      • Instruction Fuzzy Hash: 9231C6307442814FC756EF29D444A5ABFE7AF85310B188AAED0898F3A6DB31D809C791

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3587 6090ee8-60910c5 3597 609112b-6091131 3587->3597 3598 60910c7 3587->3598 3599 6091150-6091158 3597->3599 3600 6091133-609114d 3597->3600 3601 60910cc-60910cf 3598->3601 3602 60910d8 3601->3602 3603 60910d1-60910d6 3601->3603 3605 60910dd-60910e9 3602->3605 3603->3605 3606 60910eb 3605->3606 3607 60910f5-609110e 3605->3607 3606->3607 3610 609111a-6091123 3607->3610 3611 6091110 3607->3611 3610->3597 3611->3610
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$|>dq$|>dq
                                      • API String ID: 0-1385954513
                                      • Opcode ID: 12e233e5f44fd7b71ce6516a151286e869a7088511be689bcd14480ad4f4f813
                                      • Instruction ID: e7186f3a798630a400ebebb15378053f38429883794a0741002ead5457b629fe
                                      • Opcode Fuzzy Hash: 12e233e5f44fd7b71ce6516a151286e869a7088511be689bcd14480ad4f4f813
                                      • Instruction Fuzzy Hash: A831A6307443814FC766EF28D444A5ABFE7AF85310B14CAAED0858F3A6DB35D809C7A1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3613 6090eb5-6090ebf 3614 6090ec1-6090ec3 3613->3614 3615 6090f32-60910c5 3613->3615 3614->3615 3625 609112b-6091131 3615->3625 3626 60910c7 3615->3626 3627 6091150-6091158 3625->3627 3628 6091133-609114d 3625->3628 3629 60910cc-60910cf 3626->3629 3630 60910d8 3629->3630 3631 60910d1-60910d6 3629->3631 3633 60910dd-60910e9 3630->3633 3631->3633 3634 60910eb 3633->3634 3635 60910f5-609110e 3633->3635 3634->3635 3638 609111a-6091123 3635->3638 3639 6091110 3635->3639 3638->3625 3639->3638
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$|>dq$|>dq
                                      • API String ID: 0-1385954513
                                      • Opcode ID: 67cd3d916947554c208113726ca625039002af6cb7888057d392a3a0ee03595e
                                      • Instruction ID: 01031fb71479c93bdbbd7ab62d49f256769b35dd2829ef81897fcf84d4b803e6
                                      • Opcode Fuzzy Hash: 67cd3d916947554c208113726ca625039002af6cb7888057d392a3a0ee03595e
                                      • Instruction Fuzzy Hash: A531F5307443804FC765EF29D440A5ABFE7AFC5310B14C6AED0868F6A6DB31D90AC7A1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3660 23f1a84-23f1a97 3661 23f1aaf-23f1ab9 3660->3661 3662 23f1a99-23f1a9c 3660->3662 3664 23f1abb-23f1ac3 3661->3664 3665 23f1ac8-23f1ad4 3661->3665 3663 23f1a9e-23f1aa1 3662->3663 3663->3661 3666 23f1aa3-23f1aad 3663->3666 3664->3665 3667 23f1ad7-23f1adc 3665->3667 3666->3661 3666->3663 3668 23f1b0f-23f1b16 LoadLibraryA 3667->3668 3669 23f1ade-23f1ae9 3667->3669 3670 23f1b19-23f1b1d 3668->3670 3671 23f1aeb-23f1b03 call 23f2152 3669->3671 3672 23f1b05-23f1b09 3669->3672 3671->3672 3676 23f1b1e-23f1b20 3671->3676 3672->3667 3674 23f1b0b-23f1b0d 3672->3674 3674->3668 3674->3670 3676->3670
                                      APIs
                                      • LoadLibraryA.KERNEL32(00000000,?,?), ref: 023F1B16
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID: .dll
                                      • API String ID: 1029625771-2738580789
                                      • Opcode ID: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                                      • Instruction ID: d18a666d7b7bcb7509de0bac99c03dfe5e6522df26994c27732a0a0ab89b04dd
                                      • Opcode Fuzzy Hash: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                                      • Instruction Fuzzy Hash: C121E731604385CFDB65DFACF884B6D7BA4AF05224F0940ACDA8997A41D730EC45C750

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3677 23ef961-23ef98e call 23f1a84 call 23f1b22 3682 23ef9c4 3677->3682 3683 23ef990-23ef99e VirtualProtect 3677->3683 3685 23ef9c6-23ef9c9 3682->3685 3683->3682 3684 23ef9a0-23ef9c2 call 23f20f2 VirtualProtect 3683->3684 3684->3685
                                      APIs
                                        • Part of subcall function 023F1A84: LoadLibraryA.KERNEL32(00000000,?,?), ref: 023F1B16
                                      • VirtualProtect.KERNEL32(00000000,00000004,00000040,?), ref: 023EF999
                                      • VirtualProtect.KERNEL32(00000000,00000004,?,?), ref: 023EF9BC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProtectVirtual$LibraryLoad
                                      • String ID:
                                      • API String ID: 895956442-0
                                      • Opcode ID: 31a2c6fb5a155253d75781cd9ceba9c7cc267d2f06376007566f6440306b8afe
                                      • Instruction ID: 8eaea15ed2f9ec5eb92fe7ab126c2ef572d22b9e11d49d5c6755fd336c9981b1
                                      • Opcode Fuzzy Hash: 31a2c6fb5a155253d75781cd9ceba9c7cc267d2f06376007566f6440306b8afe
                                      • Instruction Fuzzy Hash: FEF0A4B2240614BEE6219A64DC41FFB73BCDF45B14F000419FB4AD60C0E7B5E60587B1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3688 6090548-6090578 3689 609057a-609057c 3688->3689 3690 6090586-60905f2 3688->3690 3689->3690 3700 6090600-609061f 3690->3700 3701 60905f4-60905f6 3690->3701 3705 6090ab3-6090ade 3700->3705 3706 6090625-6090632 3700->3706 3701->3700 3712 6090ae5-6090b21 3705->3712 3707 6090643 3706->3707 3708 6090634-6090641 3706->3708 3710 6090645-6090647 3707->3710 3708->3710 3711 609064d-609066e 3710->3711 3710->3712 3716 60906fc-609076e 3711->3716 3717 6090674-60906ae 3711->3717 3728 6090b28-6090b53 3712->3728 3732 6090781 3716->3732 3733 6090770-609077f 3716->3733 3726 60906b0-60906c0 3717->3726 3727 60906c2-60906cf 3717->3727 3735 60906d1-60906d5 3726->3735 3727->3735 3755 6090b5a-6090b9e 3728->3755 3736 6090783-6090785 3732->3736 3733->3736 3740 60906db 3735->3740 3741 60906d7-60906d9 3735->3741 3742 60907bd-60907c9 3736->3742 3743 6090787-60907b5 3736->3743 3746 60906e3-60906f5 3740->3746 3741->3746 3744 6090809-6090820 3742->3744 3745 60907cb-60907d0 3742->3745 3743->3742 3744->3755 3757 6090826 3744->3757 3834 60907d3 call 6090448 3745->3834 3835 60907d3 call 6090548 3745->3835 3836 60907d3 call 6090c78 3745->3836 3746->3716 3750 60907d5-60907e1 3750->3728 3758 60907e7-609085f 3750->3758 3769 6090ba0 3755->3769 3770 6090ba2-6090bb8 3755->3770 3757->3758 3779 6090866-6090887 3758->3779 3769->3770 3772 6090bba-6090bbe 3770->3772 3773 6090bdf 3770->3773 3775 6090bc0-6090bc1 3772->3775 3776 6090bc2-6090bd9 3772->3776 3778 6090be5-6090c02 3773->3778 3775->3776 3777 6090bdb 3776->3777 3776->3778 3777->3773 3782 6090c0e-6090c1e 3778->3782 3783 6090c04 3778->3783 3788 6090889 3779->3788 3789 6090891-6090895 3779->3789 3837 6090c20 call 6090ee8 3782->3837 3838 6090c20 call 6090ecd 3782->3838 3839 6090c20 call 6090eb5 3782->3839 3783->3782 3787 6090c26-6090c2d 3788->3789 3790 60908af-60908d6 3789->3790 3791 6090897-60908aa 3789->3791 3802 60908d8 3790->3802 3803 60908e0-609091e 3790->3803 3792 609092d-6090964 3791->3792 3798 60909a4-60909ab 3792->3798 3799 6090966-609099f 3792->3799 3800 60909cb-60909d2 3798->3800 3801 60909ad-60909bc 3798->3801 3799->3798 3804 60909d4-60909e4 3800->3804 3805 60909e6-60909ec 3800->3805 3801->3800 3809 60909be-60909c4 3801->3809 3802->3803 3825 6090928 3803->3825 3826 6090920 3803->3826 3811 60909f6-60909f8 3804->3811 3805->3811 3809->3800 3814 60909fa 3811->3814 3815 6090a02-6090a24 3811->3815 3814->3815 3820 6090a7b 3815->3820 3821 6090a26-6090a30 3815->3821 3820->3705 3823 6090a32-6090a42 3821->3823 3824 6090a44-6090a51 3821->3824 3829 6090a53-6090a57 3823->3829 3824->3829 3825->3792 3826->3825 3831 6090a59-6090a5b 3829->3831 3832 6090a5d 3829->3832 3833 6090a65-6090a74 3831->3833 3832->3833 3833->3820 3834->3750 3835->3750 3836->3750 3837->3787 3838->3787 3839->3787
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Hcq$PH]q
                                      • API String ID: 0-1299382244
                                      • Opcode ID: 33cd7f8fef285b6434a1602d59da7f24ac3f7f748853e0f00f04d9f44cb93972
                                      • Instruction ID: 5dd08cef2ee6b946b276ac5b5ebe998bbd23cf8c6a9bce9c24abdd1d00d2ec33
                                      • Opcode Fuzzy Hash: 33cd7f8fef285b6434a1602d59da7f24ac3f7f748853e0f00f04d9f44cb93972
                                      • Instruction Fuzzy Hash: A2D14D30A407068FDB65DF79C940B5ABBF6EF84310F24862DD4069B6A5DB74E885CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3840 50ab7b0-50ab7c7 3841 50ab7c9-50ab7cf 3840->3841 3842 50ab7df-50ab7e1 3840->3842 3843 50ab7d3-50ab7dd 3841->3843 3844 50ab7d1 3841->3844 3845 50abb51-50abb5c 3842->3845 3843->3842 3844->3842 3848 50abb62-50abb64 3845->3848 3849 50ab7e6-50ab7e9 3845->3849 3852 50abb66-50abb7c 3848->3852 3853 50abb84-50abb86 3848->3853 3850 50ab7ef-50ab7f1 3849->3850 3851 50ab87c-50ab87f 3849->3851 3854 50ab7f3-50ab809 3850->3854 3855 50ab811-50ab819 3850->3855 3858 50ab96f-50ab972 3851->3858 3859 50ab885-50ab887 3851->3859 3852->3853 3856 50abb88-50abb8e 3853->3856 3857 50abba0-50abba9 3853->3857 3854->3855 3865 50ab81b-50ab834 3855->3865 3866 50ab836-50ab839 3855->3866 3863 50abb92-50abb9e 3856->3863 3864 50abb90 3856->3864 3867 50ab9b3-50ab9b6 3858->3867 3868 50ab974-50ab976 3858->3868 3860 50ab889-50ab89f 3859->3860 3861 50ab8a7-50ab8af 3859->3861 3860->3861 3871 50ab8cc-50ab8d0 3861->3871 3872 50ab8b1-50ab8ca 3861->3872 3863->3857 3864->3857 3865->3866 3869 50ab83c 3866->3869 3873 50ab9b8-50ab9ba 3867->3873 3874 50ab9f7-50ab9fa 3867->3874 3875 50ab978-50ab98e 3868->3875 3876 50ab996-50ab9a0 3868->3876 3971 50ab83e call 5204ee1 3869->3971 3972 50ab83e call 5204eeb 3869->3972 3885 50ab8fa-50ab8fd 3871->3885 3886 50ab8d2-50ab8d5 3871->3886 3872->3871 3881 50ab9da-50ab9e4 3873->3881 3882 50ab9bc-50ab9d2 3873->3882 3879 50ab9fc-50ab9fe 3874->3879 3880 50aba30-50aba33 3874->3880 3875->3876 3876->3845 3902 50ab9a6-50ab9ae 3876->3902 3888 50aba1e-50aba2b 3879->3888 3889 50aba00-50aba16 3879->3889 3893 50aba69-50aba6c 3880->3893 3894 50aba35-50aba37 3880->3894 3881->3845 3907 50ab9ea-50ab9f2 3881->3907 3882->3881 3903 50ab904-50ab91e 3885->3903 3892 50ab8d8-50ab8f6 3886->3892 3888->3845 3889->3888 3959 50ab8f8 3892->3959 3905 50aba6e-50aba70 3893->3905 3906 50abaad-50abab0 3893->3906 3900 50aba39-50aba4f 3894->3900 3901 50aba57-50aba64 3894->3901 3895 50ab844-50ab85a 3895->3869 3943 50ab85c-50ab85f 3895->3943 3900->3901 3901->3845 3902->3845 3936 50ab920-50ab93f 3903->3936 3937 50ab941-50ab947 3903->3937 3916 50aba72-50aba88 3905->3916 3917 50aba90-50aba9a 3905->3917 3909 50abaea-50abaed 3906->3909 3910 50abab2-50abab4 3906->3910 3907->3845 3922 50abaef-50abaf1 3909->3922 3923 50abb27-50abb29 3909->3923 3918 50abab6-50abacc 3910->3918 3919 50abad4-50abade 3910->3919 3916->3917 3917->3845 3939 50abaa0-50abaa8 3917->3939 3918->3919 3919->3845 3948 50abae0-50abae8 3919->3948 3934 50abaf3-50abb09 3922->3934 3935 50abb11-50abb1b 3922->3935 3929 50abb2b-50abb41 3923->3929 3930 50abb49 3923->3930 3929->3930 3930->3845 3934->3935 3935->3845 3954 50abb1d-50abb25 3935->3954 3936->3903 3946 50ab94f-50ab952 3937->3946 3939->3845 3950 50ab861-50ab863 3943->3950 3951 50ab865 3943->3951 3955 50ab958 3946->3955 3956 50ab954-50ab956 3946->3956 3948->3845 3960 50ab867-50ab869 3950->3960 3951->3960 3954->3845 3961 50ab95a-50ab95c 3955->3961 3956->3961 3959->3946 3960->3845 3964 50ab86f-50ab877 3960->3964 3961->3845 3968 50ab962-50ab96a 3961->3968 3964->3845 3968->3845 3971->3895 3972->3895
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533290935.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50a0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q
                                      • API String ID: 0-3120983240
                                      • Opcode ID: 2160885becdd8156eb66b53f3be57fbc06131c3ac31165db12ce35c0300d8593
                                      • Instruction ID: 862b6fecfca739d2964db020155d0b8e75fcb7f2d3df7cc33273cccf1aece05b
                                      • Opcode Fuzzy Hash: 2160885becdd8156eb66b53f3be57fbc06131c3ac31165db12ce35c0300d8593
                                      • Instruction Fuzzy Hash: 2EB1C136B106018F8BA5ABB8F4A993D7BE7FFC4210B148529D847C3354DF39D8068B42
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (aq$(aq
                                      • API String ID: 0-3916115647
                                      • Opcode ID: 81a378a7cbf5c9192b105773f6049cb501b21f9114dfb4256b711320a75b5f10
                                      • Instruction ID: 4b2d275a739fde1bc4b24e7f741c60a1f7bc94f2ddc4f4b6cd6ccd977090d621
                                      • Opcode Fuzzy Hash: 81a378a7cbf5c9192b105773f6049cb501b21f9114dfb4256b711320a75b5f10
                                      • Instruction Fuzzy Hash: 74518E747042448FC745EF68E894AAFBBEBEBC9200B54846DD507CB399DE34DC068B91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Te]q$Te]q
                                      • API String ID: 0-3320153681
                                      • Opcode ID: 974b8ddce9802db14783a0793b7142eb18236ff34b98300423df74a10244f70e
                                      • Instruction ID: 793458c51e8c7e4d062789beeb30c106d1dcc5fca2ea7c4e789e71823039ae33
                                      • Opcode Fuzzy Hash: 974b8ddce9802db14783a0793b7142eb18236ff34b98300423df74a10244f70e
                                      • Instruction Fuzzy Hash: 7341F478B40118CFCB44DF68D598AADB7F2BF48315F6644A9E80AEB3A5CA349C41CF51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (aq$,aq
                                      • API String ID: 0-1929014441
                                      • Opcode ID: f33235ab49bc8800eb6b2335a0709bc3f918db3b5bc03483b3f8322b6d91f9d5
                                      • Instruction ID: 2181f57a893c815e791a00f41bacdcd1ff95f09f7ed302e942ee758a286ff893
                                      • Opcode Fuzzy Hash: f33235ab49bc8800eb6b2335a0709bc3f918db3b5bc03483b3f8322b6d91f9d5
                                      • Instruction Fuzzy Hash: CE2135367012144FC704EBB9A8405AE7BEBEFC5260B1580ABD90AC7395DE35CC0297D1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (aq$(aq
                                      • API String ID: 0-3916115647
                                      • Opcode ID: 63ba2f826b526c357b0e1b101c715a7333e14424343884d7b38928ff2b70c632
                                      • Instruction ID: c894d04a464d68a29b229096349a76b712540baac5b6ced2f289659f532cf886
                                      • Opcode Fuzzy Hash: 63ba2f826b526c357b0e1b101c715a7333e14424343884d7b38928ff2b70c632
                                      • Instruction Fuzzy Hash: F021573170C1505FD74A5E399814AAF7BA2EBCA390F1580A6E909DB386CE34CC02C761
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,aq
                                      • API String ID: 0-3092978723
                                      • Opcode ID: 879066e04feeaf0590a2eb2950a9c78051b9abf72494108fef530439730067c1
                                      • Instruction ID: 6f2086fbe45f2d81ce04b6b3ca4eba4fd77beeae8b550c6ee19ad472e6bb3de1
                                      • Opcode Fuzzy Hash: 879066e04feeaf0590a2eb2950a9c78051b9abf72494108fef530439730067c1
                                      • Instruction Fuzzy Hash: CC82FA74A042289FDB65DF68D884BAEB7B6FF88300F5085D9E50AA7354DB309E85CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a]q
                                      • API String ID: 0-3765744518
                                      • Opcode ID: 1153b3f515a182ff82a77556cf3b185500745fd8c958ce3c176925969945b43e
                                      • Instruction ID: 84a55b9eba361874358e44e0f4bd9c37690e6cee4657f77ddfa8d3520f8191f1
                                      • Opcode Fuzzy Hash: 1153b3f515a182ff82a77556cf3b185500745fd8c958ce3c176925969945b43e
                                      • Instruction Fuzzy Hash: 23627D74B111548BC795BB68E858ABF7BB7EB84700F508468E94B9B388DF349C078F91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a]q
                                      • API String ID: 0-3765744518
                                      • Opcode ID: 2d6540422d1da21db9b9dcbe360cd3ec9539e7924dfa3f6ec57a37a3a67b7227
                                      • Instruction ID: d37fe33df02cf7fc8bf2a6bdc9779c00defda353e92375c05d84431f1f4698b1
                                      • Opcode Fuzzy Hash: 2d6540422d1da21db9b9dcbe360cd3ec9539e7924dfa3f6ec57a37a3a67b7227
                                      • Instruction Fuzzy Hash: 54329E747151548BD795BB68E858ABF7BB7EBC8B00F508458E9479B388CF389C038B91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a]q
                                      • API String ID: 0-3765744518
                                      • Opcode ID: 57117ad23c6e363b2c0519e9a03d145a1cb4f4ad4c24edadf9cdf951fda35a16
                                      • Instruction ID: c84fe4aa9b536409ca4b236f9d0a69c60210fddf31c132de664c7db2021fdade
                                      • Opcode Fuzzy Hash: 57117ad23c6e363b2c0519e9a03d145a1cb4f4ad4c24edadf9cdf951fda35a16
                                      • Instruction Fuzzy Hash: B6329E747111548BD795BB68E858ABF7BB7EBC8700F508468E94B9B388CF349C078B91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a]q
                                      • API String ID: 0-3765744518
                                      • Opcode ID: 0798f9a116907a7a88ee9b49f089dd735df6967bc00b1d18e555102fbf2befae
                                      • Instruction ID: 4df4b86c80402d572664affd4aba5d328f8f66191cce3c1142005a48f6c500c0
                                      • Opcode Fuzzy Hash: 0798f9a116907a7a88ee9b49f089dd735df6967bc00b1d18e555102fbf2befae
                                      • Instruction Fuzzy Hash: 68329D747111548BD795BB68E858ABF7BB7EBC8700F508468E94B9B388CF349C078B91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a]q
                                      • API String ID: 0-3765744518
                                      • Opcode ID: 58826048e8e5d2accc630646d697877802b6631fca42c4fdee3e899882f327cb
                                      • Instruction ID: 59dcc6fc589cda87b020596904d38c49657070018eec5c67031e6efdd70cced8
                                      • Opcode Fuzzy Hash: 58826048e8e5d2accc630646d697877802b6631fca42c4fdee3e899882f327cb
                                      • Instruction Fuzzy Hash: 55228D747101548BD795BB68E858ABF7BA7EBC8700F508468E94B9B388DF349C078B91
                                      APIs
                                      • SafeArrayCreate.OLEAUT32(00000011,00000001,?), ref: 023F0658
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ArrayCreateSafe
                                      • String ID:
                                      • API String ID: 37945469-0
                                      • Opcode ID: 3a71c02433a8139c968cc3f30c4dd14e73a6b67554079fc4c70d085402dfb9e4
                                      • Instruction ID: f5fbcde679765832c0b5bbc424face158b8fdc8da28e971ef933839ade776e62
                                      • Opcode Fuzzy Hash: 3a71c02433a8139c968cc3f30c4dd14e73a6b67554079fc4c70d085402dfb9e4
                                      • Instruction Fuzzy Hash: 8B617A71204206AFDB68DF64D884FA7B7E8FF49305F048669EA49CB106DB70E905CFA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,aq
                                      • API String ID: 0-3092978723
                                      • Opcode ID: 4fe983c457e010f5aafdbdcb99a1c4c85671ac1fed36868167994bf5bcc7c99b
                                      • Instruction ID: e4e543153f722b0059ac379433bcfecbe8f15ff22cc0a0c3857366b141044b41
                                      • Opcode Fuzzy Hash: 4fe983c457e010f5aafdbdcb99a1c4c85671ac1fed36868167994bf5bcc7c99b
                                      • Instruction Fuzzy Hash: 5CE12B74A002189FDB65DF69D844BEEBBB6FF88300F108499E50AA7394DB749E85CF50
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 023F0750
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 913584bddb567b179a3f9b4e0e6654d789e61ea3d5744fe4b2293047c08ef92d
                                      • Instruction ID: 92bbdf4cdb456bbad51c8c3a6c4ee91f936aba38ab1d1f88b565e18e052169cf
                                      • Opcode Fuzzy Hash: 913584bddb567b179a3f9b4e0e6654d789e61ea3d5744fe4b2293047c08ef92d
                                      • Instruction Fuzzy Hash: 33B1E572500706EFDBB99E68EC80BA7B7E9FF05304F100529EB9992156E731E560CFA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: \VBm
                                      • API String ID: 0-971115878
                                      • Opcode ID: cc7c6876c6e33f6a80d523f5efac0c31a0103800d4922e134f52b698d43060bc
                                      • Instruction ID: 022e099301de6657345568839930176459b0ae57343f77aa4889536fa9211398
                                      • Opcode Fuzzy Hash: cc7c6876c6e33f6a80d523f5efac0c31a0103800d4922e134f52b698d43060bc
                                      • Instruction Fuzzy Hash: 56B17F70E1530ADFDB10CFA8C8857EEBBF2BF48304F549129D419A7295EB759882CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Ddq
                                      • API String ID: 0-562783569
                                      • Opcode ID: 2ddd1d417507cf44153aa2c6d94c6b1b4ba8d43b204151d2384f3540990a7bd9
                                      • Instruction ID: 14136d8d405fa208a316b9f92b836c5cca766e263e572ba8361b9baa30a4370b
                                      • Opcode Fuzzy Hash: 2ddd1d417507cf44153aa2c6d94c6b1b4ba8d43b204151d2384f3540990a7bd9
                                      • Instruction Fuzzy Hash: 78B17E38A002149FC714DF29D594A5DBBF6FF88310F1185AAE806EB3A5DB34EC42CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: \VBm
                                      • API String ID: 0-971115878
                                      • Opcode ID: 6abce2f99a2a3dd25e4a3a59eb1289fcd521018ca70bad076cdc36fe585cbdce
                                      • Instruction ID: b35e4eb3e9c393f35099e4670e6444535e5d48c78de111bf271bc0422230f5f4
                                      • Opcode Fuzzy Hash: 6abce2f99a2a3dd25e4a3a59eb1289fcd521018ca70bad076cdc36fe585cbdce
                                      • Instruction Fuzzy Hash: E591B570E11209DFDF10DFA8C9857EDBBF1BF88314F149129E40AA7296DB749886CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: aq
                                      • API String ID: 0-910995339
                                      • Opcode ID: 3e372109d4ad04304285715e332412956405f83a4358c98e179427d00808b81c
                                      • Instruction ID: ae0a490b1510c9eeac1fc01a9dafe319e26bef7e4988e249655fb4ee79c132d9
                                      • Opcode Fuzzy Hash: 3e372109d4ad04304285715e332412956405f83a4358c98e179427d00808b81c
                                      • Instruction Fuzzy Hash: 30613D35B0020A9FCF45DFA8D8409EEBBF6FF8C214B14805AE906E7265D731D961DBA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Ddq
                                      • API String ID: 0-562783569
                                      • Opcode ID: 20b0530510ba549bd2de4246023588ee2771cd7c8ed131f1aa6417eec3db5a43
                                      • Instruction ID: 98e3485df1d47c7e11aa05072ab04cb954e9fbb5b4f7bf25a4422489bd0ce6f6
                                      • Opcode Fuzzy Hash: 20b0530510ba549bd2de4246023588ee2771cd7c8ed131f1aa6417eec3db5a43
                                      • Instruction Fuzzy Hash: D3616B38A006149FC714DF29D584A59BBF7FF88310B1585AAE80AEB365DB34EC42CF90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: paq
                                      • API String ID: 0-3273118895
                                      • Opcode ID: b9bc13b07d6a400d9daaae1251f119712f16340fa452b6b93beb283888bda31d
                                      • Instruction ID: de8a959bb5e7b9ae5d0fe3f2bb1abb8bb2d7d1d9f68c6989b4133e2bc1962913
                                      • Opcode Fuzzy Hash: b9bc13b07d6a400d9daaae1251f119712f16340fa452b6b93beb283888bda31d
                                      • Instruction Fuzzy Hash: F0510A76600100AFCB4AAF98E958D6A7BB7FF8C3107158098E6468B375DB35DC22DF91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: E=p
                                      • API String ID: 0-1742960607
                                      • Opcode ID: dae35a9e2aa75ce667ca5865f746c126aa538a5177c5c33e0298ddfbfea39331
                                      • Instruction ID: d050a38a3e025f09ac0085c9c88075bfc3fc684efd7a7f5cbef5c54aa008e060
                                      • Opcode Fuzzy Hash: dae35a9e2aa75ce667ca5865f746c126aa538a5177c5c33e0298ddfbfea39331
                                      • Instruction Fuzzy Hash: 4C4127387511418FC755FB68F998A6E77E7EB88304B1081AA960BDB399CF34DC038B91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: E=p
                                      • API String ID: 0-1742960607
                                      • Opcode ID: cc84dcb518dc96ed4f9e6c13bd770dca41b674b7be60cd367ca8fa5441fbcd95
                                      • Instruction ID: ea8183a64a8b16341ef4b40ddd5a683edb812807d32b0f562fbe9b7a6a55aa92
                                      • Opcode Fuzzy Hash: cc84dcb518dc96ed4f9e6c13bd770dca41b674b7be60cd367ca8fa5441fbcd95
                                      • Instruction Fuzzy Hash: 274127387111418FC755FB68F998A6E77E7EB88304B1081A9960BDB399CF34DC038B81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q
                                      • API String ID: 0-1259897404
                                      • Opcode ID: 3af78d010bac60862fd476402d3e76e481bd27038f6250cad5442d0547045c94
                                      • Instruction ID: 0549f8370b1ea4959cfd221cf7e8565bc790055cedc5dc599a7159c0077a122c
                                      • Opcode Fuzzy Hash: 3af78d010bac60862fd476402d3e76e481bd27038f6250cad5442d0547045c94
                                      • Instruction Fuzzy Hash: 8D418A357001049FDB56AFA8E854EBE7BF7EB8C700B048458E606A7394CF358C128FA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q
                                      • API String ID: 0-1259897404
                                      • Opcode ID: abfa2158b39a9f14efa396d14ff541f085d4cec1f3bcf50e9f5ebecfa8645c87
                                      • Instruction ID: 3130bd299bc7a082c1ed2088c96b814dbaa36c9440e5f83106e5a99a58f3452b
                                      • Opcode Fuzzy Hash: abfa2158b39a9f14efa396d14ff541f085d4cec1f3bcf50e9f5ebecfa8645c87
                                      • Instruction Fuzzy Hash: BC419E757001009FDB56EFA8E954EBE7BF7EB8C700B148459E606A7394CB358C128FA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q
                                      • API String ID: 0-1007455737
                                      • Opcode ID: c85c97b67e66ffcf3a5be3499de25b0695ae35a78b1cf18038b34026c0dea614
                                      • Instruction ID: 9dd529d99b61820af72f39281d92ce089df6a6d26db699584975ff3bba73e795
                                      • Opcode Fuzzy Hash: c85c97b67e66ffcf3a5be3499de25b0695ae35a78b1cf18038b34026c0dea614
                                      • Instruction Fuzzy Hash: 5D313C34B222199BDB24EB64E854ABE77B6FF88700F109529D906E7395DB709C02CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: p<]q
                                      • API String ID: 0-1327301063
                                      • Opcode ID: 7731d400e12fdc5e48df091e46c72471032717a118cebb63b25f203b39a60f9a
                                      • Instruction ID: 42b4105995043c05d946c044719c9abb0bbe57d3e41559aa6fe5ecb41a312246
                                      • Opcode Fuzzy Hash: 7731d400e12fdc5e48df091e46c72471032717a118cebb63b25f203b39a60f9a
                                      • Instruction Fuzzy Hash: 85317C713042459FDB46AF59E840ABF7BEAFF8A250B054455FC4AC7394CA34D811CB30
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q
                                      • API String ID: 0-1007455737
                                      • Opcode ID: 513fdef7fab9c51553c17150e47f444b831f629702ea89ce29b6a0c76a0d3076
                                      • Instruction ID: 54bbf799759fed2711c51873e3192527268c8680a78e41cd1011ffa8df5c09d7
                                      • Opcode Fuzzy Hash: 513fdef7fab9c51553c17150e47f444b831f629702ea89ce29b6a0c76a0d3076
                                      • Instruction Fuzzy Hash: 09315E34A26215CBDB25EB64E894ABE77B2FF88700F10952DD906E73D5DB708C02CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533290935.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50a0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5b80f9ab0794423d4a7af2960597521114f25de756f8cb8f64689bf4be9ebd10
                                      • Instruction ID: 1e19f14d139ad01150fd7c73ef40d867ca3cce05a031bc642cc7ffc66c001cb1
                                      • Opcode Fuzzy Hash: 5b80f9ab0794423d4a7af2960597521114f25de756f8cb8f64689bf4be9ebd10
                                      • Instruction Fuzzy Hash: F9B26E316001118FE7649BA9DC5876EBBFBBFDA700F5085AEA206962D8CF748D81CF51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: p<]q
                                      • API String ID: 0-1327301063
                                      • Opcode ID: 62cfd6634b43ac1740479b5267857b84adac294d86800f4cc25a9b5ebce5f80f
                                      • Instruction ID: 1b66dad29a44311b0ad9cd76761307056e8b23ebf4c3e29a14b25630491b3073
                                      • Opcode Fuzzy Hash: 62cfd6634b43ac1740479b5267857b84adac294d86800f4cc25a9b5ebce5f80f
                                      • Instruction Fuzzy Hash: 63217C753042449FCB45EF59E8849BF7BEAFB89250B148415F94AC7394CA34DC12CB20
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: fbq
                                      • API String ID: 0-3185938239
                                      • Opcode ID: c28d975729ea5d3cf8131bc18901d9570a40e245c93d677ad89a31ff44ad2761
                                      • Instruction ID: f90f411ca7910293d61371c1c6e3ad1972059782a6b0c2009c426a8dcf61e6c2
                                      • Opcode Fuzzy Hash: c28d975729ea5d3cf8131bc18901d9570a40e245c93d677ad89a31ff44ad2761
                                      • Instruction Fuzzy Hash: 3911CB327191165BD719EA65A844ABFB797FFC0764F10407AF60DCB780DA21DC1247D0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a]q
                                      • API String ID: 0-3765744518
                                      • Opcode ID: 0e59fd2002fb8a24c3f8c106c447fe0f25f5e130647311bc5df84ced7eb34cf7
                                      • Instruction ID: b96a71bb487fb298e0f5df8514ffb0622309a21e7c6d4c05024b2a8229dfcc42
                                      • Opcode Fuzzy Hash: 0e59fd2002fb8a24c3f8c106c447fe0f25f5e130647311bc5df84ced7eb34cf7
                                      • Instruction Fuzzy Hash: 1B216630A453408FC781EB789841AAE3FF3EF85700F044A59D4469B384EE385907CBD2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533290935.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50a0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q
                                      • API String ID: 0-1259897404
                                      • Opcode ID: 67c48414ded7df0984b6619198f1b96743d1c23f7ee395b6fdf5f5a75f5ce0d5
                                      • Instruction ID: 6a49bb0c9ddbeea910b7994f3a2cbbbfc9abe90481ef0a1edb3c78a03c25d1df
                                      • Opcode Fuzzy Hash: 67c48414ded7df0984b6619198f1b96743d1c23f7ee395b6fdf5f5a75f5ce0d5
                                      • Instruction Fuzzy Hash: 1411A272E082658FCB2A5BB0E8117BD7BB3FF81312F0548AED652AB241C7359845CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a]q
                                      • API String ID: 0-3765744518
                                      • Opcode ID: 42c749c5341babb3213a8cfd7b199318f48cf6774a8aab799aaf7ff8f9b4012c
                                      • Instruction ID: 2cb73063626f7f5515afa546a686ea8e46505935dc35a6ff2cbcc875f745b217
                                      • Opcode Fuzzy Hash: 42c749c5341babb3213a8cfd7b199318f48cf6774a8aab799aaf7ff8f9b4012c
                                      • Instruction Fuzzy Hash: BE11D030A112108BCB84FB69D441AAE7AF7EB88700F008A29D5469B388DF75AD068BD1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Te]q
                                      • API String ID: 0-52440209
                                      • Opcode ID: 249420b52fa6213364ffad6dd8097843fb856c79bc488ea4aa4aed740418e8fa
                                      • Instruction ID: a270082fa184f9ccee06b277000167667013f427c27977e368f051b4eec758fb
                                      • Opcode Fuzzy Hash: 249420b52fa6213364ffad6dd8097843fb856c79bc488ea4aa4aed740418e8fa
                                      • Instruction Fuzzy Hash: 58110135B142648BCB49AB68D8657BF7FB3DB88700F600159D402AB3C4CB754C028BE2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: daq
                                      • API String ID: 0-1532007458
                                      • Opcode ID: 67e6ca637329ca6aeb245864d3bde26a4880072fc6a2c19891552e3ba0ace9ae
                                      • Instruction ID: ce2af1f2146d7b8ad81fb21a49fec980bae914d9b14d09d155c5c6800cb744dd
                                      • Opcode Fuzzy Hash: 67e6ca637329ca6aeb245864d3bde26a4880072fc6a2c19891552e3ba0ace9ae
                                      • Instruction Fuzzy Hash: 3D11A735A102499FC744FFBCF4455BE7BB6EB84700B504569E506E3348EF30591A8BD1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Te]q
                                      • API String ID: 0-52440209
                                      • Opcode ID: 961e3b0b218f6613b9dce76b2ba8b25e4b636f5fcda0e47f9771df0001a1a0c6
                                      • Instruction ID: 9d13639089f0a6db84a91bcf921c1a7446c5614a1f00ae26d7bf2175f8460f1e
                                      • Opcode Fuzzy Hash: 961e3b0b218f6613b9dce76b2ba8b25e4b636f5fcda0e47f9771df0001a1a0c6
                                      • Instruction Fuzzy Hash: 6B11A035B142648BDF59AA68D4557AF7FB3DB88700F60415DD402AB384CFB54C06CBD2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Te]q
                                      • API String ID: 0-52440209
                                      • Opcode ID: 46e762be9699be58cd662d9f3f59fe947aa1a84137f5aa2ffbbc0f0df6a1e4d6
                                      • Instruction ID: 304e096731ebcca1ee4c983a1eb8447395b4ba05d00cb09f230040eb41c3e893
                                      • Opcode Fuzzy Hash: 46e762be9699be58cd662d9f3f59fe947aa1a84137f5aa2ffbbc0f0df6a1e4d6
                                      • Instruction Fuzzy Hash: A8115E347141548BDB25AA98E859BBF7AB3EB88710F504019D903AB788CF784C078BE1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: daq
                                      • API String ID: 0-1532007458
                                      • Opcode ID: 1084b030b721573ed3efa1d6849edc41b6b0f3953a1c32fc709dfff9a6eb79b8
                                      • Instruction ID: 8bef88b8e0fc4d3fc8d28f6d67dcd91a5a70eeb83e02adb2eba7d28a9277d4fc
                                      • Opcode Fuzzy Hash: 1084b030b721573ed3efa1d6849edc41b6b0f3953a1c32fc709dfff9a6eb79b8
                                      • Instruction Fuzzy Hash: 2B118235A101098BC744FFBCF8495AE7BB6EB88300F504569E546A7348EF3059168BD1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q
                                      • API String ID: 0-1259897404
                                      • Opcode ID: 5f32cf51d5c941d2c30fb99d94b2842233b1968beb2f920b2236a29c667364bf
                                      • Instruction ID: 651c356652d7635088dddf264f116fb549c446ad48f69fc21ba7244ee205fc9e
                                      • Opcode Fuzzy Hash: 5f32cf51d5c941d2c30fb99d94b2842233b1968beb2f920b2236a29c667364bf
                                      • Instruction Fuzzy Hash: 400122306092849FC706EBA8EC51BBE7F3AEB81300F4480D9954ACB39ADE399906C741
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Te]q
                                      • API String ID: 0-52440209
                                      • Opcode ID: 80e6dc6bce79ff8d06b54a86e8055a1b1a4f57420fc2463eb4db8379f1877738
                                      • Instruction ID: fbdd0e2ac4e237a421bad99fa7935925a2a5ba6eac1a42c9f3954de69462f7bf
                                      • Opcode Fuzzy Hash: 80e6dc6bce79ff8d06b54a86e8055a1b1a4f57420fc2463eb4db8379f1877738
                                      • Instruction Fuzzy Hash: 5901C434B542248BDF59AF68D4557BF7AF3EB88700F204119D806AB388CF754C028BE6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: a]q
                                      • API String ID: 0-3765744518
                                      • Opcode ID: 9b6bf89218ed372d6216302c89ec941de55d990ff03c73a4a7c9045f397b520c
                                      • Instruction ID: 6fff13c06858777c62b3321c04683209552b6167dc2cffa0616e3d0b5ba376fe
                                      • Opcode Fuzzy Hash: 9b6bf89218ed372d6216302c89ec941de55d990ff03c73a4a7c9045f397b520c
                                      • Instruction Fuzzy Hash: 8EF028307402108BC745BB78E441B9D3BA7EFC4710F004A19D5075B394DFB46D068BC1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 814ca5561486901ad9a15071b84964257e5962b182e0500a400c2d1386b61591
                                      • Instruction ID: b62b1d35740adeefd101b644745fe94532e1b3a6f587c74878e92abca3b483e9
                                      • Opcode Fuzzy Hash: 814ca5561486901ad9a15071b84964257e5962b182e0500a400c2d1386b61591
                                      • Instruction Fuzzy Hash: 92E13834B012049FDB15FF68E9949AEB7B6EB89300B50852CE507AB399DF349D56CB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 36ab37a4685666e8fbe055e83c95f6781f277762be936901ae1cafaf61c86012
                                      • Instruction ID: 08ae088e7bf8b0c83c269f61546201ea74a774e1a052831e2a6f4e9f0ae40e41
                                      • Opcode Fuzzy Hash: 36ab37a4685666e8fbe055e83c95f6781f277762be936901ae1cafaf61c86012
                                      • Instruction Fuzzy Hash: 0BE1F774A44209CFDB54CF68C584A99BFF2BF89314F25C299E409AB366D730E985CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2c2614d6bc51845a3bb6136cdc713cba722e99361b252d8e37df1a81e32bb70f
                                      • Instruction ID: b4cc69f39f91db6fa15567fae4585afd08e25161cef641162d003edb97143447
                                      • Opcode Fuzzy Hash: 2c2614d6bc51845a3bb6136cdc713cba722e99361b252d8e37df1a81e32bb70f
                                      • Instruction Fuzzy Hash: A9B18D70E1130ADFDF10CFA8D9857AEBBF2BF48314F549129D419A7295EB749882CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 57d4b5ea5dc943f06a433cd6ff795b09d5db66c541b279c958d3484cbc2bfb17
                                      • Instruction ID: 2661738fcae5243744b4b94dfbbb646053d105269f54a2440c24f158e9098c77
                                      • Opcode Fuzzy Hash: 57d4b5ea5dc943f06a433cd6ff795b09d5db66c541b279c958d3484cbc2bfb17
                                      • Instruction Fuzzy Hash: 0CA150797001148FCB15EF98E484AAEB7B6EF89710F148569E906DB768CF34ED42CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 037e30e2310aa05743a91726fc8c115fd105f74a51c21638c59fd41f64cf920a
                                      • Instruction ID: 607f7ddcce4586e6009e3b51281cf422e7d27ae3e15f170a17a75436c184631e
                                      • Opcode Fuzzy Hash: 037e30e2310aa05743a91726fc8c115fd105f74a51c21638c59fd41f64cf920a
                                      • Instruction Fuzzy Hash: DE918A34B016059BDB05BF68D898AAEB7B7FF89300F108129D40667398DF74D897CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e2a0e005eb62075138cbd0eabaf85a2a39732f08e07c48603ef0f70b64893bfd
                                      • Instruction ID: 313fb1545e18b2cae90dc38fbfbdd609ef25d8726d86ea0b71b49692e4a47db6
                                      • Opcode Fuzzy Hash: e2a0e005eb62075138cbd0eabaf85a2a39732f08e07c48603ef0f70b64893bfd
                                      • Instruction Fuzzy Hash: C491F834A40205CFDBA4CFA9C594AADBBF2BF88304F2585A9D4069B365CB31ED42DF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4702956b7a68c7ad595451adece7473e40c709a56bcef42e06f292d496261b89
                                      • Instruction ID: 93bbb47cf77d692e5a20731c4b4c29313f745c7d6b6110a7e1fb9e1f9a40780b
                                      • Opcode Fuzzy Hash: 4702956b7a68c7ad595451adece7473e40c709a56bcef42e06f292d496261b89
                                      • Instruction Fuzzy Hash: 337186707191849BC355BFA8F89897F76A7EBC8601F508469E607DF3C9CD248C078B61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4dab1e0b7e81aee28665914e7f3d0492cc6a8c94f567da4f3c2a6122c82cb89c
                                      • Instruction ID: d9c5be8e4afd5ed81b8034c11b740ea15aa91beab5dfd5d6d84f6ba49156d8ca
                                      • Opcode Fuzzy Hash: 4dab1e0b7e81aee28665914e7f3d0492cc6a8c94f567da4f3c2a6122c82cb89c
                                      • Instruction Fuzzy Hash: DF71AC30B01A059BDB05BF68E898AAEB7B7FF89300F108129D40667398DF74D957CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533290935.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50a0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f26454654b69d724b627b5c4ebb0dfd1ea50da7fc1403c1be5e8ca29fb215ec9
                                      • Instruction ID: 3a809e0522b96f92841fa092ce571d4f8d9e0afe1a7628a68b9b66157aeee52c
                                      • Opcode Fuzzy Hash: f26454654b69d724b627b5c4ebb0dfd1ea50da7fc1403c1be5e8ca29fb215ec9
                                      • Instruction Fuzzy Hash: 2561C3317003404BD7A5DE66D8D8A3EFBEFBFD9600B88883D951387295CF74980A9B21
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6b90c2cbafa421358c3deaac032e64670254fb1c837439a934828c189ed93dbc
                                      • Instruction ID: 2dcac4e0fd5c3d0db1934d6effd4bb00e0c5c983dddc52d2f3255ff77b841a16
                                      • Opcode Fuzzy Hash: 6b90c2cbafa421358c3deaac032e64670254fb1c837439a934828c189ed93dbc
                                      • Instruction Fuzzy Hash: 7B81F63A115100EFDB5AAF84ED48C95BFB6FF4832430A8194E2065B276C773D8A2EB55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533290935.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50a0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0b8302463725b86ffb1b7266b023136269ea58573b98bd04981f6793ff1da4a3
                                      • Instruction ID: 6b75f249db37f8aee5f019e3e7c0b33f27791ce37fdfa9e082d47bc74ca86475
                                      • Opcode Fuzzy Hash: 0b8302463725b86ffb1b7266b023136269ea58573b98bd04981f6793ff1da4a3
                                      • Instruction Fuzzy Hash: 2F51813270030047D7A4DE56D8D8A3EF7EFBFD9600B98883D951797284DF75980A9B61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 97d51676a69c3d9dcb458e7e9bafaeea0e14d8c8b4ca6a95789dda595065e8b8
                                      • Instruction ID: 207c4da61aa957103f2bcd20070bcc5ce641034b1fac8588c55f3d9b9484febb
                                      • Opcode Fuzzy Hash: 97d51676a69c3d9dcb458e7e9bafaeea0e14d8c8b4ca6a95789dda595065e8b8
                                      • Instruction Fuzzy Hash: BA5185347102049BDB55EF69E8A8B6FB7BAEBC9704F508029D5079B348DF749C06CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4ae2930d63a31dcbfb838831dd3674160aec9999aea2e87f18bee68b9c45fada
                                      • Instruction ID: 392b02bc70eb2f241e7ffc54e11b499ad4bef969c1ae9e604f84bf67890fb116
                                      • Opcode Fuzzy Hash: 4ae2930d63a31dcbfb838831dd3674160aec9999aea2e87f18bee68b9c45fada
                                      • Instruction Fuzzy Hash: 595134347211158BDB44EB68F894AAF77BAFF88700B548129D50BDB399DF34AC06CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 96b58be4e52c19b35c84f9b7953b6d0cda85906d2130da2490c55452917285b1
                                      • Instruction ID: 7adfb89df784e402c7b1548e443a2488e293770d5e3270aa0cae9464e79ef172
                                      • Opcode Fuzzy Hash: 96b58be4e52c19b35c84f9b7953b6d0cda85906d2130da2490c55452917285b1
                                      • Instruction Fuzzy Hash: BD5165346211148BDB45EB68F894AAF77B7FF88700B148129D507DB399CF34AC06CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 887ad04e4f6d39216be3d29378e2a9e243a491fd2d84a1dd5a0aee618bb05885
                                      • Instruction ID: 09db8ad4074d5efc92b2e124577f57bdd59931722a937959ba230ceb8f106a5a
                                      • Opcode Fuzzy Hash: 887ad04e4f6d39216be3d29378e2a9e243a491fd2d84a1dd5a0aee618bb05885
                                      • Instruction Fuzzy Hash: E3313E75701104AFDB05EF94F844EAE77B7FB88310F158568E9069B365DB71E812CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533290935.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50a0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aaece06417f223f3c5f458fed407d58b5b96b5c8ef64ddadf3d27c8348978ec2
                                      • Instruction ID: 2bc1fc0f70bd8d394de82f5fed2e1c963ec56c822eec6338779b5b0b44c5f842
                                      • Opcode Fuzzy Hash: aaece06417f223f3c5f458fed407d58b5b96b5c8ef64ddadf3d27c8348978ec2
                                      • Instruction Fuzzy Hash: 1F213C217443404BDBA6AA7ADC9077EBFEFBFC6500B48847D910697255CE649C065371
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5cb4739c315ddae2ae36b1e2e4411244c5fd8aa2fa82073569d5bbcc2ad27dab
                                      • Instruction ID: 3088e2598d44bf752ab60104cdf82fc276f262a29a9cd1d3b38fcec2aff57b3c
                                      • Opcode Fuzzy Hash: 5cb4739c315ddae2ae36b1e2e4411244c5fd8aa2fa82073569d5bbcc2ad27dab
                                      • Instruction Fuzzy Hash: A5314F7260405D6F8F028ED59C50CFFBFBEEB4D210F044466FA55E2151DA36DA259BB0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e494699442973a998324658ac4bd1eadf095631c1eb378f0bacd7cd707888bf8
                                      • Instruction ID: 74e5183e90beb6f7464285210fd37a6ae6b0de926365f4c7817f7307176f9b0b
                                      • Opcode Fuzzy Hash: e494699442973a998324658ac4bd1eadf095631c1eb378f0bacd7cd707888bf8
                                      • Instruction Fuzzy Hash: 7C41FEB5D01249DFCB10CFA9C594ADEBFB1FF48300F148429E809AB254DB75A949CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b5d812d39808bb9140a8f7ec45637cac3c8ce85bfd9c40165dcb918d990bb7cb
                                      • Instruction ID: 9a04e3a63bc9c189e2c2186d6f123429bff1cd65f687504b715b3166d24d3782
                                      • Opcode Fuzzy Hash: b5d812d39808bb9140a8f7ec45637cac3c8ce85bfd9c40165dcb918d990bb7cb
                                      • Instruction Fuzzy Hash: 5331AA306002049FC744EF68E491DEEB7F6FF89314B50852AD55ADB365DB31AD0ACB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7efb8a987646bd6c0dc9599dfa25c1c97ce836c574b12e2ce0bc94b6c06871cc
                                      • Instruction ID: 62ae07eeecd3531535b1e58c8a1c5ed843c93c8e707122508ed2d9c1db34b916
                                      • Opcode Fuzzy Hash: 7efb8a987646bd6c0dc9599dfa25c1c97ce836c574b12e2ce0bc94b6c06871cc
                                      • Instruction Fuzzy Hash: 8241EDB0D01349DFCB10DFA9C494ADEBFB5BF48310F208429E809AB254DB75A945CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 36adcb6cebae9b0ac0d75c3bdf035a9c3ed7af342cb2ca9ca4a782424a9ec810
                                      • Instruction ID: 996e816e06cf5a7db991cc88c7d912d3ab37866eebab205f48b44f26b608c8bd
                                      • Opcode Fuzzy Hash: 36adcb6cebae9b0ac0d75c3bdf035a9c3ed7af342cb2ca9ca4a782424a9ec810
                                      • Instruction Fuzzy Hash: 2731BC31B22114CBCB04EF69E4546AEBBBBEFC8711F10845AD806A7385CB74AC068FD1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533290935.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50a0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4d2e9f8323d574d8c67fe029a68c76d1eca9ee2715c504dc35b9691a98d94ec9
                                      • Instruction ID: bcf4711723c8a7ca64c7446ed2bf076d3f6979a1c8e492a480326e8ebff5b9d5
                                      • Opcode Fuzzy Hash: 4d2e9f8323d574d8c67fe029a68c76d1eca9ee2715c504dc35b9691a98d94ec9
                                      • Instruction Fuzzy Hash: E121F9227443004BDBA5AA7ADCD077FEADFBFC9600784883D961697384DE64AC065361
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ce494dcb44fe53d14290ebfb45394ea8fe67fcc8d1555cc05de1e95aebe90a23
                                      • Instruction ID: cc7f25d29f741e08c971114b5a0aafecc09dfc270faa1b1eec404d8c2f4208da
                                      • Opcode Fuzzy Hash: ce494dcb44fe53d14290ebfb45394ea8fe67fcc8d1555cc05de1e95aebe90a23
                                      • Instruction Fuzzy Hash: 17318E75A04159DBDB15AFA8D8549BFBBBBEBCC710F508119E912A7388CE749C028F90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 65a3d3b51c1cdba2b04ab81ffee8f62f1390893d975e31fdcc5c65f9cec8e1ee
                                      • Instruction ID: a6d39623f18d4a2e43e32b9889af02ef2a0deda15a48a0aa0e8da2555dcebc7e
                                      • Opcode Fuzzy Hash: 65a3d3b51c1cdba2b04ab81ffee8f62f1390893d975e31fdcc5c65f9cec8e1ee
                                      • Instruction Fuzzy Hash: 7B2171747142449FD751AB68E8846BF7AE6EB89604F144029EA46C7385DF38CD068BA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5d0363622b93e0d2d3beef2cc67abc204cc9c8571e6acc848e5c552e2c5aa6e5
                                      • Instruction ID: cd5b267c38283eda4a884f98aea4966762e1ee2610c8e24666ff181a407d17a3
                                      • Opcode Fuzzy Hash: 5d0363622b93e0d2d3beef2cc67abc204cc9c8571e6acc848e5c552e2c5aa6e5
                                      • Instruction Fuzzy Hash: DF216F76700104AFDB09EF94F984DAEBBB7FB88310B054568F6069B366DB71D812CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7c0a91e20c89bbfb02ae38bf6c8fe311c4faff3a8d4b97962ac91e5388aa81d8
                                      • Instruction ID: 430b117699ab960d0318751a80098d5c7f1fb092aa24dedfc42b77dadd3a52d8
                                      • Opcode Fuzzy Hash: 7c0a91e20c89bbfb02ae38bf6c8fe311c4faff3a8d4b97962ac91e5388aa81d8
                                      • Instruction Fuzzy Hash: 782141746002059FC744EF68E490DAEB7F6FF88314B508529E54ADB365DB31AD0ACF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533290935.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50a0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 34a66aafafdd5421ab359ce04373a0349104e1c987eb1dba309e7013c8fc1c53
                                      • Instruction ID: d9551dd54c8f1e6976b24ed2e0de48d5b38818bec129604cc5df6c26b7000a68
                                      • Opcode Fuzzy Hash: 34a66aafafdd5421ab359ce04373a0349104e1c987eb1dba309e7013c8fc1c53
                                      • Instruction Fuzzy Hash: C2218E77B053109BDB254AA8EC00BAEBBFBFF95714F08416AF509E7291CA718845C790
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4522281680.00000000027FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027FD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_27fd000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cb3d83dd078487fa9bc4bd7ebaa3340f477ae28c9e514c9513985eb233479090
                                      • Instruction ID: 776f8c5767793875a9c95a073ed1c9c2504e04dfebd338ccc23746a18ab8cebf
                                      • Opcode Fuzzy Hash: cb3d83dd078487fa9bc4bd7ebaa3340f477ae28c9e514c9513985eb233479090
                                      • Instruction Fuzzy Hash: 0C2122B1508200DFDB65DF54D9C0F26BF65FB88314F248569EA0D0B356C33AD456CBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2c751ad0f79115ccfb8efcf9ec4f02fdefb741cf9dcba3b01c4e91451dfa073a
                                      • Instruction ID: 668da6ec94d059103d329f48cdb391a0b3eab60c643ffc107755f48b40a02408
                                      • Opcode Fuzzy Hash: 2c751ad0f79115ccfb8efcf9ec4f02fdefb741cf9dcba3b01c4e91451dfa073a
                                      • Instruction Fuzzy Hash: B521A3357092908FD746BB68F45897E3BB7EB8931075580AAD943CB349DF389C078B92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 67bfbf627d084ae91ac0513b58402811a44d886bc292d4cf4d80c24adbac46a8
                                      • Instruction ID: 197e38edc7bfa11294d4032c7054e1589accc9192660dfdd262a3daea04a9748
                                      • Opcode Fuzzy Hash: 67bfbf627d084ae91ac0513b58402811a44d886bc292d4cf4d80c24adbac46a8
                                      • Instruction Fuzzy Hash: DF116AB244E3C49FC743D7748D619953FB5DF53200B4B44DBD498CB2A3DA1A990AA732
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f78cdf5e17d325f289991fe50ff2426f2fe9a12c9102be6c9faecf8ecda836bb
                                      • Instruction ID: 5a95ea64dbec91acb1e1210a67e5bee555dbc0106b6ac5421fe40221ceef59b8
                                      • Opcode Fuzzy Hash: f78cdf5e17d325f289991fe50ff2426f2fe9a12c9102be6c9faecf8ecda836bb
                                      • Instruction Fuzzy Hash: 0B213730740A018FD764DF19E544E56FBE6EF84324F05CAA9D45E8BAA5D730EC49CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 897db65b504fedc860c216882d6fc5253bde660d7a01f975e65ed52c9e066995
                                      • Instruction ID: 34fa1786112ff2b6c382f0916aa64e4d5ad5114d9c6f2fae06056ba151522bc3
                                      • Opcode Fuzzy Hash: 897db65b504fedc860c216882d6fc5253bde660d7a01f975e65ed52c9e066995
                                      • Instruction Fuzzy Hash: 6C1186707442419FD764CB29D888E53BFFBEF89314B1485A9E04ACB352D730E846CB60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 43a5c4f1d6f0d7996d9fc9d1880c7a51197e43cf9823b1105443cf6175648d2f
                                      • Instruction ID: e28f72b0d9c697b3d78cf5e7de2dbb53631dba48166094a6e1eb97cbe20deefa
                                      • Opcode Fuzzy Hash: 43a5c4f1d6f0d7996d9fc9d1880c7a51197e43cf9823b1105443cf6175648d2f
                                      • Instruction Fuzzy Hash: 8C117C397011148BC785BB68F458A7F77A7EBC9710B54806AE9478B348DF389C078BD2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 17c281d7f10fc58585250df2a9a92c6253b81b81291a199c5b30d05e442dc723
                                      • Instruction ID: 48a288e230193ecb3313cad682486505977a34696c7cac714df4d5a03fda07bd
                                      • Opcode Fuzzy Hash: 17c281d7f10fc58585250df2a9a92c6253b81b81291a199c5b30d05e442dc723
                                      • Instruction Fuzzy Hash: BA110636604519AFC701CBA9D85094AFFA5EB4A320B4182A7E958C7651CB71E801CBE2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2d57197914558c44b4172c142889512b9fed90f664130a8452e690bc3b40f18e
                                      • Instruction ID: 907b23febdc780ef532074335a8ee79304423440096b4992a8e0b58bbd4f8927
                                      • Opcode Fuzzy Hash: 2d57197914558c44b4172c142889512b9fed90f664130a8452e690bc3b40f18e
                                      • Instruction Fuzzy Hash: 1B1163756041048FCB41EF94E955AAEBBF3EB88704F208489E54697384CA328D07CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0c93f5ce3df350278cfdf628e15727e5d77e674612f033e0c0669aad03248547
                                      • Instruction ID: 5c3a9a813033958732a0a65173adad9bbe3b80a406117bdd326e9013bfc05683
                                      • Opcode Fuzzy Hash: 0c93f5ce3df350278cfdf628e15727e5d77e674612f033e0c0669aad03248547
                                      • Instruction Fuzzy Hash: 0311C876704100ABE701DE54E881AAFBBEAEBC9720F54846DF44A87345DB71DC17C7A1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4522281680.00000000027FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027FD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_27fd000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4c465ffcfe113071736f375221bb6b5552fb12e37f6cf8a11cfe770540f14918
                                      • Instruction ID: c836008eb32675a54d1d62a5c628c489fcd02ab85047a9bd926d19719068c5ec
                                      • Opcode Fuzzy Hash: 4c465ffcfe113071736f375221bb6b5552fb12e37f6cf8a11cfe770540f14918
                                      • Instruction Fuzzy Hash: 2711B176508280CFCB16CF10D5C4B16BF72FB84314F24C5A9D9094B256C336D45ACBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3433ad7317bcd3df2415750884d4ba00da0c7f0d35b5fe0d3962c678ad0d0165
                                      • Instruction ID: e5a12a09664f6ad3516900ae6977201c33fb9a60b3d74ac5597c5f3eecdedfb7
                                      • Opcode Fuzzy Hash: 3433ad7317bcd3df2415750884d4ba00da0c7f0d35b5fe0d3962c678ad0d0165
                                      • Instruction Fuzzy Hash: F301F7716082406FEB158B28DC44EEA7BA9FB89370F058166FD08DB391D7719C02CB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f2a9584b8e95a5bae32bbad91b0e1299961be6f5cb2d0bc70bafcbc1b21571b6
                                      • Instruction ID: 7418c85b8fd728a6b5f714d20af003fb770a468bacd878c96e2eb9c06f07f352
                                      • Opcode Fuzzy Hash: f2a9584b8e95a5bae32bbad91b0e1299961be6f5cb2d0bc70bafcbc1b21571b6
                                      • Instruction Fuzzy Hash: 9F0161713002049BC715EF58E880EAFB7AFEBC4714B408538B6068B769DB74EC4ACB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5b0ec3ca627fc1850c849a288183b7eacc0ec2c911ebe8094b75aac638b0214d
                                      • Instruction ID: c63e2e6288b4ec420a16a1d9a0935b148db9bddf676fef2a1e608c1c82c1c206
                                      • Opcode Fuzzy Hash: 5b0ec3ca627fc1850c849a288183b7eacc0ec2c911ebe8094b75aac638b0214d
                                      • Instruction Fuzzy Hash: 07018436305155AB8B116E99FC84CBFBF6BEBC83607008039FB0A87300CE3588169750
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1caf2dce00b86090e6332255dfd171184a576dc459fe197dc7d1517b2d57b93d
                                      • Instruction ID: 2c151531851dd3fd3c0980edcd4c6013aa1dec9d34957e8fcdcf1bfe3f78f37a
                                      • Opcode Fuzzy Hash: 1caf2dce00b86090e6332255dfd171184a576dc459fe197dc7d1517b2d57b93d
                                      • Instruction Fuzzy Hash: B911A175A051408FE381EBA8E505BAF3FB6EB88710F004558EA168B3C8DF745952CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4404ce6b304829209998383a5f79bdf842298264aa285813151e0a3101b29bca
                                      • Instruction ID: 44453215632d5403d4569e0d9ef83db4d4f5c07ad8031ed9de761ea3e7f5232a
                                      • Opcode Fuzzy Hash: 4404ce6b304829209998383a5f79bdf842298264aa285813151e0a3101b29bca
                                      • Instruction Fuzzy Hash: 451103B5900649CFCB20DFAAC4847DEBBF4EF48324F248959D529A7290C778A944CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 21594235fcbb2a5312bee4994a9bb457b91b207f3ee73ddec767d3e1a03bf446
                                      • Instruction ID: e586988c5facca1c81220cf4046beac621c62183c2bc32b59a6ee37419b8e7b5
                                      • Opcode Fuzzy Hash: 21594235fcbb2a5312bee4994a9bb457b91b207f3ee73ddec767d3e1a03bf446
                                      • Instruction Fuzzy Hash: 2B01C0306092489FC715EBA8D855AAE7FF6EF45200B1044FED40AC7691DE305C058B81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4522281680.00000000027FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027FD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_27fd000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5bc89f6873c689bd6abe0e43d401bbf27c2e048e7a6ee79c812293fcbd410696
                                      • Instruction ID: ab598ae2f7a539394cff7e337dd601b1b9915a0925118f8de3ddc8aa75e46617
                                      • Opcode Fuzzy Hash: 5bc89f6873c689bd6abe0e43d401bbf27c2e048e7a6ee79c812293fcbd410696
                                      • Instruction Fuzzy Hash: 6C012B3110C300DAD7708B65CD84B67BF9CEF46324F18C42AEE485B786C3799801CAB1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e800619d2754908331c8b01b6f31c83c9f165fd1b706a25ee5a120354cbac1df
                                      • Instruction ID: ed848a49023de67b5d5e14c42101797f9b7fb4dc25d974b496fca151289be729
                                      • Opcode Fuzzy Hash: e800619d2754908331c8b01b6f31c83c9f165fd1b706a25ee5a120354cbac1df
                                      • Instruction Fuzzy Hash: 521100B59007488FCB20DFAAC484B9EBFF4EF48320F248419D519A7350D778A944CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4522281680.00000000027FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027FD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_27fd000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 998de5c35fed8291c0a2ab98a6588f640b61d8bc17f2387df9e8f899c5f19152
                                      • Instruction ID: 7158361dac80748ab7d6b921d2410f04687afca63a104edc9090f534e5f8c73e
                                      • Opcode Fuzzy Hash: 998de5c35fed8291c0a2ab98a6588f640b61d8bc17f2387df9e8f899c5f19152
                                      • Instruction Fuzzy Hash: 94015E7100E3C09ED7228B258894B62BFB4EF47224F1D84DBD9888F2A3C2695849C772
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 523c61653efbc582421b20e926c2dcfb2a7125db6de3e393656250a38b6e6a9e
                                      • Instruction ID: c780650536d1c10b8b24079c3afc949c2921fc92ac7b7e5c32349f83ee4e8183
                                      • Opcode Fuzzy Hash: 523c61653efbc582421b20e926c2dcfb2a7125db6de3e393656250a38b6e6a9e
                                      • Instruction Fuzzy Hash: 8B017571A141449FD381FBA8E845BAF77B6EB88710F104114E61BC73C8DF749D518B91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e58f261cd65d80685de75b6a6502a1fa457acfa899ee165b2f3c1969bb98161e
                                      • Instruction ID: 2b283ac1a179be984a649f50c4d2a946dd6f6e1c65512763cdaef52c95a2f58d
                                      • Opcode Fuzzy Hash: e58f261cd65d80685de75b6a6502a1fa457acfa899ee165b2f3c1969bb98161e
                                      • Instruction Fuzzy Hash: 03F0B4343006149BEB2577A8BC14B7F37ABDB84655F11406AEE078B284EF64DC12CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 73138531341ae3a1991e384e3c709922eb93eb0130e28d8b991625dd54717945
                                      • Instruction ID: baf4c94c17a287ea0e4508e671fedf363106be97ecb5255faf7a0c86c856fca6
                                      • Opcode Fuzzy Hash: 73138531341ae3a1991e384e3c709922eb93eb0130e28d8b991625dd54717945
                                      • Instruction Fuzzy Hash: BEF0FF72104198BFCF429F95CC10CFA7FB9EF0E254B058086FE9482161C676D961EFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e38b6165cb54f9d71fb846b156b5adc44b49a94f41ff39fd7d63d85d45766fc9
                                      • Instruction ID: 65c6d82a25e44d4e0ef0399a00a0a40f32ae1853e3d613b5fd539519b9200ae6
                                      • Opcode Fuzzy Hash: e38b6165cb54f9d71fb846b156b5adc44b49a94f41ff39fd7d63d85d45766fc9
                                      • Instruction Fuzzy Hash: 9EF0B47044A388AFCB06DBB48D115D97FB2DF0721074A05D7C458CB1F3DA294A07AB63
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5259cd8cfd976a0ae4618c04b570d794becef371eac2979a152a002d7c27422f
                                      • Instruction ID: fa2c3694753f0bcc08fce9a7aa99ee867cd332fec482f15c07b95f9c0d48711b
                                      • Opcode Fuzzy Hash: 5259cd8cfd976a0ae4618c04b570d794becef371eac2979a152a002d7c27422f
                                      • Instruction Fuzzy Hash: 71F0E0343097808FEB366764AC14BBF3763AB85655F15406AE9038B2D5EF64DC13CB41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 903ba4f01fbbe4067093f6600395bf635f02d63747cf56d459d6d7e8fd8e69b3
                                      • Instruction ID: 390de7c2646acec0fbf919add2e02c5a66922a88652bcd3065a3731a821d433e
                                      • Opcode Fuzzy Hash: 903ba4f01fbbe4067093f6600395bf635f02d63747cf56d459d6d7e8fd8e69b3
                                      • Instruction Fuzzy Hash: 62F024350893C85FC702CB789C50AC93F74CF03500F4406E2D484CB1E3E62A2A0BDB52
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 877c0292035a67c5d56ff6a22e6ed4743f5b2b3dbf166993dfbcea78ceaeded0
                                      • Instruction ID: 4474a50c54bbb27b96c3685b76598e2163b75fe6af43039c640fb5e591ed18bb
                                      • Opcode Fuzzy Hash: 877c0292035a67c5d56ff6a22e6ed4743f5b2b3dbf166993dfbcea78ceaeded0
                                      • Instruction Fuzzy Hash: 12E02B63F4D2810FEB4657786C545DA7F23DFA12A471908BFC205CB255E4658405D312
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 30dba71320a8b71ffd71c6b134dc6717a04d19d5a07f77f4ca887264e7341975
                                      • Instruction ID: ecda4e630271a8ae73eb1f976ff2480b58e04d343dfeb013af8cf3fab1e2e42d
                                      • Opcode Fuzzy Hash: 30dba71320a8b71ffd71c6b134dc6717a04d19d5a07f77f4ca887264e7341975
                                      • Instruction Fuzzy Hash: F6F0A0313102045BCB60AA9DFC54B2E76AFEB86A90F2440A9F606CB288CE60D8078761
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5bf9cde2c4581a5a43d7b3f09bc9ba81034283ce92c6a7979506d4f2bc8e1f44
                                      • Instruction ID: 1faf38cd36fa46d5b3e5d198f125e481536da81593dacfb394f8855d584b418c
                                      • Opcode Fuzzy Hash: 5bf9cde2c4581a5a43d7b3f09bc9ba81034283ce92c6a7979506d4f2bc8e1f44
                                      • Instruction Fuzzy Hash: AEF082756041019FC640EB49EC80EAFF7B6EBD8624F108519F12593280CB31981BCBB1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 903fcff97b50e9445a2b77cd8b3ba398f0e46698eb2846510e4dc98874cf7702
                                      • Instruction ID: 32ed3224988421bea919637c55d5c910c121fe711cf7750121fab81997b04472
                                      • Opcode Fuzzy Hash: 903fcff97b50e9445a2b77cd8b3ba398f0e46698eb2846510e4dc98874cf7702
                                      • Instruction Fuzzy Hash: B5F03076300114AB9745BA49E884CAF7BABE7CC7607508129E54A87354CF719C5687A1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e5415e2048b6cbde096eb34eff47117a0746989bda200d9432d5e33b20ca48d1
                                      • Instruction ID: 8506cb6115f7e39343d665428d7b927de3a7e2cc1e1afc221215530c66aad090
                                      • Opcode Fuzzy Hash: e5415e2048b6cbde096eb34eff47117a0746989bda200d9432d5e33b20ca48d1
                                      • Instruction Fuzzy Hash: 79F0E5312053105FC304AB2EE89096ABFEEEFC5610B048076E909CB256EE659C09C3E1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a87fa5284bd46d5c3711f2058577ab2ba70269040294a2b8a7c7392565cd8482
                                      • Instruction ID: a79947d2229c68a3171cd5b7d5bd9c348cc1484fd5e54c0d8a0f46bb9306a0a0
                                      • Opcode Fuzzy Hash: a87fa5284bd46d5c3711f2058577ab2ba70269040294a2b8a7c7392565cd8482
                                      • Instruction Fuzzy Hash: A5F0A0313103409BDB51AB5CF841F6EBBEBAB86651F2840A9E605CF185CA60D816C762
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 583d9cdb2cfba2177d0c9cb0674d3c269f48d61f6aea8441003e2703f7c2a6ec
                                      • Instruction ID: f9c3da6ed20f1c7ecf19eae74a84c23795b911e84bf6aa8bcdf81af6c93ae64c
                                      • Opcode Fuzzy Hash: 583d9cdb2cfba2177d0c9cb0674d3c269f48d61f6aea8441003e2703f7c2a6ec
                                      • Instruction Fuzzy Hash: 9BF08C32000198AFDF028F94CC01DFA7FA9EB4A260F188046FD9492211C236DC21DBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 80ec1a0701aa5aa050b5cc0d4f3c2cae4889814720f187c26f21319867b50802
                                      • Instruction ID: a3222ff7a4aeb85093b834d847870d4ad1bfe79c5594467507f333ef9c732c45
                                      • Opcode Fuzzy Hash: 80ec1a0701aa5aa050b5cc0d4f3c2cae4889814720f187c26f21319867b50802
                                      • Instruction Fuzzy Hash: D6F05E315106089FCB01AE68D8019E97B79FF4A310F01825AFC0467210EB32E995CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1f347c013fd6bbbbaeb8b5da7a4446dff506064a5119cf9cd782ce5acc378950
                                      • Instruction ID: d07d705b6f0f299e16e3c8a6e9f791c15b544152f01e75bebaaaa5e7b04fdb08
                                      • Opcode Fuzzy Hash: 1f347c013fd6bbbbaeb8b5da7a4446dff506064a5119cf9cd782ce5acc378950
                                      • Instruction Fuzzy Hash: 06E0263D7042101BD3051B99B8D0D3F7FABE7CD2A571801AAF909C3340CE258C138BA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f59114708d28515eb13a1d4f2730c16f59002e706e22633a5ae52d91d25cc5bf
                                      • Instruction ID: 922397b47f868cf5073cad9727d50c25442d6339ad3f8f2226c1a646afc68531
                                      • Opcode Fuzzy Hash: f59114708d28515eb13a1d4f2730c16f59002e706e22633a5ae52d91d25cc5bf
                                      • Instruction Fuzzy Hash: F1F0395984EBE20FC3130B782C70B94BF705F53229B0A07C3C8C5CA1E3D609096AC3A2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0ee72eceee7ec3bf8d9a0cc6308b9e9de3d30478013ceef58d8b2bf2d7360c49
                                      • Instruction ID: a3f3f60a3492e346eddca008407748e866776b75558b65585cb1dbc9a76bf8af
                                      • Opcode Fuzzy Hash: 0ee72eceee7ec3bf8d9a0cc6308b9e9de3d30478013ceef58d8b2bf2d7360c49
                                      • Instruction Fuzzy Hash: 99E06576B812405FC64097A8E899FBA37E9EFC8325F0944A5E50AC7286CD655802CF61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0b4d24b7db45b640f33ba7a2aac070a3823640e0ed135c6a2fccc31ffbbc0fc7
                                      • Instruction ID: edeb13d25ab48613c0a6d8f1dfe8d152c9a2158df2b75ed62296731d4f133557
                                      • Opcode Fuzzy Hash: 0b4d24b7db45b640f33ba7a2aac070a3823640e0ed135c6a2fccc31ffbbc0fc7
                                      • Instruction Fuzzy Hash: BBF01C721041987FDB428E95CC10AFA7FADEB8D215F088056FD98C2141C53AD921ABA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 21a706edead02ce9a77a7b7273cbdf773942f2a51454d207aec336cc5e19f82b
                                      • Instruction ID: 2c8c399bbdd6df42dfe8a58953790cf5fd0b6de17413f7a5bf205a2122fcd60a
                                      • Opcode Fuzzy Hash: 21a706edead02ce9a77a7b7273cbdf773942f2a51454d207aec336cc5e19f82b
                                      • Instruction Fuzzy Hash: 8DE0ED763040008F9B09EE58E8444AEF3A3EBC82007108069EA1AC3300CA3948268BA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 158c6b933e19ad98458121c75d9054b6be34b04b6755dc0f3e5dab9959630c14
                                      • Instruction ID: 8a026486ca2d3ebd21dfe28d5d825b43dc046c85dddf9c8b4c137300a0fd1650
                                      • Opcode Fuzzy Hash: 158c6b933e19ad98458121c75d9054b6be34b04b6755dc0f3e5dab9959630c14
                                      • Instruction Fuzzy Hash: E3E0267530A5124BFB36192CE85433C92A2FB80684F708139DD06D7384CB69CC838B80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 198219340c28c80515599dd23beb4d482da168439291eb6bae6f9fc383e72e87
                                      • Instruction ID: 24185246f39252c620c8bab9a207c20c8e099f8bd300652b08c1853e2dffd949
                                      • Opcode Fuzzy Hash: 198219340c28c80515599dd23beb4d482da168439291eb6bae6f9fc383e72e87
                                      • Instruction Fuzzy Hash: BDF01C349112089FCB44FF64E941A6E7BEAEB45300B404569D50AC7214EE355E01EB41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 40b153383e6de520665622cd19abb3d691de445f4deecf93faaa50dfd1b24b64
                                      • Instruction ID: 704a75d8dcbbdfedf44427af84db028faf61110e9c107736e094e3b967943e86
                                      • Opcode Fuzzy Hash: 40b153383e6de520665622cd19abb3d691de445f4deecf93faaa50dfd1b24b64
                                      • Instruction Fuzzy Hash: 81E0ED721041987F8B41CE95CC10CFA7FEDEB4D265B088046FE98D2151C576DD21EBB0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cc890966d5589c7e232a15668db06ad3291cbc5b035241499897848733a922c5
                                      • Instruction ID: 0f9481386e004e3cceae9c3a578aa937ce1301cda9915ed9529a2afb41392957
                                      • Opcode Fuzzy Hash: cc890966d5589c7e232a15668db06ad3291cbc5b035241499897848733a922c5
                                      • Instruction Fuzzy Hash: E6F02236110114BF8B069F84DD44CA5BBAAFB9922070A859AFA185B232C773D921EB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 50168c70c24c4fda7f878c648ebec291bda5cff32eda69453f7ca11834bcf32f
                                      • Instruction ID: d2ad606ed076ac4af367d08e279c6d0508070eb105ec00b7fee1c317e6c86c6b
                                      • Opcode Fuzzy Hash: 50168c70c24c4fda7f878c648ebec291bda5cff32eda69453f7ca11834bcf32f
                                      • Instruction Fuzzy Hash: 79E048721040987F8B51CE99DC11DFB7FEDDA4E111708804BFD94C2242C579D921DBB0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 031ff531f74bbf85dc452dcbb71d50ace9c094e4f468986d72ad244119ff5f2b
                                      • Instruction ID: 084bbbd496a99b9e3bc804881178e5562448347961ab7002b50277df26265236
                                      • Opcode Fuzzy Hash: 031ff531f74bbf85dc452dcbb71d50ace9c094e4f468986d72ad244119ff5f2b
                                      • Instruction Fuzzy Hash: 48E0DFB22041919BCB59DE5CD844B7BB7AADFC9710F2884A9F142C734ACA24D813DBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4da1111b606845de5035f384ec32bd141da47d66f05b27e7745d5743f547b208
                                      • Instruction ID: b6cd2c54e4165a2c69853c887862e7e41f65797c82941f7a872e473444d3d875
                                      • Opcode Fuzzy Hash: 4da1111b606845de5035f384ec32bd141da47d66f05b27e7745d5743f547b208
                                      • Instruction Fuzzy Hash: 15E01239705114274615269AB8C4C3FBBAFE7CD6A5354416AFA09C7345CE519C1287E1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 218c161eba586f92e28f4b6d0482754cd9835a4f3285d7dd703bc3090b37d2de
                                      • Instruction ID: 4113866c25c45313434879279af8a2dc0186470f4c01456e7e8b24bbe7e9a543
                                      • Opcode Fuzzy Hash: 218c161eba586f92e28f4b6d0482754cd9835a4f3285d7dd703bc3090b37d2de
                                      • Instruction Fuzzy Hash: 64E092355081149FDB01CF54E901A6AB7E6FF85700F00469FF80497310DB329D1ACB63
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5599f63cac5a2defa685fd326d6940cf937cde26685704752067e8dcbd10245a
                                      • Instruction ID: f6a67d7f91544cbad8fcbcc22ac99efa210a4487b64d6da597b8da6c6776f3b5
                                      • Opcode Fuzzy Hash: 5599f63cac5a2defa685fd326d6940cf937cde26685704752067e8dcbd10245a
                                      • Instruction Fuzzy Hash: 7AE0923A504114DFCB00DF54E900E6EB7F6EF88B00F00899FA84493210DB369D16CFA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 12e126b056f4f72d9bf0e597a75731ad268fd419bce075a33564090f06039326
                                      • Instruction ID: bff0b7b44bbfc74b6e730700f463c9c078ca63d231b07a6f1db1a4ed85ee8c83
                                      • Opcode Fuzzy Hash: 12e126b056f4f72d9bf0e597a75731ad268fd419bce075a33564090f06039326
                                      • Instruction Fuzzy Hash: 1AE09A39A441908FC7859BBCE0A9AE83FF0EF4E21474604E9E44ACB363CA209813CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e5caad62fed701a75d2c5db091a94ae851251d22697597c3269e3394fcffc357
                                      • Instruction ID: 19dcaec0b0d9941f788dfc6975e2d5b0b73b6540180c8f24a85bc2ed777c9e75
                                      • Opcode Fuzzy Hash: e5caad62fed701a75d2c5db091a94ae851251d22697597c3269e3394fcffc357
                                      • Instruction Fuzzy Hash: 8FE086B31000587FD700CE84CC51FB67BADDB99261F08805ABD54D6342C676DD22EBB0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 664f35d6e9b6a0b8d0af0c68ad880da06b61d7390ef2d4ad81f92f49d285d556
                                      • Instruction ID: ab42ce4db648e4beb32346b8b6c2f302b8672c3b12da0919521848ec76e6fc6f
                                      • Opcode Fuzzy Hash: 664f35d6e9b6a0b8d0af0c68ad880da06b61d7390ef2d4ad81f92f49d285d556
                                      • Instruction Fuzzy Hash: 83E04F721040A87F8B41CE99CC10DFB7FED9A4D111B08804BFDA4C2242C57AD922EBB0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 57c7cc6f4bd77637b09f07d9cd2a38d9dc99ffb8763cf703fc9b683a480210a2
                                      • Instruction ID: da1b3b1566638ac64bab14013681e9aedd2b59842f0eae5f8fa11a6a90bb8313
                                      • Opcode Fuzzy Hash: 57c7cc6f4bd77637b09f07d9cd2a38d9dc99ffb8763cf703fc9b683a480210a2
                                      • Instruction Fuzzy Hash: 7EE01A34A11118DFCB44FFA8E94096E77FFEB88304B5041A9D90A97359EE75AE11CB82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f90695a2f390e9ef13cb80685542f26cf74424575ec3fdb30062d632a97e6b2d
                                      • Instruction ID: 1f0e0721dc279f96404b72f501db7fd0427cf96ce71ee8a0eeed14afccc17498
                                      • Opcode Fuzzy Hash: f90695a2f390e9ef13cb80685542f26cf74424575ec3fdb30062d632a97e6b2d
                                      • Instruction Fuzzy Hash: CCD01232314114A7C705698DE844EBF7B5FE7C9B21F448026F60687344CE759C125BE0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d6a75ae764199fe99b308aac3a03996e2305893a35d3d30e9a0e5b935e48ad4c
                                      • Instruction ID: 919e9a273eb9ae310733978cd142bb3cfe16135100be88fc7f90aff3d38de2fd
                                      • Opcode Fuzzy Hash: d6a75ae764199fe99b308aac3a03996e2305893a35d3d30e9a0e5b935e48ad4c
                                      • Instruction Fuzzy Hash: 32E012B66493904BD3C2CAA4EC51491BB72EF9A5107058CDAE85987352DA13C91BC761
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8fe881f4e538d5261b30772029c5381cb629c382349b6402aedb8cbd5e39ba98
                                      • Instruction ID: fafb2e647375dd22451c62ca28c0693e46e82c48a8265b657a8fc6403ae5c6df
                                      • Opcode Fuzzy Hash: 8fe881f4e538d5261b30772029c5381cb629c382349b6402aedb8cbd5e39ba98
                                      • Instruction Fuzzy Hash: EFE08C36100158AFCB01CE88CC11AA67B69DB89220F28845AFD5487342C6B2EC22E7A0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c7df2adfa1e2c55bb6307693051c7137472f7ec2fb18c70666fd62398011666
                                      • Instruction ID: 6bf06cfc1c5994269ab7fd37740340e218dbec4edcda89fa453b012e138c0284
                                      • Opcode Fuzzy Hash: 8c7df2adfa1e2c55bb6307693051c7137472f7ec2fb18c70666fd62398011666
                                      • Instruction Fuzzy Hash: BEE086721052486FD703CE94CC00C957F7AEF96250B09848BFC4497252C672DC22D790
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 75ead94c8e53b9f3493e9c940c65ea9ea50ffff30ed10f9b90cf9d3853cfcb46
                                      • Instruction ID: 3fb1d3643bb4f7a6cfd0a5b4fca6a18fa6c26e17d8e542f67aed66a9f8483dc8
                                      • Opcode Fuzzy Hash: 75ead94c8e53b9f3493e9c940c65ea9ea50ffff30ed10f9b90cf9d3853cfcb46
                                      • Instruction Fuzzy Hash: FFD05B3DB4463DCF42596E699844D6977E5AF8D76530505A0ED09CB360CF64DC4087D1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2865410cf2a23ffd7ad7591f6b19b4a8edbf2835667f1f8d689cfa97cfdfb19b
                                      • Instruction ID: 70fd6f9c5ac1bdc794ef3732baeaf15368b9e8a8034806b9b07383b5e13aef97
                                      • Opcode Fuzzy Hash: 2865410cf2a23ffd7ad7591f6b19b4a8edbf2835667f1f8d689cfa97cfdfb19b
                                      • Instruction Fuzzy Hash: F4E01A34A11208DFCB44FF68E94186E77BFEB84304B4004A8D50AD7218EE356E11DB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9437ad46dd07726988163f30a60a380ce19050c70b4d80ddb21aba84ae321c5d
                                      • Instruction ID: 2666ed1954615de4942946702e371b3c53f0dee0009cb1c171ce177e1dffd936
                                      • Opcode Fuzzy Hash: 9437ad46dd07726988163f30a60a380ce19050c70b4d80ddb21aba84ae321c5d
                                      • Instruction Fuzzy Hash: 29E012B510C2429FC242DF65D95089ABFB1EBD5A20705C98AF460562E2D9218D1AD722
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a57d2d55cf326725ef195d409c217b8e6a862c7a3f203b1f03a19a87aa05e63c
                                      • Instruction ID: 2c956cff2a485152400462a19046674f417a895006d51b9a157bd83e72dda23c
                                      • Opcode Fuzzy Hash: a57d2d55cf326725ef195d409c217b8e6a862c7a3f203b1f03a19a87aa05e63c
                                      • Instruction Fuzzy Hash: D3D05B7B85010CAFDF41EAA8CE4175D7BFEDB45200F5405A55418E7211FB3D9B115752
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c5d7de3237b370936afe313def22fe190943721a666d39ccefa211a8f3109384
                                      • Instruction ID: ba15b268bc84810440d921e0b45ef4884bf4df05878fc71309c0122934f3319f
                                      • Opcode Fuzzy Hash: c5d7de3237b370936afe313def22fe190943721a666d39ccefa211a8f3109384
                                      • Instruction Fuzzy Hash: EEE08634B842404FC705D778E860A0977D2FF85304B58916D9814CB2AADB31D803C784
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d5b59ee1285b90c6e278784ea278bf5169d12da9c6ace79a349ea37192618f53
                                      • Instruction ID: dc6d817c2e3118bc8bc08062b8f5af7395634a080690aa8fc33fbe22153c0db2
                                      • Opcode Fuzzy Hash: d5b59ee1285b90c6e278784ea278bf5169d12da9c6ace79a349ea37192618f53
                                      • Instruction Fuzzy Hash: 84E01D666040A45EDB51CED5D811FF67FDD9B5D111F088087F9A4C6142C579C511D770
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 370b9c53a30a7b4c205bdb080f88f14fddf7bb707ddc623399fe750bae77b7e4
                                      • Instruction ID: 268fb7fe9f39c96bd79b26ca6d760c1a020485ee10dd61f81134559b624a7e69
                                      • Opcode Fuzzy Hash: 370b9c53a30a7b4c205bdb080f88f14fddf7bb707ddc623399fe750bae77b7e4
                                      • Instruction Fuzzy Hash: 3DE012721041A83F8750DA99DC51DBB7FED9A4E121718C09BBD94C7242C565DD1197B0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 634b8b6328f87344819c755c63663415d51adcd12c8a2de45a78852b1841f4d5
                                      • Instruction ID: 68d1907f784317e677148aec6f65122ff075b3d4cb9a90b49785eb3ea4860c75
                                      • Opcode Fuzzy Hash: 634b8b6328f87344819c755c63663415d51adcd12c8a2de45a78852b1841f4d5
                                      • Instruction Fuzzy Hash: D3E0B632100119BF8F018E84DC41CEA7B6AEB9C260B14801AFE1456221C673D832EB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6f66fad1e8403919f85446dba622ad4c9de823a1eef9f33e874550cf85a32c57
                                      • Instruction ID: 35f40dcd9ade717c57c4bfa7fcf28fb46997cde2d91247b9869b068bc0745021
                                      • Opcode Fuzzy Hash: 6f66fad1e8403919f85446dba622ad4c9de823a1eef9f33e874550cf85a32c57
                                      • Instruction Fuzzy Hash: 56E02B397482944FD7016F78D8580893FB1AF0731670800E2E048CF272EE248C028B92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 49bec1adbdd607e6d40542e0f5ee0b269763f6f04078961a161352a179076708
                                      • Instruction ID: b7c15f5d6199f36f7ff641d71568f529fc96a3582e1d2df4f696ef0e7959edf5
                                      • Opcode Fuzzy Hash: 49bec1adbdd607e6d40542e0f5ee0b269763f6f04078961a161352a179076708
                                      • Instruction Fuzzy Hash: 05E0EC721041586F8B41CE89D811CB67BADDB89260704805ABD5486251C672DD229BB0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a8e2869a3afbe9af28b473b636aed89354cbd2061cd8bfc760e64b876deb78e5
                                      • Instruction ID: 5ffbf746aedd02beee038126ebb7434ed0446538cd87c6cc494697cfdbe4e50a
                                      • Opcode Fuzzy Hash: a8e2869a3afbe9af28b473b636aed89354cbd2061cd8bfc760e64b876deb78e5
                                      • Instruction Fuzzy Hash: 3FD012721041A82F8750CA99D810DB77BEC9A4D121708C05BB994C7242C565DD1197B0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5bd5e710004956d66dfe3e2215aab6d0f81319c1ea20041723a612196364da64
                                      • Instruction ID: 0e78a27741c7657a89158647ee5ee4e5ddb29d7e211c5697c5f048b27a1ad32d
                                      • Opcode Fuzzy Hash: 5bd5e710004956d66dfe3e2215aab6d0f81319c1ea20041723a612196364da64
                                      • Instruction Fuzzy Hash: 1BE02636100119BF9F059E84DC41CEA7B6AEB99664B14805AFE1556221C673D932EB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ee6ef33d8e28933248e6c6088b2621d6d46389d20ae1d7bf49f26239ca62b98f
                                      • Instruction ID: 5204a58ee5f24c765a8db093eb3f3ab0db9c19d4e9303ff5768a022aae514c97
                                      • Opcode Fuzzy Hash: ee6ef33d8e28933248e6c6088b2621d6d46389d20ae1d7bf49f26239ca62b98f
                                      • Instruction Fuzzy Hash: 63D012F36142105BD244D948E855A9AF765E7D4314F15881BE81087304C6A2DC56C761
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c4be00d91c9122165574cb2bd97cb4fa320002a503ab894ca3672f4e6fd1b7e
                                      • Instruction ID: 862550c9cafb6b8b35aa07bb20cc779bb3a475cc24f3a4f4c4354907e7ef8693
                                      • Opcode Fuzzy Hash: 8c4be00d91c9122165574cb2bd97cb4fa320002a503ab894ca3672f4e6fd1b7e
                                      • Instruction Fuzzy Hash: E4D0C2763042404BC6418B60D8545A9BF62DBD411AB04C4ABD44987292CA328903CF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f719c54c47867651b667420d36212038f6145ea56772a2144b5ba510ec795045
                                      • Instruction ID: ca6a23e6b21a41a74e77ed762d814b1058e4dcb49834c1fb83b2533a82a7b8ab
                                      • Opcode Fuzzy Hash: f719c54c47867651b667420d36212038f6145ea56772a2144b5ba510ec795045
                                      • Instruction Fuzzy Hash: 6FE0C2B5944308BFC701DBB4991086A7FFADF0620078102EB9908DB191EA354A149B92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a8e6a07dc12e02ad3e5ed504a5308a9fd4191ff32c073443818bcad8348e5d37
                                      • Instruction ID: 74bd5e682b91a2d78f462f720d40d5774850364329bd47b2e62bddd07364fa43
                                      • Opcode Fuzzy Hash: a8e6a07dc12e02ad3e5ed504a5308a9fd4191ff32c073443818bcad8348e5d37
                                      • Instruction Fuzzy Hash: B2D012321001187F8B01CE84DC01CA67B6DEB89260704C056FD1487211C672DD22DBE0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f88a6081c7b9d1d35f84f8a16a5147ee3227c5e301f81bdf8519b9df63361026
                                      • Instruction ID: c0f7bd7456a58de2f8d94fe7786f8dfdadb350ba88d33c38d5cd3b7aec1b4fee
                                      • Opcode Fuzzy Hash: f88a6081c7b9d1d35f84f8a16a5147ee3227c5e301f81bdf8519b9df63361026
                                      • Instruction Fuzzy Hash: 08E086325181448BC301DB2CC851B95B7B4DF86200F0C899EE44067210DB61E845C751
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1fd753c0bfbcbf3f5de1626f0647e1218d0c6153fa5ebb1c0d299c5b22bf09e5
                                      • Instruction ID: 7ea918630c17d9a1a83b5890c3a49781d12c8b5b49a149f9012635aec280aa36
                                      • Opcode Fuzzy Hash: 1fd753c0bfbcbf3f5de1626f0647e1218d0c6153fa5ebb1c0d299c5b22bf09e5
                                      • Instruction Fuzzy Hash: 67D017B23180409BD649A65CE895BEEB756DB94700B948429E2028738ACA659822CB95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bc07454ede8f528791dcc5d6f048360ad328c2a4fa70c34f29411287676f06a8
                                      • Instruction ID: 5c8cb5414e955fa5233421e41d3fd52fd66150915b2a03b99bc97904fe012a23
                                      • Opcode Fuzzy Hash: bc07454ede8f528791dcc5d6f048360ad328c2a4fa70c34f29411287676f06a8
                                      • Instruction Fuzzy Hash: 2ED05E721181911BD340CB58C8A2AB7FBE8EF8A118F2C8C8EE4D0C3341D755DC12C7A0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3ed9f6e19119b712b19e4fb8f256090207ef2c22f03449da3d78005dcdc89471
                                      • Instruction ID: 95251f1481c62d7ac7cc8b06c9ccb15b618c5cbb2071c4535ed82918e6a8a169
                                      • Opcode Fuzzy Hash: 3ed9f6e19119b712b19e4fb8f256090207ef2c22f03449da3d78005dcdc89471
                                      • Instruction Fuzzy Hash: 1DE086351092D46FD742CF94D9508A67F759B45214708C49BF89487153C5728D22EFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 98d77450f1478b2f27c769f1030c9cee2c9d253487dd9550957ba06a1da8a0e3
                                      • Instruction ID: 15d5fc096ea52df5729892e2c2f3ef566b13d10162e5c16878456403bea1322f
                                      • Opcode Fuzzy Hash: 98d77450f1478b2f27c769f1030c9cee2c9d253487dd9550957ba06a1da8a0e3
                                      • Instruction Fuzzy Hash: 58E012396401149FC784EB6CE558E5977E4FB4D22178240A5E50AC7355CB249C018F91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dd80a02ff4f6eacf62041afa6a7434b2b32869d6d0a5356a9467f282bfb3b4c9
                                      • Instruction ID: b0f8d065ffdfffec5fd1d4d137ea261d635092868af1fb0f64b8216b7689ddc4
                                      • Opcode Fuzzy Hash: dd80a02ff4f6eacf62041afa6a7434b2b32869d6d0a5356a9467f282bfb3b4c9
                                      • Instruction Fuzzy Hash: A2E0867DD882A0CBD3419F69945C3267291EB48715F4A81B5CC49D7285DB3C48028A91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fc75d740e95971e3062f19454f5bb7135d0d1f9d368caee40995ad66aecc0c0e
                                      • Instruction ID: 0d62521b72087ad817b1b82d60a1bc9262cee9061dbbb685590d6b88b7c08f95
                                      • Opcode Fuzzy Hash: fc75d740e95971e3062f19454f5bb7135d0d1f9d368caee40995ad66aecc0c0e
                                      • Instruction Fuzzy Hash: A0D05EB110C3805FC381DB64C894896BBB6EBD6644B1A888AE484872A2C722CC0BC721
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c028f8c05080fe640835760c394ea6da55831368b07eb1c2847945d2a1e9853
                                      • Instruction ID: 194bd592818fd6242d7b59117f234364f3f226fdeca7c7eef0f0f4b44842be79
                                      • Opcode Fuzzy Hash: 8c028f8c05080fe640835760c394ea6da55831368b07eb1c2847945d2a1e9853
                                      • Instruction Fuzzy Hash: 07D05B752083414FC641DA58DC504A9B771EFD5530705CD5BD460472D1CB128C0BC721
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cddbc6da9e7ec79a21828201d82a63c5fef1888125d8ccead103b3af9e1dcd8f
                                      • Instruction ID: 5bcb31cf934ba789ae2d0c823d2afb982b9f0294e71a47ed6a25a91d6c10ed5c
                                      • Opcode Fuzzy Hash: cddbc6da9e7ec79a21828201d82a63c5fef1888125d8ccead103b3af9e1dcd8f
                                      • Instruction Fuzzy Hash: BCD05EB260420547D641DE44E851A52B7A2FFD5214F18888DEC149B742C723EC2B8B91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4d7eb9b5004ef3435612a12ac9d8e3b6d077dbad8d4e0b1dcaf805aed9cae0fa
                                      • Instruction ID: a21c3769e43812b2c12ea7c1bad4cefbacc223444552d0c75227eb596df58253
                                      • Opcode Fuzzy Hash: 4d7eb9b5004ef3435612a12ac9d8e3b6d077dbad8d4e0b1dcaf805aed9cae0fa
                                      • Instruction Fuzzy Hash: CDD09E761142119FD358DB48DC92F66B3A9FFC4318F28C85EE89183340D765EC26CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c60a704ef1626963a63f137d4959bf871652333cdb206336b00e47869390c8bb
                                      • Instruction ID: 3a650636752adbe3aaa9dd9fcd47a44dd0cc13e0c99513b4f7f3c1d523ed9760
                                      • Opcode Fuzzy Hash: c60a704ef1626963a63f137d4959bf871652333cdb206336b00e47869390c8bb
                                      • Instruction Fuzzy Hash: B5D05E7150C3C14FC382DA64D8109C1BF72EFD6A0470A8C8AE88087253C7229C0BC761
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 23eff9baeda3ebf7225464ffe4e76638ce36b95c14eef2696aa629267cbdfd54
                                      • Instruction ID: 15bcb119607ec2a6f6a33acd040aad27a708a17b0c4b7d7c1f379ecbc21b5d9d
                                      • Opcode Fuzzy Hash: 23eff9baeda3ebf7225464ffe4e76638ce36b95c14eef2696aa629267cbdfd54
                                      • Instruction Fuzzy Hash: 85D05B765093405FC241DA68E8504857B71ABD6504B468C87E4C0C7253C712DD0BC751
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8ab869af69afa5e3705abfa003fbeb05737d94153e11a484e1e7a4c73e3e153c
                                      • Instruction ID: d8e6f52d84d0e9a7535ad6c92223e7db018a165c074aefbb2bfd7201b7f166f6
                                      • Opcode Fuzzy Hash: 8ab869af69afa5e3705abfa003fbeb05737d94153e11a484e1e7a4c73e3e153c
                                      • Instruction Fuzzy Hash: D3D05E322001187F8B00CE88DC00CA67BADEB89220B04C05AFD5887241CAB2ED22DBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8404fe3e9ffa5fd25cc04cd593f64656398a3d45209ae1175c4332bca1eab800
                                      • Instruction ID: da2987e753ad50b56341bc16cba31b61863a804ac9f5e31b4298e9f8ae536a3c
                                      • Opcode Fuzzy Hash: 8404fe3e9ffa5fd25cc04cd593f64656398a3d45209ae1175c4332bca1eab800
                                      • Instruction Fuzzy Hash: 05E0C27580A104DFCF01CBA4DB109ADBFB0FF4920171005EBD405E7121E9364A14DB02
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ad592c1fca8e6c612192cfefc2ca52efe625a843052d27f32999fb5809da10dc
                                      • Instruction ID: 045e65347fd308ef7742c67507d6a79386c07cf928135cf321030126c5582f42
                                      • Opcode Fuzzy Hash: ad592c1fca8e6c612192cfefc2ca52efe625a843052d27f32999fb5809da10dc
                                      • Instruction Fuzzy Hash: 3CD0C2759091889FCB01DBA8DA0049EBFB19F0520074101EBC444DB122E9354A088743
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9dce517a35ddb31469afb28722cf79c466662e69207419c720ad7bdb77c04b7b
                                      • Instruction ID: e6b58ae8775f9b589b13e5a178578a2d321891d846690e3638e28dbaab16892d
                                      • Opcode Fuzzy Hash: 9dce517a35ddb31469afb28722cf79c466662e69207419c720ad7bdb77c04b7b
                                      • Instruction Fuzzy Hash: A5D0A7B0A092800FC382C270CC68401BFB09FE6D4431AC9DEE484CB2D2D9218907D711
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8a6305cdf9e8529f5787785aae0087a62ce7c4f8e1443984f732c58d5b50b09a
                                      • Instruction ID: e93e70d1afc6f7a07d5b05b45b89caa7dce120f9509c3fd19d5de0b9b804997d
                                      • Opcode Fuzzy Hash: 8a6305cdf9e8529f5787785aae0087a62ce7c4f8e1443984f732c58d5b50b09a
                                      • Instruction Fuzzy Hash: A5E0C27510D3405FC342CF60DD40849BFB2DFC6A20705C98EE460562D3C5228D0BCB62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 44ba782675fcdd8aff74ea6f0a83c41e2cb3e78684efea51cd70aa7f2296677b
                                      • Instruction ID: 877f0f7dcd895513f3842dead994786ff947c22c1e70ab8d1161cd6d10d093a9
                                      • Opcode Fuzzy Hash: 44ba782675fcdd8aff74ea6f0a83c41e2cb3e78684efea51cd70aa7f2296677b
                                      • Instruction Fuzzy Hash: 04D09E36200118BF9B05DE84DC41CA6BB6AEB89660B14C45AFD1547351CAB3ED22DB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 09dc1fee9593ef5cf39e4f9c6e1c76270005efabd1be53d3faf6f8cac9ce2e25
                                      • Instruction ID: 89890c46944c931701e0b93bad2929263cc91018a4e6fdc9f10c1f4a7097f77f
                                      • Opcode Fuzzy Hash: 09dc1fee9593ef5cf39e4f9c6e1c76270005efabd1be53d3faf6f8cac9ce2e25
                                      • Instruction Fuzzy Hash: 13D017312081119FD201CB48E948E5ABBE6EBC9B14F15888EE4405B255C6A29C13DB62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 74725f531f6cbca2db8a72776655834748e1b21725b00a264ddcf8834067fb27
                                      • Instruction ID: e7b67c5b6f3eea8412a701ea9c684ec7472ee07d84b08a1496b00addd42103e3
                                      • Opcode Fuzzy Hash: 74725f531f6cbca2db8a72776655834748e1b21725b00a264ddcf8834067fb27
                                      • Instruction Fuzzy Hash: 21D0A77180010CAFCF01DFE8D95069EBBFDDF452007A005E5D504F3210FA355A109792
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ec5d0044e3c2a6d3c2a48e4e58054b04eed4a9867d30759385bb1ff4eaa512d0
                                      • Instruction ID: 19be02e7b0570c44817d82d1775ba2c77822b7e89f6eae4bbee4e8f5620b165f
                                      • Opcode Fuzzy Hash: ec5d0044e3c2a6d3c2a48e4e58054b04eed4a9867d30759385bb1ff4eaa512d0
                                      • Instruction Fuzzy Hash: B9D05B7160D3525FD355C604CC54C66BBA5EFC5314B15889FF45087656CB698C07C761
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 53a3019e676f3bafe2916118db5871fc201081e9aad418f76e653bf3fd65c3ea
                                      • Instruction ID: fb5a26d56ad76a3e30e49eada5c5150ac5ccc4845a81d9969abba381f79e2d3e
                                      • Opcode Fuzzy Hash: 53a3019e676f3bafe2916118db5871fc201081e9aad418f76e653bf3fd65c3ea
                                      • Instruction Fuzzy Hash: E1D0C97520A2444FC382C660C854556BFB59F9611171AC59BD489CB293CA269C07C791
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ab2cc6aee497696666f7a107985ec7ad55e609b6f37452c1790b361bb4aca2e8
                                      • Instruction ID: 07c8ed7d0f9973dfaa1fa20bacc4603f4c8439a4f44c732da13e49590b21c5dc
                                      • Opcode Fuzzy Hash: ab2cc6aee497696666f7a107985ec7ad55e609b6f37452c1790b361bb4aca2e8
                                      • Instruction Fuzzy Hash: C0D05E7AA082505FE244DB04E882B66B7A5FBC5200F08C88EE89443301CB61EC42CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b0a2e4a5bdf741079c1f1771c310f968e8a0134e46f868ab843d2ccd0e66439d
                                      • Instruction ID: 03f0624dac58c6a070a2eebbef1cb379b27a856f4a9f1676ba0697a3d685e964
                                      • Opcode Fuzzy Hash: b0a2e4a5bdf741079c1f1771c310f968e8a0134e46f868ab843d2ccd0e66439d
                                      • Instruction Fuzzy Hash: 83D0C27120C2405FC341CF58D9A0D5ABBA58BC5620704898EB8A0821C6C525DC07CB32
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 12a626dee0f6061a1a1bba870c1221f8a662b02dd499ea1a0b5a6d4d01d9836b
                                      • Instruction ID: 910cf9776aba2709ef088d74e2ccb3a8ba241357400932d4e776d6dd47249097
                                      • Opcode Fuzzy Hash: 12a626dee0f6061a1a1bba870c1221f8a662b02dd499ea1a0b5a6d4d01d9836b
                                      • Instruction Fuzzy Hash: 9ED0C77694110CAFCB00EFE8C94155F7BFDDF4920079045E5950DD7210EA355B105792
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b30043610113ac1ae1c52aefba5170a79ec335e22683c0b3e62044c6a2778121
                                      • Instruction ID: 7925895959e2cfdbe8242facf7ea485dc86374aab37b418f6ff0f7ce7ce21718
                                      • Opcode Fuzzy Hash: b30043610113ac1ae1c52aefba5170a79ec335e22683c0b3e62044c6a2778121
                                      • Instruction Fuzzy Hash: 4CD0C93AA150148AD745CB68F891688B371FBC86A9F1482AAE918C7151EB329517CB41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0a6c6621da86a5809af16484cf72af008eb6c81f3636b307f71a7005080693bb
                                      • Instruction ID: 94a088f29cfe9b8c26649b96f354f152ae5d3017778aaa77f20b81586065f253
                                      • Opcode Fuzzy Hash: 0a6c6621da86a5809af16484cf72af008eb6c81f3636b307f71a7005080693bb
                                      • Instruction Fuzzy Hash: 3FD0A77180010CFFCB10EFA8CE0095E7BFEDF44200B9102E59404E7210EA355A005BD2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1247021079af8ddeaf08f50173653d85b58649bcd4882df303f03bb6ae1e31aa
                                      • Instruction ID: 45337b9aa159a1b9290066e97b417cbf5ad02fb287860fab98b8008c795475d9
                                      • Opcode Fuzzy Hash: 1247021079af8ddeaf08f50173653d85b58649bcd4882df303f03bb6ae1e31aa
                                      • Instruction Fuzzy Hash: 1CD05E761081109FD200CA54E981F1AB7E5DFC8A10F18C84EB84097351D663DC17C762
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 42fd247b915573d456279d0c87d05c783a5463724d6bf84aca3f29986218056c
                                      • Instruction ID: f35c83d55daf3b4599ed22cde20fc59f9eeee6e3565f339d8f0d9829ab74faf4
                                      • Opcode Fuzzy Hash: 42fd247b915573d456279d0c87d05c783a5463724d6bf84aca3f29986218056c
                                      • Instruction Fuzzy Hash: C7D0A7775042105FE340CF44C841AA6B3A5FBD4704F28881EF81083300CB62DD07C750
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7b8c0f8170efad9b20adc434118d9abd995b47696a9c4dbed277a3d513921ef2
                                      • Instruction ID: 7d90c673cb843a057c3789e06ef18bf189a1950845421659411aa27657f072b1
                                      • Opcode Fuzzy Hash: 7b8c0f8170efad9b20adc434118d9abd995b47696a9c4dbed277a3d513921ef2
                                      • Instruction Fuzzy Hash: 90D0A77684010CAFCB01EFB8CA4056E7BFDDF4420078041E6A804F3210FA395E0057D2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1b616ca033596dafa55274a3b8ae9db77162423988e3aafc2124094f10a4a30e
                                      • Instruction ID: bb4c6f455bf1e86e3f245b0dbf6f6d0add77cdded6a9e59fd51cabc3ac34e39f
                                      • Opcode Fuzzy Hash: 1b616ca033596dafa55274a3b8ae9db77162423988e3aafc2124094f10a4a30e
                                      • Instruction Fuzzy Hash: 2BD0C97194120CEF8B00DFA4E9019AEBBFEEB49214B1045E6EA09D3210FE355A14AB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ebeb89d373e8cbd855456b1e5d8261725191ce5136eb73da821d1f95c7c4bd9a
                                      • Instruction ID: 19ab39aa5c2b1350cf0df35a0be30dd57a360d9815d7e29bccf06f0cc24939a8
                                      • Opcode Fuzzy Hash: ebeb89d373e8cbd855456b1e5d8261725191ce5136eb73da821d1f95c7c4bd9a
                                      • Instruction Fuzzy Hash: 02D0C97594110CAFCB10EFA8DD009AEBBFEDF49200B9046E69909D7210EE355A109B92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 83ca4de69c8eee25dacc93efac2ae6798cc8912ee8739bae348875322567b422
                                      • Instruction ID: aeb4e18a26f19fc0b301973d5f2307ce834281c859c98843c08f4e9e0a039963
                                      • Opcode Fuzzy Hash: 83ca4de69c8eee25dacc93efac2ae6798cc8912ee8739bae348875322567b422
                                      • Instruction Fuzzy Hash: BED05E7960C3C15FC346DF6488A0956BB71BFC62307058E8FE8A08B2D6CA21DC07C721
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dfac3f10ecf37b112b55c692512f7778d99e11b4592794949f7cf8189365b6f9
                                      • Instruction ID: 137792cdc1c8a35273be5715e01a4c8c1f97277a9cf92c522f37f61f9cf1bdab
                                      • Opcode Fuzzy Hash: dfac3f10ecf37b112b55c692512f7778d99e11b4592794949f7cf8189365b6f9
                                      • Instruction Fuzzy Hash: 59D0C97594110CEFCB00EFE88A1199EBBFEDF49200B9046E69908D7210EE355A10AB92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7b3a3f65c19d197807b40478617315f8c656adcce861b033c73945bc44e2e942
                                      • Instruction ID: 3dd8c56f3e08ea3eac1b13e301ebf7410b7820c4e58eef1e27f3ac977c8ebda7
                                      • Opcode Fuzzy Hash: 7b3a3f65c19d197807b40478617315f8c656adcce861b033c73945bc44e2e942
                                      • Instruction Fuzzy Hash: 9CD0C77594110CAFCB00DFE8C90155E77FDDF4520075045E59509D7110EA355B105792
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 048053144c151d835a8dc51c0904f718331c9d76de7494aca7b3df937feef744
                                      • Instruction ID: f91b356334e042e8297d80d11540b68749db44ad6875d506cae8eb50d65c9d05
                                      • Opcode Fuzzy Hash: 048053144c151d835a8dc51c0904f718331c9d76de7494aca7b3df937feef744
                                      • Instruction Fuzzy Hash: 64D0C77594110CAF8B01DFA8890055E77FDDF45200B5046E59504D7110EA355B105792
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aa904ec04e08125a11926b2bce5133d6e6e9bfea4a587c0d393a0771950f3971
                                      • Instruction ID: c1cee0328571f4f21f5ad203b57a318353a4107fedf81193fdcc06c11c00d3ed
                                      • Opcode Fuzzy Hash: aa904ec04e08125a11926b2bce5133d6e6e9bfea4a587c0d393a0771950f3971
                                      • Instruction Fuzzy Hash: 6BD0C77595110CAF8B10DFA4990055EB7FDDF4520079045E59504D7110EA355A105B92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 45484448cb64b18c793ac27b05560e87250e296b9481d277c4ab2c2644560e83
                                      • Instruction ID: 74ff0dd41168a834d856d54cb322de3ae3944ed96fa5ad578d28e1e6d844ba79
                                      • Opcode Fuzzy Hash: 45484448cb64b18c793ac27b05560e87250e296b9481d277c4ab2c2644560e83
                                      • Instruction Fuzzy Hash: 53D05E7910D3815FD341DA64E910892BB61ABC5204B15884FE88083286C622C91BCB71
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d55c26dff63e39c69744ad3fae76a6bba79f85de3801b898aa197068ae95ae68
                                      • Instruction ID: 10990026b25e4d81c2dc525784aa3897b66a3194e796bf5a4358ed13a64cc428
                                      • Opcode Fuzzy Hash: d55c26dff63e39c69744ad3fae76a6bba79f85de3801b898aa197068ae95ae68
                                      • Instruction Fuzzy Hash: 6BD0A772504110AFC200CE04E940C26B3F6EBD8600B05840EB40063300C762DC06DB72
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6686bd1b80655eab1ee194a80cb490c64c488c569f7823a84185efbe4b6ba5e7
                                      • Instruction ID: 5baee7cc0b0d8cf888c725a1f80e8c9bfc2500eb8b289e8ff10018f406022340
                                      • Opcode Fuzzy Hash: 6686bd1b80655eab1ee194a80cb490c64c488c569f7823a84185efbe4b6ba5e7
                                      • Instruction Fuzzy Hash: 66D0C97594110CAFCB01EFA89A0099EBBFEDF49200B9146E69908E7210EA355A14ABD2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8179cbff29ae22e2b9fb09b656978abb7d36131cb3e2ea1afaca8869f4ca66fa
                                      • Instruction ID: 8c3528b762a912d0deb74afab60a5ebac44ab53032d4040f8dd552f579a6ef07
                                      • Opcode Fuzzy Hash: 8179cbff29ae22e2b9fb09b656978abb7d36131cb3e2ea1afaca8869f4ca66fa
                                      • Instruction Fuzzy Hash: D5D0C9713412009BC344CA24C896B25B3A1EBD5324F24C47CA808CB360DB3EEC0BDA10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f1a26d34fd6f9fe7ae9e470a6bd6cbc8b78bc1605dfcf13ad5ff1642b2dd94f6
                                      • Instruction ID: 3431f163010644519c2ca26567a503382a7ff1639c9b6028a0202c4e451efb14
                                      • Opcode Fuzzy Hash: f1a26d34fd6f9fe7ae9e470a6bd6cbc8b78bc1605dfcf13ad5ff1642b2dd94f6
                                      • Instruction Fuzzy Hash: DFD0C97594110CAF8B00DFE8D90099EBBFEDF49200B9146E69908E7210EA355A109B92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fcaf93c0f87f41ace20546147fb097b2092566db94148271ef7a00567d98a9d4
                                      • Instruction ID: 88a0325cf0708b0c3424bf8231c58f8fbe8a57db25e62e6198a543356a2a111c
                                      • Opcode Fuzzy Hash: fcaf93c0f87f41ace20546147fb097b2092566db94148271ef7a00567d98a9d4
                                      • Instruction Fuzzy Hash: 80D0C9756092805FC346C664CC65821BFB1AFDA100719C4EFE488CB3A3DA26DD47CB66
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ca01dc930ca4817c6e01b502a57e2fdcea0e6561c100d4b96921084e024c0670
                                      • Instruction ID: a16d7986ebc2bcdd83ca5ad18d672c92eccc2e5b7453505adbf25475fda1a279
                                      • Opcode Fuzzy Hash: ca01dc930ca4817c6e01b502a57e2fdcea0e6561c100d4b96921084e024c0670
                                      • Instruction Fuzzy Hash: 01D0C97560E3805FC346D770C864865BF71EFA7244B2AC4DAD885CB2A3DA629D07CB62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7a781c1a6d06fce8584d93ad96957df940f7e854fbe6024760991abf410b162b
                                      • Instruction ID: dfb295d84e0ec2ca7f004ad1020c1e6dc6cfc7f2618a6508f3f44c0590bf351f
                                      • Opcode Fuzzy Hash: 7a781c1a6d06fce8584d93ad96957df940f7e854fbe6024760991abf410b162b
                                      • Instruction Fuzzy Hash: 96D0C77994110CAF8B01DFA8890055E77FDDF4520075046E59504E7210EA355A105792
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 030a1f0e7115cf809657ccddf58d4bde88f0601cf305ab7736a9aabdd4d216a9
                                      • Instruction ID: d7a4b2faec8533bc1f95b34c1142406ec250603ed5f95787b7f7e013b6680772
                                      • Opcode Fuzzy Hash: 030a1f0e7115cf809657ccddf58d4bde88f0601cf305ab7736a9aabdd4d216a9
                                      • Instruction Fuzzy Hash: BCD0C77594110CAFCB01DFA8990055E77FDDF4520075045E59504E7110EA355E1457D2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 33e07de4b97ec2e796a5acde3ced142022dbfbd9d3ebf93fab85ba90e28871f5
                                      • Instruction ID: ec671399d24ff6161ffb36ddea61bcd20594e6c9339121f1e11275433fafaf46
                                      • Opcode Fuzzy Hash: 33e07de4b97ec2e796a5acde3ced142022dbfbd9d3ebf93fab85ba90e28871f5
                                      • Instruction Fuzzy Hash: 0FC0807110D2440FC74A97B48D750007F70DB4310471794D7D044CF193D623C9078749
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c7906c20d3659fcacddeae8ca23af75108176498530408984df258beaffcc256
                                      • Instruction ID: 0d775f6973dfb94f001ea6fde4a5bde55aa47e598e9be174891581060debfb52
                                      • Opcode Fuzzy Hash: c7906c20d3659fcacddeae8ca23af75108176498530408984df258beaffcc256
                                      • Instruction Fuzzy Hash: 7ED0A9A264D2800BC341D2308C6A486BFA28B53201318849EC4488B2A3E6229917C352
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a6278988a665eea632aee88f0ed6d6f91970dff125543529c6b9a00635391f43
                                      • Instruction ID: 77062cf6514ebd9af596a24cec83ec171cee50b0a64c26bc29e55a529b198b41
                                      • Opcode Fuzzy Hash: a6278988a665eea632aee88f0ed6d6f91970dff125543529c6b9a00635391f43
                                      • Instruction Fuzzy Hash: DBC08C9449A2803AEB824278CC200B47B388F8700031604C7E090CA0E6C900890B8333
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5be6843f7fd8f4ab389d5ba4b1c2fe1dd5d6d050ef64cce21dd44f0d5f0b0021
                                      • Instruction ID: 6a7b2963bdc7a85c62cbd10efedb4a044439a39385993bb45de9ec968f3ff6f7
                                      • Opcode Fuzzy Hash: 5be6843f7fd8f4ab389d5ba4b1c2fe1dd5d6d050ef64cce21dd44f0d5f0b0021
                                      • Instruction Fuzzy Hash: 64D0C9B16093805FC346C628CC65812BFB2DF96144719C4DEE489CB3A3EA26ED07CB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 57ade709de8550919e80493a0e658b43c11ef741c1bdf70a1c4bfec234482138
                                      • Instruction ID: 2847a2b36c61b717c9750f66a5ed37734faa5e150f9d21dc6189e91dbfe088c9
                                      • Opcode Fuzzy Hash: 57ade709de8550919e80493a0e658b43c11ef741c1bdf70a1c4bfec234482138
                                      • Instruction Fuzzy Hash: 96D0A7B510C3C04FD241DA50E420542BB61EBD5604B068C4FE44083243C622DC1ACB60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 791868b2b6d4904eca63423b42afb3773cf3bd7afed7f015f908fe64dc81cf6d
                                      • Instruction ID: 1d2c5b51030abd186a83bee4b09449a282c16bbf154cb9b97365610c327b5c4c
                                      • Opcode Fuzzy Hash: 791868b2b6d4904eca63423b42afb3773cf3bd7afed7f015f908fe64dc81cf6d
                                      • Instruction Fuzzy Hash: B8D0C9712081219F9244CA48E950C6BB7E9DBC9A10B14884EB88493241CA62DC16CBB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 17863d712193b5472dbe0f021bddc9d9438bf75e8df2597419076ab45583585f
                                      • Instruction ID: 8f715eae2f9d4770cefe4ace3d285fc92edddf3c09eac1f589e7248fd16d862d
                                      • Opcode Fuzzy Hash: 17863d712193b5472dbe0f021bddc9d9438bf75e8df2597419076ab45583585f
                                      • Instruction Fuzzy Hash: 7ED092356102009FD384CA28C842B25BBA5AFD9604F14C02EA449CB250EB339C438B11
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b39a8cebf3584088c8d526d7baa774cabc7b5de2bfb54bb10417033ab1d8a0ea
                                      • Instruction ID: 097c2fe041179814f081786e32c4aa57ba1048511c670b8e6ec155016e23950f
                                      • Opcode Fuzzy Hash: b39a8cebf3584088c8d526d7baa774cabc7b5de2bfb54bb10417033ab1d8a0ea
                                      • Instruction Fuzzy Hash: ADD0C976208111AF9204CF44E951D6FB7EAEBC9A10B14884EB840A7351CA62EC16CBB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 51c40f8df0b5ce8b31fabb25b0f6b956f8b3e3b2aad0a9efdbfc77306fb2a667
                                      • Instruction ID: 3f4b940bfd6d96bf633b6d4bb2c3104ba9e7193ab47deff7f288c4bed0158032
                                      • Opcode Fuzzy Hash: 51c40f8df0b5ce8b31fabb25b0f6b956f8b3e3b2aad0a9efdbfc77306fb2a667
                                      • Instruction Fuzzy Hash: AED022B2820A0047D300EB70CC01748FB71FFA2200F08C26EE4809E682EF22E14AEB00
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6e55fc6264d638cf95df2c6d050f9366b3590aff03b52688d4a950743e630372
                                      • Instruction ID: 5a2a01988f8153f763100be9cada0298e6e68f1d08446351e97a815d9347a3dd
                                      • Opcode Fuzzy Hash: 6e55fc6264d638cf95df2c6d050f9366b3590aff03b52688d4a950743e630372
                                      • Instruction Fuzzy Hash: 33D0C9353051005FD344C62CC856B66BBA2DF99214F28C5ADA488C7361DA37E843CB00
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ae623dfbbdccbb3d45f7b6bc5be4985f66892d4b7be4ba8a8e0ff7c90fef639
                                      • Instruction ID: cab6dc87377855d9578fcc32a6e5c370ddb34332efe54c265d123c5da17843a7
                                      • Opcode Fuzzy Hash: 5ae623dfbbdccbb3d45f7b6bc5be4985f66892d4b7be4ba8a8e0ff7c90fef639
                                      • Instruction Fuzzy Hash: 36D0C975204221ABD244EA48C891C66B7A6FFC8214725C84EE85193341DB62DC2BCBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c12b03a47a37ca33842b4b906e77ba44e29f523dd4ab30ed22ee273b32786a99
                                      • Instruction ID: e767c25c28ded9aba3bacacdf86233215d027b25cd34dee394f94abc8c65590a
                                      • Opcode Fuzzy Hash: c12b03a47a37ca33842b4b906e77ba44e29f523dd4ab30ed22ee273b32786a99
                                      • Instruction Fuzzy Hash: 4CD092382092815FD345EB28C9A4C16BFB19F8A319719C4AAA488CB262DA25D902DB25
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6cbf61c7855c29cca62892fad52bd2ca1089606d2f4793913797eea40346f54c
                                      • Instruction ID: bd15f09dec7c7c5be59abcd26f164c48370f26b4e2103004ab8143b0151cf210
                                      • Opcode Fuzzy Hash: 6cbf61c7855c29cca62892fad52bd2ca1089606d2f4793913797eea40346f54c
                                      • Instruction Fuzzy Hash: A8D0C976608111AF9204CE44ED41C6AB7E6EBD9A14B14884EB840A7310CAA2DC16CBB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3adbd3f34ed2185ea416d2e1d9cb2c72271ed0cb4a69ac46c066166e1c4edb2f
                                      • Instruction ID: 6b9e96b88ef95d88876d1a3a59e0f645fb9460123b5c5b566098515222817e1e
                                      • Opcode Fuzzy Hash: 3adbd3f34ed2185ea416d2e1d9cb2c72271ed0cb4a69ac46c066166e1c4edb2f
                                      • Instruction Fuzzy Hash: A1D012B16794941BD341C6348C159857F61C776A01714C9B6D095C7186D523D91BCB50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3376590f5429214e28c3b4d9f6ed6c6233dfcd421e52c0f3c4dc678f51f361bb
                                      • Instruction ID: 700ee3653c4226446550c9390134f339e2e33181833234920f7d6767a77e600d
                                      • Opcode Fuzzy Hash: 3376590f5429214e28c3b4d9f6ed6c6233dfcd421e52c0f3c4dc678f51f361bb
                                      • Instruction Fuzzy Hash: 13C012347104008FCB48CB38D902B74B3E2AB88200F54C0BEA48CC3A14EB328C0B8B52
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 34272eed9e53df692bc8be6204ee986d8c83a68f19f09d1a06f3850bf36c352e
                                      • Instruction ID: cb15cba21ea8fc629e59453eb9129620699c274c452e2889fbae384a54f83278
                                      • Opcode Fuzzy Hash: 34272eed9e53df692bc8be6204ee986d8c83a68f19f09d1a06f3850bf36c352e
                                      • Instruction Fuzzy Hash: F3C012A248CBCA4FD3830BA06C25381BF905B13222F8802C2C2A8481D3E66902808743
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8980fea1badc8a0e21d866ee951b87bbdcc22e6f4117c3aeb473243866ca628b
                                      • Instruction ID: 384c4af97ffc395be1b0d5e24817c6f87ed1d44d8ec0ad8e1ac662727117c4c9
                                      • Opcode Fuzzy Hash: 8980fea1badc8a0e21d866ee951b87bbdcc22e6f4117c3aeb473243866ca628b
                                      • Instruction Fuzzy Hash: 4EC012725592405FD3828314EC515506F719B4220470990CAA448CB193DA22C9178610
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                      • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                      • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                      • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                      • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                      • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                      • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                      • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                      • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                      • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cd451bc7cccd177471409f3a52ba81dcb4ea58801ae84ab75e529a258c043428
                                      • Instruction ID: 5861a9ff287bc0a999bbd30a8443f70c9adc21d559f91a9ba71c798b3d06a292
                                      • Opcode Fuzzy Hash: cd451bc7cccd177471409f3a52ba81dcb4ea58801ae84ab75e529a258c043428
                                      • Instruction Fuzzy Hash: 60D05E7560C3C15FC342CB68E420466BF61FB8A610B148C8EE89087252C726981AC752
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3f591725e525a5a8d5fb20c672e80e8395c365615b67196758a872fb710af336
                                      • Instruction ID: a28cb1c66dbc58e9e7558d1b0d5c16990dfc430a726eee5a7e56de5a4b475ddd
                                      • Opcode Fuzzy Hash: 3f591725e525a5a8d5fb20c672e80e8395c365615b67196758a872fb710af336
                                      • Instruction Fuzzy Hash: A9D0C9387011419FD344CB29C952B21BBA2EF8A344F18C4ADA498C7351DA32E843CF00
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 28a353425ee592d5207fffb77e1dd01627b4356497138d89034bace684856c81
                                      • Instruction ID: 6c5f936e902acbb3c6682c02cd67fb1164fa1849d5897d83e7341f9ac1d43eb5
                                      • Opcode Fuzzy Hash: 28a353425ee592d5207fffb77e1dd01627b4356497138d89034bace684856c81
                                      • Instruction Fuzzy Hash: 7CC012752082109F9244DA04C841C66B3A6FBD8210714C84EF85497301CB62EC07CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8ded62d99f861a4b1fe79807b53c9a388f36aa27df122fbe596e7b8a0f1b4b5c
                                      • Instruction ID: e43b0c9acf9ae1128a0303c631ee17fe5d408b569f453b1217765c120b4cbd7c
                                      • Opcode Fuzzy Hash: 8ded62d99f861a4b1fe79807b53c9a388f36aa27df122fbe596e7b8a0f1b4b5c
                                      • Instruction Fuzzy Hash: 27D0A77620C3D1CFD300CA54E510755FBA1FBD5204F198C4ED48047302C723D916D761
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: efeeab9ed5e64e8221a51cab56d26de0e5958ba296afc7932373cc732bf825a8
                                      • Instruction ID: 835d69050c0934ee6865915f6eeb2ce77ade6179b21611a6ae4af8c2f558d19c
                                      • Opcode Fuzzy Hash: efeeab9ed5e64e8221a51cab56d26de0e5958ba296afc7932373cc732bf825a8
                                      • Instruction Fuzzy Hash: 3DC012752042205F9244DA04C881C76B3A5FBC8210B14C84EF85193300CB62EC07CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                      • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                      • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                      • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                      • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                      • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                      • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da104ed294ad11bc4f61273c1af02750ccb4806ec6d3a2d17a0f18c5654fe4d9
                                      • Instruction ID: ae98021c1c4d8af43744a71e5f198d2ef1257413cae9998b8b8bf09e1ae3aa9a
                                      • Opcode Fuzzy Hash: da104ed294ad11bc4f61273c1af02750ccb4806ec6d3a2d17a0f18c5654fe4d9
                                      • Instruction Fuzzy Hash: 51D0C9757092805FD309C714C8A581ABFE5AFDA715718C49EA988CB3A6EB71EC06CB11
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d8f08d21f774e0548807ce75b8506ffde3543316bcdcbdd5788bc2b68125c542
                                      • Instruction ID: bcf9ef9c82f7d3924de405cb1b01dc34d2668a849c410a3a4cb9bba8efa29a2e
                                      • Opcode Fuzzy Hash: d8f08d21f774e0548807ce75b8506ffde3543316bcdcbdd5788bc2b68125c542
                                      • Instruction Fuzzy Hash: 91C012712082605F8244DA48C850C67F7E9AFCD110718C84FB494C3341CA61DC07C7A0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 190581340facbc74879cc40d528814a4e8f51335649714857137ac68fc8cdbd2
                                      • Instruction ID: 57ed6fdcd5138ec078a754c1d85a3cf10a643f74b1452f60676ce18b5d65e60e
                                      • Opcode Fuzzy Hash: 190581340facbc74879cc40d528814a4e8f51335649714857137ac68fc8cdbd2
                                      • Instruction Fuzzy Hash: B2C0127440A2804FC382AA208C10C90BB30AFE2A0430BA4DED804CB2A3CA23A80B8611
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6fd5862abba9300e25b077a0ac4af4b5da7c8fab61ce18239a04dd38772a8edf
                                      • Instruction ID: 805465856a0e97f1801a7b9e58a9ccc16fe6aa036e262aa7ced1ad80dc8590cd
                                      • Opcode Fuzzy Hash: 6fd5862abba9300e25b077a0ac4af4b5da7c8fab61ce18239a04dd38772a8edf
                                      • Instruction Fuzzy Hash: 59C012752142125BD254DA04C841D66B3A6FFC8314F14C86EE85083345CF76DC07C7A0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c98c4cdc3b84a9c194ade4a1eb095f261a92d223edfaf8a46b4d7d9a49a45b0b
                                      • Instruction ID: fb2a2b64c1c1c755f390b16b1e6be5643d38e6e7530d4c91ab505ade0c238035
                                      • Opcode Fuzzy Hash: c98c4cdc3b84a9c194ade4a1eb095f261a92d223edfaf8a46b4d7d9a49a45b0b
                                      • Instruction Fuzzy Hash: D8C002751092818FC3868B709869440BF70EF8360972BA5CED4858B2A7DB26990BDB56
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f81ffda9770564412da37cbf47386c95ca19164b66d465b9a77f0f81d7f58547
                                      • Instruction ID: a44d9ac060220f98f2b9bd7b112e4ab7ec1d88bd908cbc73574f3a541aea9d74
                                      • Opcode Fuzzy Hash: f81ffda9770564412da37cbf47386c95ca19164b66d465b9a77f0f81d7f58547
                                      • Instruction Fuzzy Hash: 3AD0C9396011009FD344CB38C941A52F7E1EB98604F20C42DB408C3350EB329D07CB42
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1694dc5011dbdf67a171cee199f07adf130deb0109038907b67837284db29456
                                      • Instruction ID: e05f7ca945bcec650edf8b8558c4e3781ce00b65f067f7999bb297dddb0ac935
                                      • Opcode Fuzzy Hash: 1694dc5011dbdf67a171cee199f07adf130deb0109038907b67837284db29456
                                      • Instruction Fuzzy Hash: A5C012B11052409FC74A8630C8644547FB0DB4320475754CEC000CF1B2C6225907D711
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fb350aa5a2cbf02a3bfa0e2daf5b62769d68e63c036b566d1b043cf48c431266
                                      • Instruction ID: d7db7abec0dc91a41803cabfc6cbabcb7fd3f4e73d2d41db2281c14cfaf71147
                                      • Opcode Fuzzy Hash: fb350aa5a2cbf02a3bfa0e2daf5b62769d68e63c036b566d1b043cf48c431266
                                      • Instruction Fuzzy Hash: 89D012B67041406BC304D618CCA6F15F7A2DBD5205F1CC46D6849CB356EA31EC02C711
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2dac5567923e782492463b717922a7bf856a4f6e5825715cfebb8a49fc1668a9
                                      • Instruction ID: dec476a2e5167b9533f063439f53550af96628672d1e8af353cacf31d22d86ca
                                      • Opcode Fuzzy Hash: 2dac5567923e782492463b717922a7bf856a4f6e5825715cfebb8a49fc1668a9
                                      • Instruction Fuzzy Hash: B8C012E240A2808FCB8282208894080BF30DB6B10032BA8CAC0618B1A3CA178A4BE742
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                      • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                      • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                      • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0a0542805eb1c17f10d089303f1794b317cb4307e86741a0df48a6a6d4036042
                                      • Instruction ID: 73b3982373deb122314108fc87b8200cf68f29d90dce39dac4eaddf76c7f5931
                                      • Opcode Fuzzy Hash: 0a0542805eb1c17f10d089303f1794b317cb4307e86741a0df48a6a6d4036042
                                      • Instruction Fuzzy Hash: E0D0C9342011009FD348CA28C842B16B7E5EFD8610F14C42DA488C3351DB31DC03CB10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                      • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                      • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                      • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                      • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                      • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                      • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c564f5c31d61f839d91227fceabe3d566bf12c43890b3bb645a28abba4e1e3b7
                                      • Instruction ID: 54f055b1285db2cd7820dd1fce111bca6dd26a819157e8393f921ed70a086d27
                                      • Opcode Fuzzy Hash: c564f5c31d61f839d91227fceabe3d566bf12c43890b3bb645a28abba4e1e3b7
                                      • Instruction Fuzzy Hash: 55C08C321000028BC328DA14CC83700B731EF80300FB8C0A8B025D7299CB3BD8039A00
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                      • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                      • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                      • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cc51c27a393ef13df97fbf430050db0a95fe8d6fd93d22599a5dbbc42a19b9b0
                                      • Instruction ID: 61307fb49b1e292039a8d53f39c6cf82a49b17aef03e20d10aada2b8f1679019
                                      • Opcode Fuzzy Hash: cc51c27a393ef13df97fbf430050db0a95fe8d6fd93d22599a5dbbc42a19b9b0
                                      • Instruction Fuzzy Hash: C9C012367005009FD344CA28CC92B22B7E2EBD8201F24C02DA408C3395EA32EC03CB04
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 30e10cab164d9cb8b3b49db521b5246b376fc0118eed3f2138bfdd779b469406
                                      • Instruction ID: 058c61361e8bc6440a929d7c0e78cff15daa4f07bd20a5d0073b464b19bb14b9
                                      • Opcode Fuzzy Hash: 30e10cab164d9cb8b3b49db521b5246b376fc0118eed3f2138bfdd779b469406
                                      • Instruction Fuzzy Hash: 33C04CA101E2D00EC782967488558913F319B9741530F99EED4C58B5E38A074D1BC712
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d9731e16b225bf7c9fd6ae9c9c57e026980363a0178d07acd22a6581a85d7995
                                      • Instruction ID: 1a1d68f640e10034c9997d160af75442998f5fffe8bfe551c4986e99382ff02c
                                      • Opcode Fuzzy Hash: d9731e16b225bf7c9fd6ae9c9c57e026980363a0178d07acd22a6581a85d7995
                                      • Instruction Fuzzy Hash: 90C08C7A81684CEE8F42DBA498204EDBBB6DF0120079003E2D80592020DE320B289BC6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: af69096565f7cc022b82ea9435373f1e7d24d51f65270b838a966fbcd1e89b1d
                                      • Instruction ID: 458b076f2d8b96cf822f6ab628ba840a8c9e27e85c7c5c4dfbd3ad557660dc4d
                                      • Opcode Fuzzy Hash: af69096565f7cc022b82ea9435373f1e7d24d51f65270b838a966fbcd1e89b1d
                                      • Instruction Fuzzy Hash: C5C02B3E02440C85CF00E680C8017687352EF00300F9003D04C0D45030CA11072047C3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a5f1d189fe9d98b0a1643ecad5a91412556c9566bfdb64cbb58041c8745dfcf0
                                      • Instruction ID: dcf327ca4eb18b7d3879aa82dbe133445f07b788fe7d6ac9b8d81099edbb41fe
                                      • Opcode Fuzzy Hash: a5f1d189fe9d98b0a1643ecad5a91412556c9566bfdb64cbb58041c8745dfcf0
                                      • Instruction Fuzzy Hash: 74D0123510564957D217C754D560B54BF919FA6208F19C09DEC9947292CF33DC03D710
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 72a1404f2bb33a7aa8d18e7eaa41a78a88ff0e990713c72671ec80728489e261
                                      • Instruction ID: 5e709b80a3162c866517befaed6a50914e3b1141130e546fc4299869900e1731
                                      • Opcode Fuzzy Hash: 72a1404f2bb33a7aa8d18e7eaa41a78a88ff0e990713c72671ec80728489e261
                                      • Instruction Fuzzy Hash: 29C080B61051808AD340C374CD52B047F51DB42205F1CC0DFC4449B203D521D517D754
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 93dd6358eceac0f0a72640028f7f5f6a275b84741b15ad884951b4a621def032
                                      • Instruction ID: 15ac71db8ffbd1952da90a678220d17b5bffbb3e20cbc78ee48215c8cf3ded0b
                                      • Opcode Fuzzy Hash: 93dd6358eceac0f0a72640028f7f5f6a275b84741b15ad884951b4a621def032
                                      • Instruction Fuzzy Hash: 42C04CE25010034BF9148910C851B64A253E750158F28D459D516C6346E796D8034604
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6679f9e28e4593526d4e4aa71bed4854c69be03eb5437bd67961509648af227d
                                      • Instruction ID: e24f81ece9401113e2f9125e53abdff255f63e7307873693e15ef26cafaf35ea
                                      • Opcode Fuzzy Hash: 6679f9e28e4593526d4e4aa71bed4854c69be03eb5437bd67961509648af227d
                                      • Instruction Fuzzy Hash: B7C04C759101009FD345CBB4D891B247BB2EF85604F55C06DA805C7215DB3BA9078F45
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ae948d99bc1f1d373088a518726d6802ed9e68ae0283efa762f38181b4f23d47
                                      • Instruction ID: 0835571904a86911aeef7479e3560dee6cbb0285f37d8a39f6c32b9dcae0ee95
                                      • Opcode Fuzzy Hash: ae948d99bc1f1d373088a518726d6802ed9e68ae0283efa762f38181b4f23d47
                                      • Instruction Fuzzy Hash: A7D0C93C1001009FC745CB60D590B61BBA6EF98614F14C59DA80887251DB36980BDF41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8aefe07a179f1ae4737116118d1b44dcad4aa65a913b5ca0aa4044ffef15a7fc
                                      • Instruction ID: 93f3ca250182468adf7b8b4942b3998dbb27efdbb7c827138a78172550b1351a
                                      • Opcode Fuzzy Hash: 8aefe07a179f1ae4737116118d1b44dcad4aa65a913b5ca0aa4044ffef15a7fc
                                      • Instruction Fuzzy Hash: 86C0123CA81028AFDF412A90E8949AC7A33FF48300F000024EA02A2698CA210C14AB00
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9627357f85c97c28dc2889f4433020ea5c22498d81ba94d2d40900073d7f2948
                                      • Instruction ID: f596bd363dd1f48494d18b95522e36a16dfcebdfd14c45b1ca3b08a4468608e3
                                      • Opcode Fuzzy Hash: 9627357f85c97c28dc2889f4433020ea5c22498d81ba94d2d40900073d7f2948
                                      • Instruction Fuzzy Hash: 47C08C38E00008EFCF062BA0E845DFCBA33EB88300F008016F902B6360CE324C208F11
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c71a3ee143ddc56a5aa6cdf1d0f58e7b00b98b8cd1267a813a6c176da74a0d93
                                      • Instruction ID: f06360af114d77d5fc0b023256f4868db9bed3e2c5f18ea277abc1357020e55a
                                      • Opcode Fuzzy Hash: c71a3ee143ddc56a5aa6cdf1d0f58e7b00b98b8cd1267a813a6c176da74a0d93
                                      • Instruction Fuzzy Hash: B5C04C305532159ED3499771A807B29BE59A700204F84C529A599C7052DB6854024A45
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 980ec5a90bd7857a1a1c679131392b2060510c4ec69f70b489f3a38c5d2585b2
                                      • Instruction ID: b9f85181e43b2fce7be0e3c08f6980ea14caf31784448c7b248a9f6b6fc40e9f
                                      • Opcode Fuzzy Hash: 980ec5a90bd7857a1a1c679131392b2060510c4ec69f70b489f3a38c5d2585b2
                                      • Instruction Fuzzy Hash: 1DC04C753001015B8244D618CD95926F7B5DBD9254754C46D6449DB366DB36EC03CB10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: db83b91f14e2aff39d4cabdcba3dfe993f35f7d2fcdd3d53355948207115d1a4
                                      • Instruction ID: 4b3084fe212e14137226e3ff1e72c536b038dfa58741f0eaeabd27339863a4bd
                                      • Opcode Fuzzy Hash: db83b91f14e2aff39d4cabdcba3dfe993f35f7d2fcdd3d53355948207115d1a4
                                      • Instruction Fuzzy Hash: 7EC04C753041005F8254D618CD9592AF7A5DBD9214754C46D6449DB355DB32EC03CB10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b3642d849beea4a5c0713dc700c1599754ed37cd77fc78e07c7a6b0f3893e2ec
                                      • Instruction ID: 36d7d47151933c33def1f2d9df831ba185036dc00797e6521b1d338a0643255e
                                      • Opcode Fuzzy Hash: b3642d849beea4a5c0713dc700c1599754ed37cd77fc78e07c7a6b0f3893e2ec
                                      • Instruction Fuzzy Hash: 76C092722095829BC346D61CDD82714FFA5DBC5215F2CC8A9A418CB386CF3BE893CB42
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 313f8fb0e4e635070a201f2480988a7dc0686cb4b171e8a08ef78de2a0036e40
                                      • Instruction ID: 5d1986998d4a0fc3cd6ea1d32ddbe886385840d10af4a12dc8eb3996080a6502
                                      • Opcode Fuzzy Hash: 313f8fb0e4e635070a201f2480988a7dc0686cb4b171e8a08ef78de2a0036e40
                                      • Instruction Fuzzy Hash: 47C08C30614101CFE208CB58D880A40B3A0BBC2300F20805AE008CF114CB329413D600
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0d2928ccc1f73ed82f3f412241a04845b922902cb18883733448dbb2d0bf5ac0
                                      • Instruction ID: 4b85fa7906a9f40a3f65b418f79fe7638ebbe7cd376ad654ed15c424af0380e6
                                      • Opcode Fuzzy Hash: 0d2928ccc1f73ed82f3f412241a04845b922902cb18883733448dbb2d0bf5ac0
                                      • Instruction Fuzzy Hash: 08C04C753001005F8244C618D895916F7B5DBD8214724C46D6849C7355DA32EC03C650
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b5c3eb747b97153e541e2d23c3e70eeb158976c9d68e8f3d071bd14363c0e657
                                      • Instruction ID: c3e00f4fa864d4526dfddf5ed8a08e8b8c95f985f4e1fd03c1d7c7c3aa6d4a98
                                      • Opcode Fuzzy Hash: b5c3eb747b97153e541e2d23c3e70eeb158976c9d68e8f3d071bd14363c0e657
                                      • Instruction Fuzzy Hash: A6C04C753001009F8644C618D896916F7A5DBD8254724C46DB449C7355DB32EC03C610
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 17ecd67ba88299163addf91bf1a094607f93fd1b7f2e319ee096ee21c0815165
                                      • Instruction ID: c2668dbb283a02f9f630b10ed92ffe6a0e8af95727c49c3586412286116d5963
                                      • Opcode Fuzzy Hash: 17ecd67ba88299163addf91bf1a094607f93fd1b7f2e319ee096ee21c0815165
                                      • Instruction Fuzzy Hash: 70C04C395441448BD749CF34D89565477A3FF86608F14C26DA404C7555DF37D51BCB41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 56bb2ee8fbfbd11e23919eb8dbd9be9b93ca3a5a901a5c3fcdd7df279b8b401a
                                      • Instruction ID: 1e3f8298eca5368d7112699c88a74482743591fab844153e7b6828cf06fb2daa
                                      • Opcode Fuzzy Hash: 56bb2ee8fbfbd11e23919eb8dbd9be9b93ca3a5a901a5c3fcdd7df279b8b401a
                                      • Instruction Fuzzy Hash: A1C04C753001005F8244C618C995926F7A5DBD8218B54C46D7449C7355DB32EC03C654
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6b2a539ccbde8513939cc90b9ca2b34a08de721acdbd9a49142ffcf975a61445
                                      • Instruction ID: 71a7f3993958caed6ebe96668ee6719fa8571cfc101024d598d4dc45be3c5448
                                      • Opcode Fuzzy Hash: 6b2a539ccbde8513939cc90b9ca2b34a08de721acdbd9a49142ffcf975a61445
                                      • Instruction Fuzzy Hash: ADC04C359001208FD346DB64F55175877B1FBC4615F14C56DE404C7155DB379547CB41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 22f456174f21feff40fa96c8507c30988b370398411715951ca0d62b1267a9db
                                      • Instruction ID: d02271007ded9602ee674acb0becfc48171b8728a7d4a1888ebcef8486ce727a
                                      • Opcode Fuzzy Hash: 22f456174f21feff40fa96c8507c30988b370398411715951ca0d62b1267a9db
                                      • Instruction Fuzzy Hash: B6C048B05251209BC388CB34DC82B54BFE1EB84215F28D8AAE40AC6261DB369A03EA10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                      • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d56b18338140599c6ff39ff5ec7ac409a7950ea979dbfcb5a5ee332abe6003a4
                                      • Instruction ID: f757a4ff74b031fd628793518641024edc607299c78b8139a199590983facdc2
                                      • Opcode Fuzzy Hash: d56b18338140599c6ff39ff5ec7ac409a7950ea979dbfcb5a5ee332abe6003a4
                                      • Instruction Fuzzy Hash: E5C09269E492844FC743A3288C2296E6F268E83212B8951FE90518F1A3DE479906C361
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                      • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                      • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                      • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                      • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d9e0c35b121253358edfe79592e24728b25f8f4bda99099ec68fa593775225f0
                                      • Instruction ID: daedd82454a6eef6782213f5bf1558419834a63bb48cc1e40d3af0a36c72cf73
                                      • Opcode Fuzzy Hash: d9e0c35b121253358edfe79592e24728b25f8f4bda99099ec68fa593775225f0
                                      • Instruction Fuzzy Hash: 39C04C755040415BD645C718D885708BBB1FB85209F58C49DA459DB615CB26E502C780
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                      • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                      • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                      • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cdfec89ecf4d227c2e3f2741df1fca2c4e7a0756e2f1ba050c9a008d3bdc9887
                                      • Instruction ID: e80b9cbb32ce7aa80f269217a2acaa4f8c5de131eb2df65f765f3a476441bad2
                                      • Opcode Fuzzy Hash: cdfec89ecf4d227c2e3f2741df1fca2c4e7a0756e2f1ba050c9a008d3bdc9887
                                      • Instruction Fuzzy Hash: 3DB002747054005B8748D65DD951515A7D29BC9215728C4AD641DC7355DE22DD039644
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6f7cf4de71e3aabb938130b0626456a12c6626f1cda970ca6245ea36752ffc16
                                      • Instruction ID: 1bd09ab20a2c8652f37bc8b9e331a1db5745fb95980be304e2f7b74448a5a842
                                      • Opcode Fuzzy Hash: 6f7cf4de71e3aabb938130b0626456a12c6626f1cda970ca6245ea36752ffc16
                                      • Instruction Fuzzy Hash: 13B09232A094505BC245D718C9A1824BBA19F85218368C099A848CB206CB22D813CA80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b8825f9ede951f1dcfe7d654ae58471831fa950c74c7393679caae3c57d02a84
                                      • Instruction ID: 15236876decb1d9d0d06d254f4506640a6855d98e24465ea8c6d1f8f4b20f19e
                                      • Opcode Fuzzy Hash: b8825f9ede951f1dcfe7d654ae58471831fa950c74c7393679caae3c57d02a84
                                      • Instruction Fuzzy Hash: F0C09B5140B2845FC71677A0DC614587F710D4314978584E99C5157192DA075A098F96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1e364d90393b9f9888a2fa4b09c90a1e0d4d7fa8e6e9c6ab79b4803761514eb3
                                      • Instruction ID: e41ee6ab76bd0eb697ae9f4a5a609d57cdd6fa66e0e80cb0905dc0da725e054a
                                      • Opcode Fuzzy Hash: 1e364d90393b9f9888a2fa4b09c90a1e0d4d7fa8e6e9c6ab79b4803761514eb3
                                      • Instruction Fuzzy Hash: 73C048341102009FC644CBA0E8D2B19B721AB8A308F588499E60947221DB2AA903EA10
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aa616614bdafa19052c87427800e096d39eebe8dee727e7ac837fc6b7d004403
                                      • Instruction ID: b7b4d6eb2a19043c8d0587d738cc7e80f0f478bc70e2640cd037fb95b7159bea
                                      • Opcode Fuzzy Hash: aa616614bdafa19052c87427800e096d39eebe8dee727e7ac837fc6b7d004403
                                      • Instruction Fuzzy Hash: BDB012302040004F8244C608F981408B3A1DBC4214328C09C6858CB305CF33D8038540
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a8c5e47847b3e668c96bf0ea7692bdfb317706dc4720912bd0afa86048a033d8
                                      • Instruction ID: a9e586b648280743f98debef43dc8482d6f28ddffc798c18314899aaf609ed25
                                      • Opcode Fuzzy Hash: a8c5e47847b3e668c96bf0ea7692bdfb317706dc4720912bd0afa86048a033d8
                                      • Instruction Fuzzy Hash: BFB012302051008B8748D608CD81414B361DBC420431CC49C6418CB345CF33D8038A40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dd6315fb016090684311a4e3d4a92e8793579c0392daf50e0dc44e9b39e87d82
                                      • Instruction ID: 5c8285f0b42e0d7c49feca8d2a9f81e57cdbfd5f3e556ca3fda37936e6f24f1c
                                      • Opcode Fuzzy Hash: dd6315fb016090684311a4e3d4a92e8793579c0392daf50e0dc44e9b39e87d82
                                      • Instruction Fuzzy Hash: 89B012712040004F8244C608DC82408B361DBC420872CC49D6409CF309CF33D8038540
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c2f3759229300dec757fee1718a97d8dedc57cc463ac104ccefe4c12e4fd5589
                                      • Instruction ID: b8cf5549d0562b279d6a7c7eba1ce00091888a6def954c16ff9804c8e3f74e6e
                                      • Opcode Fuzzy Hash: c2f3759229300dec757fee1718a97d8dedc57cc463ac104ccefe4c12e4fd5589
                                      • Instruction Fuzzy Hash: CB9002354C460CCB568027D67449555775CA6445157840551E60D416455E65642045A5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 995657623e91f5004f06dde97bec9a0d0d105d03ecf8b2ba5bcf69636af6d880
                                      • Instruction ID: 1c4f6fa8cbb6e2d372cb089f5dc489de11f6fb274d430c494ff3c00891e7e35e
                                      • Opcode Fuzzy Hash: 995657623e91f5004f06dde97bec9a0d0d105d03ecf8b2ba5bcf69636af6d880
                                      • Instruction Fuzzy Hash: DE90223000020C8B00002380B00A828BB0C8A000083C0C000B28C800020E282000008A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                      • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                      • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                      • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                      • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                      • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                      • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                      • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                      • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                      • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                      • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                      • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                      • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                      • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                      • Instruction ID: 2108930940694c1c8b8ad4272d9396267f2db374b9021a0985f6588530823504
                                      • Opcode Fuzzy Hash: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                      • Instruction Fuzzy Hash: 6BA002742010009BC644DB54C991814F761EFC5219728C4DDA8198B256CF33ED03DA40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4535436380.0000000006090000.00000040.00000800.00020000.00000000.sdmp, Offset: 06090000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6090000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                      • Instruction ID: 2108930940694c1c8b8ad4272d9396267f2db374b9021a0985f6588530823504
                                      • Opcode Fuzzy Hash: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                      • Instruction Fuzzy Hash: 6BA002742010009BC644DB54C991814F761EFC5219728C4DDA8198B256CF33ED03DA40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8fd6bf2a6895a0a1853c9e3b3647d21e63520108b2f000fdb98d704a02e44312
                                      • Instruction ID: 2b8a08d7225d96b80e6145f313e2df3b83edd84c2fad7360020ebbb997fc309a
                                      • Opcode Fuzzy Hash: 8fd6bf2a6895a0a1853c9e3b3647d21e63520108b2f000fdb98d704a02e44312
                                      • Instruction Fuzzy Hash: ECA00228A241C14AFB029F11A4A67E43FB0A30738CF552C40C9F472222C7655053BF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d5b74a3464112a6765594da12762a2de9f77794b0177741cb28ff480b004387
                                      • Instruction ID: acd3410c80573a7207a281af457919074a4e447733e77b34a4a54a48cf18abb7
                                      • Opcode Fuzzy Hash: 9d5b74a3464112a6765594da12762a2de9f77794b0177741cb28ff480b004387
                                      • Instruction Fuzzy Hash: 52A00271122044568604E694C955C25B6166FE1205B34D16952164A5A6CF629D12D698
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q
                                      • API String ID: 0-127220927
                                      • Opcode ID: ebe02b871d3f968bc6628dc6357c5b725d49f7e18fe9bbb9412f0aecd5a19dbf
                                      • Instruction ID: 678aa693481b6e5eb48a146b85341a14e23b8a492df583988b05818516b5f5e2
                                      • Opcode Fuzzy Hash: ebe02b871d3f968bc6628dc6357c5b725d49f7e18fe9bbb9412f0aecd5a19dbf
                                      • Instruction Fuzzy Hash: 3B724E746011158FD745EF68E894ABFB7F6FB88700F108159E907AB398CB389C12CBA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q
                                      • API String ID: 0-127220927
                                      • Opcode ID: 4e2c0101ecd7664999ad5d82748caa748c44ff05afee8b9db3f636778f1513dc
                                      • Instruction ID: c35f6a458b4f188fd907bc54590067954f01363b19400cfa0cb2adbe851dc2de
                                      • Opcode Fuzzy Hash: 4e2c0101ecd7664999ad5d82748caa748c44ff05afee8b9db3f636778f1513dc
                                      • Instruction Fuzzy Hash: 2E522934B012158FDB15FF28D994AAEB7B2FB89300F5045ADD50AAB3A5DB30AD56CF40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q
                                      • API String ID: 0-127220927
                                      • Opcode ID: 4db46c9edb17b2201333b8904ee84273ec0abc777d97caa9ac8d68dd9057f155
                                      • Instruction ID: 759cf46d0b5236d86dc29503563d44534c8f8b9bf5acd9a43aeb136e37669467
                                      • Opcode Fuzzy Hash: 4db46c9edb17b2201333b8904ee84273ec0abc777d97caa9ac8d68dd9057f155
                                      • Instruction Fuzzy Hash: 9E522938B012158FDB19FF64D894AAEB7B2FB89300F5045ADD40AA73A9DB309D56CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q
                                      • API String ID: 0-127220927
                                      • Opcode ID: 1b194bcbb8eb547288c570513d144c5fed6bdd2c0d3e4c902aa29f187ac0bedd
                                      • Instruction ID: 90988cc471a263742dbf438743d97701e180460f46231493b810cde768890161
                                      • Opcode Fuzzy Hash: 1b194bcbb8eb547288c570513d144c5fed6bdd2c0d3e4c902aa29f187ac0bedd
                                      • Instruction Fuzzy Hash: 33422934B012158FDB15FF24D894AAEB7B2FB89300F5045ADD40AAB3AADB349D56CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q
                                      • API String ID: 0-127220927
                                      • Opcode ID: 93b105e000c9e5e111042e14f52f4ee0e648f913c2f8dcb789825f3f1ef32c3e
                                      • Instruction ID: 8129d5c0848bb8b81af886bcacd788d0493a339820e7deebd19b497df3810b9a
                                      • Opcode Fuzzy Hash: 93b105e000c9e5e111042e14f52f4ee0e648f913c2f8dcb789825f3f1ef32c3e
                                      • Instruction Fuzzy Hash: F2422A38B012158FDB15FF24D994AAEB7B2FB89300F5045ADD40AA73A9DB309D56CF90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4533518082.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_50d0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (aq$,aq
                                      • API String ID: 0-1929014441
                                      • Opcode ID: 643dcd139f4136ba2f5d5adc18255c620b33d980af817402fd5527d93bf2f64d
                                      • Instruction ID: ad5d860d22427a8f4322cfb961f3eca9367d589dcdb4beadcf4c9a23b327a2cf
                                      • Opcode Fuzzy Hash: 643dcd139f4136ba2f5d5adc18255c620b33d980af817402fd5527d93bf2f64d
                                      • Instruction Fuzzy Hash: F9F13D34B052158FCB45EFA8E494AAEBBF3FB88700F55C159E506AB355CB34DC428BA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q
                                      • API String ID: 0-3120983240
                                      • Opcode ID: b788a73c2e79d8db8d838a6a1b04f172262af469d6f634718a8215e75a2036db
                                      • Instruction ID: 720e1ea2a200c126ac03e8692c221ea0af56b18a0192a1b05decc56f9384133d
                                      • Opcode Fuzzy Hash: b788a73c2e79d8db8d838a6a1b04f172262af469d6f634718a8215e75a2036db
                                      • Instruction Fuzzy Hash: 5C613E75E446448FDB4AEF6AE98068E7BE7EFC8300F14C569D1049B2ADEF745806CB50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q
                                      • API String ID: 0-3120983240
                                      • Opcode ID: f2b430228b4bb3d6870105a63808ff821bde193ca580042a1224ae66e3687a84
                                      • Instruction ID: af38163d97ac910c979cf6409db049ad23579e6938b2b03fff4c7856adaf98e6
                                      • Opcode Fuzzy Hash: f2b430228b4bb3d6870105a63808ff821bde193ca580042a1224ae66e3687a84
                                      • Instruction Fuzzy Hash: 8A512D74E442448FDB4AEF6AE98069E7BE7EFC8300B14C529D1049B2ACEB74581ACB50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: @
                                      • API String ID: 0-2766056989
                                      • Opcode ID: 7d58ce99e14cd4456ae23e5809613514da7f6838dea5dcaaa26db1aac14b0b8b
                                      • Instruction ID: 2f5c04f4a76945f33868a34ee1a14c37ecf0e546ae3d2b810603bf00d9c39ad4
                                      • Opcode Fuzzy Hash: 7d58ce99e14cd4456ae23e5809613514da7f6838dea5dcaaa26db1aac14b0b8b
                                      • Instruction Fuzzy Hash: 3C72B230618B598FDF69DF28C8857A973E5FB98314F14462DD88BC7281EB34E546CB41
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Pl]q
                                      • API String ID: 0-2207481929
                                      • Opcode ID: 72f2c1950b830e9cec2a06a633ac95862c927a9228c804284b00dc6dfe10fd10
                                      • Instruction ID: 7de6fd5c345fa96c2da1da6dd81527bc0e3dfe0c77f5e8b53e5471fdcaf21d53
                                      • Opcode Fuzzy Hash: 72f2c1950b830e9cec2a06a633ac95862c927a9228c804284b00dc6dfe10fd10
                                      • Instruction Fuzzy Hash: 28F1C974B111189FDB05FFA4E994EAEB7B7FF89700B108519E806A7399CB71AC12CB50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Pl]q
                                      • API String ID: 0-2207481929
                                      • Opcode ID: caa962cb4b29df7dca8ce823574686f65c13f0dcf31323a7cc9a6fcaa2e82159
                                      • Instruction ID: 3859e8f5045075f4c4ef429aeed244d1bb4c16ac2bfb93c338db8c69977d1ce3
                                      • Opcode Fuzzy Hash: caa962cb4b29df7dca8ce823574686f65c13f0dcf31323a7cc9a6fcaa2e82159
                                      • Instruction Fuzzy Hash: C1D1DC74B111149FDB05FFA4E994EAEB7B7FF89700B108519E806A7359DB70AC12CB50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @
                                      • API String ID: 0-2766056989
                                      • Opcode ID: ca13e274902d146ecd33d54093c0bf213aa6ac0034d9c0dcaec5321759144ee0
                                      • Instruction ID: c8e977c3e76fe5700c0a4e1bbf5abb13b80cec65200f01ccc63689bbb5de3b44
                                      • Opcode Fuzzy Hash: ca13e274902d146ecd33d54093c0bf213aa6ac0034d9c0dcaec5321759144ee0
                                      • Instruction Fuzzy Hash: 47A1E8382120008FD745FF64E595D6A33EBFB983087018569990B9F39ADF78EC56CB92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ff471fed8362e1f6680916959444b0539dd2ef4160a15e649cb06b76fd5f0269
                                      • Instruction ID: f7e507a79540643178f4afb6db801f050c1194db97effa26a0072c8dfca79508
                                      • Opcode Fuzzy Hash: ff471fed8362e1f6680916959444b0539dd2ef4160a15e649cb06b76fd5f0269
                                      • Instruction Fuzzy Hash: 76429B71608341EFDBA4CF14E844B6BBBE9EF88714F08492DFA899B251D770E845CB51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7273895f1c543c6ed7c57c63f1d018ff2b92f71a1a02f9530acb05745bae79c6
                                      • Instruction ID: a844071e0b14a7cb57b395becb59141ae52c896afb5ed8bdcc12ee4bd497fbf0
                                      • Opcode Fuzzy Hash: 7273895f1c543c6ed7c57c63f1d018ff2b92f71a1a02f9530acb05745bae79c6
                                      • Instruction Fuzzy Hash: 15421C747111058FDB55EF68E898AAF7BB3FB88300F548469E8079B368DB749C52CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5bb7002fc0c7a41af7d0894aa67ad9bea283be67e5616b7e643052158db811a8
                                      • Instruction ID: 61b9eddd8c1691773afa48391d2b4254dcf2b1a73add57a2bb884b7e1d32a992
                                      • Opcode Fuzzy Hash: 5bb7002fc0c7a41af7d0894aa67ad9bea283be67e5616b7e643052158db811a8
                                      • Instruction Fuzzy Hash: BB22EF729153248FDB28CF79EC8525D7FA2FFA2314F42821DC446A7666CB74158BAF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3f25aa825a39bec38ad6b6d36dd1a7b58a115f37f7b46c95bc86c5f4f7415b87
                                      • Instruction ID: d24bd834c29ad813092c5a698335ed8cae118bc7f23d3fec6b09df29449e4493
                                      • Opcode Fuzzy Hash: 3f25aa825a39bec38ad6b6d36dd1a7b58a115f37f7b46c95bc86c5f4f7415b87
                                      • Instruction Fuzzy Hash: E7D17531718B598BDF28DF2898897AEB7E5FB58705F00462ED85BC3280DF30E5158B81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f95ed46a00e7fea519fd7751f29611d3244ed38eecb630b9aedc720668332520
                                      • Instruction ID: e8896459477785c0f34e5f2aff3d0b226b6e121a5597ba9e8ee1c462d9a890ba
                                      • Opcode Fuzzy Hash: f95ed46a00e7fea519fd7751f29611d3244ed38eecb630b9aedc720668332520
                                      • Instruction Fuzzy Hash: 81024A70A112168FCB59DFA8C494A7FBBB2FF88300F108629D65A97785DB30E955CBC0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3e74d2aa687a79bc353c1e30e2761018af6d861ea5a8c8f1c92844b65f1d9ba9
                                      • Instruction ID: b8fb4d7e929f11fc5479e188b9f382e336059f72bcb11d57fcbe6cd5dba5155f
                                      • Opcode Fuzzy Hash: 3e74d2aa687a79bc353c1e30e2761018af6d861ea5a8c8f1c92844b65f1d9ba9
                                      • Instruction Fuzzy Hash: 9FD13931518A4C8FDB59EF28C889AEA77E5FB98300F044669E85BCB155DF30E945CB82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e45004cfa00b96cc07e21d80348e0ecc464919f4c4bc6f170ace2c42d415ba2b
                                      • Instruction ID: f083912d648a80b3011d7b92d9be9cb305cc473cddca76d75ec7046c754766f4
                                      • Opcode Fuzzy Hash: e45004cfa00b96cc07e21d80348e0ecc464919f4c4bc6f170ace2c42d415ba2b
                                      • Instruction Fuzzy Hash: 67B17230314A1D8FCF69EB28D8D47BAB3D6FB98304F544269C45BC7285DB24E94ACB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ebf261606ae56286347d42574e3f592f39f74f603c34f734bcca56a6e6fe2072
                                      • Instruction ID: 2570af0931e15816eadd377ce67f9713f110c91260f02af2d16a25d64ef54983
                                      • Opcode Fuzzy Hash: ebf261606ae56286347d42574e3f592f39f74f603c34f734bcca56a6e6fe2072
                                      • Instruction Fuzzy Hash: E9B1296644E3C09FC7478B309CB56D27FB0AE1721471E85EFC4C18E4A3E25AA55BDB22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 423274d785eb87c9d4762a23f2ca51dbbe4dc6fdf6348b202e511c46baf4a350
                                      • Instruction ID: 253e6b8485aa2d54c703269ffc7ec1a10bd2cd0fc5969a6871706847184ff895
                                      • Opcode Fuzzy Hash: 423274d785eb87c9d4762a23f2ca51dbbe4dc6fdf6348b202e511c46baf4a350
                                      • Instruction Fuzzy Hash: 1AD1C778B111158FC795FB28E998A6E77F2EB88704F1180A9950BDB399DF349C42CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1f94b13c2daa90c730190c1cd864a56a9b1639c4e0fe7d40a6d6a7e9e5343133
                                      • Instruction ID: 5da6146c1b12e389d1773bc9e8f5877ef42e23d869eb680d8184b7d445d34300
                                      • Opcode Fuzzy Hash: 1f94b13c2daa90c730190c1cd864a56a9b1639c4e0fe7d40a6d6a7e9e5343133
                                      • Instruction Fuzzy Hash: 08D1D878B111158FC795FB28E998A6E77F2EB88704F1180A9950BDB399DF349C42CF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4e0c3fcbc81e30a1f0ff2caa0f5ec18b347653cbd75dd7d3581866542c433f75
                                      • Instruction ID: 7decdd9b4df63b21c4accebf2559145691aa82032f9e22c423a4a99a74435a7f
                                      • Opcode Fuzzy Hash: 4e0c3fcbc81e30a1f0ff2caa0f5ec18b347653cbd75dd7d3581866542c433f75
                                      • Instruction Fuzzy Hash: F2B17F79E001298FDB05CBA8C9806ADFBF2FF58304F588669D859EB605D734ED45CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e2e903f92329977da97ab707699d6460e74b4fcfb6d1b984767a57618237eb95
                                      • Instruction ID: d469ecbeb55dda07fb67cdea6592827c1269886eadbdbbf078cc9288ba8ff7ed
                                      • Opcode Fuzzy Hash: e2e903f92329977da97ab707699d6460e74b4fcfb6d1b984767a57618237eb95
                                      • Instruction Fuzzy Hash: D9A12F31508A4C8FDB65EF28C889BEA77F5FB58315F10466EE84AC7160EB30D645CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 57c58558abb69b0afab09040fafbd8630bfc317d9ab16d587aadb5ead90f7045
                                      • Instruction ID: 5cdf6a1a4b55cf415209c1c3fe32ee5291ebadc4077a1df1c33a4fc82453778e
                                      • Opcode Fuzzy Hash: 57c58558abb69b0afab09040fafbd8630bfc317d9ab16d587aadb5ead90f7045
                                      • Instruction Fuzzy Hash: BEA1F9357012059FDB04FF28E894A6E77B3FB99310B548129E9079B3A9DB349D22CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 183b9697684ff9e6cfa89e2e32e9c87884baf0b2fb5ef167a9766d8fcbea3ecb
                                      • Instruction ID: 9e53d8027e5a601731a1c74787e146055d3bb1aa90b1586e5d00b4a0fd1913c6
                                      • Opcode Fuzzy Hash: 183b9697684ff9e6cfa89e2e32e9c87884baf0b2fb5ef167a9766d8fcbea3ecb
                                      • Instruction Fuzzy Hash: 1FB16D79E005298BDB15CFA8C8806ADFBF1FF88300B548669D855EB206D774ED82CB94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3427408294e6d4664e92a441cf5b2af7f4ccfeab4136bfb36d60367dd816a403
                                      • Instruction ID: ef0dfaf54f8251a6faf464c7553930ebe55dc8be9baf621cf4ff953711b2dfb1
                                      • Opcode Fuzzy Hash: 3427408294e6d4664e92a441cf5b2af7f4ccfeab4136bfb36d60367dd816a403
                                      • Instruction Fuzzy Hash: 84A1A479E0466A8FDB05CFA8C8416EEFBF1FF45300F188169D855EB206D7349992CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534222205.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5200000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0c222ea4c0bfa758fdc0e80306a4bfab9a974c401d655e7395f7daab3caeb319
                                      • Instruction ID: b7e65f9308c93368ae6e79e8489c09d966bf8bed37e5bb5a4519dbebf1194730
                                      • Opcode Fuzzy Hash: 0c222ea4c0bfa758fdc0e80306a4bfab9a974c401d655e7395f7daab3caeb319
                                      • Instruction Fuzzy Hash: 9BB1D978B111158FC794FB28E998A6E77F2EB88704F1480A9950BDB399DF349C42CF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b09967ac5482500bc099009dc95111bd7cc7545dcabcf40ba633cd1a509d9f95
                                      • Instruction ID: d2b3861f796d398cde5e486febd253eab1fe6452347a37ee5cd8c2fa29e79da6
                                      • Opcode Fuzzy Hash: b09967ac5482500bc099009dc95111bd7cc7545dcabcf40ba633cd1a509d9f95
                                      • Instruction Fuzzy Hash: 2C515174E0020ADFCF08CF88C590AAEB7B1FF89314F248199D855AB755D731AE52DB94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4e64317625e06953a0030493f718403388be9115d8c6a0e5777c3d8d6dbedd3d
                                      • Instruction ID: fc848310fa91ae612587323c20349b3f5b98af9cb5782c582d6d39adb536edb7
                                      • Opcode Fuzzy Hash: 4e64317625e06953a0030493f718403388be9115d8c6a0e5777c3d8d6dbedd3d
                                      • Instruction Fuzzy Hash: B33195B4E0010ADFCF08CF98C590AAEBBB1FF49314F248599D855AB345D375AA82CF94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4521593104.0000000002390000.00000040.00001000.00020000.00000000.sdmp, Offset: 02390000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2390000_nXNMsYXFFc.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2f432f6d4d57ddd5edf10f0a55197208a6667e030cc273150dee4b63bd6a15e3
                                      • Instruction ID: 91b6c706bcecd9ff2a5c33ef736eb5d1f59bc5d5ea323c472f5c4b0a69d74e4f
                                      • Opcode Fuzzy Hash: 2f432f6d4d57ddd5edf10f0a55197208a6667e030cc273150dee4b63bd6a15e3
                                      • Instruction Fuzzy Hash: 4001F634A00109EFCF54DF98C684AADF7B6FB45314F208199D809AB390C331AE42DF80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534009592.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51b0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (aq$4']q$4']q$4']q$4']q$paq
                                      • API String ID: 0-463314800
                                      • Opcode ID: 9c9496827e3bb5897ed9312c332ce9f996d3acc3b0f8f220cefe0be4d84ff0c6
                                      • Instruction ID: 56a04ee1abe49cbefec8902566ba361a5f76ad7d386fed2237189824dfdb3a74
                                      • Opcode Fuzzy Hash: 9c9496827e3bb5897ed9312c332ce9f996d3acc3b0f8f220cefe0be4d84ff0c6
                                      • Instruction Fuzzy Hash: 8D718E746402058FC709EF68E994AAF7BEBFF88300B10496DD446973A8DF74AD06CB61
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4534140930.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_51e0000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (_]q$(_]q$(_]q$(_]q
                                      • API String ID: 0-2651352888
                                      • Opcode ID: 6fb1f15ce026659909d20fac96967ec2dc0aab4288818905a2ea762077fdf6a5
                                      • Instruction ID: 3f08898432849048d33588962a6b8ad20dc8d8cb3b6525b74a08de2f906244b6
                                      • Opcode Fuzzy Hash: 6fb1f15ce026659909d20fac96967ec2dc0aab4288818905a2ea762077fdf6a5
                                      • Instruction Fuzzy Hash: 9F819E31B14104CFC705FF68E8989AEB7B6FB89300B508569D447AB398DF34AD42CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4523840715.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2850000_nXNMsYXFFc.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: &(,k$('Y{$e'o$}IIS
                                      • API String ID: 0-1374273654
                                      • Opcode ID: affaf16bc03c58557d869828756f43e17eb8750f60761e41872809f84eddbf5f
                                      • Instruction ID: 4146827cd2c2390f96547913eaacd741ac36129489dbbcd0dd9fc153f6df14c3
                                      • Opcode Fuzzy Hash: affaf16bc03c58557d869828756f43e17eb8750f60761e41872809f84eddbf5f
                                      • Instruction Fuzzy Hash: 788156B0806A448ED349DF1A9589FA5BBE1BF89310F5A86FAC14D8F232EB708045CF55