Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nXNMsYXFFc.exe

Overview

General Information

Sample name:nXNMsYXFFc.exe
Analysis ID:1581187
MD5:be2edcf02f80b8d9ab65724911e3f2e6
SHA1:ad9a05ddee4f70214bfae228f6a974924bcb2f90
SHA256:3df79f238f056cabc4083c1970b1bc5f2e7e6200c364c0d542b484be20a08e73
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Found many strings related to Crypto-Wallets (likely being stolen)
Found potential dummy code loops (likely to delay analysis)
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Tries to harvest and steal Bitcoin Wallet information
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Potential time zone aware malware
Program does not show much activity (idle)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64native
  • nXNMsYXFFc.exe (PID: 2980 cmdline: "C:\Users\user\Desktop\nXNMsYXFFc.exe" MD5: BE2EDCF02F80B8D9AB65724911E3F2E6)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x5c05a:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x5f5f0:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: nXNMsYXFFc.exe PID: 2980JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      1.2.nXNMsYXFFc.exe.25827ce.0.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
      • 0x57a8c:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
      1.2.nXNMsYXFFc.exe.25827ce.0.raw.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
      • 0x5988c:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
      • 0x5ce22:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T08:20:25.638178+010020283713Unknown Traffic192.168.11.304980923.209.72.25443TCP
      2024-12-27T08:23:35.538997+010020283713Unknown Traffic192.168.11.304981423.209.72.25443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T08:20:35.174397+010020355951Domain Observed Used for C2 Detected185.156.175.4321411192.168.11.3049810TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: nXNMsYXFFc.exeReversingLabs: Detection: 28%
      Source: nXNMsYXFFc.exeVirustotal: Detection: 22%Perma Link
      Source: nXNMsYXFFc.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 185.156.175.43:21411 -> 192.168.11.30:49810
      Source: global trafficTCP traffic: 192.168.11.30:49810 -> 185.156.175.43:21411
      Source: Joe Sandbox ViewASN Name: M247GB M247GB
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.30:49814 -> 23.209.72.25:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.11.30:49809 -> 23.209.72.25:443
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: unknownTCP traffic detected without corresponding DNS query: 185.156.175.43
      Source: nXNMsYXFFc.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
      Source: nXNMsYXFFc.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: nXNMsYXFFc.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: nXNMsYXFFc.exe, 00000001.00000002.31283468378.0000000000837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
      Source: nXNMsYXFFc.exe, 00000001.00000002.31283468378.00000000007D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: nXNMsYXFFc.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
      Source: nXNMsYXFFc.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
      Source: nXNMsYXFFc.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
      Source: nXNMsYXFFc.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: nXNMsYXFFc.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: nXNMsYXFFc.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
      Source: nXNMsYXFFc.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
      Source: nXNMsYXFFc.exe, 00000001.00000002.31283468378.00000000007D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
      Source: nXNMsYXFFc.exe, 00000001.00000002.31283468378.0000000000837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabw
      Source: nXNMsYXFFc.exeString found in binary or memory: http://ocsp.digicert.com0A
      Source: nXNMsYXFFc.exeString found in binary or memory: http://ocsp.digicert.com0C
      Source: nXNMsYXFFc.exeString found in binary or memory: http://ocsp.digicert.com0X
      Source: nXNMsYXFFc.exeString found in binary or memory: http://ocsp.sectigo.com0
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000003138000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: nXNMsYXFFc.exeString found in binary or memory: http://www.toolwiz.com
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/WebDriver.dll
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/chromedriver.exe
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/msedgedriver.exe
      Source: nXNMsYXFFc.exeString found in binary or memory: https://sectigo.com/CPS0
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354rCannot

      System Summary

      barindex
      Source: 1.2.nXNMsYXFFc.exe.25827ce.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
      Source: 1.2.nXNMsYXFFc.exe.25827ce.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
      Source: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
      Source: 1.2.nXNMsYXFFc.exe.25827ce.0.raw.unpack, ImIFiiaFZW8NwtFyyJ.csLarge array initialization: pnTWmaVul: array initializer size 304704
      Source: 1.2.nXNMsYXFFc.exe.3c35570.3.raw.unpack, ImIFiiaFZW8NwtFyyJ.csLarge array initialization: pnTWmaVul: array initializer size 304704
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess Stats: CPU usage > 6%
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_025807511_2_02580751
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_025E0E061_2_025E0E06
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_025DD6D61_2_025DD6D6
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_025896A31_2_025896A3
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_025DDB0E1_2_025DDB0E
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_025DD3061_2_025DD306
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_025DC4121_2_025DC412
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_025800001_2_02580000
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_025DE5AE1_2_025DE5AE
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_029C53D01_2_029C53D0
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_029C5B301_2_029C5B30
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_029C1D801_2_029C1D80
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_029C1AF71_2_029C1AF7
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_029C4A301_2_029C4A30
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_029C53C01_2_029C53C0
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_029C1B081_2_029C1B08
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_029C48AF1_2_029C48AF
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_029C1D801_2_029C1D80
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_029CAF801_2_029CAF80
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_029C45B61_2_029C45B6
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_052AC0081_2_052AC008
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_052A4E581_2_052A4E58
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_052A53451_2_052A5345
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_052A6D001_2_052A6D00
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_052A9CC01_2_052A9CC0
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_052ABB501_2_052ABB50
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053750A01_2_053750A0
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053700401_2_05370040
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053762601_2_05376260
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053AA7101_2_053AA710
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053A1AA01_2_053A1AA0
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053A6F081_2_053A6F08
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053A57601_2_053A5760
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053A8E281_2_053A8E28
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053AA6FF1_2_053AA6FF
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053AE3301_2_053AE330
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053AE3201_2_053AE320
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053AF2C11_2_053AF2C1
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053C9C381_2_053C9C38
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053CD7A01_2_053CD7A0
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053C9F801_2_053C9F80
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053CA8501_2_053CA850
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053CFA911_2_053CFA91
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053CF5571_2_053CF557
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053CF54E1_2_053CF54E
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053C1F601_2_053C1F60
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053C1F501_2_053C1F50
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053CD7901_2_053CD790
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053CF63D1_2_053CF63D
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053C001B1_2_053C001B
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053C00401_2_053C0040
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053C40A81_2_053C40A8
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053CD0E51_2_053CD0E5
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053CFB661_2_053CFB66
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_053CFA9A1_2_053CFA9A
      Source: nXNMsYXFFc.exeStatic PE information: invalid certificate
      Source: nXNMsYXFFc.exeBinary or memory string: OriginalFilename vs nXNMsYXFFc.exe
      Source: nXNMsYXFFc.exe, 00000001.00000000.28833596563.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: WM/OriginalFilename vs nXNMsYXFFc.exe
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIcgrxeqruy.dll" vs nXNMsYXFFc.exe
      Source: nXNMsYXFFc.exe, 00000001.00000002.31289715982.0000000003D50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIcgrxeqruy.dll" vs nXNMsYXFFc.exe
      Source: nXNMsYXFFc.exe, 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSojzzarduxj.exe" vs nXNMsYXFFc.exe
      Source: nXNMsYXFFc.exe, 00000001.00000002.31293260849.0000000005180000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameIcgrxeqruy.dll" vs nXNMsYXFFc.exe
      Source: nXNMsYXFFc.exeBinary or memory string: WM/OriginalFilename vs nXNMsYXFFc.exe
      Source: nXNMsYXFFc.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: 1.2.nXNMsYXFFc.exe.25827ce.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
      Source: 1.2.nXNMsYXFFc.exe.25827ce.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
      Source: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
      Source: 1.2.nXNMsYXFFc.exe.25827ce.0.raw.unpack, XxHkOWpffRyD2rf8x9.csCryptographic APIs: 'CreateDecryptor'
      Source: 1.2.nXNMsYXFFc.exe.25827ce.0.raw.unpack, XxHkOWpffRyD2rf8x9.csCryptographic APIs: 'CreateDecryptor'
      Source: 1.2.nXNMsYXFFc.exe.25827ce.0.raw.unpack, ImIFiiaFZW8NwtFyyJ.csCryptographic APIs: 'CreateDecryptor'
      Source: 1.2.nXNMsYXFFc.exe.3c35570.3.raw.unpack, XxHkOWpffRyD2rf8x9.csCryptographic APIs: 'CreateDecryptor'
      Source: 1.2.nXNMsYXFFc.exe.3c35570.3.raw.unpack, XxHkOWpffRyD2rf8x9.csCryptographic APIs: 'CreateDecryptor'
      Source: 1.2.nXNMsYXFFc.exe.3c35570.3.raw.unpack, ImIFiiaFZW8NwtFyyJ.csCryptographic APIs: 'CreateDecryptor'
      Source: classification engineClassification label: mal100.spyw.evad.winEXE@1/0@0/1
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_02580E61 CreateToolhelp32Snapshot,Thread32First,Wow64SuspendThread,CloseHandle,CloseHandle,1_2_02580E61
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeMutant created: NULL
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeMutant created: \Sessions\1\BaseNamedObjects\f2d06879d699
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: nXNMsYXFFc.exeReversingLabs: Detection: 28%
      Source: nXNMsYXFFc.exeVirustotal: Detection: 22%
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: nXNMsYXFFc.exeStatic file information: File size 2174904 > 1048576
      Source: nXNMsYXFFc.exeStatic PE information: Raw size of CODE is bigger than: 0x100000 < 0x127600

      Data Obfuscation

      barindex
      Source: 1.2.nXNMsYXFFc.exe.25827ce.0.raw.unpack, XxHkOWpffRyD2rf8x9.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
      Source: 1.2.nXNMsYXFFc.exe.3c35570.3.raw.unpack, XxHkOWpffRyD2rf8x9.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
      Source: nXNMsYXFFc.exeStatic PE information: real checksum: 0xff4012 should be: 0x21a706
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_025877B6 push ebx; retf 1_2_025877BE
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_052A89B8 push eax; ret 1_2_052A89B9
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_052A8A4B pushfd ; ret 1_2_052A8A51
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_052A9ACB push eax; iretd 1_2_052A9AD1
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_0537A7BA push eax; iretd 1_2_0537A7C1
      Source: 1.2.nXNMsYXFFc.exe.25827ce.0.raw.unpack, XxHkOWpffRyD2rf8x9.csHigh entropy of concatenated method names: 'kM5C10wM8a7nJUq9YQn', 'UMrXMFw6rY39JRAnjo4', 'kQNfG0h0et', 'vh0ry9Sq2v', 'vMdfsjNtiP', 'c1Tf9G3hPh', 'WT5fI1NDIY', 'yWLfLFR0VC', 'kIMNxe4OdN', 'L5YC0OdQI'
      Source: 1.2.nXNMsYXFFc.exe.3c35570.3.raw.unpack, XxHkOWpffRyD2rf8x9.csHigh entropy of concatenated method names: 'kM5C10wM8a7nJUq9YQn', 'UMrXMFw6rY39JRAnjo4', 'kQNfG0h0et', 'vh0ry9Sq2v', 'vMdfsjNtiP', 'c1Tf9G3hPh', 'WT5fI1NDIY', 'yWLfLFR0VC', 'kIMNxe4OdN', 'L5YC0OdQI'
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeMemory allocated: 29C0000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeMemory allocated: 2C30000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeMemory allocated: 2A40000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWindow / User API: threadDelayed 9874Jump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exe TID: 6212Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exe TID: 2068Thread sleep count: 9874 > 30Jump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exe TID: 2068Thread sleep count: 79 > 30Jump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: nXNMsYXFFc.exe, 00000001.00000002.31283468378.00000000007D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess Stats: CPU usage > 5% for more than 60s
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_02580751 mov edx, dword ptr fs:[00000030h]1_2_02580751
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_02580D11 mov eax, dword ptr fs:[00000030h]1_2_02580D11
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_02581360 mov eax, dword ptr fs:[00000030h]1_2_02581360
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_02581361 mov eax, dword ptr fs:[00000030h]1_2_02581361
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeCode function: 1_2_025810C1 mov eax, dword ptr fs:[00000030h]1_2_025810C1
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeProcess token adjusted: DebugJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeMemory allocated: page read and write | page guardJump to behavior
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.000000000305D000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002F91000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002FE5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: nXNMsYXFFc.exeBinary or memory string: ProgMan
      Source: nXNMsYXFFc.exeBinary or memory string: ProgManU
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.000000000305D000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002F91000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002F3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager*
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.000000000305D000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002FE5000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000003035000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct

      Stealing of Sensitive Information

      barindex
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002E69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Electrum
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002F3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q com.liberty.jaxx
      Source: nXNMsYXFFc.exe, 00000001.00000003.30533223700.0000000005595000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002F3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q1C:\Users\user\AppData\Roaming\Ethereum\keystore
      Source: nXNMsYXFFc.exe, 00000001.00000003.30533223700.0000000005595000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
      Source: nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002F3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
      Source: nXNMsYXFFc.exe, 00000001.00000003.30533223700.0000000005595000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
      Source: nXNMsYXFFc.exeString found in binary or memory: set_UseMachineKeyStore
      Source: C:\Users\user\Desktop\nXNMsYXFFc.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
      Source: Yara matchFile source: 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: nXNMsYXFFc.exe PID: 2980, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts321
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      Process Injection
      1
      Disable or Modify Tools
      OS Credential Dumping1
      System Time Discovery
      Remote Services11
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      442
      Virtualization/Sandbox Evasion
      LSASS Memory521
      Security Software Discovery
      Remote Desktop Protocol1
      Data from Local System
      1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Process Injection
      Security Account Manager442
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Deobfuscate/Decode Files or Information
      NTDS3
      Process Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA Secrets1
      Application Window Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Software Packing
      Cached Domain Credentials23
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      nXNMsYXFFc.exe29%ReversingLabs
      nXNMsYXFFc.exe23%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://ocsp.sectigo.com00%Avira URL Cloudsafe
      http://www.toolwiz.com0%Avira URL Cloudsafe
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://sectigo.com/CPS0nXNMsYXFFc.exefalse
        high
        https://stackoverflow.com/q/14436606/23354nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0ynXNMsYXFFc.exefalse
            high
            http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0nXNMsYXFFc.exefalse
              high
              http://ocsp.sectigo.com0nXNMsYXFFc.exefalse
              • Avira URL Cloud: safe
              unknown
              https://github.com/DFfe9ewf/test3/raw/refs/heads/main/WebDriver.dllnXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://stackoverflow.com/q/2152978/23354rCannotnXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://stackoverflow.com/q/11564914/23354;nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.toolwiz.comnXNMsYXFFc.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://github.com/DFfe9ewf/test3/raw/refs/heads/main/chromedriver.exenXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://github.com/DFfe9ewf/test3/raw/refs/heads/main/msedgedriver.exenXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#nXNMsYXFFc.exefalse
                          high
                          http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#nXNMsYXFFc.exefalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namenXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, nXNMsYXFFc.exe, 00000001.00000002.31285978351.0000000003138000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              185.156.175.43
                              unknownRomania
                              9009M247GBtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1581187
                              Start date and time:2024-12-27 08:18:16 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 10m 27s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2021, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                              Run name:Suspected VM Detection
                              Number of analysed new started processes analysed:3
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:nXNMsYXFFc.exe
                              Detection:MAL
                              Classification:mal100.spyw.evad.winEXE@1/0@0/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 91%
                              • Number of executed functions: 338
                              • Number of non-executed functions: 37
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): dllhost.exe, backgroundTaskHost.exe
                              • Excluded IPs from analysis (whitelisted): 23.44.201.17, 52.111.229.19, 52.113.194.132
                              • Excluded domains from analysis (whitelisted): www.bing.com, assets.msn.com, ecs.office.com, ctldl.windowsupdate.com, nexusrules.officeapps.live.com, api.msn.com
                              • Report size getting too big, too many NtOpenFile calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              TimeTypeDescription
                              02:20:34API Interceptor14422497x Sleep call for process: nXNMsYXFFc.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              185.156.175.43UD3cS4ODWz.exeGet hashmaliciousUnknownBrowse
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                M247GBUD3cS4ODWz.exeGet hashmaliciousUnknownBrowse
                                • 185.156.175.43
                                ub8ehJSePAfc9FYqZIT6.arm6.elfGet hashmaliciousUnknownBrowse
                                • 92.118.56.167
                                ub8ehJSePAfc9FYqZIT6.arm7.elfGet hashmaliciousMiraiBrowse
                                • 92.118.56.167
                                ub8ehJSePAfc9FYqZIT6.x86_64.elfGet hashmaliciousUnknownBrowse
                                • 92.118.56.167
                                ub8ehJSePAfc9FYqZIT6.ppc.elfGet hashmaliciousUnknownBrowse
                                • 92.118.56.167
                                ub8ehJSePAfc9FYqZIT6.mips.elfGet hashmaliciousUnknownBrowse
                                • 92.118.56.167
                                ub8ehJSePAfc9FYqZIT6.mpsl.elfGet hashmaliciousUnknownBrowse
                                • 92.118.56.167
                                ub8ehJSePAfc9FYqZIT6.arm.elfGet hashmaliciousMiraiBrowse
                                • 92.118.56.167
                                ub8ehJSePAfc9FYqZIT6.m68k.elfGet hashmaliciousMiraiBrowse
                                • 92.118.56.167
                                No context
                                No context
                                No created / dropped files found
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.156429765941512
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.79%
                                • Win32 Executable Delphi generic (14689/80) 0.15%
                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                File name:nXNMsYXFFc.exe
                                File size:2'174'904 bytes
                                MD5:be2edcf02f80b8d9ab65724911e3f2e6
                                SHA1:ad9a05ddee4f70214bfae228f6a974924bcb2f90
                                SHA256:3df79f238f056cabc4083c1970b1bc5f2e7e6200c364c0d542b484be20a08e73
                                SHA512:950a60d17efebe1b61f96be5e4947d128c15d812e2e895f4d3d1d1ef5607b5931c7919696ac71c4fd7160c3dcb9f0fa724b0ae0d42b8db3cb6e8b6d171a0a61e
                                SSDEEP:49152:4uG6knvVDK8YcrWaCyqp1uw/0L5QiHzROaBoKxcMH:LG6knvVe8Yzacp50Lx5BoYc8
                                TLSH:BFA5BE52B74348B3F25716B81C4EABD8953A7F105EF1648B3BFC8A4C0FB661139152AB
                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                Icon Hash:3e5fcdce1f0c2813
                                Entrypoint:0x52859c
                                Entrypoint Section:CODE
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                DLL Characteristics:
                                Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:ba8c1dbdc3c38ecddecbc436d980538f
                                Signature Valid:false
                                Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                Signature Validation Error:The digital signature of the object did not verify
                                Error Number:-2146869232
                                Not Before, Not After
                                • 21/04/2022 02:00:00 21/04/2025 01:59:59
                                Subject Chain
                                • CN=Musecy SM Ltd., O=Musecy SM Ltd., S=Lemesos, C=CY
                                Version:3
                                Thumbprint MD5:BD369706380B543F3116644C27E8A343
                                Thumbprint SHA-1:2162556B51EFF0F55949EEDD6D0B270E412C27B0
                                Thumbprint SHA-256:90FD858CBC4F0C292C17D50C323FD0B5704D87EFD7DB4B80AF74D76CCAE868E7
                                Serial:00C134B2A3AE7F9BD5A260DC5FCC04087C
                                Instruction
                                push ebp
                                mov ebp, esp
                                add esp, FFFFFFF0h
                                mov eax, 00528184h
                                call 00007F902C9F6D21h
                                mov eax, dword ptr [0052C484h]
                                mov eax, dword ptr [eax]
                                call 00007F902CA5D12Dh
                                mov ecx, dword ptr [0052C1D8h]
                                mov eax, dword ptr [0052C484h]
                                mov eax, dword ptr [eax]
                                mov edx, dword ptr [005263B0h]
                                call 00007F902CA5D12Dh
                                mov ecx, dword ptr [0052C15Ch]
                                mov eax, dword ptr [0052C484h]
                                mov eax, dword ptr [eax]
                                mov edx, dword ptr [00525E40h]
                                call 00007F902CA5D115h
                                mov eax, dword ptr [0052C484h]
                                mov eax, dword ptr [eax]
                                call 00007F902CA5D189h
                                call 00007F902C9F45B8h
                                lea eax, dword ptr [eax+00h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x12f0000x295e.idata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x14f0000xc8400.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x2104000x2bb8.rsrc
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1340000x1a13c.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x1330000x18.rdata
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                CODE0x10000x1275fc0x127600d8787007bbfa6c50dc285c2ae43d7862False0.45226126084426577data6.569236214754046IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                DATA0x1290000x36c00x3800f15602958cfed3b9c1fa839de845894eFalse0.35498046875data4.044626185990053IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                BSS0x12d0000x1d210x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .idata0x12f0000x295e0x2a007d48f980de0ab1b669d230f1aad47239False0.3625372023809524data5.0281993778896545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .tls0x1320000x100x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rdata0x1330000x180x200b90be1293225713fd61560e123c5aa47False0.05078125MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "S"0.2069200177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                .reloc0x1340000x1a13c0x1a200c839772e1a25c7cda4d2220521452f23False0.39902624102870815data6.531022351368505IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                .rsrc0x14f0000xc84000xc840042c657d12ed380130e9a41c474fadbb6False0.7004172031054932data7.557370194206266IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_CURSOR0x14fe040x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
                                RT_CURSOR0x14ff380x134data0.4642857142857143
                                RT_CURSOR0x15006c0x134data0.4805194805194805
                                RT_CURSOR0x1501a00x134data0.38311688311688313
                                RT_CURSOR0x1502d40x134data0.36038961038961037
                                RT_CURSOR0x1504080x134data0.4090909090909091
                                RT_CURSOR0x15053c0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                RT_BITMAP0x1506700x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                RT_BITMAP0x1508400x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
                                RT_BITMAP0x150a240x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                RT_BITMAP0x150bf40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
                                RT_BITMAP0x150dc40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
                                RT_BITMAP0x150f940x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
                                RT_BITMAP0x1511640x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
                                RT_BITMAP0x1513340x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                RT_BITMAP0x1515040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
                                RT_BITMAP0x1516d40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                RT_BITMAP0x1518a40xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
                                RT_ICON0x15198c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0ChineseChina0.2980894357033006
                                RT_ICON0x1621b40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0ChineseChina0.43776570618800187
                                RT_ICON0x1663dc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0ChineseChina0.5142116182572614
                                RT_ICON0x1689840x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0ChineseChina0.5811444652908068
                                RT_ICON0x169a2c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 0ChineseChina0.6598360655737705
                                RT_ICON0x16a3b40x468Device independent bitmap graphic, 16 x 32 x 32, image size 0ChineseChina0.749113475177305
                                RT_DIALOG0x16a81c0x52data0.7682926829268293
                                RT_STRING0x16a8700xe4data0.5789473684210527
                                RT_STRING0x16a9540x1e4data0.38016528925619836
                                RT_STRING0x16ab380x1a4data0.4714285714285714
                                RT_STRING0x16acdc0x11cdata0.5880281690140845
                                RT_STRING0x16adf80x38cdata0.4251101321585903
                                RT_STRING0x16b1840xc4data0.6071428571428571
                                RT_STRING0x16b2480xecdata0.597457627118644
                                RT_STRING0x16b3340x130data0.5625
                                RT_STRING0x16b4640x3c0data0.4
                                RT_STRING0x16b8240x400data0.3876953125
                                RT_STRING0x16bc240x314data0.4022842639593909
                                RT_STRING0x16bf380x334data0.3426829268292683
                                RT_STRING0x16c26c0x404data0.3754863813229572
                                RT_STRING0x16c6700x114data0.5
                                RT_STRING0x16c7840xe4data0.5482456140350878
                                RT_STRING0x16c8680x24cdata0.477891156462585
                                RT_STRING0x16cab40x3ccdata0.30246913580246915
                                RT_STRING0x16ce800x3acdata0.37553191489361704
                                RT_STRING0x16d22c0x2d4data0.4046961325966851
                                RT_RCDATA0x16d5000x242bfDelphi compiled form 'TvgBackground'EnglishUnited States0.2749883571028422
                                RT_RCDATA0x1917c00x10data1.5
                                RT_RCDATA0x1917d00x670data0.6037621359223301
                                RT_RCDATA0x191e400xa2aDelphi compiled form 'TfrmAbout'0.23904688700999233
                                RT_RCDATA0x19286c0x817Delphi compiled form 'TfrmControlBox'0.3896668276195075
                                RT_RCDATA0x1930840x1ce81Delphi compiled form 'TfrmPlayer'0.9742231906825112
                                RT_RCDATA0x1aff080x1809Delphi compiled form 'TvgBitmapEditor'0.3528360149520559
                                RT_RCDATA0x1b17140x3144Delphi compiled form 'TvgBrushDesign'0.20480494766888677
                                RT_RCDATA0x1b48580x80eDelphi compiled form 'TvgPathDataDesigner'0.4010669253152279
                                RT_GROUP_CURSOR0x1b50680x14Lotus unknown worksheet or configuration, revision 0x11.25
                                RT_GROUP_CURSOR0x1b507c0x14Lotus unknown worksheet or configuration, revision 0x11.25
                                RT_GROUP_CURSOR0x1b50900x14Lotus unknown worksheet or configuration, revision 0x11.3
                                RT_GROUP_CURSOR0x1b50a40x14Lotus unknown worksheet or configuration, revision 0x11.3
                                RT_GROUP_CURSOR0x1b50b80x14Lotus unknown worksheet or configuration, revision 0x11.3
                                RT_GROUP_CURSOR0x1b50cc0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                RT_GROUP_CURSOR0x1b50e00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                RT_GROUP_ICON0x1b50f40x5adataChineseChina0.7888888888888889
                                DLLImport
                                kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, SystemTimeToFileTime, Sleep, SizeofResource, SetThreadLocale, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEnvironmentVariableW, SetEnvironmentVariableA, SetEndOfFile, SetCurrentDirectoryW, ResumeThread, ResetEvent, ReleaseMutex, ReadFile, OutputDebugStringA, MulDiv, LockResource, LocalFileTimeToFileTime, LoadResource, LoadLibraryExW, LoadLibraryW, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProfileStringA, GetProcAddress, GetModuleHandleA, GetModuleFileNameW, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameW, GetFullPathNameA, GetFileSize, GetFileAttributesW, GetFileAttributesA, GetExitCodeThread, GetEnvironmentVariableW, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCurrentDirectoryW, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileW, FindFirstFileW, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateMutexA, CreateFileW, CreateFileA, CreateEventA, CompareStringW, CompareStringA, CloseHandle
                                version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRegionData, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExcludeClipRect, EndPage, EndDoc, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICA, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, BitBlt
                                user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, SendDlgItemMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsClipboardFormatAvailable, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetUpdateRgn, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowExA, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharLowerBuffW, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                kernel32.dllSleep
                                oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                ole32.dllReleaseStgMedium, RevokeDragDrop, RegisterDragDrop, OleInitialize, CoCreateInstance
                                comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                                imm32.dllImmSetCompositionWindow, ImmSetCompositionFontA, ImmGetCompositionStringW, ImmReleaseContext, ImmGetContext
                                winspool.drvOpenPrinterA, EnumPrintersA, DocumentPropertiesA, ClosePrinter
                                shell32.dllDragQueryFileW, DragQueryFileA
                                comdlg32.dllChooseFontA, ChooseColorA, GetSaveFileNameA, GetOpenFileNameA
                                Language of compilation systemCountry where language is spokenMap
                                ChineseChina
                                EnglishUnited States
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-12-27T08:20:25.638178+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.11.304980923.209.72.25443TCP
                                2024-12-27T08:20:35.174397+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert1185.156.175.4321411192.168.11.3049810TCP
                                2024-12-27T08:23:35.538997+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.11.304981423.209.72.25443TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Dec 27, 2024 08:20:33.993575096 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:20:34.273581028 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:20:34.274234056 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:20:34.275140047 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:20:34.553884983 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:20:34.554054976 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:20:34.844136000 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:20:34.844149113 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:20:34.844326973 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:20:34.849812984 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:20:35.174396992 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:20:35.311527014 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:20:35.363020897 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:20:37.889738083 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:20:38.210460901 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:20:38.210673094 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:20:38.529333115 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:01.826381922 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:02.144013882 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:02.144182920 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:02.622473955 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:02.903753042 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:03.038845062 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:03.061801910 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:03.381088972 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:03.381273985 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:03.840965033 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:04.112456083 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:27.773772001 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:28.092152119 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:28.092310905 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:28.370286942 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:28.413435936 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:28.691010952 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:28.694293022 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:29.010710955 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:29.011121035 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:29.343769073 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:53.850977898 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:54.168706894 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:54.168874979 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:54.448326111 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:54.501300097 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:54.779382944 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:54.829374075 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:54.839273930 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:55.159086943 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:21:55.159204006 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:21:55.479335070 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:22:19.851012945 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:22:20.171462059 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:22:20.171600103 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:22:20.516623020 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:22:20.595644951 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:22:20.636029005 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:22:20.913717031 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:22:20.964086056 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:22:20.983808041 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:22:21.318810940 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:22:21.318927050 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:22:21.729510069 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:22:22.006647110 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:22:45.860557079 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:22:46.180247068 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:22:46.180550098 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:22:46.458129883 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:22:46.536396027 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:22:46.816451073 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:22:46.891933918 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:22:47.220643044 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:22:47.220768929 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:22:47.538629055 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:23:11.906213999 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:23:12.239336967 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:23:12.239576101 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:23:12.518630981 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:23:12.561774015 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:23:12.838558912 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:23:12.889799118 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:23:12.903359890 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:23:13.221586943 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:23:13.221806049 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:23:13.550169945 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:23:37.878603935 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:23:38.259089947 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:23:38.537727118 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:23:38.538433075 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:23:38.587203026 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:23:38.865556002 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:23:38.915199041 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:23:38.922123909 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:23:39.248833895 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:23:39.248984098 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:23:39.581703901 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:03.899262905 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:04.284414053 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:04.565779924 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:04.612456083 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:04.893750906 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:04.960236073 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:05.285105944 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:05.285255909 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:05.424835920 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:05.924685955 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:06.250801086 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:29.432629108 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:29.751621008 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:29.751764059 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:30.030468941 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:30.075439930 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:30.355115891 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:30.356162071 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:30.689554930 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:30.689719915 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:31.006618977 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:55.429512978 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:55.746551991 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:55.746665001 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:55.970314026 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:56.022566080 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:56.245259047 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:56.245883942 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:56.550396919 CET2141149810185.156.175.43192.168.11.30
                                Dec 27, 2024 08:24:56.550532103 CET4981021411192.168.11.30185.156.175.43
                                Dec 27, 2024 08:24:56.878504992 CET2141149810185.156.175.43192.168.11.30

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Target ID:1
                                Start time:02:20:21
                                Start date:27/12/2024
                                Path:C:\Users\user\Desktop\nXNMsYXFFc.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\nXNMsYXFFc.exe"
                                Imagebase:0x400000
                                File size:2'174'904 bytes
                                MD5 hash:BE2EDCF02F80B8D9AB65724911E3F2E6
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Borland Delphi
                                Yara matches:
                                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.31285978351.0000000002C54000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:7.1%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:26%
                                  Total number of Nodes:96
                                  Total number of Limit Nodes:11
                                  execution_graph 58784 2580751 58785 258075f 58784->58785 58798 25810a1 58785->58798 58787 2580be5 58788 25808f7 GetPEB 58790 2580974 58788->58790 58789 25808b2 58789->58787 58789->58788 58801 2580e61 58790->58801 58793 25809d5 CreateThread 58794 25809ad 58793->58794 58812 2580d11 GetPEB 58793->58812 58794->58787 58810 2581361 GetPEB 58794->58810 58796 2580e61 5 API calls 58796->58787 58797 2580a2f 58797->58787 58797->58796 58799 25810ae 58798->58799 58811 25810c1 GetPEB 58798->58811 58799->58789 58802 2580e77 CreateToolhelp32Snapshot 58801->58802 58804 25809a7 58802->58804 58805 2580eae Thread32First 58802->58805 58804->58793 58804->58794 58806 2580f6a CloseHandle 58805->58806 58807 2580ed5 58805->58807 58806->58804 58807->58806 58808 2580f0c Wow64SuspendThread 58807->58808 58809 2580f36 CloseHandle 58807->58809 58808->58809 58809->58807 58810->58797 58811->58799 58813 2580d6a 58812->58813 58814 2580dca CreateThread 58813->58814 58815 2580e17 58813->58815 58814->58813 58816 2581541 58814->58816 58819 25dbf06 58816->58819 58818 2581546 58820 25df3fc 58819->58820 58821 25dbf10 58819->58821 58822 25df50a 58820->58822 58823 25df420 58820->58823 58821->58818 58833 25e06d6 58822->58833 58857 25e1c7d 58823->58857 58826 25df438 58827 25e1c7d LoadLibraryA 58826->58827 58832 25df4b0 58826->58832 58828 25df47a 58827->58828 58829 25e1c7d LoadLibraryA 58828->58829 58830 25df496 58829->58830 58831 25e1c7d LoadLibraryA 58830->58831 58831->58832 58832->58818 58834 25e1c7d LoadLibraryA 58833->58834 58835 25e06f9 58834->58835 58836 25e1c7d LoadLibraryA 58835->58836 58837 25e0711 58836->58837 58838 25e1c7d LoadLibraryA 58837->58838 58839 25e072f 58838->58839 58840 25e0744 VirtualAlloc 58839->58840 58855 25e0758 58839->58855 58842 25e0772 58840->58842 58840->58855 58841 25e1c7d LoadLibraryA 58844 25e07f0 58841->58844 58842->58841 58842->58855 58843 25e1c7d LoadLibraryA 58846 25e0846 58843->58846 58844->58846 58844->58855 58861 25e1a84 58844->58861 58845 25e08a8 58845->58855 58856 25e090a 58845->58856 58865 25df866 58845->58865 58846->58843 58846->58845 58846->58855 58850 25e0a16 58892 25e0e06 LoadLibraryA 58850->58892 58851 25e09cb 58851->58855 58888 25e04c7 58851->58888 58855->58832 58856->58850 58856->58851 58856->58855 58858 25e1c94 58857->58858 58859 25e1cbb 58858->58859 58898 25dfd82 LoadLibraryA 58858->58898 58859->58826 58862 25e1a99 58861->58862 58863 25e1b0f LoadLibraryA 58862->58863 58864 25e1b19 58862->58864 58863->58864 58864->58844 58866 25e1a84 LoadLibraryA 58865->58866 58867 25df87a 58866->58867 58870 25df882 58867->58870 58893 25e1b22 58867->58893 58870->58855 58879 25df961 58870->58879 58871 25df8b8 VirtualProtect 58871->58870 58872 25df8cc 58871->58872 58873 25df8e6 VirtualProtect 58872->58873 58874 25e1b22 LoadLibraryA 58873->58874 58875 25df907 58874->58875 58875->58870 58876 25df91e VirtualProtect 58875->58876 58876->58870 58877 25df92e 58876->58877 58878 25df943 VirtualProtect 58877->58878 58878->58870 58880 25e1a84 LoadLibraryA 58879->58880 58881 25df977 58880->58881 58882 25e1b22 LoadLibraryA 58881->58882 58883 25df987 58882->58883 58884 25df9c4 58883->58884 58885 25df990 VirtualProtect 58883->58885 58884->58856 58885->58884 58886 25df9a0 58885->58886 58887 25df9af VirtualProtect 58886->58887 58887->58884 58889 25e04fa 58888->58889 58890 25e0640 SafeArrayCreate 58889->58890 58891 25e05a5 58889->58891 58890->58891 58891->58855 58892->58855 58894 25df89a 58893->58894 58896 25e1b3d 58893->58896 58894->58870 58894->58871 58896->58894 58897 25dff27 LoadLibraryA 58896->58897 58897->58894 58898->58858

                                  Control-flow Graph

                                  APIs
                                  • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000,?,?,?,?,?,025809A7,?,00000001,?,81EC8B55,000000FF), ref: 02580E9F
                                  • Thread32First.KERNEL32(00000000,0000001C), ref: 02580ECB
                                  • Wow64SuspendThread.KERNEL32(00000000), ref: 02580F1E
                                  • CloseHandle.KERNEL32(00000000), ref: 02580F48
                                  • CloseHandle.KERNEL32(00000000), ref: 02580F7C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandle$CreateFirstSnapshotSuspendThreadThread32Toolhelp32Wow64
                                  • String ID:
                                  • API String ID: 2720937676-0
                                  • Opcode ID: ed4f7e93d5c748d87e273fbd072de27cfcb41b6612c19f34ce8dd7f2a24eca5e
                                  • Instruction ID: 36637764e2fe4655cd8292dbe9f47e908f808f118a54aba272d0afc33261b353
                                  • Opcode Fuzzy Hash: ed4f7e93d5c748d87e273fbd072de27cfcb41b6612c19f34ce8dd7f2a24eca5e
                                  • Instruction Fuzzy Hash: FE410E71600109AFDB18DF98C490BADBBB6FF88300F10C168EA15AB7D4DB74AE45CB54

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1924 2580d11-2580d68 GetPEB 1925 2580d73-2580d77 1924->1925 1926 2580d7d-2580d88 1925->1926 1927 2580e17-2580e1e 1925->1927 1929 2580d8e-2580da5 1926->1929 1930 2580e12 1926->1930 1928 2580e29-2580e2d 1927->1928 1932 2580e3e-2580e45 1928->1932 1933 2580e2f-2580e3c 1928->1933 1934 2580dca-2580de2 CreateThread 1929->1934 1935 2580da7-2580dc8 1929->1935 1930->1925 1937 2580e4e-2580e53 1932->1937 1938 2580e47-2580e49 1932->1938 1933->1928 1939 2580de6-2580dee 1934->1939 1935->1939 1938->1937 1939->1930 1941 2580df0-2580e0d 1939->1941 1941->1930
                                  APIs
                                  • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 02580DDD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateThread
                                  • String ID: ,
                                  • API String ID: 2422867632-3772416878
                                  • Opcode ID: fc60953fbf7661c618888493d7684cefa6d88d8934743e077e5b29c3addb46ae
                                  • Instruction ID: 5d93dad4dd134ecf461a6a446e90383a2a7113772a9f447e47dea9b28c8572a0
                                  • Opcode Fuzzy Hash: fc60953fbf7661c618888493d7684cefa6d88d8934743e077e5b29c3addb46ae
                                  • Instruction Fuzzy Hash: E841C474A00208EFDB14DF98C994BAEBBB1BF48314F208598D5156B391D7B1AE85CF94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2806 53cd7a0-53cd7c2 2807 53cd7c8-53cf0c3 2806->2807 2808 53cffa0-53cffac 2806->2808 3112 53cf0c5 call 537f9a8 2807->3112 3113 53cf0c5 call 537f998 2807->3113 3075 53cf0cb-53cf1a1 3086 53cf1e3-53cf243 3075->3086 3087 53cf1a3-53cf1d6 3075->3087 3093 53cf35f-53cf37b 3086->3093 3094 53cf249-53cf32a call 53c7080 3086->3094 3087->3086 3097 53cf37d-53cf383 3093->3097 3098 53cf38e 3093->3098 3094->3093 3110 53cf32c-53cf358 3094->3110 3097->3098 3098->2808 3110->3093 3112->3075 3113->3075
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 7[IS
                                  • API String ID: 0-4287113815
                                  • Opcode ID: b4cd43e20d589500c3b8079d7c0750d8b7f2e9169c43fed328e2e562b56c976f
                                  • Instruction ID: dbc4e96b5e56d0c612a93a0d4e93cd27bc571ee76600db982575c4cf3de534dc
                                  • Opcode Fuzzy Hash: b4cd43e20d589500c3b8079d7c0750d8b7f2e9169c43fed328e2e562b56c976f
                                  • Instruction Fuzzy Hash: 7AF2C2346021148FD745FF24E9A0FAA73F2BB9C304B1181A9E54AEB358DB34AD51CF96

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 3114 53cd790-53cd7c2 3116 53cd7c8-53cd806 3114->3116 3117 53cffa0-53cffac 3114->3117 3123 53cd810-53cd816 3116->3123 3124 53cd820-53cf0b0 3123->3124 3383 53cf0b7-53cf0c3 3124->3383 3421 53cf0c5 call 537f9a8 3383->3421 3422 53cf0c5 call 537f998 3383->3422 3384 53cf0cb-53cf1a1 3395 53cf1e3-53cf243 3384->3395 3396 53cf1a3-53cf1d6 3384->3396 3402 53cf35f-53cf37b 3395->3402 3403 53cf249-53cf32a call 53c7080 3395->3403 3396->3395 3406 53cf37d-53cf383 3402->3406 3407 53cf38e 3402->3407 3403->3402 3419 53cf32c-53cf358 3403->3419 3406->3407 3407->3117 3419->3402 3421->3384 3422->3384
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 7[IS
                                  • API String ID: 0-4287113815
                                  • Opcode ID: 30f022c777c174f8436e5cf70e4c279e7f3a03f7d9f8c5ad67a13a4844fe51e2
                                  • Instruction ID: e398f4daab8b6b1a4ac89230a4fd6a45fc6feffc3a333ad94586ff038a299b59
                                  • Opcode Fuzzy Hash: 30f022c777c174f8436e5cf70e4c279e7f3a03f7d9f8c5ad67a13a4844fe51e2
                                  • Instruction Fuzzy Hash: 86F2C2346021148FD745FF24E9A0FAA73F2BB9C304B1181A9E54AEB358CB34AD51CF96
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4
                                  • API String ID: 0-4088798008
                                  • Opcode ID: 0f3f3d91c2cdc17fe416568ed17c907cb16cd5273c976ecc33b22295347ed874
                                  • Instruction ID: dc1deea5c0e9adee83a2bdb79216775cefd61989bbb3b4d8f321b97591a0f058
                                  • Opcode Fuzzy Hash: 0f3f3d91c2cdc17fe416568ed17c907cb16cd5273c976ecc33b22295347ed874
                                  • Instruction Fuzzy Hash: 19E20A75A11218CFDB15EF64D894BAEBBB6FF88700F508099E50AAB358DB709D41CF90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4
                                  • API String ID: 0-4088798008
                                  • Opcode ID: 98b0abb223f6e5017211bf57d2f5598b25dba48d26313306779bb48dc3955a4d
                                  • Instruction ID: 242143666387b3552880379e6835f81e36fb748e3b2da210509f6cbc23413533
                                  • Opcode Fuzzy Hash: 98b0abb223f6e5017211bf57d2f5598b25dba48d26313306779bb48dc3955a4d
                                  • Instruction Fuzzy Hash: FF622B75A11218CFDB15EF64D884BAEBBB6FF88700F548099E50A9B358CB709D81CF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 4201 2580751-25808b9 call 2580d01 call 2581301 call 25814b1 call 25810a1 4210 2580cea-2580ced 4201->4210 4211 25808bf-25808c6 4201->4211 4212 25808d1-25808d5 4211->4212 4213 25808f7-2580972 GetPEB 4212->4213 4214 25808d7-25808f5 call 2581221 4212->4214 4215 258097d-2580981 4213->4215 4214->4212 4217 2580999-25809ab call 2580e61 4215->4217 4218 2580983-2580997 4215->4218 4224 25809ad-25809d3 4217->4224 4225 25809d5-25809f6 CreateThread 4217->4225 4218->4215 4226 25809f9-25809fd 4224->4226 4225->4226 4228 2580cbe-2580ce1 4226->4228 4229 2580a03-2580a36 call 2581361 4226->4229 4228->4210 4229->4228 4233 2580a3c-2580a8b 4229->4233 4235 2580a96-2580a9c 4233->4235 4236 2580a9e-2580aa4 4235->4236 4237 2580ae4-2580ae8 4235->4237 4238 2580aa6-2580ab5 4236->4238 4239 2580ab7-2580abb 4236->4239 4240 2580aee-2580afb 4237->4240 4241 2580bb6-2580ca9 call 2580e61 call 2580d01 call 2581301 4237->4241 4238->4239 4242 2580abd-2580acb 4239->4242 4243 2580ae2 4239->4243 4244 2580b06-2580b0c 4240->4244 4267 2580cab 4241->4267 4268 2580cae-2580cb8 4241->4268 4242->4243 4245 2580acd-2580adf 4242->4245 4243->4235 4248 2580b3c-2580b3f 4244->4248 4249 2580b0e-2580b1c 4244->4249 4245->4243 4250 2580b42-2580b49 4248->4250 4252 2580b3a 4249->4252 4253 2580b1e-2580b2d 4249->4253 4250->4241 4255 2580b4b-2580b54 4250->4255 4252->4244 4253->4252 4257 2580b2f-2580b38 4253->4257 4255->4241 4258 2580b56-2580b66 4255->4258 4257->4248 4260 2580b71-2580b7d 4258->4260 4263 2580bae-2580bb4 4260->4263 4264 2580b7f-2580bac 4260->4264 4263->4250 4264->4260 4267->4268 4268->4228
                                  APIs
                                  • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,?,00000001,?,81EC8B55,000000FF), ref: 025809F4
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateThread
                                  • String ID:
                                  • API String ID: 2422867632-0
                                  • Opcode ID: ab5d47d79a2d43a5b885d4cd1ac6413eb39dbc8d65d1c3a23088184392affe3b
                                  • Instruction ID: 3b57d6b75f07265fe0f72d6fd47bde6e537b5b7ebb3c3249628e4e9fd47ffc57
                                  • Opcode Fuzzy Hash: ab5d47d79a2d43a5b885d4cd1ac6413eb39dbc8d65d1c3a23088184392affe3b
                                  • Instruction Fuzzy Hash: 0E12C0B0E00219DFDB14DF98C990BADBBB2FF88304F2482A9D515AB385D774AA45CF54
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: df13567360534b123d5dd4304ba4fdff30dffac5ede7991671293697ff232ab7
                                  • Instruction ID: 159a4482bd93b37d236214e0204d328b02cefd44a597626bd23bb95ab6e2feba
                                  • Opcode Fuzzy Hash: df13567360534b123d5dd4304ba4fdff30dffac5ede7991671293697ff232ab7
                                  • Instruction Fuzzy Hash: 6A525F75B201058BDB19EF69D494A6E7BB3FF88700F648169E506EB388DF749C428F90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 733efce1b11d9a492e171f67cb04de08f30e78a426aba863b6630b0cf5a3dad5
                                  • Instruction ID: 511a25490d167f641e6d8f19c249b7d9b0132299f370c59ee43cf2cf03117d4f
                                  • Opcode Fuzzy Hash: 733efce1b11d9a492e171f67cb04de08f30e78a426aba863b6630b0cf5a3dad5
                                  • Instruction Fuzzy Hash: 05520675A005149FDB15DFA8C984E69BBB2FF88304F6681A8E509EB366CB31EC51CF41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 37e1b3c83e9d93ed4fba23a16b1c8be47c3589c44933c332a8c746b1f48f956b
                                  • Instruction ID: f78b614ebc90034e8a4c52f1406665736391271cf9e89e4fc887ccb81d51363d
                                  • Opcode Fuzzy Hash: 37e1b3c83e9d93ed4fba23a16b1c8be47c3589c44933c332a8c746b1f48f956b
                                  • Instruction Fuzzy Hash: 28322D74B112088FDB28EF65D894AAEBBB2FF88300F608569D5069B358DF74AC45CF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4b34f9e31a8a5aa073c8aaeec8c310f465f536112c4a6830d74b756c2f422cbf
                                  • Instruction ID: 9e6b739d51843eb24a6ef74aeb1f8d4cf714eaebd12031348268fb8416e29d08
                                  • Opcode Fuzzy Hash: 4b34f9e31a8a5aa073c8aaeec8c310f465f536112c4a6830d74b756c2f422cbf
                                  • Instruction Fuzzy Hash: 6C121E39B112089FCB15FF64D994AAEBBB6FB89300F508529E406AB358DF349C55CF90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fb8cab9f6a24f85d9b5b06d5d151c59a4fbbcea927499bf578f6a3050739e016
                                  • Instruction ID: bd82d966c3ce8da6c513a1919dad329c0a7d65c3e30f77a0e485b8dc3ad58bf8
                                  • Opcode Fuzzy Hash: fb8cab9f6a24f85d9b5b06d5d151c59a4fbbcea927499bf578f6a3050739e016
                                  • Instruction Fuzzy Hash: B51240357241058BD719EFA9E49466E7BB3FF88700F648169E506EB388DFB49C428F90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 88ce75dfc0d04dd64a6433f1378d98c37f9d0872d95f3b24a0735be03e617340
                                  • Instruction ID: ee8fba66c2659f619397731f8577adb000b3dcb0f3d132eb3c2cad5db1c38342
                                  • Opcode Fuzzy Hash: 88ce75dfc0d04dd64a6433f1378d98c37f9d0872d95f3b24a0735be03e617340
                                  • Instruction Fuzzy Hash: 40E11771A012819FC716DF78C4A5AA9BFF2FF49310B2D8199E4859BB56CB349D42CB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 95f3ea71e1d3f6cf8a82682fe572f5018bcc3e409216ca1319450bc98eb26a0b
                                  • Instruction ID: 213ed6dae3f2182a752e23ffc7672de529fe25c47aee234d2f458f4b727ddbb0
                                  • Opcode Fuzzy Hash: 95f3ea71e1d3f6cf8a82682fe572f5018bcc3e409216ca1319450bc98eb26a0b
                                  • Instruction Fuzzy Hash: 3BD13F39B011199FCB09FF74E994A6E7BB7FB88300B508519E406AB398DF349D52DB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f99f5f3734f8f4a21c7027acf4e6de1998150d0d5299d810f692cc0b90838f6f
                                  • Instruction ID: 4f88d4d406ec2fa0a9f7a9bb23372eeffacb8cde21dfebaf4d9ee49983c516f3
                                  • Opcode Fuzzy Hash: f99f5f3734f8f4a21c7027acf4e6de1998150d0d5299d810f692cc0b90838f6f
                                  • Instruction Fuzzy Hash: 5AD14039B011199FCB09FF74E994A6E7BB7FB88300B508519E406AB398DF349D52DB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f73c3c7cab79691f17a7f28071f9015dea195fbdb49781cd372bc4210641086
                                  • Instruction ID: 893a9b61c640262dae68fc0818b78596a560df5689de5f8a671fb68030168835
                                  • Opcode Fuzzy Hash: 1f73c3c7cab79691f17a7f28071f9015dea195fbdb49781cd372bc4210641086
                                  • Instruction Fuzzy Hash: DCC1F9347111548FD749FB28E594B6E7BE3BB88700F6181A9E50ADB398DF34AC428F91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2edb2481b12179772073ddc0c35d244fcdd0b47e18f294faf07e8a36a9b77cd1
                                  • Instruction ID: 2817aaaf988cc9fbf9a56ec131a2f0bd039f9d0b033e00e492a9ced9c7357efd
                                  • Opcode Fuzzy Hash: 2edb2481b12179772073ddc0c35d244fcdd0b47e18f294faf07e8a36a9b77cd1
                                  • Instruction Fuzzy Hash: ADB14870E0421D8FDB14CFA9C8857AEBBF2BF88354F14816DD816A7294EB759C85CB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 07655adb09e0b0283924828591831a0b50b46720c46f08ab1b28b72868a162f8
                                  • Instruction ID: 16a219465fe55cd6f46b2d9b85452cf580e5a7b7d533837741e019aadedda3e8
                                  • Opcode Fuzzy Hash: 07655adb09e0b0283924828591831a0b50b46720c46f08ab1b28b72868a162f8
                                  • Instruction Fuzzy Hash: 52C1E8347111548FD749FB28E594B6E7BE3BB88700F6181A9E50ADB398DF34AC428F91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 99eddd02200a8c8311ce702965b4a58f19fd6fc62ada0e48e7fc65414f1f2535
                                  • Instruction ID: 2a35a1c526b33bae30e31da60a73c9fc9fe1dbb6c4693ac191176158522e61ba
                                  • Opcode Fuzzy Hash: 99eddd02200a8c8311ce702965b4a58f19fd6fc62ada0e48e7fc65414f1f2535
                                  • Instruction Fuzzy Hash: 3BB14970E0020D9FDB14CFA9D9857AEBFF2BF88314F14816DD855AB294EBB49845CB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 50c1dff067f525b082b07f502dfb271a78694f49ff9a2e0cbd507fc75496f418
                                  • Instruction ID: 27f5b03b245fbff359f91c3dbbeda07ccaa6e4a65d1282a3719c6eac16c7b5dd
                                  • Opcode Fuzzy Hash: 50c1dff067f525b082b07f502dfb271a78694f49ff9a2e0cbd507fc75496f418
                                  • Instruction Fuzzy Hash: 94918A72E002498FDF10CFA9C8857ADBFF2BF88714F15816DE409A7294EB74A845CB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cbaa5db65305684947e8545e6524f0bf057d762164dda87c100e793677544dd6
                                  • Instruction ID: ca5f5e3293dd61d51277e8437084cc398deae1bfc88b500363cea2c367268704
                                  • Opcode Fuzzy Hash: cbaa5db65305684947e8545e6524f0bf057d762164dda87c100e793677544dd6
                                  • Instruction Fuzzy Hash: 8CA108347111548FD749FB28E594B6A3BE3BB8C700F6181A9E50ADB398CF34AC428F91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 266bed3a6191cfd9711de20dc3a5dfabdd0eb8cc0168c9d6982c755a96428b37
                                  • Instruction ID: fbb448072d5af487b1c1c2af8df74700dab5d6d71cab9eb647f08fa02ca92125
                                  • Opcode Fuzzy Hash: 266bed3a6191cfd9711de20dc3a5dfabdd0eb8cc0168c9d6982c755a96428b37
                                  • Instruction Fuzzy Hash: 40512D71A126848BD708EF6BF94668A7FF3BFD8300B14C96AE405DB2A8DF7059458F50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d8df96591eaf5cbd7c23a84387152801396f1b890c048d72665d6267592defa6
                                  • Instruction ID: 0c2c8bc3ad699a82a4d6372f8c2e4ef3fe3bcd884d2cbebb2482c20b6d4875f7
                                  • Opcode Fuzzy Hash: d8df96591eaf5cbd7c23a84387152801396f1b890c048d72665d6267592defa6
                                  • Instruction Fuzzy Hash: 66513E71A126848BD708EF6BF94668A7FF3BFD8300B14C96AE405DB2A8DF7059458F50

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 025E1A84: LoadLibraryA.KERNEL32(00000000,?,?), ref: 025E1B16
                                  • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?), ref: 025DF8C1
                                  • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 025DF8F4
                                  • VirtualProtect.KERNEL32(00000000,0040145E,00000040,?), ref: 025DF927
                                  • VirtualProtect.KERNEL32(00000000,0040145E,?,?), ref: 025DF951
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ProtectVirtual$LibraryLoad
                                  • String ID:
                                  • API String ID: 895956442-0
                                  • Opcode ID: 2e97600cb857c96b3e27a7ca78dc6b50189988e4741ea1636e9ebab3cfc04358
                                  • Instruction ID: f531ebb95c27d4b0679b382f59c949d6f9908b3c5026f64aff5eef89145971a6
                                  • Opcode Fuzzy Hash: 2e97600cb857c96b3e27a7ca78dc6b50189988e4741ea1636e9ebab3cfc04358
                                  • Instruction Fuzzy Hash: 6121F77260460A7FF724AE799C44FB77AACEB84304F04043EFB4BD1550EB69A90587B9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 42 29c7230-29c72f1 52 29c7317-29c734c 42->52 53 29c72f3-29c730f 42->53 57 29c7414-29c7449 52->57 58 29c7352-29c7361 52->58 53->52 67 29c744f-29c746a 57->67 68 29c7d6a-29c7d87 57->68 59 29c73c5-29c7407 58->59 60 29c7363-29c7380 58->60 59->57 65 29c738d-29c73c2 60->65 66 29c7382 60->66 65->59 66->65 67->68 78 29c7d8d-29c7daa 68->78 79 29c749a-29c74c5 68->79 78->68 84 29c7dac-29c7dda call 29c6600 78->84 85 29c74ee-29c74f9 79->85 86 29c74c7-29c74e4 79->86 105 29c7ddc-29c7e07 84->105 87 29c74fb-29c7518 85->87 88 29c7522-29c752d 85->88 86->85 87->88 89 29c754c-29c7557 88->89 90 29c752f-29c7544 88->90 94 29c7559-29c7576 89->94 95 29c7580-29c75c5 89->95 90->89 94->95 117 29c75cb-29c75e8 95->117 118 29c7d26-29c7d3a 95->118 111 29c7e0d-29c7e0f 105->111 112 29c7f30-29c7f44 105->112 111->112 113 29c7e15-29c7e17 111->113 124 29c7f4c-29c7f8b 112->124 113->105 116 29c7e19-29c7e3c 113->116 116->124 129 29c7e42-29c7e54 116->129 127 29c75ee-29c76b6 call 29c6e14 call 29c6e24 117->127 128 29c7d0a-29c7d1e 117->128 131 29c7d42-29c7d65 118->131 124->68 127->131 178 29c76bc-29c76e5 127->178 128->118 138 29c7e56-29c7e81 129->138 139 29c7e93-29c7f9e 129->139 131->68 151 29c7f14-29c7f28 138->151 152 29c7e87-29c7e89 138->152 139->84 177 29c7fa4 139->177 151->112 152->151 154 29c7e8f-29c7e91 152->154 154->138 154->139 177->68 178->131 181 29c76eb-29c770e 178->181 280 29c7711 call 53c7138 181->280 281 29c7711 call 53c7128 181->281 183 29c7717-29c7856 call 29c03dc 201 29c785b-29c7883 183->201 205 29c7b99-29c7bbc 201->205 206 29c7889-29c7b91 201->206 211 29c7bbe-29c7bc4 205->211 212 29c7bd4-29c7c66 205->212 206->205 214 29c7bc8-29c7bca 211->214 215 29c7bc6 211->215 230 29c7c7e-29c7d08 212->230 231 29c7c68-29c7c6e 212->231 214->212 215->212 230->68 232 29c7c70 231->232 233 29c7c72-29c7c74 231->233 232->230 233->230 280->183 281->183
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,kq$,kq$,kq$,kq
                                  • API String ID: 0-772104199
                                  • Opcode ID: d184761e8a884a1a4e89cdfc1087627492a11ce66e39427a1f1c271f0147ccae
                                  • Instruction ID: 887e4c7d0b72807535b3eb724841679a1eee7cb970497a3ec654ae13c5ce6ea5
                                  • Opcode Fuzzy Hash: d184761e8a884a1a4e89cdfc1087627492a11ce66e39427a1f1c271f0147ccae
                                  • Instruction Fuzzy Hash: 92622B38B112148BD718EF69E4587AE7BB7EF84B00F608469E506DB388DF749C468F91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294183278.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5270000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: af6bb75481d60baa0ccb941c66b59a336b02a748205185432df546369fc66af4
                                  • Instruction ID: 7ea852a0ade159be8e293d551fa3a8ae58e0ee8841f88ad6970952bf39c34328
                                  • Opcode Fuzzy Hash: af6bb75481d60baa0ccb941c66b59a336b02a748205185432df546369fc66af4
                                  • Instruction Fuzzy Hash: BE63A534F3122A8BCB299B78955827E79E7EFC9610F548059D90ED7384EEB08D41CF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1943 25e1a84-25e1a97 1944 25e1aaf-25e1ab9 1943->1944 1945 25e1a99-25e1a9c 1943->1945 1947 25e1abb-25e1ac3 1944->1947 1948 25e1ac8-25e1ad4 1944->1948 1946 25e1a9e-25e1aa1 1945->1946 1946->1944 1949 25e1aa3-25e1aad 1946->1949 1947->1948 1950 25e1ad7-25e1adc 1948->1950 1949->1944 1949->1946 1951 25e1ade-25e1ae9 1950->1951 1952 25e1b0f-25e1b16 LoadLibraryA 1950->1952 1953 25e1aeb-25e1b03 call 25e2152 1951->1953 1954 25e1b05-25e1b09 1951->1954 1955 25e1b19-25e1b1d 1952->1955 1953->1954 1959 25e1b1e-25e1b20 1953->1959 1954->1950 1957 25e1b0b-25e1b0d 1954->1957 1957->1952 1957->1955 1959->1955
                                  APIs
                                  • LoadLibraryA.KERNEL32(00000000,?,?), ref: 025E1B16
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID: .dll
                                  • API String ID: 1029625771-2738580789
                                  • Opcode ID: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                                  • Instruction ID: f0cdb5df979d9e9d972d3ca60dc5d4073c266b3ac588eb5d805b626c46e6ed14
                                  • Opcode Fuzzy Hash: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                                  • Instruction Fuzzy Hash: B321C3717006858FDB29DFACC844A6A7FA8BF05264F09816CD80A87A41D730EC45C794

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1960 29c746f-29c7494 1964 29c7d8d-29c7daa 1960->1964 1965 29c749a-29c74c5 1960->1965 1970 29c7dac-29c7dda call 29c6600 1964->1970 1971 29c7d6a-29c7d87 1964->1971 1972 29c74ee-29c74f9 1965->1972 1973 29c74c7-29c74e4 1965->1973 1994 29c7ddc-29c7e07 1970->1994 1971->1964 1971->1965 1974 29c74fb-29c7518 1972->1974 1975 29c7522-29c752d 1972->1975 1973->1972 1974->1975 1977 29c754c-29c7557 1975->1977 1978 29c752f-29c7544 1975->1978 1982 29c7559-29c7576 1977->1982 1983 29c7580-29c75c5 1977->1983 1978->1977 1982->1983 2006 29c75cb-29c75e8 1983->2006 2007 29c7d26-29c7d3a 1983->2007 2000 29c7e0d-29c7e0f 1994->2000 2001 29c7f30-29c7f44 1994->2001 2000->2001 2002 29c7e15-29c7e17 2000->2002 2013 29c7f4c-29c7f8b 2001->2013 2002->1994 2005 29c7e19-29c7e3c 2002->2005 2005->2013 2018 29c7e42-29c7e54 2005->2018 2016 29c75ee-29c76b6 call 29c6e14 call 29c6e24 2006->2016 2017 29c7d0a-29c7d1e 2006->2017 2020 29c7d42-29c7d65 2007->2020 2013->1971 2016->2020 2067 29c76bc-29c76e5 2016->2067 2017->2007 2027 29c7e56-29c7e81 2018->2027 2028 29c7e93-29c7f9e 2018->2028 2020->1971 2040 29c7f14-29c7f28 2027->2040 2041 29c7e87-29c7e89 2027->2041 2028->1970 2066 29c7fa4 2028->2066 2040->2001 2041->2040 2043 29c7e8f-29c7e91 2041->2043 2043->2027 2043->2028 2066->1971 2067->2020 2070 29c76eb-29c770e 2067->2070 2169 29c7711 call 53c7138 2070->2169 2170 29c7711 call 53c7128 2070->2170 2072 29c7717-29c7856 call 29c03dc 2090 29c785b-29c7883 2072->2090 2094 29c7b99-29c7bbc 2090->2094 2095 29c7889-29c7b91 2090->2095 2100 29c7bbe-29c7bc4 2094->2100 2101 29c7bd4-29c7c66 2094->2101 2095->2094 2103 29c7bc8-29c7bca 2100->2103 2104 29c7bc6 2100->2104 2119 29c7c7e-29c7d08 2101->2119 2120 29c7c68-29c7c6e 2101->2120 2103->2101 2104->2101 2119->1971 2121 29c7c70 2120->2121 2122 29c7c72-29c7c74 2120->2122 2121->2119 2122->2119 2169->2072 2170->2072
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,kq$,kq
                                  • API String ID: 0-910951715
                                  • Opcode ID: cc4cf5bbff5dcf81faf55c5745eab9b3c49bf39b73a322c5ada0e711c3c2f02b
                                  • Instruction ID: 592184f4876e11b8cb547ce3cac1ba3b7751df8af326fea4286f267077f6dd1e
                                  • Opcode Fuzzy Hash: cc4cf5bbff5dcf81faf55c5745eab9b3c49bf39b73a322c5ada0e711c3c2f02b
                                  • Instruction Fuzzy Hash: A2324B387211148BE708EF69E4587AA7BB7EFC8B04F608459E506DB388CF749C468F91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2171 29c74e6 2172 29c74ee-29c74f9 2171->2172 2173 29c74fb-29c7518 2172->2173 2174 29c7522-29c752d 2172->2174 2173->2174 2175 29c754c-29c7557 2174->2175 2176 29c752f-29c7544 2174->2176 2178 29c7559-29c7576 2175->2178 2179 29c7580-29c75c5 2175->2179 2176->2175 2178->2179 2189 29c75cb-29c75e8 2179->2189 2190 29c7d26-29c7d3a 2179->2190 2195 29c75ee-29c76b6 call 29c6e14 call 29c6e24 2189->2195 2196 29c7d0a-29c7d1e 2189->2196 2197 29c7d42-29c7d65 2190->2197 2195->2197 2233 29c76bc-29c76e5 2195->2233 2196->2190 2208 29c7d6a-29c7d87 2197->2208 2214 29c7d8d-29c7daa 2208->2214 2215 29c749a-29c74c5 2208->2215 2214->2208 2223 29c7dac-29c7dda call 29c6600 2214->2223 2215->2172 2224 29c74c7-29c74e4 2215->2224 2235 29c7ddc-29c7e07 2223->2235 2224->2172 2233->2197 2240 29c76eb-29c770e 2233->2240 2241 29c7e0d-29c7e0f 2235->2241 2242 29c7f30-29c7f44 2235->2242 2377 29c7711 call 53c7138 2240->2377 2378 29c7711 call 53c7128 2240->2378 2241->2242 2244 29c7e15-29c7e17 2241->2244 2251 29c7f4c-29c7f8b 2242->2251 2244->2235 2246 29c7e19-29c7e3c 2244->2246 2246->2251 2254 29c7e42-29c7e54 2246->2254 2247 29c7717-29c7856 call 29c03dc 2298 29c785b-29c7883 2247->2298 2251->2208 2259 29c7e56-29c7e81 2254->2259 2260 29c7e93-29c7f9e 2254->2260 2269 29c7f14-29c7f28 2259->2269 2270 29c7e87-29c7e89 2259->2270 2260->2223 2294 29c7fa4 2260->2294 2269->2242 2270->2269 2272 29c7e8f-29c7e91 2270->2272 2272->2259 2272->2260 2294->2208 2302 29c7b99-29c7bbc 2298->2302 2303 29c7889-29c7b91 2298->2303 2308 29c7bbe-29c7bc4 2302->2308 2309 29c7bd4-29c7c66 2302->2309 2303->2302 2311 29c7bc8-29c7bca 2308->2311 2312 29c7bc6 2308->2312 2327 29c7c7e-29c7d08 2309->2327 2328 29c7c68-29c7c6e 2309->2328 2311->2309 2312->2309 2327->2208 2329 29c7c70 2328->2329 2330 29c7c72-29c7c74 2328->2330 2329->2327 2330->2327 2377->2247 2378->2247
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,kq$,kq
                                  • API String ID: 0-910951715
                                  • Opcode ID: 9cd68195e6ebcf1d2f8c90b366b459deff2380a99c2635621b81387e02a7d88c
                                  • Instruction ID: 2b60a5f535fcd43acc2e566011c00a7ecc61e8c72c0775d761dc9d38ed7c00c1
                                  • Opcode Fuzzy Hash: 9cd68195e6ebcf1d2f8c90b366b459deff2380a99c2635621b81387e02a7d88c
                                  • Instruction Fuzzy Hash: C2324B387211148BD708EF69E4587AA7BB7EFC8B00F60845AE506DB388DF749C468F91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2379 29c751a 2380 29c7522-29c752d 2379->2380 2381 29c754c-29c7557 2380->2381 2382 29c752f-29c7544 2380->2382 2383 29c7559-29c7576 2381->2383 2384 29c7580-29c75c5 2381->2384 2382->2381 2383->2384 2393 29c75cb-29c75e8 2384->2393 2394 29c7d26-29c7d3a 2384->2394 2399 29c75ee-29c76b6 call 29c6e14 call 29c6e24 2393->2399 2400 29c7d0a-29c7d1e 2393->2400 2401 29c7d42-29c7d65 2394->2401 2399->2401 2441 29c76bc-29c76e5 2399->2441 2400->2394 2412 29c7d6a-29c7d87 2401->2412 2418 29c7d8d-29c7daa 2412->2418 2419 29c749a-29c74c5 2412->2419 2418->2412 2427 29c7dac-29c7dda call 29c6600 2418->2427 2428 29c74ee-29c74f9 2419->2428 2429 29c74c7-29c74e4 2419->2429 2443 29c7ddc-29c7e07 2427->2443 2428->2380 2430 29c74fb-29c7518 2428->2430 2429->2428 2430->2380 2441->2401 2448 29c76eb-29c770e 2441->2448 2449 29c7e0d-29c7e0f 2443->2449 2450 29c7f30-29c7f44 2443->2450 2585 29c7711 call 53c7138 2448->2585 2586 29c7711 call 53c7128 2448->2586 2449->2450 2452 29c7e15-29c7e17 2449->2452 2459 29c7f4c-29c7f8b 2450->2459 2452->2443 2454 29c7e19-29c7e3c 2452->2454 2454->2459 2462 29c7e42-29c7e54 2454->2462 2455 29c7717-29c7856 call 29c03dc 2506 29c785b-29c7883 2455->2506 2459->2412 2467 29c7e56-29c7e81 2462->2467 2468 29c7e93-29c7f9e 2462->2468 2477 29c7f14-29c7f28 2467->2477 2478 29c7e87-29c7e89 2467->2478 2468->2427 2502 29c7fa4 2468->2502 2477->2450 2478->2477 2480 29c7e8f-29c7e91 2478->2480 2480->2467 2480->2468 2502->2412 2510 29c7b99-29c7bbc 2506->2510 2511 29c7889-29c7b91 2506->2511 2516 29c7bbe-29c7bc4 2510->2516 2517 29c7bd4-29c7c66 2510->2517 2511->2510 2519 29c7bc8-29c7bca 2516->2519 2520 29c7bc6 2516->2520 2535 29c7c7e-29c7d08 2517->2535 2536 29c7c68-29c7c6e 2517->2536 2519->2517 2520->2517 2535->2412 2537 29c7c70 2536->2537 2538 29c7c72-29c7c74 2536->2538 2537->2535 2538->2535 2585->2455 2586->2455
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,kq$,kq
                                  • API String ID: 0-910951715
                                  • Opcode ID: 59ed268038ba1c3310de8815c344f0844b552551fa885950714d2e3bda51df3e
                                  • Instruction ID: cf7d6b26297123a619f79d61677e2966456e5430a948301551714e734adc39c2
                                  • Opcode Fuzzy Hash: 59ed268038ba1c3310de8815c344f0844b552551fa885950714d2e3bda51df3e
                                  • Instruction Fuzzy Hash: DA324C387211148BD708EF69E4587AA7BB7EFC8B04F60845AE506DB388DF749C468F91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2587 29c7578 2588 29c7580-29c75c5 2587->2588 2594 29c75cb-29c75e8 2588->2594 2595 29c7d26-29c7d3a 2588->2595 2600 29c75ee-29c76b6 call 29c6e14 call 29c6e24 2594->2600 2601 29c7d0a-29c7d1e 2594->2601 2602 29c7d42-29c7d65 2595->2602 2600->2602 2648 29c76bc-29c76e5 2600->2648 2601->2595 2613 29c7d6a-29c7d87 2602->2613 2619 29c7d8d-29c7daa 2613->2619 2620 29c749a-29c74c5 2613->2620 2619->2613 2628 29c7dac-29c7dda call 29c6600 2619->2628 2629 29c74ee-29c74f9 2620->2629 2630 29c74c7-29c74e4 2620->2630 2651 29c7ddc-29c7e07 2628->2651 2631 29c74fb-29c7518 2629->2631 2632 29c7522-29c752d 2629->2632 2630->2629 2631->2632 2634 29c754c-29c7557 2632->2634 2635 29c752f-29c7544 2632->2635 2634->2588 2640 29c7559-29c7576 2634->2640 2635->2634 2640->2588 2648->2602 2656 29c76eb-29c770e 2648->2656 2657 29c7e0d-29c7e0f 2651->2657 2658 29c7f30-29c7f44 2651->2658 2793 29c7711 call 53c7138 2656->2793 2794 29c7711 call 53c7128 2656->2794 2657->2658 2660 29c7e15-29c7e17 2657->2660 2667 29c7f4c-29c7f8b 2658->2667 2660->2651 2662 29c7e19-29c7e3c 2660->2662 2662->2667 2670 29c7e42-29c7e54 2662->2670 2663 29c7717-29c7856 call 29c03dc 2714 29c785b-29c7883 2663->2714 2667->2613 2675 29c7e56-29c7e81 2670->2675 2676 29c7e93-29c7f9e 2670->2676 2685 29c7f14-29c7f28 2675->2685 2686 29c7e87-29c7e89 2675->2686 2676->2628 2710 29c7fa4 2676->2710 2685->2658 2686->2685 2688 29c7e8f-29c7e91 2686->2688 2688->2675 2688->2676 2710->2613 2718 29c7b99-29c7bbc 2714->2718 2719 29c7889-29c7b91 2714->2719 2724 29c7bbe-29c7bc4 2718->2724 2725 29c7bd4-29c7c66 2718->2725 2719->2718 2727 29c7bc8-29c7bca 2724->2727 2728 29c7bc6 2724->2728 2743 29c7c7e-29c7d08 2725->2743 2744 29c7c68-29c7c6e 2725->2744 2727->2725 2728->2725 2743->2613 2745 29c7c70 2744->2745 2746 29c7c72-29c7c74 2744->2746 2745->2743 2746->2743 2793->2663 2794->2663
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,kq$,kq
                                  • API String ID: 0-910951715
                                  • Opcode ID: aa0078e1ea93893e6e0d9208dbc06a2c250e0ce1a2fdeda514a70220eaa9354b
                                  • Instruction ID: 2d18240b4ba2c3cef5e94bac38b34a938b2659671ba48dce7f8ad1c215745dd3
                                  • Opcode Fuzzy Hash: aa0078e1ea93893e6e0d9208dbc06a2c250e0ce1a2fdeda514a70220eaa9354b
                                  • Instruction Fuzzy Hash: 00223D387211048BD709EF69E4587AA7BB7EFC8B04F608469E506DB388DF749C468F91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2795 25df961-25df98e call 25e1a84 call 25e1b22 2800 25df9c4 2795->2800 2801 25df990-25df99e VirtualProtect 2795->2801 2803 25df9c6-25df9c9 2800->2803 2801->2800 2802 25df9a0-25df9c2 call 25e20f2 VirtualProtect 2801->2802 2802->2803
                                  APIs
                                    • Part of subcall function 025E1A84: LoadLibraryA.KERNEL32(00000000,?,?), ref: 025E1B16
                                  • VirtualProtect.KERNEL32(00000000,00000004,00000040,?), ref: 025DF999
                                  • VirtualProtect.KERNEL32(00000000,00000004,?,?), ref: 025DF9BC
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ProtectVirtual$LibraryLoad
                                  • String ID:
                                  • API String ID: 895956442-0
                                  • Opcode ID: 31a2c6fb5a155253d75781cd9ceba9c7cc267d2f06376007566f6440306b8afe
                                  • Instruction ID: 766dea6b268c9d7ea3d2c88c3356ba1a9740228f8c873d88aac8a436ffdf4f9b
                                  • Opcode Fuzzy Hash: 31a2c6fb5a155253d75781cd9ceba9c7cc267d2f06376007566f6440306b8afe
                                  • Instruction Fuzzy Hash: DCF081B26406147EE6209B68DC41FFB36ACEB85A14F000419FB1AD6080EB75EA05C7A9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 4269 25e04c7-25e04f4 4270 25e057c-25e0583 4269->4270 4271 25e04fa-25e050d 4269->4271 4272 25e0585-25e0599 4270->4272 4273 25e05a1-25e05a3 4270->4273 4277 25e0513-25e053f call 25e1a5f 4271->4277 4278 25e05b0-25e05b3 4271->4278 4272->4273 4275 25e05b5-25e05c0 4273->4275 4276 25e05a5-25e05ab 4273->4276 4283 25e05c6-25e05d2 4275->4283 4284 25e06c7 4275->4284 4279 25e06cb-25e06d5 4276->4279 4290 25e0575 4277->4290 4291 25e0541-25e0550 4277->4291 4278->4272 4285 25e05d4-25e05d9 4283->4285 4286 25e05e0-25e061b call 25e1a5f 4283->4286 4284->4279 4292 25e05de 4285->4292 4293 25e061e-25e0620 4286->4293 4294 25e0578-25e057a 4290->4294 4291->4272 4298 25e0552-25e0557 4291->4298 4292->4293 4293->4284 4296 25e0626-25e063a 4293->4296 4294->4270 4294->4272 4296->4284 4302 25e0640-25e0662 SafeArrayCreate 4296->4302 4298->4294 4301 25e0559-25e056f 4298->4301 4303 25e0573 4301->4303 4302->4284 4305 25e0664-25e066f 4302->4305 4303->4294 4306 25e0684-25e068d 4305->4306 4307 25e0671-25e0682 4305->4307 4311 25e068f call 244d006 4306->4311 4312 25e068f call 244d01d 4306->4312 4307->4306 4307->4307 4308 25e0695-25e06ab 4309 25e06ad-25e06be 4308->4309 4310 25e06c0 4308->4310 4309->4309 4309->4310 4310->4284 4311->4308 4312->4308
                                  APIs
                                  • SafeArrayCreate.OLEAUT32(00000011,00000001,?), ref: 025E0658
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ArrayCreateSafe
                                  • String ID:
                                  • API String ID: 37945469-0
                                  • Opcode ID: 3a71c02433a8139c968cc3f30c4dd14e73a6b67554079fc4c70d085402dfb9e4
                                  • Instruction ID: f76cac47dc698a47edda2c3e51cf917587007e1859b3a4d3c4dac64b4255bdff
                                  • Opcode Fuzzy Hash: 3a71c02433a8139c968cc3f30c4dd14e73a6b67554079fc4c70d085402dfb9e4
                                  • Instruction Fuzzy Hash: 2B615B71200246AFDB28DF60C884FA7BBE8BF49315F04856AE95ADB141DB70E905CFA5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 4313 25e06d6-25e073a call 25e1c7d * 3 4320 25e073c-25e073e 4313->4320 4321 25e0764 4313->4321 4320->4321 4322 25e0740-25e0742 4320->4322 4323 25e0767-25e0771 4321->4323 4322->4321 4324 25e0744-25e0756 VirtualAlloc 4322->4324 4325 25e0758-25e075f 4324->4325 4326 25e0772-25e0795 call 25e20f2 call 25e2116 4324->4326 4325->4321 4327 25e0761 4325->4327 4332 25e07df-25e07f8 call 25e1c7d 4326->4332 4333 25e0797-25e07cd call 25e1dea call 25e1cc0 4326->4333 4327->4321 4332->4321 4339 25e07fe 4332->4339 4342 25e0a2e-25e0a37 4333->4342 4343 25e07d3-25e07d9 4333->4343 4341 25e0804-25e080a 4339->4341 4344 25e080c-25e0812 4341->4344 4345 25e0846-25e084f 4341->4345 4348 25e0a3e-25e0a46 4342->4348 4349 25e0a39-25e0a3c 4342->4349 4343->4332 4343->4342 4350 25e0814-25e0817 4344->4350 4346 25e08a8-25e08b3 4345->4346 4347 25e0851-25e0857 4345->4347 4354 25e08cc-25e08cf 4346->4354 4355 25e08b5-25e08be call 25df9ca 4346->4355 4351 25e085b-25e0876 call 25e1c7d 4347->4351 4352 25e0a75 4348->4352 4353 25e0a48-25e0a73 call 25e2116 4348->4353 4349->4348 4349->4352 4356 25e082b-25e082d 4350->4356 4357 25e0819-25e081e 4350->4357 4376 25e0878-25e0880 4351->4376 4377 25e0895-25e08a6 4351->4377 4360 25e0a79-25e0a99 call 25e2116 4352->4360 4353->4360 4364 25e0a2a 4354->4364 4365 25e08d5-25e08de 4354->4365 4355->4364 4379 25e08c4-25e08ca 4355->4379 4356->4345 4363 25e082f-25e083d call 25e1a84 4356->4363 4357->4356 4362 25e0820-25e0829 4357->4362 4389 25e0a9f-25e0aa1 4360->4389 4390 25e0a9b 4360->4390 4362->4350 4362->4356 4373 25e0842-25e0844 4363->4373 4364->4342 4366 25e08e4-25e08eb 4365->4366 4367 25e08e0 4365->4367 4374 25e08ed-25e08f6 call 25df866 4366->4374 4375 25e091b-25e091f 4366->4375 4367->4366 4373->4341 4391 25e08f8-25e08fe 4374->4391 4392 25e0904-25e0905 call 25df961 4374->4392 4383 25e0925-25e0947 4375->4383 4384 25e09c1-25e09c4 4375->4384 4376->4364 4381 25e0886-25e088f 4376->4381 4377->4346 4377->4351 4379->4366 4381->4364 4381->4377 4383->4364 4400 25e094d-25e0960 call 25e20f2 4383->4400 4386 25e0a16-25e0a18 call 25e0e06 4384->4386 4387 25e09c6-25e09c9 4384->4387 4399 25e0a1d-25e0a1e 4386->4399 4387->4386 4393 25e09cb-25e09ce 4387->4393 4389->4323 4390->4389 4391->4364 4391->4392 4402 25e090a-25e090d 4392->4402 4397 25e09e7-25e09f8 call 25e04c7 4393->4397 4398 25e09d0-25e09d2 4393->4398 4415 25e09fa-25e0a01 call 25e0aa6 4397->4415 4416 25e0a09-25e0a14 call 25dff93 4397->4416 4398->4397 4403 25e09d4-25e09d7 4398->4403 4404 25e0a1f-25e0a26 4399->4404 4412 25e0984-25e09bd 4400->4412 4413 25e0962-25e0966 4400->4413 4402->4375 4409 25e090f-25e0915 4402->4409 4410 25e09de-25e09e5 call 25e1674 4403->4410 4411 25e09d9-25e09dc 4403->4411 4404->4364 4406 25e0a28 4404->4406 4406->4406 4409->4364 4409->4375 4410->4399 4411->4404 4411->4410 4412->4364 4426 25e09bf 4412->4426 4413->4412 4417 25e0968-25e096b 4413->4417 4423 25e0a06 4415->4423 4416->4399 4417->4384 4421 25e096d-25e0982 call 25e1ef5 4417->4421 4421->4426 4423->4416 4426->4384
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 025E0750
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 913584bddb567b179a3f9b4e0e6654d789e61ea3d5744fe4b2293047c08ef92d
                                  • Instruction ID: 76d902083ff50e62dd7b0b5ecec470625e60cf5809d8a6c8e246d88120c5bbb1
                                  • Opcode Fuzzy Hash: 913584bddb567b179a3f9b4e0e6654d789e61ea3d5744fe4b2293047c08ef92d
                                  • Instruction Fuzzy Hash: 2BB1E472500B06EBDF299E60CC80BB7BBE9FF45314F140529E55BA2180E771E550CBA9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: d
                                  • API String ID: 0-2564639436
                                  • Opcode ID: 6cbef4f210df2cafc757d79a2db0d2f3dcdf0a3afe5e047f9dcbbceb90640602
                                  • Instruction ID: f66cc6f18ec857adec5dede9826452827cba52b9432122fccf175f93a88e6597
                                  • Opcode Fuzzy Hash: 6cbef4f210df2cafc757d79a2db0d2f3dcdf0a3afe5e047f9dcbbceb90640602
                                  • Instruction Fuzzy Hash: A5C16631A0060ADFCB24CF58D484D6ABBF2FF88314B15C999D45A9B361EB34F852CB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @
                                  • API String ID: 0-2766056989
                                  • Opcode ID: 5bb328f250bf713444744575d1c368d1a8e64e58293c1d757e469833cf57b663
                                  • Instruction ID: 6e58f69588b8c848b4afc942156433eb58e209e6cbe1a4407a2e0f68c982177d
                                  • Opcode Fuzzy Hash: 5bb328f250bf713444744575d1c368d1a8e64e58293c1d757e469833cf57b663
                                  • Instruction Fuzzy Hash: 5731AD347012548FCB00FB64E565BAE7BB6BB8C304F5085ADE506DB758CB30AC12CB92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @
                                  • API String ID: 0-2766056989
                                  • Opcode ID: 12211b04905265e5b92bbcb08a7b4c84b1e24cb0f1d27c76726944b7fe1237a6
                                  • Instruction ID: da162812dad9c27d9b10328a51d532feef2da3da0b6d2a745c584be4aa60d141
                                  • Opcode Fuzzy Hash: 12211b04905265e5b92bbcb08a7b4c84b1e24cb0f1d27c76726944b7fe1237a6
                                  • Instruction Fuzzy Hash: 5C31AF346022948FD704FB64E565BAE7BF6BB8C304F50856DE502DB754CB30AC52CB92
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294183278.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5270000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7456d737bdf4dee10ddf4457be0354ebdb87127ec10bc3e3202001c4b06fade7
                                  • Instruction ID: e864f1063354e2881ce3d9050ed2fce8fbaf4cc372568237d387566a6b6e08e0
                                  • Opcode Fuzzy Hash: 7456d737bdf4dee10ddf4457be0354ebdb87127ec10bc3e3202001c4b06fade7
                                  • Instruction Fuzzy Hash: 96B28030624115CBD759DB69C8587AAFBFEFF98300F5084ADB10A9B294CFB09D858F61
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $
                                  • API String ID: 0-3993045852
                                  • Opcode ID: e7270baf051be281a53558087faf30708e574d5e3b139057e1e45293a9de8391
                                  • Instruction ID: c2b0c6a2085aed2c74c7021de8f7947abab86c35fc9fb022c3d48540e72fe803
                                  • Opcode Fuzzy Hash: e7270baf051be281a53558087faf30708e574d5e3b139057e1e45293a9de8391
                                  • Instruction Fuzzy Hash: 5011AF75B112109BD708FB69E4457AE7AA2EF84B20F14891EE406DB388EF709D418FC1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0a833dbfb75b59de63a909d29aaad8a6447ea1ed7bb4ceeac956eda2415569c3
                                  • Instruction ID: f85a1ba9cee3caff73f1d0e5016fc0cece8efdb69b801b0137dd604451c57f3b
                                  • Opcode Fuzzy Hash: 0a833dbfb75b59de63a909d29aaad8a6447ea1ed7bb4ceeac956eda2415569c3
                                  • Instruction Fuzzy Hash: FC82F774A112189FDB65DF69C890BAEBBB6FF88300F508199E409A7354DF70AE85CF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 65f27e321cc9cdf9ce1f34e8212aca845401eabebe54fbac1c2660a5ff82b485
                                  • Instruction ID: 1aab11a4f283f295c396d9d8f4739fec1e6f81fd21dbe998705e55f2ce774b6b
                                  • Opcode Fuzzy Hash: 65f27e321cc9cdf9ce1f34e8212aca845401eabebe54fbac1c2660a5ff82b485
                                  • Instruction Fuzzy Hash: 73028C30B151068BE728EF69D85476F7AA7EFC8700F648469E546DB388DE789C018F91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 720f14921e1981f8645eeb7849bb42dddff4ddcebb1e01ca1897b3a6d4a3f085
                                  • Instruction ID: 5cfe74051617609523ec2e40577bdc9b8d1537ffa3b281cc9050b2b679f098be
                                  • Opcode Fuzzy Hash: 720f14921e1981f8645eeb7849bb42dddff4ddcebb1e01ca1897b3a6d4a3f085
                                  • Instruction Fuzzy Hash: C1127F30A01646CFD725EF79C554AAEB7B2BF84700F648A69D4069B390DB75E886CF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 218d0c320ec285af61e26eed6177c270b5634998384a17a0a8a7d0546e90cdc7
                                  • Instruction ID: 1bdd22a20c2e197a182a6d3e27e32f17060852ef50068ae86847a18097852856
                                  • Opcode Fuzzy Hash: 218d0c320ec285af61e26eed6177c270b5634998384a17a0a8a7d0546e90cdc7
                                  • Instruction Fuzzy Hash: 99E11C39B112089FCB14FF64D994AAEBBB6FB89300F608529E406AB358DF349D55CF41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d2732c9d05e75db074656e4d847f23371622246e35e995ce42bb23ba4bb84875
                                  • Instruction ID: 3ee9f48be2003d1aee0cab7c1d6167005a6b32f9f93eb80aba1d3b8dc740bcf2
                                  • Opcode Fuzzy Hash: d2732c9d05e75db074656e4d847f23371622246e35e995ce42bb23ba4bb84875
                                  • Instruction Fuzzy Hash: 35D15C31A01746CFD725EF79C544BAAB7B2FF84300F648A6AD4469B290DB71E886CF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1aa5af4e60c43924e7e0eb4ca751d4a637e96718c59853b99ea47f25f91be3ab
                                  • Instruction ID: 7f995019262df1295e568e9976cefa3a6e30e28279e1e447faaf4cf1b8a9c7ab
                                  • Opcode Fuzzy Hash: 1aa5af4e60c43924e7e0eb4ca751d4a637e96718c59853b99ea47f25f91be3ab
                                  • Instruction Fuzzy Hash: AEE16B74A111189FDB65DF69C850BAEBBB6FF88700F108199E409AB354DF74AE85CF80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294183278.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5270000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2268ba22fcf65d2c19d1ca793de56c08e12efdbbab522cb66725da5680b1a0d0
                                  • Instruction ID: 55295d19588b39b4bec2e952144b949e12e20d0cab677cd3796c56a677deca8d
                                  • Opcode Fuzzy Hash: 2268ba22fcf65d2c19d1ca793de56c08e12efdbbab522cb66725da5680b1a0d0
                                  • Instruction Fuzzy Hash: 36B18138B2061A8B8B19EF65A5A957E7EA3FFC5610714841DE80BC7384FF70D9028F46
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 957ef3ebf9557c8c469393ca07cea78eee9f88f6cc52d837d56e2f77d88a9e62
                                  • Instruction ID: 109450feec1a4a3fbbaefacc668a0815173f6e478d24e05ad0dbbabe7ce614da
                                  • Opcode Fuzzy Hash: 957ef3ebf9557c8c469393ca07cea78eee9f88f6cc52d837d56e2f77d88a9e62
                                  • Instruction Fuzzy Hash: 00D1C675A04205DFDB14DF98C584AA9BBB2FF49310F25C299E409AB326D730E986CF80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d4e243dca9da8deda2cf1da164bebd9bca229fbe49ff113cfd89a4ddbe0827bd
                                  • Instruction ID: c5b29eddce7572ad24adcbba27406c82851e716e93a3e02d5ce353cec5ff2dfe
                                  • Opcode Fuzzy Hash: d4e243dca9da8deda2cf1da164bebd9bca229fbe49ff113cfd89a4ddbe0827bd
                                  • Instruction Fuzzy Hash: 34B14870E0421D8FDB10CFA9C8857ADBFF2BF88354F14816DE815A7290EB759885CB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0f212da6f5cdb435f57c712c45b48ab0a2ae11cefb1f5cc591af55cd1df1db8b
                                  • Instruction ID: 1072b53c8c7a821b8d513e69f55e9d05acfa4f1ba3ea9fe88d2af217c58d9a0f
                                  • Opcode Fuzzy Hash: 0f212da6f5cdb435f57c712c45b48ab0a2ae11cefb1f5cc591af55cd1df1db8b
                                  • Instruction Fuzzy Hash: CCB15A34A016049FDB18DF69D984A59BBF6FF88710F2585A9E405EB3A5DB30EC01CF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e908261c35930a23eed093668d1fbc6ce8eab1478c37a6755e1c4b6855f34937
                                  • Instruction ID: 17b94775bcc5e432a27b03f90eab44590bb101665700e0312420f5797df3befd
                                  • Opcode Fuzzy Hash: e908261c35930a23eed093668d1fbc6ce8eab1478c37a6755e1c4b6855f34937
                                  • Instruction Fuzzy Hash: 3DA14770E0020D9FDB10CFA9D9857ADBFF2BF48314F14816DD859AB294EBB49885CB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a3441eae5b2acb6bb363fd46bec05f34ce6e6638568fe45a2cf6137010fb2603
                                  • Instruction ID: 877c99a0a9127bff9f97a1314ade048b513999c515fdc27cdbcc30fd6438ae13
                                  • Opcode Fuzzy Hash: a3441eae5b2acb6bb363fd46bec05f34ce6e6638568fe45a2cf6137010fb2603
                                  • Instruction Fuzzy Hash: 44A180357001048FDB19EF59D484A9EBBB6EF88710F25816AE8069B798CF34ED42CF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e087e1372bdf859e606e9298df8062f598e9147b9200f7f2bfbef34494e73a9
                                  • Instruction ID: 76efb36332d42907e9a14ff93f041b8b434d2915ffc6f4cb9f631547a10a2336
                                  • Opcode Fuzzy Hash: 8e087e1372bdf859e606e9298df8062f598e9147b9200f7f2bfbef34494e73a9
                                  • Instruction Fuzzy Hash: 5791AE3AB011099BCB15FF64D8946AEB7B7FB88300F108129E406A7398DF749C66DB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b116861cd3db4b2f520e26246e28e3b0ee6e720c2026f24fdb7b8e544f17dda
                                  • Instruction ID: 7b0186d898963ca61a0d19813c71da0e42faf330fd03362029126724f68e98ae
                                  • Opcode Fuzzy Hash: 7b116861cd3db4b2f520e26246e28e3b0ee6e720c2026f24fdb7b8e544f17dda
                                  • Instruction Fuzzy Hash: 08917972E00249CFDB10CFA9C9857ADBFF2BF88714F15816DE409A7294EB74A845CB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d6a9c4c1ca57ef0e93b9b72de9f7761cfc68067885f6cef5e06c8168342725f3
                                  • Instruction ID: c8e2fa5837aa3910c31febfe2e547ac51c94bb67d715b657e8a2205e2e5b11d5
                                  • Opcode Fuzzy Hash: d6a9c4c1ca57ef0e93b9b72de9f7761cfc68067885f6cef5e06c8168342725f3
                                  • Instruction Fuzzy Hash: 1D91E934A00105DFDB25DFA9C994AADBBB2FF88304F2485AAD5069B361DB31ED46CF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 203d7ae5b3bca90cefbcc2daa5edeef4d6e15f7c962d2973d481f9cca29f2c9d
                                  • Instruction ID: 11ec0b060f4bdaa81f863de9f061fc6066aba7d8e1cefbb44dd44146e2ff5f09
                                  • Opcode Fuzzy Hash: 203d7ae5b3bca90cefbcc2daa5edeef4d6e15f7c962d2973d481f9cca29f2c9d
                                  • Instruction Fuzzy Hash: F07182657251448FE308EFA9E49462F3EA7EFC8700B54856AA107DB3CDCD64DC468FA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e507316d5c7fc9eb0d956936a751ff037a9b5a4bd8b7f3222cf818a9e32351c0
                                  • Instruction ID: 533a82a551333718a389644cbb0243bc16751efd64cf1aa75673ac589ef411a4
                                  • Opcode Fuzzy Hash: e507316d5c7fc9eb0d956936a751ff037a9b5a4bd8b7f3222cf818a9e32351c0
                                  • Instruction Fuzzy Hash: 7E71CF3AB111098BCB05FF64D8946ADB7B7FF88300F108529E406A7798EF749D66DB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294183278.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5270000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ef352a20d7373c2ddd22cb628f1cb254697baa34a212d1d93d767305708ebd40
                                  • Instruction ID: 1a718a5d97fbde450bbc8dd34544d635ddb9bd3267df97b65151d25a770c8773
                                  • Opcode Fuzzy Hash: ef352a20d7373c2ddd22cb628f1cb254697baa34a212d1d93d767305708ebd40
                                  • Instruction Fuzzy Hash: 6D619E353103424BC715EE26C4E8B3EF7AEBFD9600B95887D95078B354CFB4A80A8B61
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e31af5d104ff54881455b5c8bb1e1bc9c3761043a064d31952a9a9068044f7f5
                                  • Instruction ID: cef59d3406a9814b1a54d381eaac21d98c100809d7bcb9703ac7b49964ffdd42
                                  • Opcode Fuzzy Hash: e31af5d104ff54881455b5c8bb1e1bc9c3761043a064d31952a9a9068044f7f5
                                  • Instruction Fuzzy Hash: B581463A511104EFDB1AAF94E948D51BFBBFB0C32430A85D4E2098B636C736E871EB51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294183278.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5270000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d53f6732717024014edd25434018a692f45525c00b5e423cb4748141521d71f
                                  • Instruction ID: d81927856154747439b3451d96d989be5ef3d0ada08e000f054dc3dbd7a5943a
                                  • Opcode Fuzzy Hash: 7d53f6732717024014edd25434018a692f45525c00b5e423cb4748141521d71f
                                  • Instruction Fuzzy Hash: 86516C3531020247D715EE66C4D8B3EF7AEBFD9600B95887DA50B9B254CFB4A80A8B61
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a830314c2af7d0e7d8b8ce74295563dd716f3b67b5f53c66436b6cbbe1e7d865
                                  • Instruction ID: 1688791c6757d9c55c93d133f98f0d4de563b50a6154a849afdd7131422f9b81
                                  • Opcode Fuzzy Hash: a830314c2af7d0e7d8b8ce74295563dd716f3b67b5f53c66436b6cbbe1e7d865
                                  • Instruction Fuzzy Hash: BF619C75A056048FCB19EFA8D95469EBBF2FFC9310B50896ED54ADB744DB30AC028F81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5ad43198bcdd28e22f3458e7945ed568353aa2e2ecb5093784ac55d8d93f10fb
                                  • Instruction ID: 0e13de61eac63cfd424c80ffc3fb885e93edd2bd5789ae1d9b7af31e7a4ad7ae
                                  • Opcode Fuzzy Hash: 5ad43198bcdd28e22f3458e7945ed568353aa2e2ecb5093784ac55d8d93f10fb
                                  • Instruction Fuzzy Hash: 227138B0E0424D9FDB14DFA9C884BAEBFF2BF88714F148169D415E7294EBB49841CB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 705ca43547c5c13e5d6ed3a2d11c217634d1c908644a7756c47fc3a4bc42857b
                                  • Instruction ID: 205bfc97a8078a5f7e30a42659cf94ed948702142cba42bbed067f8961f01bd2
                                  • Opcode Fuzzy Hash: 705ca43547c5c13e5d6ed3a2d11c217634d1c908644a7756c47fc3a4bc42857b
                                  • Instruction Fuzzy Hash: 35514936B1010A9FCF05DFA9D9449EEBBF6FF8C314B14802AF909E7250D635D9219B91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c45766828198e3cc3446d03527886176b3dcce0bd5e8fb90a7f028b935a95105
                                  • Instruction ID: bd266966f33d465ff990f0bc92f9594346917a1a65ecf0b4dd8dcc09e2f5496b
                                  • Opcode Fuzzy Hash: c45766828198e3cc3446d03527886176b3dcce0bd5e8fb90a7f028b935a95105
                                  • Instruction Fuzzy Hash: 947137B0E0424D9FDB14DFA9C885B9EBFF2BF88314F148169E419E7250EBB49851CB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 64db80a98ea9ee875b1dc0b54077c72edfbf52958d1d254eba2addbab7070190
                                  • Instruction ID: 618dc45943b75988d48aaddc557b519a9d6fe5cfb7be489517f90880d387e65b
                                  • Opcode Fuzzy Hash: 64db80a98ea9ee875b1dc0b54077c72edfbf52958d1d254eba2addbab7070190
                                  • Instruction Fuzzy Hash: 2851CF317152448FD708FF69E894B6E7BA7EFD8300B64846DE50ACB398DE709C028B90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 23d37050763c0e16f0e1dd7fe7201e82909b7a69b3a47037371b3f86c1f9de1d
                                  • Instruction ID: a4c40103a96ff01d7518cd6579a7580f902d5893fcedd31239e0f516ae040e9c
                                  • Opcode Fuzzy Hash: 23d37050763c0e16f0e1dd7fe7201e82909b7a69b3a47037371b3f86c1f9de1d
                                  • Instruction Fuzzy Hash: 10618D34A016009FCB18EF69D584A59BBF6FF88310B25C5A9E416EB3A5DB30EC41CF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03a1070828fb60ec5c5faeb9896e61a2a9c15cd451aed2bd263e697bd0f06819
                                  • Instruction ID: afb506ec22014c1c8d4748929a3c62dd1236c547778122d709278f23c7415981
                                  • Opcode Fuzzy Hash: 03a1070828fb60ec5c5faeb9896e61a2a9c15cd451aed2bd263e697bd0f06819
                                  • Instruction Fuzzy Hash: CC516E35B202049BDB15EF69D898B5ABBA6FFC8704F508029E506D7388CFB09C068F91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4dd25ad89099ca2973c61d41a0b1986f764f5bcacc0be51382fa5d7b898683cb
                                  • Instruction ID: 8bffa8b1a5d272a949e321e4d451fd35d99e5db55093176514ec7253d64223f5
                                  • Opcode Fuzzy Hash: 4dd25ad89099ca2973c61d41a0b1986f764f5bcacc0be51382fa5d7b898683cb
                                  • Instruction Fuzzy Hash: CD41F2397011059FDB19FB28E890A7EBBA3EFC8714724856EE906CB344DF309C128B91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d5b38d0d93e5b60434fddab06d505cb60f14be29162a549678c1b151f15b5698
                                  • Instruction ID: 070371e693d624a2e0798611ef64dc56a744f78d05b7a1d94e2999760ea9886e
                                  • Opcode Fuzzy Hash: d5b38d0d93e5b60434fddab06d505cb60f14be29162a549678c1b151f15b5698
                                  • Instruction Fuzzy Hash: 0C510879210000AFDB49AF98E958E5A7FA7FF8C3147558098F2069B375CA31DC22DF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5a21279cd61c9b4b572f255e8adf4f604d9929fee30cd6d3d493a3c17fd8aaee
                                  • Instruction ID: 9de18ced6e6c60d180d2a42f689dc252061c4a71502b9a0bec4e0bc43964088f
                                  • Opcode Fuzzy Hash: 5a21279cd61c9b4b572f255e8adf4f604d9929fee30cd6d3d493a3c17fd8aaee
                                  • Instruction Fuzzy Hash: 74513A387111148FD708EF69E594BAE7BA6FB88700B50806DE806DB398DF70AD16CF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 73a460fc91b6a4f9d716ebab83dca1934be49d2e1c4de7adb181072db27d0420
                                  • Instruction ID: f2d2acc27c4bf932c4599712cb97197e40c138006477ee9c9e7ba115451a0490
                                  • Opcode Fuzzy Hash: 73a460fc91b6a4f9d716ebab83dca1934be49d2e1c4de7adb181072db27d0420
                                  • Instruction Fuzzy Hash: E45149386111048FD708EF69E594BAE3BA6FB88700B54806DE802DB398DF70AD16CF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 518040ad9302429dc27b6e597b9e275f2ab063f556c866a901adfc42b441f6fa
                                  • Instruction ID: bea6df887cc6f640395227e5c5829e3b40346b29681b2d0641c8c825a615ff27
                                  • Opcode Fuzzy Hash: 518040ad9302429dc27b6e597b9e275f2ab063f556c866a901adfc42b441f6fa
                                  • Instruction Fuzzy Hash: 05410D347111458FD709FB68E594A6E7BE7BBC8310B6481A9E506DB398CF34AC428B91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 20045c751f06f38121aac26be3bd37b2bd8d173d524df937395f185fcb0eeeb1
                                  • Instruction ID: d1b2a513506e0a7a693d87d62c729413a64975b6405494eef67782fea0538916
                                  • Opcode Fuzzy Hash: 20045c751f06f38121aac26be3bd37b2bd8d173d524df937395f185fcb0eeeb1
                                  • Instruction Fuzzy Hash: 22410D347111458FD709FB68E594A6E7BE7BBCC310B6481A9E506DB398CF34AC428B91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9326bc122b0dbf4e98893f404fc83e2a8364928020824c980c8cd1f28e93eaf4
                                  • Instruction ID: fac3e5116ad935d23235e7746c49ee434b8a028eb967ff9e875e4ad7d425694f
                                  • Opcode Fuzzy Hash: 9326bc122b0dbf4e98893f404fc83e2a8364928020824c980c8cd1f28e93eaf4
                                  • Instruction Fuzzy Hash: 30313C36B00108AFDB14EF95E844A9A7BB7FF88310F158869F9069B255DB75EC11CF90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bae119e2b6ea6f97fb3faee2f79227dc937d3a587100f6d070acaa7510d5899d
                                  • Instruction ID: dd4a8b15faa9dd448dcbfc76a62f2790819b094ed081b77830bbf23a310669de
                                  • Opcode Fuzzy Hash: bae119e2b6ea6f97fb3faee2f79227dc937d3a587100f6d070acaa7510d5899d
                                  • Instruction Fuzzy Hash: 7D412A39B101049FDB09EFA8D854A6E7BF7EB88700B608059F50AAB394CF359D528F91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c63f8813096a919da65c8c0c649170650bf4091cebc88e81d0e3c938788c05df
                                  • Instruction ID: b139915c4cf3e6409a92e61123f0ce0399eb66db302700239272e47ccfeb47c3
                                  • Opcode Fuzzy Hash: c63f8813096a919da65c8c0c649170650bf4091cebc88e81d0e3c938788c05df
                                  • Instruction Fuzzy Hash: 7F413939B101049FDB09EFA8D894AAE7FB6EB88700F508059F50AAB354CF759C528F91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294183278.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5270000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9489644d26ea8fa7807d4b7f23490dca0c3db82a8dd807eb152081683f4f3199
                                  • Instruction ID: 5e84cdb26d16511c88ca979ad16b849fd7d831d9d870fe4f72bf362641c57892
                                  • Opcode Fuzzy Hash: 9489644d26ea8fa7807d4b7f23490dca0c3db82a8dd807eb152081683f4f3199
                                  • Instruction Fuzzy Hash: 64314D317143410BDB16FA3A8894B3FA7EEAFC6610F5684BE91199B790CE749C028372
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1ece90b62487de2ef3570b211b77b40b91eceb837aef2e4998ad804fc94920f8
                                  • Instruction ID: c2a779bdab8a1a1f4444c0b787665f82b3d1ba14ae17524b58f5b5ffb2c54218
                                  • Opcode Fuzzy Hash: 1ece90b62487de2ef3570b211b77b40b91eceb837aef2e4998ad804fc94920f8
                                  • Instruction Fuzzy Hash: 4741C534B401048FCB48DFA8E598AADBBF2BF89310F6554A9E50AEB365CA319C40CF55
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9a66f0c2f9e267edf58a89b753586aaed91353460a3969656286fdad44b7193d
                                  • Instruction ID: 8ef4f98296cfcdb86872d183fd13a05ee4ea44281f470a8c2cf6b127a18d1c31
                                  • Opcode Fuzzy Hash: 9a66f0c2f9e267edf58a89b753586aaed91353460a3969656286fdad44b7193d
                                  • Instruction Fuzzy Hash: 5141F930A00209DFDB15DBA9C995BBDBBB2BF88304F24856DD406AB251CB35DD86CF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cd9addf3fe7ad1e34a2f77f079e897c590499dfdd06b7c83d35c80c54f77fff5
                                  • Instruction ID: 8145af127b294dc837a93d3834c8e154b6e9c9dc7b34549b774c41ec03a43560
                                  • Opcode Fuzzy Hash: cd9addf3fe7ad1e34a2f77f079e897c590499dfdd06b7c83d35c80c54f77fff5
                                  • Instruction Fuzzy Hash: 4931C335A012459FD704EFA8D891AEE7BB6FF85304B50852AE409DB314DB70EC4ACF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1a796c57e739298bcf9199e76868a333e8da45b143d72f8d079186a8327f1ff7
                                  • Instruction ID: 567f53055793f6732176ed8c5fe7aec4a1f5cffef2b1450750a9b3500ed6d0c1
                                  • Opcode Fuzzy Hash: 1a796c57e739298bcf9199e76868a333e8da45b143d72f8d079186a8327f1ff7
                                  • Instruction Fuzzy Hash: 7F2121337051144FC304ABBAE8906AEBBE6EFC526072580BBE90DD7344DE31CC129791
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dc3bf624f42ef5cbaf3017b3811a42e5dee54f80885aef259de6eab1b2261cc0
                                  • Instruction ID: ec21886eebb9a33596bf2ebb71deb5765360043bd701d84ff7ee7d7d7eae3af5
                                  • Opcode Fuzzy Hash: dc3bf624f42ef5cbaf3017b3811a42e5dee54f80885aef259de6eab1b2261cc0
                                  • Instruction Fuzzy Hash: 8C314D73A000596F9F128ED59C50CFFBFBEEF4D211B044066FA55E2150DA36DA25ABB0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bc764955cedd4a342542f6911676133fd759d46c2e4ea2e021b5f9413b37e9e5
                                  • Instruction ID: be8c4443c02a1c8e2817cdf6cb5b3036f6dfbbf8c4bc97e0eb5d227cf49eecfc
                                  • Opcode Fuzzy Hash: bc764955cedd4a342542f6911676133fd759d46c2e4ea2e021b5f9413b37e9e5
                                  • Instruction Fuzzy Hash: 8E4124B5D00348DFDB14CFA9C584ADEBFB5BF48314F248429E809AB250DB749A45CF90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0d8ea051f3e776fc0e01803ce401399d6f9f3ebd0ea8920b24d753f67969f5d5
                                  • Instruction ID: e090c95f2a1a481bd489ad1448b3833bf6c782f6b6485e4f6e29635eea48b807
                                  • Opcode Fuzzy Hash: 0d8ea051f3e776fc0e01803ce401399d6f9f3ebd0ea8920b24d753f67969f5d5
                                  • Instruction Fuzzy Hash: 2D214BB7A082046FC701DBA8EC40A5BFFFADB85350F5584AAE445D7351D931DC02DBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4e7a0b6a1164738d2155f3fa367c679391a77fe085da41cafd372e1e2c7dbe99
                                  • Instruction ID: 138bdf82c90370c7f9a97f47d283319bd961df49cb1e8e44c24d937f4386ff88
                                  • Opcode Fuzzy Hash: 4e7a0b6a1164738d2155f3fa367c679391a77fe085da41cafd372e1e2c7dbe99
                                  • Instruction Fuzzy Hash: DD41F2B0D00349DFDB14CFA9C594ADEBFB5BF48314F248429E819AB250DBB59A45CF90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dd8c1f4e08a61fa1eee181ef0905ffbfaebb140bd595072569b661f02af92cf5
                                  • Instruction ID: c77164532a6aad957e1f118f50829322fac0991008abee655943001d806c3d2a
                                  • Opcode Fuzzy Hash: dd8c1f4e08a61fa1eee181ef0905ffbfaebb140bd595072569b661f02af92cf5
                                  • Instruction Fuzzy Hash: C131B9357016844FD324EFA9C440A9ABBE6EFC5710B58CA6FD0458F390DF31E84A9B90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5df9057acc80cd9422aa7b7e57b7be43c35102ab3b35f40bf716d1383d785fda
                                  • Instruction ID: 01493e27cf7e0bc9527706467acd3611b4102c37a5f40b6537b98e5f86f8b2c6
                                  • Opcode Fuzzy Hash: 5df9057acc80cd9422aa7b7e57b7be43c35102ab3b35f40bf716d1383d785fda
                                  • Instruction Fuzzy Hash: E5319E35B116148BDB04EB59D4446AEBBB7EFC8711F60859EE806A7384CBB0BC418FD1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8110b49db859b1219c10f5828585b0b0a47f13ee855c743c79d76b15f156bd72
                                  • Instruction ID: 5f15ac0c3d5fa25277f9ef4258ca25752465f76b02711cf874feff7cff911c7b
                                  • Opcode Fuzzy Hash: 8110b49db859b1219c10f5828585b0b0a47f13ee855c743c79d76b15f156bd72
                                  • Instruction Fuzzy Hash: 23317434B112188FDB14EF65E965AAEBBB6BF88700F50456DE902E7744DF709C01CB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7c3bdcfb28df295c7e94c4ade0cdeb646d4df2bc699cf77f31367bb2a138b8fe
                                  • Instruction ID: b08804069fe50c93136f38d517d2fcd411c17e059e521fe05d04bfd62acfdc8e
                                  • Opcode Fuzzy Hash: 7c3bdcfb28df295c7e94c4ade0cdeb646d4df2bc699cf77f31367bb2a138b8fe
                                  • Instruction Fuzzy Hash: 9031A434B102149FDB15EB64E462AAEBBB6BF88700F50446DE902D7744CF709C05CB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ed1c8598e6f27926e82aa3a1c16ccc21cf799c7f30df311c4cb308beae68c017
                                  • Instruction ID: 552c1afe49b8a9aee28002b396b6ff3ac4a0f10dc00c676e92a7a6a511fb851e
                                  • Opcode Fuzzy Hash: ed1c8598e6f27926e82aa3a1c16ccc21cf799c7f30df311c4cb308beae68c017
                                  • Instruction Fuzzy Hash: AF316B763141599FDB06EF1AD880AAA3BABFF89340F548455FD09C73A4CA35DC91CB60
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294183278.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5270000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 121771706a24acbfb5c21b326750f4442ec42083ebe320a69f9e2ecd34972a88
                                  • Instruction ID: eea8714b888fdb029502d3e3be56b65229d73265e5b79568b2b01d0dabb236bd
                                  • Opcode Fuzzy Hash: 121771706a24acbfb5c21b326750f4442ec42083ebe320a69f9e2ecd34972a88
                                  • Instruction Fuzzy Hash: 9221C53171424607DB29BA3A9494A3FA2DFAFC5610B95847E911A9B784DE709C0287B2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294183278.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5270000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1824cfa0649317d8c975e9bf16ba669840d68f9b7b139c6ed48be282b1840021
                                  • Instruction ID: bdfcefba51399c0a35bb7c48d5fab2b137a9c680b822ad258a170ff7d17d883d
                                  • Opcode Fuzzy Hash: 1824cfa0649317d8c975e9bf16ba669840d68f9b7b139c6ed48be282b1840021
                                  • Instruction Fuzzy Hash: 68214C72F253198BCB2ACA60DD057B97B76FF89701F0900AEE509A7380C7B58C41CB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 67ab59c967e3e36f09fc0f85f99a025ab97d8917badf6e9d947a3fdaaf2dcaff
                                  • Instruction ID: 24a63d8f380d776bf785b350d27cf5a14d3542e2e4cd020c225f51c96d55055f
                                  • Opcode Fuzzy Hash: 67ab59c967e3e36f09fc0f85f99a025ab97d8917badf6e9d947a3fdaaf2dcaff
                                  • Instruction Fuzzy Hash: E83171356101089BDB08EF99D454A9F7FBAEFCC710F608119E512E7388CE759C418F90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b927dccf8792c50cd41eeaa2040a2c38bb74439979a72b7c5decb705856361fe
                                  • Instruction ID: f57e5646f6f70f1b875e0c48c767a50c8cd092d1d8602ae8a682d35224477399
                                  • Opcode Fuzzy Hash: b927dccf8792c50cd41eeaa2040a2c38bb74439979a72b7c5decb705856361fe
                                  • Instruction Fuzzy Hash: 10219C363141499FDB09EF1AD880AAE3BBBFF89340B548415F909C73A4CA30DC51CB20
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294183278.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5270000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5f14bb16421753962192041d6ce809aa8814b1b66c8eb0363121d980e2da419c
                                  • Instruction ID: 983ce8b3db400bdf8cdf9d239e296a2ede78b950a543b95355184c0c33ef5bf2
                                  • Opcode Fuzzy Hash: 5f14bb16421753962192041d6ce809aa8814b1b66c8eb0363121d980e2da419c
                                  • Instruction Fuzzy Hash: F6218E71F293299BDB15C655D8017AABFBABF85710F08807BE50DDB280CAB24C458AA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ff06fdc8062def507666404d1c7ac1f0cd6df3075210f94469c469983686583b
                                  • Instruction ID: b950ac3171e08c9b43a03f854a856b42114d0b4d2565d9e9a27a8c7380dbe736
                                  • Opcode Fuzzy Hash: ff06fdc8062def507666404d1c7ac1f0cd6df3075210f94469c469983686583b
                                  • Instruction Fuzzy Hash: 3821A136A10108AFCB08EF95E844E9A7BB7FF88310F054464FA069B265DB75EC15CF90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ec53593a79696a6191b34fcbc658c6a5d14aa73b11403cf82cfb5caad1b61b46
                                  • Instruction ID: d437a8229f9c943ea24ec9dd1ac495e27df3452bdccf49fd07aad3c76c5a0091
                                  • Opcode Fuzzy Hash: ec53593a79696a6191b34fcbc658c6a5d14aa73b11403cf82cfb5caad1b61b46
                                  • Instruction Fuzzy Hash: 102174756141049BDB08EF58D855BAF7BBAEBC8704F60805AF502E7384CEB59D068FA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d0f41885e07811acde8db1a06dee622e7451887a46fb29da2e2581fd77ce4d73
                                  • Instruction ID: af32aac74a552bda181d6aa4406a9998766da4403feb647a04baf0b8ae5675f7
                                  • Opcode Fuzzy Hash: d0f41885e07811acde8db1a06dee622e7451887a46fb29da2e2581fd77ce4d73
                                  • Instruction Fuzzy Hash: 8F2181347102045BDB14AE6A98847AE7AE7EFC8740F60402AE906CB384DF788C51CBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 73e5ba0612002173eceba2f61fe6f97cd731e2943bd271b510e51db2d409e020
                                  • Instruction ID: 02430595ec47a7cac217856c4870da19f355033252e105e009ebbced9f4e9ce3
                                  • Opcode Fuzzy Hash: 73e5ba0612002173eceba2f61fe6f97cd731e2943bd271b510e51db2d409e020
                                  • Instruction Fuzzy Hash: B02157317081485FE71A9B699410BAE3FA6FBCA760F24805BE90ADB381CE399C01CF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294183278.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5270000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fdc74571372815e56e71c8a6c90aba763d29ea48ce1c42cefe9f33c77c69cb1c
                                  • Instruction ID: fbb75aec0beccb6be8be5895628ade9c263a08b388cb9c39af6e5e7da2cd23e6
                                  • Opcode Fuzzy Hash: fdc74571372815e56e71c8a6c90aba763d29ea48ce1c42cefe9f33c77c69cb1c
                                  • Instruction Fuzzy Hash: 24218B31B293594BDB158A64DC107A6BFBABF85700F0440BBF508EB281CAB14D058BA2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 865d5fd4def6976fdda32be170cece42e9155d95d4ff18796089da6b8d21ab7a
                                  • Instruction ID: 91ce0b4ee321ef7777e37aae3bb550362a73131e80fc94a38abb311761ace706
                                  • Opcode Fuzzy Hash: 865d5fd4def6976fdda32be170cece42e9155d95d4ff18796089da6b8d21ab7a
                                  • Instruction Fuzzy Hash: D6216134A012059FD704EF68D48199EBBB6FF89304B908529E50ADB354DF30AD5ACFD1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284610523.000000000244D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_244d000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e4fcef510e4e83662fb1fc54d308e985fc5153b38095112cfe1a31a0e62e501
                                  • Instruction ID: 8311ad97469858d3339426ddaff88cf9265e70cf546d0bbef2f081fa57b49fba
                                  • Opcode Fuzzy Hash: 8e4fcef510e4e83662fb1fc54d308e985fc5153b38095112cfe1a31a0e62e501
                                  • Instruction Fuzzy Hash: DE21D3B1A04240DFEF05DF14D9C0B27BFA5EB88724F24856AE90A4B346CB36D456CAA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fe719487bb18c151641fd0bd35e7d85017922a83ff363e9564b5e7278ab99d85
                                  • Instruction ID: 7481c1648c371a2ad0dd2a1456825ba6c27b98908a41fc25b4b6f4b2949e0431
                                  • Opcode Fuzzy Hash: fe719487bb18c151641fd0bd35e7d85017922a83ff363e9564b5e7278ab99d85
                                  • Instruction Fuzzy Hash: E31104327092165BEB18DA65A850ABFBB9BFBC0B25B10407EF505CB684DF61AC0187E0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3d48f95e46547e88c7cfd6a155469669e189f0e240f747c4da1afcebc28264f
                                  • Instruction ID: 9a420b91b099f6f11cf59d2b58fe40d99ef58e0214013148fefe8532c6adeaaa
                                  • Opcode Fuzzy Hash: c3d48f95e46547e88c7cfd6a155469669e189f0e240f747c4da1afcebc28264f
                                  • Instruction Fuzzy Hash: 34213730600B048FD324EF59D544E62F7E2FF84320B49CAAAD05A8B661D730F84ACB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 39c4c532eaf66c959e60b62e32ac9ab88f62506a1af369d5727ee9f238ae1eeb
                                  • Instruction ID: e00e118d26f9f08c006e5353f487310e077dea0cfb220168ca785cb6df896062
                                  • Opcode Fuzzy Hash: 39c4c532eaf66c959e60b62e32ac9ab88f62506a1af369d5727ee9f238ae1eeb
                                  • Instruction Fuzzy Hash: 7A1186743042409FD724DB69D884E63BBF9EF89715B18856AE04ECB252E730E84BCB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b1a37264b7ab598e24daaa36e8c5c0563669575e3ad8407a69b9a192f7f38c4f
                                  • Instruction ID: ad112b2e674701f4403d9f60b6b70b6b6bf5574b4e5068fd1ceeac44188dc21e
                                  • Opcode Fuzzy Hash: b1a37264b7ab598e24daaa36e8c5c0563669575e3ad8407a69b9a192f7f38c4f
                                  • Instruction Fuzzy Hash: 70117F397111504BE709BB69E4487AF3BB7EBD9710B648069E802C7388DFB49C468FD2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 370d723a1498a71e69421d70aef3d3ebe8960ef93965dbfd0004e7b9f97bc197
                                  • Instruction ID: bd069ac023713894183818797f1ef81079003a37880dc6fdf24850c4ef07d27d
                                  • Opcode Fuzzy Hash: 370d723a1498a71e69421d70aef3d3ebe8960ef93965dbfd0004e7b9f97bc197
                                  • Instruction Fuzzy Hash: 4A1156B5800649CFDB10DFAAC485BDEBFF4EB48310F24845AD459A7350C338A945CFA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 265bd6d470138cb7da3ce78a5a38f260ba04f70ba567181737290c80ccaa2daf
                                  • Instruction ID: 06aed7075732ff0a1d7152bd987be2c5059a62093dbabdcef80bd9475ece18db
                                  • Opcode Fuzzy Hash: 265bd6d470138cb7da3ce78a5a38f260ba04f70ba567181737290c80ccaa2daf
                                  • Instruction Fuzzy Hash: 28114C397111544BD709BB69E05866F3BA7EBC97107A4C069E802CB388DFB49C568FD2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a5ba69b3e74e7f53d7eb364935fdfb8efd5e684ca87f667812d088848e3def18
                                  • Instruction ID: a1cc9eea05c4c2db9ed9c553a76948dad57dd90319fe2b1c70252771364c286f
                                  • Opcode Fuzzy Hash: a5ba69b3e74e7f53d7eb364935fdfb8efd5e684ca87f667812d088848e3def18
                                  • Instruction Fuzzy Hash: 00112932609248AFC701CBA9E850A46FFB9EF86320B2581BFE558C7642CB31ED05C7D1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a1cb5fd8726802e39a7d770f8f2afe2c497a2c1a0e56a9e259e8cf117d2fa664
                                  • Instruction ID: 1c5ce928779abe25af2514120bd2992374fcf10f71ffca21daecd59084278f37
                                  • Opcode Fuzzy Hash: a1cb5fd8726802e39a7d770f8f2afe2c497a2c1a0e56a9e259e8cf117d2fa664
                                  • Instruction Fuzzy Hash: 29115E30B112109BD754FB6994457AF7AA2EFC5B20F54892DE406DB388EFB0AD418FC1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 993c117bb66009c6b9a815204e7295ef952a9616da1c01b62577fdbf904e836e
                                  • Instruction ID: 1832ce3c58f87984e783c9ab9b4a4973230866cd29c605ece23030dc3eb2a791
                                  • Opcode Fuzzy Hash: 993c117bb66009c6b9a815204e7295ef952a9616da1c01b62577fdbf904e836e
                                  • Instruction Fuzzy Hash: 9B11C135A101188BDB15BB64C8557BE7BA7EBC8B00F60051AE506EB384CFB56C018BD5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284610523.000000000244D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_244d000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ef5b3b1da17f6604c14d0925e0f94b1545b6838bc00fdb672b6ac929534d1fe
                                  • Instruction ID: d1ebebab107eac36afb60cfaf278ec83e8967c0195982bc4488426367519224c
                                  • Opcode Fuzzy Hash: 4ef5b3b1da17f6604c14d0925e0f94b1545b6838bc00fdb672b6ac929534d1fe
                                  • Instruction Fuzzy Hash: 4B11B176904280CFDF12CF14D9C4B16BF62FB84714F2485AAD8094B256C336D456CBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7dfe1f201af0782d1149fb86ba02439a3f5d66899edbc3bcf04232cca1bc13be
                                  • Instruction ID: 0017de0b9b960fa435587664d43be2c42e13c4c2c9953736d56c905d82d15bb5
                                  • Opcode Fuzzy Hash: 7dfe1f201af0782d1149fb86ba02439a3f5d66899edbc3bcf04232cca1bc13be
                                  • Instruction Fuzzy Hash: E41182353250444BD319AB69E85576F3EABDFC9600F68806EE10ACB3C9CE689C024FD6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c895bdb2b497994769e376c3d98d67bef53b0c3ca65d4aec29f286897ac02f44
                                  • Instruction ID: 10037bbd0a86a8a6f81d23a5f0de60fb6e55ec8ece2652c5e8f373fb3ac66ec0
                                  • Opcode Fuzzy Hash: c895bdb2b497994769e376c3d98d67bef53b0c3ca65d4aec29f286897ac02f44
                                  • Instruction Fuzzy Hash: 6001F5797042044FD7208F69C894E3ABBEAEF8D751718446BEA49CB311EB32EC00CB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5819037eb84267a12e1fc82ac2b79081b9c72a592d2958ca99b92956ca319e12
                                  • Instruction ID: 044736c884c12e8019f9f623cd8f31781f96932e9734784402db34417a23bfe7
                                  • Opcode Fuzzy Hash: 5819037eb84267a12e1fc82ac2b79081b9c72a592d2958ca99b92956ca319e12
                                  • Instruction Fuzzy Hash: 0C117376E101098FC708FFB8E5456EE7BB5EB88300F54496AE005E7248EE705D158FD1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 97731acd61170758dbb589b18175543d2969e138dcc5a239e1f8f0f8e6278c66
                                  • Instruction ID: 863c164cac202a859f6888dcba8ed64f5aeda29f5427152aad1e0fdbc785daf6
                                  • Opcode Fuzzy Hash: 97731acd61170758dbb589b18175543d2969e138dcc5a239e1f8f0f8e6278c66
                                  • Instruction Fuzzy Hash: 2D115E322112489BC714EF59D981EDB7BAAEBC4714F50C839F5098B658CE74EC4A8F90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 64ba057ba3923ee6173d367d4893898cc75090687432dcf5d9a005c67b547156
                                  • Instruction ID: 7b49317aa8173accc0efc33037581c7a8de703f26977fe32b065e0f4c62bb23d
                                  • Opcode Fuzzy Hash: 64ba057ba3923ee6173d367d4893898cc75090687432dcf5d9a005c67b547156
                                  • Instruction Fuzzy Hash: C701DF32A04148AFDB618F68D484EFA7BA6FB89360F148066FC48DB241CA359842CF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4834aeae0cb814507a4129cf3cbbbc791b613d8888db1c84d30221ebbc2199e3
                                  • Instruction ID: 217837f747ce6c76e612d59846dfc236c1c505365f2ef1fa2c092efbc9d581e4
                                  • Opcode Fuzzy Hash: 4834aeae0cb814507a4129cf3cbbbc791b613d8888db1c84d30221ebbc2199e3
                                  • Instruction Fuzzy Hash: 121130347541148BDB18AB59E4597AF7AB3EBC8705F604029E402A73C4CFB55C468FE2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 59fd2f012a4566ef8608c500ddaa4cc74576326f2c706a06a7fe97cafc0579af
                                  • Instruction ID: 4f0014b57dbc889b19cfecb8c31fd2df5ef8afcfb6344c846f4a99dd19487464
                                  • Opcode Fuzzy Hash: 59fd2f012a4566ef8608c500ddaa4cc74576326f2c706a06a7fe97cafc0579af
                                  • Instruction Fuzzy Hash: FB118E35A102098FC708FFB9E4455AE7FB5EB88700F50856AE006E7248EF705D158BE1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b204cfe2c9a58b8417618b32aa03e69064333567ad54360dc1ab4edaf2bd3fd3
                                  • Instruction ID: 172f9b88262ab32822fe61f1bd12af73a913dd251a464dc98cd667a9c41d4eec
                                  • Opcode Fuzzy Hash: b204cfe2c9a58b8417618b32aa03e69064333567ad54360dc1ab4edaf2bd3fd3
                                  • Instruction Fuzzy Hash: 72018435B101188BDB15BB64D8657AE7BB7EBC8B00F20411AE506AB384CFB55D058BD5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: af56582f3d8378306f8deed32e5fe4a8e07b3b9d8d486f7890c4da518f12e4cc
                                  • Instruction ID: d8f1fd20a51df64dfb4537be7b6466149ef50300fb67d6b48e84584f87e26748
                                  • Opcode Fuzzy Hash: af56582f3d8378306f8deed32e5fe4a8e07b3b9d8d486f7890c4da518f12e4cc
                                  • Instruction Fuzzy Hash: BF0188363011146B9B096E99EC849AB7F6AEFC8220750803DF60587344CE718C159F91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 21f88564190b782e93be3dfaa572d62627d85985d393a858e73545e81d0fbf89
                                  • Instruction ID: 78b4966ef0db971e86e2476f25e0413d51fd64bf4a9f897f4f0b4c42c3cd6f34
                                  • Opcode Fuzzy Hash: 21f88564190b782e93be3dfaa572d62627d85985d393a858e73545e81d0fbf89
                                  • Instruction Fuzzy Hash: C50196356092489FC704EFA9D85555E7FFAEF45200B6180AEE40AD7391DE315D018B91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ad605740f0e75e7591e3b44d606f4a6d4374cdcef5a8362b831cea08e5b268ee
                                  • Instruction ID: 76af7a6418f407fd4fee8ed4db80bcc979f2e9899ff938b3fe30589a5e9b321c
                                  • Opcode Fuzzy Hash: ad605740f0e75e7591e3b44d606f4a6d4374cdcef5a8362b831cea08e5b268ee
                                  • Instruction Fuzzy Hash: 98117CB5A102449FE344EFA8D8017AA3FBAEB88710F504159E616CB388DA705D518FA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 51989627955c343104d2f74ab3d212b5107e6d39b4ab5de6b9d9691f0d94c024
                                  • Instruction ID: c99567a66e8e9b26020b8ec4c1439d31ee6b723ec3941ee50785281e01b196fb
                                  • Opcode Fuzzy Hash: 51989627955c343104d2f74ab3d212b5107e6d39b4ab5de6b9d9691f0d94c024
                                  • Instruction Fuzzy Hash: 1401A2787002044FD724DF69C898D3AB7FAEF8D311714446AE649CB311EA31EC01CB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284610523.000000000244D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_244d000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2fab3e4eb7c3cd91317ce78d3527d46626767cc607a625d14192d86852d4eb47
                                  • Instruction ID: 0be0090876fc8dc0321506fb2b10c75082973b80a42fc1364d2956c8731639c3
                                  • Opcode Fuzzy Hash: 2fab3e4eb7c3cd91317ce78d3527d46626767cc607a625d14192d86852d4eb47
                                  • Instruction Fuzzy Hash: 0301127140D3C09EE7124B258D94B62BFB4DF43228F1981DBE9C88F297C2695849CB72
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284610523.000000000244D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0244D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_244d000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 21e378492263743d4dc091ddad3cbced5aacb5f5b7a5d722c929cc4fdc60564c
                                  • Instruction ID: 68ed082a4583bc7b7f3ce7907f64847e88ed876d933e3ded1ab38f9d7c7e20d4
                                  • Opcode Fuzzy Hash: 21e378492263743d4dc091ddad3cbced5aacb5f5b7a5d722c929cc4fdc60564c
                                  • Instruction Fuzzy Hash: AD01A771905380DAF7104A26CDC4B67BF98DF4122CF18C117ED495B282C779A586CEB1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5feb1a4a1fd2cd77ec08472fff011cdcddc15684e711734985f5b1f6ff3e380c
                                  • Instruction ID: 5186d336294d4b786146fc37602eb06f1f099f54bf70cae9276e2acf06a2035d
                                  • Opcode Fuzzy Hash: 5feb1a4a1fd2cd77ec08472fff011cdcddc15684e711734985f5b1f6ff3e380c
                                  • Instruction Fuzzy Hash: 0D1100B59002498FCB10DFAAC588B9EBFF4EF48320F24845AD559A7350D375AA44CFA5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cde806753783199970ba5859d347a312fef197165e182e5f1c3666eb912e7d88
                                  • Instruction ID: 5b38c2111d7c9461e352f4a4396587cda8e1f65f0b6df36d1a8f9d3e50abcaa1
                                  • Opcode Fuzzy Hash: cde806753783199970ba5859d347a312fef197165e182e5f1c3666eb912e7d88
                                  • Instruction Fuzzy Hash: 4601F175B042529FCB04EF58D8448BEB776FBD8304B10486AE90197241CB358916CBB1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b8c53725620fbf70a97fdb2825551e41d3b169bdf65edae82420abc3548d461
                                  • Instruction ID: c1d41f73b02d370f1afa78e13bf88b5f6786ef0267460997481126102d2838fc
                                  • Opcode Fuzzy Hash: 7b8c53725620fbf70a97fdb2825551e41d3b169bdf65edae82420abc3548d461
                                  • Instruction Fuzzy Hash: 52017175A101049FE384EFA9D80179F3BBAEB88710F508169E61ACB3C8DE745D518FD2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e7a96ec26416185e387738c01e8c073ff31046f962957ad552e6c8c5e9fcd29
                                  • Instruction ID: c9d459a3910d999a7a252ba465b7aaa07e5a6f8a61e9bf17d63eb47e986157e1
                                  • Opcode Fuzzy Hash: 8e7a96ec26416185e387738c01e8c073ff31046f962957ad552e6c8c5e9fcd29
                                  • Instruction Fuzzy Hash: A7018472A112489BC718EF68D89276D7B66EF95700B60849DE105CB355DE71AD028F82
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 81ff5a9c8a3f1c03fb488e343eefbe26c71bb48590e8861d80e627f680d00035
                                  • Instruction ID: 1c5c5c0d362a6499cffcafabdd5892565bdf51c9ea62574c69012fda144984ed
                                  • Opcode Fuzzy Hash: 81ff5a9c8a3f1c03fb488e343eefbe26c71bb48590e8861d80e627f680d00035
                                  • Instruction Fuzzy Hash: CAF0F4356443841FC7459B78EC55BF93BB5EF8A710F194096E886CB347C8259C0B8B25
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3ef1a0df9b4946e56dcf2a539b6e84164e73ddd44930885b0c55e5b599344e5
                                  • Instruction ID: 0d287df07f58f4292404e2d2850533115d61c90744917ce3d9c67d26c6b2cab9
                                  • Opcode Fuzzy Hash: c3ef1a0df9b4946e56dcf2a539b6e84164e73ddd44930885b0c55e5b599344e5
                                  • Instruction Fuzzy Hash: 53F0B4367502059BEE297669AC0077A37A7EB84650F20403AEE0ACB384FEB49D11CB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f4d97ee343101b7c0385cadbf58b6ddef0995f87db16b7d57017018566781f1c
                                  • Instruction ID: 34c049a8035cdc4608a88fbde2263afbd5cd6e1f0fb4307561515fea9d4425fd
                                  • Opcode Fuzzy Hash: f4d97ee343101b7c0385cadbf58b6ddef0995f87db16b7d57017018566781f1c
                                  • Instruction Fuzzy Hash: 64F0C8307012105BD714FBA4E4057AE7BA3EBC0B20F148A5DE4069B384DFB1AD458BC1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ffb548c7864a2ea64f9e453d19adc09b549fbb602bb10227f4add78efa94c225
                                  • Instruction ID: ea1e48b95f5121eee99fad78a375f89f90720b9e98bfae41fe7972c950b5d16b
                                  • Opcode Fuzzy Hash: ffb548c7864a2ea64f9e453d19adc09b549fbb602bb10227f4add78efa94c225
                                  • Instruction Fuzzy Hash: B2F0967261405CAFCB50DFE5E850BBB7FF9AB49210B148096F948C7241CA35DA119BA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f22a16d58074cd700932b40b554a70e670bcf08795e38f9a53be1559473d3624
                                  • Instruction ID: aaeec9d4affedb1c44065db430b5585618d7436a1e844a46a340bbb9eddcb517
                                  • Opcode Fuzzy Hash: f22a16d58074cd700932b40b554a70e670bcf08795e38f9a53be1559473d3624
                                  • Instruction Fuzzy Hash: CEF0EC721051987FCF439E95DC10CFA7FB9EF4D250B099086FE9482262C676D961EFA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9ce6269dfddc147dcb92203a2021eb81d67b784ee691051b609959331e18c79b
                                  • Instruction ID: 83fd7bded0581ac88ad53ec7ee422f8e8a3ba00fc52300c82080079259e1f6b0
                                  • Opcode Fuzzy Hash: 9ce6269dfddc147dcb92203a2021eb81d67b784ee691051b609959331e18c79b
                                  • Instruction Fuzzy Hash: A2F024316483805FC3498B68ECA4BF93B71EF85224F29409AE98ACB283C8619C06CB55
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0655a434a821fa258a776eb159239930d9e0a68347215a5414067b27cff47bf4
                                  • Instruction ID: 0d6fef45474b696d26266e56602a9552f33328ea815ed66ef0de324a4dbfdeda
                                  • Opcode Fuzzy Hash: 0655a434a821fa258a776eb159239930d9e0a68347215a5414067b27cff47bf4
                                  • Instruction Fuzzy Hash: 55F02B363142819FEF2A6724AC107763BA39F80600F244066E902CB284EAB44C51CF41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 72e55e370be5f55141fd333024784da07c4290ca2f3883c7a7ea1ca460ada4c8
                                  • Instruction ID: dfe3bde365ca17cbda12361496226d0f89533377f5be2435f77b9b24f8c30ae3
                                  • Opcode Fuzzy Hash: 72e55e370be5f55141fd333024784da07c4290ca2f3883c7a7ea1ca460ada4c8
                                  • Instruction Fuzzy Hash: D7F0E577D19145ABCB05CB65DC81719BBB5EF45204FA881EED40CD7701EA71EA0187C1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 45da385b887aa6eae1ea9fcdf7920fa52d22cc3988c671f5634f10702f300262
                                  • Instruction ID: c7e07dacdee16d41ff06efc40bb1768a2b9b2bee3350ec945c32eac403ab3594
                                  • Opcode Fuzzy Hash: 45da385b887aa6eae1ea9fcdf7920fa52d22cc3988c671f5634f10702f300262
                                  • Instruction Fuzzy Hash: 78F0B4726180509FD744DA5CE840A6BBBD9DFD8700B08845AF141C3285C9A5EC02CBB1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aa87f90a84455788f20b3d4b636875fcbc6cb32c4b26170387223aba6481814c
                                  • Instruction ID: d9dfee10c76d232848bee74a0a7362ef80abde569ff7109db0821d8579963a5c
                                  • Opcode Fuzzy Hash: aa87f90a84455788f20b3d4b636875fcbc6cb32c4b26170387223aba6481814c
                                  • Instruction Fuzzy Hash: 0CF05C3233034457DB14AA2EAC45B657BABFF81710F25006AF605DF280DEB09812C761
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8ebc6b1a9d475dabf1ebb639485f50a8c71f99ad31df8f595c9dac1e2e23203f
                                  • Instruction ID: 98da6548ab664d44d6ab9b48f8e357c930984dd9049991b8e8c37f5a9aa1f4a6
                                  • Opcode Fuzzy Hash: 8ebc6b1a9d475dabf1ebb639485f50a8c71f99ad31df8f595c9dac1e2e23203f
                                  • Instruction Fuzzy Hash: 23F0E57AB1400417E325DA19D941B796B9AEBC4204F24C469F109C7346DE7AD803CB51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb9c4a0fbf5a813d79d6d4be0f48b5c81b7177881a7accdbf5094d4e1d068bfa
                                  • Instruction ID: f88a357539327cc02bc6e42d080020047f152cbfde466d3d00f3bb5d37fc47e8
                                  • Opcode Fuzzy Hash: bb9c4a0fbf5a813d79d6d4be0f48b5c81b7177881a7accdbf5094d4e1d068bfa
                                  • Instruction Fuzzy Hash: 37F0321448E7E44FC3A707781C795F47FB0DC0302031A06D6CDC28B0A3800AAA2FE7A6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b4941339a484c1ac218a98dcc642aa67043d6a8580b50be575e84b714f26aa48
                                  • Instruction ID: 18c7b32a7cf8ae59a3d7f624082a1936080b6187ef9651d28be3f47368c1b9b5
                                  • Opcode Fuzzy Hash: b4941339a484c1ac218a98dcc642aa67043d6a8580b50be575e84b714f26aa48
                                  • Instruction Fuzzy Hash: 50F0EC3233020457CE18695E9C00B2637ABAFC1B50F254029F609DB384CDB09C22C791
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c5f7242ccbb0cd8b75f8789737ae15f96768ba100e8c98cbfdd0e67fe18ffe1e
                                  • Instruction ID: 6afae5e2853a5c8f6cf44a4b0b0d1cac8f1452d71b60c35a330bf73a5bd4d316
                                  • Opcode Fuzzy Hash: c5f7242ccbb0cd8b75f8789737ae15f96768ba100e8c98cbfdd0e67fe18ffe1e
                                  • Instruction Fuzzy Hash: 4CF0963212D3C44FC342EB60DD918157F36FFC230471888DEE4858B15BC6619D16CB51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5dac8dc3ff66e91aa191838ca025fd055f176323d93eeab5aac2accdc5345e69
                                  • Instruction ID: 6c0216e6d6eaaa582cb7122474909331a52d737cd641efaf388f077ad280636b
                                  • Opcode Fuzzy Hash: 5dac8dc3ff66e91aa191838ca025fd055f176323d93eeab5aac2accdc5345e69
                                  • Instruction Fuzzy Hash: 9BF0827A700104ABC705AB98EC90A6B7B9BEBCC7A1B55842AF54AC7344DE348C158B90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 272a0836b8831fcce879ef378354d8a41e4eebee46b5094d6c3a8b7fdb94e173
                                  • Instruction ID: 4c5571f9bc60148462b0cfc5f065823f735b49890b777a4326d77c5fa1a47b4f
                                  • Opcode Fuzzy Hash: 272a0836b8831fcce879ef378354d8a41e4eebee46b5094d6c3a8b7fdb94e173
                                  • Instruction Fuzzy Hash: 80E02BB97069150FD321091D2855A2FABA9EB85A00B50417EF408EB204CDA8AC024B91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9505ae356c3d122ad7665f79543aa5a918688942e84e110eda440bccaaf2e6f0
                                  • Instruction ID: 74bff28cb0101d58ab8027e6e89a2f0085071cc43e43c76ffc9f76cdf9ef17d7
                                  • Opcode Fuzzy Hash: 9505ae356c3d122ad7665f79543aa5a918688942e84e110eda440bccaaf2e6f0
                                  • Instruction Fuzzy Hash: 9DF0A03A3000046B8705BA49E88096B7BAFEBC8760B508029F50AC7304CE309C158BA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 34bd55dd42713e93c67b8e498ab3b2cc960fa66bd702d5744983473984e9d1f1
                                  • Instruction ID: 6fc32e9e3116eac5fcb13c0d42b27661dd65246239b101f3fc3ea9fdc0c619c8
                                  • Opcode Fuzzy Hash: 34bd55dd42713e93c67b8e498ab3b2cc960fa66bd702d5744983473984e9d1f1
                                  • Instruction Fuzzy Hash: E6F0BE71518204EFC701CFA4E941A6ABBF5DF85600F10849EA90493311CA329E16ABA2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 061cebdefb489c2b2f80bda839debd269e6ada2f72ffe257377362219437d71c
                                  • Instruction ID: ad38fa75b8bd197f0e08eea54d2b4304a8c79fb2292b3718c38db01a06401c37
                                  • Opcode Fuzzy Hash: 061cebdefb489c2b2f80bda839debd269e6ada2f72ffe257377362219437d71c
                                  • Instruction Fuzzy Hash: 55F01C72104198BFDB028FA5CC01DFA7FB9EF4A264F098186FD9492251C676DD21DBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 06ecb2fbf2f7657a41472c1f8fe5e9ad9d8ab3900d883516151f4b3847f213f8
                                  • Instruction ID: 8b9d5c47196fce7e409b564075fb807f4de3c9874c9ef6c0df0567a5d1bbc963
                                  • Opcode Fuzzy Hash: 06ecb2fbf2f7657a41472c1f8fe5e9ad9d8ab3900d883516151f4b3847f213f8
                                  • Instruction Fuzzy Hash: 46F07437110114AFCB06CF84D840D96BBBAFB88320B05849AFA184B632C732D921EF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 34245472336708cc2920c47eefd0b8801a36268686600edc4ad8bc9aca07c05d
                                  • Instruction ID: af86d68e81e74344cc1bb953f0db79a5eccccb3d77797f691fd0b4df76826b63
                                  • Opcode Fuzzy Hash: 34245472336708cc2920c47eefd0b8801a36268686600edc4ad8bc9aca07c05d
                                  • Instruction Fuzzy Hash: B7E09B727052405FC305EE69DD91656AB6AEFC5210B19C476E10DDB356DA20CC0583E0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 040034b758971a9dd9618c05b7a05cad034777bfd4ad9e1322397c4820dfd885
                                  • Instruction ID: ee824f4f9c855dd50054c6b574bc86157fd9863450307f3f853eb8bd12135b19
                                  • Opcode Fuzzy Hash: 040034b758971a9dd9618c05b7a05cad034777bfd4ad9e1322397c4820dfd885
                                  • Instruction Fuzzy Hash: 9CE0D8393051111BE6051AA678C457A6FABDBD969171C41ABE909C3384CE205C128B90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2c68105138b15a696e9f5b598da1e980aa7529d8225c888ed03e733dc17f8389
                                  • Instruction ID: d5ae1544d8aaa18da4039ab658af4e86db07245c9ab3c61b0ca8275fcb7798f8
                                  • Opcode Fuzzy Hash: 2c68105138b15a696e9f5b598da1e980aa7529d8225c888ed03e733dc17f8389
                                  • Instruction Fuzzy Hash: 34E026267082100FE7052E7A6C651FA7BD3EBC211071408ABE242CB252DC32C40A5310
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 38f7c215e88813f64e9814fc136cf38980a5dfbc4ab957d71df7756ec3a6c38c
                                  • Instruction ID: 79f190b413ad06bdc79f7ecf9454057b4242576deb0ab98391b3831b6965edcc
                                  • Opcode Fuzzy Hash: 38f7c215e88813f64e9814fc136cf38980a5dfbc4ab957d71df7756ec3a6c38c
                                  • Instruction Fuzzy Hash: 0DF082755083409FD345DB14D840912BBA1FFD9300B15884EE85087355CB72DD5BCB61
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7bccaaad364922d21b4065ddf8f4fbbb564fac5737827d1c703adc9ad86ce1e1
                                  • Instruction ID: a4799da16c43833bccfd07fb02dba34b1730143121b87527aa909ee5390a4bcf
                                  • Opcode Fuzzy Hash: 7bccaaad364922d21b4065ddf8f4fbbb564fac5737827d1c703adc9ad86ce1e1
                                  • Instruction Fuzzy Hash: 51F039721040986FCB41CE99D810EB77FECAB4D221B08804AFEA4C2241C639D922ABB0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d3b4df908ef3de0da10c5a54a28f433ada365caf301f4506901c8290f4b43fd2
                                  • Instruction ID: 82b33ef8fc50809eb620453e30f9ae455b256aa12e59d811501c4a89ddcc20a4
                                  • Opcode Fuzzy Hash: d3b4df908ef3de0da10c5a54a28f433ada365caf301f4506901c8290f4b43fd2
                                  • Instruction Fuzzy Hash: C1F082A550B3C45FCB42CBB499612957F709F42100B1880DBD044DB263DE225E06DB51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2bddb322053850fbdb461dbad92d9e9e9ed0c31dcc647fa264d210d205027929
                                  • Instruction ID: e1aa784eaf99580f2c1cb8c8e6dff6cadb6a46ffa38e23bed5805c0ec6df59c2
                                  • Opcode Fuzzy Hash: 2bddb322053850fbdb461dbad92d9e9e9ed0c31dcc647fa264d210d205027929
                                  • Instruction Fuzzy Hash: ECF06DB25000986FDF41CED4CD509FB3FA9EB8C255B098046FDA8D6191C53AD922EB60
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 353af09753b0ba7bc3a462bb46cc08dfd38769f6fd218f7dafa177a4d1a97e3b
                                  • Instruction ID: 3ff109f8545a240ac215da7fb32290ab060666860f723a2653e045b75ee07de5
                                  • Opcode Fuzzy Hash: 353af09753b0ba7bc3a462bb46cc08dfd38769f6fd218f7dafa177a4d1a97e3b
                                  • Instruction Fuzzy Hash: 52E0D8F2805048ABC700DEB5D96164B7F7ADB41341B5684FE9008DF250EE369E059B91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 91ba328cc56eafd04b3e73e3c537ab8c2f5473dae9f1dc8aa32edc88785f785f
                                  • Instruction ID: c7764f97f7a9cc98040d2c3c9d7dc8e54f25c15c122d2bb8a53a5efd186b8693
                                  • Opcode Fuzzy Hash: 91ba328cc56eafd04b3e73e3c537ab8c2f5473dae9f1dc8aa32edc88785f785f
                                  • Instruction Fuzzy Hash: CDE0ED329222089FC704FFA4DA52B9F77B6EF99604F6041A8E509DB354EE716E10DF81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1be4949cf32e382ade603b6145ba6ab7a6f53e69c014ba8c9a135e84cbc14f10
                                  • Instruction ID: 59327d7ceeddb0b208d61b6df32e6057c420843bbb95ad4f7f56ee3a3b0bf7ce
                                  • Opcode Fuzzy Hash: 1be4949cf32e382ade603b6145ba6ab7a6f53e69c014ba8c9a135e84cbc14f10
                                  • Instruction Fuzzy Hash: BAF0A0729106089FCB01EFA8CD118E9BB71EF49300F02C65AFC486B260FB31D961CB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 40b153383e6de520665622cd19abb3d691de445f4deecf93faaa50dfd1b24b64
                                  • Instruction ID: 704a75d8dcbbdfedf44427af84db028faf61110e9c107736e094e3b967943e86
                                  • Opcode Fuzzy Hash: 40b153383e6de520665622cd19abb3d691de445f4deecf93faaa50dfd1b24b64
                                  • Instruction Fuzzy Hash: 81E0ED721041987F8B41CE95CC10CFA7FEDEB4D265B088046FE98D2151C576DD21EBB0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c2cbe8e7595b336344adfe1bb9d02d7967eae89bbf8177afbf580d036ba5c817
                                  • Instruction ID: f83e3c5b2ab2d35cdcd3e1d4a3d31df64816a61235de731409ad561c73adb66c
                                  • Opcode Fuzzy Hash: c2cbe8e7595b336344adfe1bb9d02d7967eae89bbf8177afbf580d036ba5c817
                                  • Instruction Fuzzy Hash: B3E01236701115275618265B78C483BBBAFEBC9AA5354416AF90DC3384CE616C2286E1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 47402df45c46afe5cda7f773ac7ed345737a474fc31964f63f9314cef3e87f62
                                  • Instruction ID: 4867cddb9dff3c0cffca12bab4d432b70ebf5bb677c92bc116a0cde99bc45e76
                                  • Opcode Fuzzy Hash: 47402df45c46afe5cda7f773ac7ed345737a474fc31964f63f9314cef3e87f62
                                  • Instruction Fuzzy Hash: F6E0DF321140982FC350CE99D800EB37BEC9B4D110F048056F9A4C3281CA69E9029BA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 21bad3f8bb78a028e9e7d6b1e797c6a0f618a2411e33ad5f37ac712141522e13
                                  • Instruction ID: 4b88adafda05e2a28163bad217b73957b86bb464158144c04ce459f48a808d73
                                  • Opcode Fuzzy Hash: 21bad3f8bb78a028e9e7d6b1e797c6a0f618a2411e33ad5f37ac712141522e13
                                  • Instruction Fuzzy Hash: 1FE06D716001904FC3999B7CE058AE83BF0EF0D25134504D5D48ACB262CA219812CF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 567d301de30e3b8d4d63a654f917858e9cc33466a1910d9270fc81ca7aee995a
                                  • Instruction ID: 57b2fdcae052896e8a7ee8c2e55aa4e6ce372fde4333f2c7a020c3a4f10870df
                                  • Opcode Fuzzy Hash: 567d301de30e3b8d4d63a654f917858e9cc33466a1910d9270fc81ca7aee995a
                                  • Instruction Fuzzy Hash: 51E0E532110108BFDF01CF84EC41DEA7BAAFB5C320F04841AFE0486220C672E862EB90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eb1cae6f7d53055ede1bf14bd83e584db4d5d4e6632a478b7f85a7e71b516647
                                  • Instruction ID: ccba1a1209704aaa0a5bc8013b1a05785f81cd8bb82fadd73539a877100c394e
                                  • Opcode Fuzzy Hash: eb1cae6f7d53055ede1bf14bd83e584db4d5d4e6632a478b7f85a7e71b516647
                                  • Instruction Fuzzy Hash: 0AE09A361001186FD701CE84C841BA63BADEB89261F04804AB94482241C676E922DBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 664f35d6e9b6a0b8d0af0c68ad880da06b61d7390ef2d4ad81f92f49d285d556
                                  • Instruction ID: ab42ce4db648e4beb32346b8b6c2f302b8672c3b12da0919521848ec76e6fc6f
                                  • Opcode Fuzzy Hash: 664f35d6e9b6a0b8d0af0c68ad880da06b61d7390ef2d4ad81f92f49d285d556
                                  • Instruction Fuzzy Hash: 83E04F721040A87F8B41CE99CC10DFB7FED9A4D111B08804BFDA4C2242C57AD922EBB0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9d6827afd7fe25384e78826a6007031e6a8ea98e0a6b7efed475411a66102dee
                                  • Instruction ID: 670d59951c33852e3a87ebb512fb852bc54d2540199ea7ee7b91f356f5e320b1
                                  • Opcode Fuzzy Hash: 9d6827afd7fe25384e78826a6007031e6a8ea98e0a6b7efed475411a66102dee
                                  • Instruction Fuzzy Hash: 0AE086B0B005509FE714EF65E841516FFFAABC8215B08C5AFE40D8B616DF3698438B80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2d1f756c9758ca3ee6d6ad52483a676c5f1023e032279478da285fee7f41bc1a
                                  • Instruction ID: 76d3c8e24654eb176360c3131cddefa51ac6bbaee3c5181ed298eb3fd161db26
                                  • Opcode Fuzzy Hash: 2d1f756c9758ca3ee6d6ad52483a676c5f1023e032279478da285fee7f41bc1a
                                  • Instruction Fuzzy Hash: 4FE092616081904FDB05DB3DA8807267FA5DF8A711B08889AF041C718ACAA458159B52
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f009e8a7935eb45b61b77ff40a5793dfc6dd0e5626309f214bc05fb69b9cc8e8
                                  • Instruction ID: 2b241265f78477204d0a58b4a5e23ad3f1db93fa0dced41aab8c556a29776957
                                  • Opcode Fuzzy Hash: f009e8a7935eb45b61b77ff40a5793dfc6dd0e5626309f214bc05fb69b9cc8e8
                                  • Instruction Fuzzy Hash: 29E04F351082986FDB45CF58DC508A67FB9DF462207058496F894C6253C6629D22EBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 80a73c82b7d36a47435eadb71bec5a8e7825013746fdfeff81af2bbdd1f9c029
                                  • Instruction ID: 820688676f7209ec5f5cbf4a19f331dcf78dcb9e66c323c95b0738b9a3cf9796
                                  • Opcode Fuzzy Hash: 80a73c82b7d36a47435eadb71bec5a8e7825013746fdfeff81af2bbdd1f9c029
                                  • Instruction Fuzzy Hash: 01E01230A112089FCB04FFA4D941A6E77B6EBC4304B604169E509D7348DD71AE10DF92
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 59f72177d4f88f5ecfa732d55a9df54b7fbab4b5d600628ec67eca789d26bd99
                                  • Instruction ID: d6a250c36e8b490e579f45ad693d8359a3491ab00fcec1ffb3c3d3d4754b2cdc
                                  • Opcode Fuzzy Hash: 59f72177d4f88f5ecfa732d55a9df54b7fbab4b5d600628ec67eca789d26bd99
                                  • Instruction Fuzzy Hash: F8D01236310114A7D7056A8DE844EAB3B5EFBC8721F54802AF606C7244CEB69C125FE1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e2e8211fc53a9a4643da4d9c6fe402ef6c3ff6e86a1cd0b0e03c7b7a67ed3054
                                  • Instruction ID: 6a62911f7ada6e881d83f9eb073091b60ae9d90494ad109d28d0c4c4dd67f2b7
                                  • Opcode Fuzzy Hash: e2e8211fc53a9a4643da4d9c6fe402ef6c3ff6e86a1cd0b0e03c7b7a67ed3054
                                  • Instruction Fuzzy Hash: 46E0EC7A505108AFCB01DBB8DD4174A7BBADF45200F5182AA9508EB355DA316A156BC1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 728493d8646a103c99bae8e8ff9f2dfb67580594483094a4a92be69d77976066
                                  • Instruction ID: 10a85955b96048f79564cfeb35743b4c446502ded681d06e42c4602fab92eb73
                                  • Opcode Fuzzy Hash: 728493d8646a103c99bae8e8ff9f2dfb67580594483094a4a92be69d77976066
                                  • Instruction Fuzzy Hash: F1E05B35B551D44FCB9257B494584EC3FB6DF4A25534500E5E486CB222DD515C07CB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 072795321b6175fde078ba6318f0a8d56a85c2add8259997215d14c1ea023a80
                                  • Instruction ID: 3db147a01e37bc1920c37433f67dbbc936dbc12ab4e41346b9402888ad575b1a
                                  • Opcode Fuzzy Hash: 072795321b6175fde078ba6318f0a8d56a85c2add8259997215d14c1ea023a80
                                  • Instruction Fuzzy Hash: BDD02B31B44230CF42199A29940042937EAAF8562032545E8E405CF321CF21CC4087D1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 11d5c9ebb59904881c2a57027df9a70d94021a33efd8fc4ef57c0a990e0ad09d
                                  • Instruction ID: f1da2e35742b64abd6c4263e3f0b76072fd36d44ca948be0354b354fba57ada0
                                  • Opcode Fuzzy Hash: 11d5c9ebb59904881c2a57027df9a70d94021a33efd8fc4ef57c0a990e0ad09d
                                  • Instruction Fuzzy Hash: A1E01A31A222089FCB04FFA4EA4195E77BAEBC420476040A8E509D7248DE316E10DF81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 228d9a32c0817061a18cf453d39405ce6ec0183b078d3c88fd4c64ed7a45c664
                                  • Instruction ID: 2d0a773a029407eae3fe7c0ce11f6513421b4d2ebb67851d2266bafdb60e4e29
                                  • Opcode Fuzzy Hash: 228d9a32c0817061a18cf453d39405ce6ec0183b078d3c88fd4c64ed7a45c664
                                  • Instruction Fuzzy Hash: BAE04FB25002486FDB01CF84D955AA63FB5DB54211B04C05AFD5586251C672C823DB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fdd745460ca7d5efc9c1dc2ce27f995a4aac50829a4d18a94f40eb6df460b945
                                  • Instruction ID: 3cf7624e7ebc167b6df1485056a3171d0a6a72460343c0df891e93520e142d0a
                                  • Opcode Fuzzy Hash: fdd745460ca7d5efc9c1dc2ce27f995a4aac50829a4d18a94f40eb6df460b945
                                  • Instruction Fuzzy Hash: 8BE0EC765001186BDB01CE84DC41AA67B6AEB99264F18C05ABD0496351DAB2DD22DB90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d56b0c5f0bd7085c3bf9164357dd16f720a83def111052c424076796e0be58f8
                                  • Instruction ID: ab0ed48109db8d9295b4a8b39d1fa8e5ab2337cea3992ec9d51805571b605dda
                                  • Opcode Fuzzy Hash: d56b0c5f0bd7085c3bf9164357dd16f720a83def111052c424076796e0be58f8
                                  • Instruction Fuzzy Hash: 42E0C27290A24CAFC701DFA4991418A7FB9CF06210B5040EBE444E7211FD325E048792
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5bd5e710004956d66dfe3e2215aab6d0f81319c1ea20041723a612196364da64
                                  • Instruction ID: 0e78a27741c7657a89158647ee5ee4e5ddb29d7e211c5697c5f048b27a1ad32d
                                  • Opcode Fuzzy Hash: 5bd5e710004956d66dfe3e2215aab6d0f81319c1ea20041723a612196364da64
                                  • Instruction Fuzzy Hash: 1BE02636100119BF9F059E84DC41CEA7B6AEB99664B14805AFE1556221C673D932EB90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 89673832edfff9f9bfe54c431dfd79f5486c9437fbd24a2311619e2551f18f99
                                  • Instruction ID: 2c14e3ae64cb184cdc39c1b0f1a0f43a41f0013729e1aba34359663b054b16bb
                                  • Opcode Fuzzy Hash: 89673832edfff9f9bfe54c431dfd79f5486c9437fbd24a2311619e2551f18f99
                                  • Instruction Fuzzy Hash: 05D0C2B32182505BD241E908E884996A761EBD4320F08C82FE40083305CA62DC56C361
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 49bec1adbdd607e6d40542e0f5ee0b269763f6f04078961a161352a179076708
                                  • Instruction ID: b7c15f5d6199f36f7ff641d71568f529fc96a3582e1d2df4f696ef0e7959edf5
                                  • Opcode Fuzzy Hash: 49bec1adbdd607e6d40542e0f5ee0b269763f6f04078961a161352a179076708
                                  • Instruction Fuzzy Hash: 05E0EC721041586F8B41CE89D811CB67BADDB89260704805ABD5486251C672DD229BB0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a8e2869a3afbe9af28b473b636aed89354cbd2061cd8bfc760e64b876deb78e5
                                  • Instruction ID: 5ffbf746aedd02beee038126ebb7434ed0446538cd87c6cc494697cfdbe4e50a
                                  • Opcode Fuzzy Hash: a8e2869a3afbe9af28b473b636aed89354cbd2061cd8bfc760e64b876deb78e5
                                  • Instruction Fuzzy Hash: 3FD012721041A82F8750CA99D810DB77BEC9A4D121708C05BB994C7242C565DD1197B0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4840826680b98ee7c919f95df3c221e76c5dc955e64fb07bb0b073ff09454988
                                  • Instruction ID: f068c3bf4fa0b625ad05ae5d9d4dae7dc952719c14ae174c450d97efc44485a4
                                  • Opcode Fuzzy Hash: 4840826680b98ee7c919f95df3c221e76c5dc955e64fb07bb0b073ff09454988
                                  • Instruction Fuzzy Hash: 98D01776815108EFCB00DFE8E941B9E7FFDEB48300FA041AAA508D7210EE326E149B91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d785f9eb4fdc39c891738aec182069c0b3cbfa976f2c66e5632add2eb5bd10a2
                                  • Instruction ID: bd5f5bcd96c0fb9a50a01f139754400513107d3d0025a010d9e1b118884bdbd4
                                  • Opcode Fuzzy Hash: d785f9eb4fdc39c891738aec182069c0b3cbfa976f2c66e5632add2eb5bd10a2
                                  • Instruction Fuzzy Hash: 85D012B180624CAADF01EBF4A6507997FB99B46200F51419BD90897212EE311B156792
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4eaff115308764575a877b2a4031da13a1d308c3a3d68b1cb948e063d64aaec6
                                  • Instruction ID: 3e4c96e36021c1a4edacee29648c98e956dd6f0305bcb4c8c7d52ca94cd8702b
                                  • Opcode Fuzzy Hash: 4eaff115308764575a877b2a4031da13a1d308c3a3d68b1cb948e063d64aaec6
                                  • Instruction Fuzzy Hash: C1E0ECB4609280AFD345EB54D950926BBA2BBC9304F18C89EF8558B356CB22D807DB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0de0925bafdd884222765a9e99766698b21bfa92224d21a76b0a20c54784134a
                                  • Instruction ID: d39fe3de573106ef03db5fa7fb34f30364901f9eb7ba9a2d15ec3d507cdcd388
                                  • Opcode Fuzzy Hash: 0de0925bafdd884222765a9e99766698b21bfa92224d21a76b0a20c54784134a
                                  • Instruction Fuzzy Hash: A5D012BA81510DABCB00DAA5D90178A7BFDDB45204F5145AED408DB211F9315B055BD1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d31bba036535300563a34da1a22f05515f5577d0394155e15fb232e84e47c7b8
                                  • Instruction ID: ed6634e8a45aa5c09dc07bf5e0c684ace79826ccda49531e322569dcc36df736
                                  • Opcode Fuzzy Hash: d31bba036535300563a34da1a22f05515f5577d0394155e15fb232e84e47c7b8
                                  • Instruction Fuzzy Hash: AED012721181A01BD340D758CC91BA2BBE5AFDB615F18888EA490C7245C555E802C7A1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d248731c1373cb081b7a09ce72014ff2e079e943745880617712f89e93918f8
                                  • Instruction ID: da74c8faa2927293a48ee6f9275b28754dc3163c9af1bc30606a9d389a0ae86e
                                  • Opcode Fuzzy Hash: 7d248731c1373cb081b7a09ce72014ff2e079e943745880617712f89e93918f8
                                  • Instruction Fuzzy Hash: D8E0127181130CABDB40EFE4E5C0B9B7BFAEF49300F905199E504D7211D9315A015B85
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 76e7ac50f3e425859741c4dc5d5d7d446904bd10c5b35c5acca7a2c3440fc5f7
                                  • Instruction ID: ce1cb9e0f19e7407cf42d9c5da392714d90cf53eabb12e15d7f00900531c975c
                                  • Opcode Fuzzy Hash: 76e7ac50f3e425859741c4dc5d5d7d446904bd10c5b35c5acca7a2c3440fc5f7
                                  • Instruction Fuzzy Hash: 02E0C2B35000446FDB00CE84DD40AA63B65DB95211B04C45AF85987241CA72CC22DF60
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a8e6a07dc12e02ad3e5ed504a5308a9fd4191ff32c073443818bcad8348e5d37
                                  • Instruction ID: 74bd5e682b91a2d78f462f720d40d5774850364329bd47b2e62bddd07364fa43
                                  • Opcode Fuzzy Hash: a8e6a07dc12e02ad3e5ed504a5308a9fd4191ff32c073443818bcad8348e5d37
                                  • Instruction Fuzzy Hash: B2D012321001187F8B01CE84DC01CA67B6DEB89260704C056FD1487211C672DD22DBE0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 81a2d8954466da127c84c1ef70aa236854cb6a0a5702d31d34eeb5787439287b
                                  • Instruction ID: b9e45ad7037caa968c6f6cfd42229f5e0cca072b9a35f0c3c5e3b7eb5ac05433
                                  • Opcode Fuzzy Hash: 81a2d8954466da127c84c1ef70aa236854cb6a0a5702d31d34eeb5787439287b
                                  • Instruction Fuzzy Hash: 4DD012765181505FD340CB94E901E66BBE9DFC9610F19884EF84497241C561EC17DBB2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8ab869af69afa5e3705abfa003fbeb05737d94153e11a484e1e7a4c73e3e153c
                                  • Instruction ID: d8e6f52d84d0e9a7535ad6c92223e7db018a165c074aefbb2bfd7201b7f166f6
                                  • Opcode Fuzzy Hash: 8ab869af69afa5e3705abfa003fbeb05737d94153e11a484e1e7a4c73e3e153c
                                  • Instruction Fuzzy Hash: D3D05E322001187F8B00CE88DC00CA67BADEB89220B04C05AFD5887241CAB2ED22DBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bf20fd5b87561a154fd2be8948a118b485dd326ad4e0e3ce3a635ed38a7539d1
                                  • Instruction ID: bc6048ca703ac4745b21eaeba5c8f1262883c178fd65b2c67d7864d38b803f2c
                                  • Opcode Fuzzy Hash: bf20fd5b87561a154fd2be8948a118b485dd326ad4e0e3ce3a635ed38a7539d1
                                  • Instruction Fuzzy Hash: D6E017356402249FC348EB6CF558AAE37F8EF4C62178200A5E50BCB322CA60EC008F95
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 76176ff8bde2537871f21225c7ff1d84ee3e85a75fe81d262607a5d1a3051f9c
                                  • Instruction ID: 03e1c5f5403bb33d2c24a4784fed570aceed3df4815acc25783f85394e577285
                                  • Opcode Fuzzy Hash: 76176ff8bde2537871f21225c7ff1d84ee3e85a75fe81d262607a5d1a3051f9c
                                  • Instruction Fuzzy Hash: D5E08631D48291CBD3019F69905835636A1BF49A11F9685BDC8459B206DB2888528E96
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7f995fcfea616d215700479df6319ef4c781ef3e20f9af3652e1698832835a97
                                  • Instruction ID: 0f069fc6f1d5ae03eec6f0aeeca4502df8d21bedeb6f71d4c96e7f4302ef7bcb
                                  • Opcode Fuzzy Hash: 7f995fcfea616d215700479df6319ef4c781ef3e20f9af3652e1698832835a97
                                  • Instruction Fuzzy Hash: 8ED017725142209FD744CA08CC82A96B3A9FF99304F19884AAC50A7304C6B1BC129AA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e07470999f7a11fdb990592e0a7f741b9780c98b06f18548634a49583df0865
                                  • Instruction ID: 099fd02b5f4bb506c0b026dd9597e2cbe5a94b00700ec572c2f38a9434203161
                                  • Opcode Fuzzy Hash: 8e07470999f7a11fdb990592e0a7f741b9780c98b06f18548634a49583df0865
                                  • Instruction Fuzzy Hash: CEE012766181519FD706CB58E945E16BBE5DFD9700F04889EF4409B351D662DC02CBB2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1fc158e1450c88d29e063d85d263e16064dccdf0d8ea8b8714b3c9e1d2220cb0
                                  • Instruction ID: e11d4ce1e89fdbbaf2babf525b27bdcd91182c37417492870a9f324f121a654e
                                  • Opcode Fuzzy Hash: 1fc158e1450c88d29e063d85d263e16064dccdf0d8ea8b8714b3c9e1d2220cb0
                                  • Instruction Fuzzy Hash: FCE01276500004AFDB41CED4DD519667B21EB88351B0AC45BFD54972A1DA72DD22EB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3cc0ff3a654f6a8f388b7d943aad3353b444a49b29942fab0366ca63abf83c31
                                  • Instruction ID: 1cdf739801dd431e6555272125bdb5a734f947e90d278002bbc9229b4557cd98
                                  • Opcode Fuzzy Hash: 3cc0ff3a654f6a8f388b7d943aad3353b444a49b29942fab0366ca63abf83c31
                                  • Instruction Fuzzy Hash: DFD05E791083516FD240DA68D8058A3BBA5EBC6200B15885BE88083285D661DC07CAB2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d8e6de7b8e062d5202d8d04b1c66ecd82274c911c633d29bd295b31b3e0e7e4b
                                  • Instruction ID: b38b02ad362bdbf4607e9d4e1e38dfe5a58504fff5cf00a73e0803b053843c6a
                                  • Opcode Fuzzy Hash: d8e6de7b8e062d5202d8d04b1c66ecd82274c911c633d29bd295b31b3e0e7e4b
                                  • Instruction Fuzzy Hash: DFD017B6C05148AFD741DBE4E7417DA7FF5AF89200F6046EA8148A7221EA325A059B81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8f8a1a3fb71765858a324fdf0fbeb9e08f14c9205f93404105881ad3e96f692b
                                  • Instruction ID: 047e77e56fbc710dc65e6ce60afc98a63cd0f1b0492f6cfdd720ac5f2c89918e
                                  • Opcode Fuzzy Hash: 8f8a1a3fb71765858a324fdf0fbeb9e08f14c9205f93404105881ad3e96f692b
                                  • Instruction Fuzzy Hash: 5BD017BA1082219FD240CA04C881A56B3A5FFC9210F19899EE41497310CAA2EC22CBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4e686f8b00d7d9b95b448aba3bcf22ad39d02744dbf66f2ffbc167f18b943196
                                  • Instruction ID: 300474875275fc6ad99df7c25ca20017c0a13423b37acd8ef822b9d9af431f3d
                                  • Opcode Fuzzy Hash: 4e686f8b00d7d9b95b448aba3bcf22ad39d02744dbf66f2ffbc167f18b943196
                                  • Instruction Fuzzy Hash: 8BD05E755292906FE300DB44D800EA3BBA9ABC5300F09C84EF84083202CB619C0BDBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1e8d0e92cc212f8614493f1a98d51ccfdf7d7fdff33b400c74fe24d9f34822e1
                                  • Instruction ID: 035ff23e187856d321b93e707644857948a2cbe5c043c04fbde87a4760337fe8
                                  • Opcode Fuzzy Hash: 1e8d0e92cc212f8614493f1a98d51ccfdf7d7fdff33b400c74fe24d9f34822e1
                                  • Instruction Fuzzy Hash: FFD02EB6108000AFC300CE40ECA0E5BB7F6DBC8700F26881FB804A3340DA62DC02CB62
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44ba782675fcdd8aff74ea6f0a83c41e2cb3e78684efea51cd70aa7f2296677b
                                  • Instruction ID: 877f0f7dcd895513f3842dead994786ff947c22c1e70ab8d1161cd6d10d093a9
                                  • Opcode Fuzzy Hash: 44ba782675fcdd8aff74ea6f0a83c41e2cb3e78684efea51cd70aa7f2296677b
                                  • Instruction Fuzzy Hash: 04D09E36200118BF9B05DE84DC41CA6BB6AEB89660B14C45AFD1547351CAB3ED22DB90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a74995118321cbf27df7ba45ef6a8c30c01933b2996151411a1a1e4175e136f6
                                  • Instruction ID: 54c09cf46cb72975f4ea5108164b527448a772d7c3ace219490901e74eeb2da6
                                  • Opcode Fuzzy Hash: a74995118321cbf27df7ba45ef6a8c30c01933b2996151411a1a1e4175e136f6
                                  • Instruction Fuzzy Hash: 7AD0A7B151C3505FD240DA14D810853B7A5EBD5300B06CC5FE440C3341E661DC07CBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9806b422fee61591bbdbccab13f7572f42a47a5fa3eef16c888538319a76755e
                                  • Instruction ID: ba17aa1765bd0aebdaf32e6dec6cf4927d5e7a6becb47563efd18d542db70f1d
                                  • Opcode Fuzzy Hash: 9806b422fee61591bbdbccab13f7572f42a47a5fa3eef16c888538319a76755e
                                  • Instruction Fuzzy Hash: 0BD05EF26180109BC240CE94F900E17B7DA9BD5601F168C4AB544D3282C521CC178A32
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dec72b0bdd6420785ea87aa85c499c9197198e506aff4200c145f873351ac01d
                                  • Instruction ID: 636f99fed3f917e49f595c7e4e76ef46051e63f403035f083e030e2102a47ea3
                                  • Opcode Fuzzy Hash: dec72b0bdd6420785ea87aa85c499c9197198e506aff4200c145f873351ac01d
                                  • Instruction Fuzzy Hash: F6D02BB6D492089FC741CBF09B1065F7FB19F0520035101EB900CEB350E8318F108F41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: abf991ed4b0b9eeedbd014fb0bc54b7330927eece565c085191bd898e0cd807d
                                  • Instruction ID: 4bcbbfcf6e050b132dac491db2e91963445743b39d0f1a2cca9c2e74fd56f566
                                  • Opcode Fuzzy Hash: abf991ed4b0b9eeedbd014fb0bc54b7330927eece565c085191bd898e0cd807d
                                  • Instruction Fuzzy Hash: 15D05E76518010DFD200DE44ED41E66B7EAEBC8700F04C84EB40093341CA72EC12CF72
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 11d5aeaa5b147cdda817f4e1ea01c16a3efac2927ae8783143a1dc89514ea926
                                  • Instruction ID: 0ac03861501bbd25c7f15f55999e403fcc73dc001fb43661e274961178fc74a9
                                  • Opcode Fuzzy Hash: 11d5aeaa5b147cdda817f4e1ea01c16a3efac2927ae8783143a1dc89514ea926
                                  • Instruction Fuzzy Hash: 06D017762181109FD244CB58E981F5AB7A5EBC9A14F14884EE84093212CAA2EC07DB62
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6a2284755ec5835cfbbc18b7d17ff2532f5eeecc0bdb1c42391507b01b8741ea
                                  • Instruction ID: 0b5d0a8df646eb2eef0a89b0e6a9790f7b824de3a4740cec42f69b82544c7fd0
                                  • Opcode Fuzzy Hash: 6a2284755ec5835cfbbc18b7d17ff2532f5eeecc0bdb1c42391507b01b8741ea
                                  • Instruction Fuzzy Hash: ACE0EC7110D2819FD302CB94E990A19BFF1AF96600B16888EE4809B2A3C6219C56CB72
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 24ca3cf25e7df12523f0971f4fcbe322aeaee3dab7e4c8f414a7e3385a4fe5e4
                                  • Instruction ID: 09371cb134c97d4a8c799badfa4ae4b7f9cee0c93e1b103d908771f350e5e604
                                  • Opcode Fuzzy Hash: 24ca3cf25e7df12523f0971f4fcbe322aeaee3dab7e4c8f414a7e3385a4fe5e4
                                  • Instruction Fuzzy Hash: DDD05E716082906FE341CB48E841966BB65FBC5210F14886FE84043202CB619C57D760
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6b33e59c0f709fc8fd82ff813f09aa0a568d9e3679a74abb8b3cff702c9fca4e
                                  • Instruction ID: 4e777cc80947c426afe6e8ac80ddf79ce293428b1d012e61c170cfe1247f7c7b
                                  • Opcode Fuzzy Hash: 6b33e59c0f709fc8fd82ff813f09aa0a568d9e3679a74abb8b3cff702c9fca4e
                                  • Instruction Fuzzy Hash: 52D05E745093906FE700CB58D800A63BBA9ABC5204F05C84FE88047202CB61AC0BDBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b797355017d98d4b5b1c7e955e1d9dcb12fe6bc9d37820f268099c704aade325
                                  • Instruction ID: eaa1a8886e9bc3d93034ad0256b8f91f9030f8a4c95c6c60fa8dae25e1112949
                                  • Opcode Fuzzy Hash: b797355017d98d4b5b1c7e955e1d9dcb12fe6bc9d37820f268099c704aade325
                                  • Instruction Fuzzy Hash: 10C080773080018F5F459504F0946BD3795FFC076671400AEF505C3544DB319C014750
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f0c50b28573695ccecf03b8b3d382c7619d1fc1e6188155fb9ea3d4dc074ab94
                                  • Instruction ID: 979c97f6bf271468d7bd30f9e2a0147bb237e16787a14cbdf39683cdc61974fd
                                  • Opcode Fuzzy Hash: f0c50b28573695ccecf03b8b3d382c7619d1fc1e6188155fb9ea3d4dc074ab94
                                  • Instruction Fuzzy Hash: 11D0C77590510CABC702EFE5E95166E7BF9DB4520079191EF950CE7310ED315F1057D1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3f186a5388f30838b65e3b7848d39e0d0d6890d8be7aac6d6ca51640e41c14b5
                                  • Instruction ID: 7a087ea51c1080b400199bd76e43e62c7f22f05d8c7809beb3f4c13776242e9e
                                  • Opcode Fuzzy Hash: 3f186a5388f30838b65e3b7848d39e0d0d6890d8be7aac6d6ca51640e41c14b5
                                  • Instruction Fuzzy Hash: CAE01275909148DFCF02DBA4BA146997FB0EF06301F1100EBD805D7661E9321E14DB43
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6859dfcaeef080bcfc239620bc3b863ac9a784889c5bc8e50e56f8bc1d5e5801
                                  • Instruction ID: 1031dae71ffe835f524eee0dc0248f81debc59da5a81e943c7e9cf272ced51bf
                                  • Opcode Fuzzy Hash: 6859dfcaeef080bcfc239620bc3b863ac9a784889c5bc8e50e56f8bc1d5e5801
                                  • Instruction Fuzzy Hash: 6DE02B301085408FC300EF6CE850B89BBB2EFC2704F04899ED04053212DB32D807CB61
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 58654150ffe9c792afec588e33c7658d1e8f7c0aef47a78a3bb07730164b4752
                                  • Instruction ID: c91265afa3e2926914ac8faf895ecc0f75d861d6587ec4bb347fe0078146916b
                                  • Opcode Fuzzy Hash: 58654150ffe9c792afec588e33c7658d1e8f7c0aef47a78a3bb07730164b4752
                                  • Instruction Fuzzy Hash: 80D067751141119FD344DF54E985E66B7E6EBC8614F14884EB44093351CA62EC16DB62
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a5e59682899421d0d9899f0280a831b2258f1ff7e0269ffc7b6411531a15d5df
                                  • Instruction ID: 8aa55aec287213f5addb9261f648349889955459a2d46c46ed86d7d1bcd862f9
                                  • Opcode Fuzzy Hash: a5e59682899421d0d9899f0280a831b2258f1ff7e0269ffc7b6411531a15d5df
                                  • Instruction Fuzzy Hash: 4BD09E751242109FD684DF58D991E9AB7A5FBC8314F148C4AE45487211CB71ED17CB54
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 722d2ca7dd4d1966eb896dc76f326842c47c974f18811a463b221eaf7d1b2097
                                  • Instruction ID: 55293252b17682d7ef36d5b92c3cb56f259589c2cce2aa6f13ed8086572bfd21
                                  • Opcode Fuzzy Hash: 722d2ca7dd4d1966eb896dc76f326842c47c974f18811a463b221eaf7d1b2097
                                  • Instruction Fuzzy Hash: 5DD09E752142609FD244DB6CD845F67B7A5FBC8710F188C5EF85187210DB71EC06CB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e2f70ddbbfaae76d1e265fc804b60cbc65c794aaac903c4bfe4b2f78ee5ec60
                                  • Instruction ID: 3e5afdf45c087f60515ba54a6a2bc1015e9350051f28f04ebe34918e6fa4ac27
                                  • Opcode Fuzzy Hash: 8e2f70ddbbfaae76d1e265fc804b60cbc65c794aaac903c4bfe4b2f78ee5ec60
                                  • Instruction Fuzzy Hash: DDD05E756242119FE280DF54D881D56B3A5FFC8310F108C0EE41187354CB72EC16CB90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e6a5ff6153aac5ceb58f3674082453ecabed82e08b13d10243ae7a361d1c82c9
                                  • Instruction ID: f4d96f470e2d8c5a6040fa8fa5fa6caa08a8b43c0b6a12be609b10a1fa94561d
                                  • Opcode Fuzzy Hash: e6a5ff6153aac5ceb58f3674082453ecabed82e08b13d10243ae7a361d1c82c9
                                  • Instruction Fuzzy Hash: 36D05E712083C18FC382CF54E890815BBB1FF9A2007168C8BE454CB2A3C732DC46CB62
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0c5752107e4a8374f78816b34aebfc047c0b5bafbe788c3a58fdb0c609160f25
                                  • Instruction ID: 69bb7abb7e1e593c93d50fe8da5b5eeaed433511d66c85445daa81cb8f8fba0f
                                  • Opcode Fuzzy Hash: 0c5752107e4a8374f78816b34aebfc047c0b5bafbe788c3a58fdb0c609160f25
                                  • Instruction Fuzzy Hash: 69D0C77590510CAB8700DFE5D50159E7BF9DF4520075045AA9509D7210ED325F105791
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8f42dad2313b8a05111ce860fb288e9f52cf7795928af20a67ed26427b0a450f
                                  • Instruction ID: 8dc985336993334e117618ca1ed04ece5669c4a6e0c21b76b6f667c750c7f87a
                                  • Opcode Fuzzy Hash: 8f42dad2313b8a05111ce860fb288e9f52cf7795928af20a67ed26427b0a450f
                                  • Instruction Fuzzy Hash: 47D0C97190510CAB8B01DFE5AA1069EBBFADB45200BA041AA9508E7210ED325F106B92
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 46ee5dc24c6b831c1cc29e4449de98bdb7a22d958f3ded79decebeb490595247
                                  • Instruction ID: 85c20a2ea37caf143f76c1ec3adcbc071a4477d42a39e1fe375730de87967a1c
                                  • Opcode Fuzzy Hash: 46ee5dc24c6b831c1cc29e4449de98bdb7a22d958f3ded79decebeb490595247
                                  • Instruction Fuzzy Hash: A2D0C9B96051406FE344C754D851E12BFA99B99201F14C19DA44887322DE319D56C700
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a7cdcad6c0eb27f67fc5bdac0b050ac15039acbfcda955c50bcfad3c87f7dd25
                                  • Instruction ID: 0295df49968a220b86bbf41c1a5d965fb8325908ec92b9c3d414cffa38cfc6a5
                                  • Opcode Fuzzy Hash: a7cdcad6c0eb27f67fc5bdac0b050ac15039acbfcda955c50bcfad3c87f7dd25
                                  • Instruction Fuzzy Hash: 02D0C97191510CEF8B04DFE5A90069EBBFADF45200BA042EA9608E7310ED325F146B92
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8f40bd31e2ca29d501904fdcac51fe415c02be52800ec3f8e4d07ba88324e874
                                  • Instruction ID: c7324d7d56a89d6084c984ff6e8c7dc9f9dd12ef3a69ddf947651b74ec60e17b
                                  • Opcode Fuzzy Hash: 8f40bd31e2ca29d501904fdcac51fe415c02be52800ec3f8e4d07ba88324e874
                                  • Instruction Fuzzy Hash: BAD0A7738052489FCB11CBA4C9127497FB5EF86210F5403EEC4159B161ED32BD1AE743
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14cf5872a33c3fe428f3fd695b912e595172db67356e7075809dd128e2c936b8
                                  • Instruction ID: 3dd71f58086af9fbe04aea30d6f1a1606af4cfc2f10b817a264e73f0e61c08fe
                                  • Opcode Fuzzy Hash: 14cf5872a33c3fe428f3fd695b912e595172db67356e7075809dd128e2c936b8
                                  • Instruction Fuzzy Hash: C7D05EB65081008FC700CF94EA50A0AFBA1AB99641F06885EA540A7291D622CC07CB22
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6cae722162a3ef691525f330fc21d13e4828863bbebf27bf5231218fec2432ce
                                  • Instruction ID: 64050a5b371d38c13ce0fe9462fffc8b199ccd0e7dd1062de9b074886dd86691
                                  • Opcode Fuzzy Hash: 6cae722162a3ef691525f330fc21d13e4828863bbebf27bf5231218fec2432ce
                                  • Instruction Fuzzy Hash: DFD0C97590510CAF8B00DFE9A90069EBBFEDF45200BA081AA9508E7310ED325F146B92
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4eaeb69477d36273f4aba173b522a0c50c5b28254b6711a20e5ad64f906b14ad
                                  • Instruction ID: 5e49d994096b3d8b2e1ac3df5c8c8c1366241c329e0c697cc588a586c689ba5e
                                  • Opcode Fuzzy Hash: 4eaeb69477d36273f4aba173b522a0c50c5b28254b6711a20e5ad64f906b14ad
                                  • Instruction Fuzzy Hash: BBD0C77190510CAB8701DFE5A51055E7BF9DB4520075151EA9508E7210ED315F1057D1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8b20a3de2d4f23265dee32523c408301c6354235520a6ed78bd728bb303b3280
                                  • Instruction ID: 2ee1b18834811b4d142b364a9f76ffcdc01c337a366cf245b335adbb41d42927
                                  • Opcode Fuzzy Hash: 8b20a3de2d4f23265dee32523c408301c6354235520a6ed78bd728bb303b3280
                                  • Instruction Fuzzy Hash: 72D0C97591510CAB8B00DFE5A90069FBBFEDB45200BA181AAD508E7210ED325F146BD2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2d97bf751427dac6b6ff56ea17b01bd3b33478c8c1e7860795a7c223ca54bfbe
                                  • Instruction ID: c6ef512ee9d82f4ed6f0b8d0e27d2f19118729a8dc8ebf9870a15feb180d6b0f
                                  • Opcode Fuzzy Hash: 2d97bf751427dac6b6ff56ea17b01bd3b33478c8c1e7860795a7c223ca54bfbe
                                  • Instruction Fuzzy Hash: C8D0C97691520CEF8B04DFE5F90569EBBF9EF05200B6041A6E909D3310EE325F14AB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 06417abc1d458b360c5aabd089e8602a90aa6400676f761e06555d831fbf430a
                                  • Instruction ID: d06276fa88e835feb0942bf6e87b8401daf2ac6e9889875615e269bd7eff58b5
                                  • Opcode Fuzzy Hash: 06417abc1d458b360c5aabd089e8602a90aa6400676f761e06555d831fbf430a
                                  • Instruction Fuzzy Hash: 18D0C972A1510CAB8B10DFE5A90069EBBFADF45200BA081AA9509E7210EE325F105B92
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e120ffcf9a60db06e5b5c568c306c2d9692626768a4d8bf8f44382f78f938096
                                  • Instruction ID: bdef2a2388974a41f1dc51e0ba653d1e3ae1512706cf260dcb8ab0351ddfff5e
                                  • Opcode Fuzzy Hash: e120ffcf9a60db06e5b5c568c306c2d9692626768a4d8bf8f44382f78f938096
                                  • Instruction Fuzzy Hash: 35D0C97191610CEB8B04DFE9A90069EBBFADF45200BA041AAE508E7210ED325F105BA2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a4beae8ad9a9c5253de3025218bc46352b4fe7c25b6387a058e7a3ec1cec0382
                                  • Instruction ID: 8178bc22e4104f330b39f78db2f75a5fe99baf594d818ce1876cbb283b827ed5
                                  • Opcode Fuzzy Hash: a4beae8ad9a9c5253de3025218bc46352b4fe7c25b6387a058e7a3ec1cec0382
                                  • Instruction Fuzzy Hash: 20D0C97191510CAB8B00EFE5A94069EBBFADF45300BA041AAA508E7210ED725F105BD2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c7ae9224a02b43b2f4e5d2d8702e2964c0f22fe3ce87859c3e563278911667ad
                                  • Instruction ID: 32cea01e0a94a2076d000c499536ea638c351ef85916ba6080b4ab6e022b1734
                                  • Opcode Fuzzy Hash: c7ae9224a02b43b2f4e5d2d8702e2964c0f22fe3ce87859c3e563278911667ad
                                  • Instruction Fuzzy Hash: BAD05B758150489FC740CBE4D71075F7AB1DF44301F5146EA5408E3240DA315B105781
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e0d493f580a50aa11207fc89bd1ec7c3f9c0bbbea4648ced9dd9eead8b4eedd5
                                  • Instruction ID: 2f0c54b4a24ae440dc9450001dd80c4d0ab39840a009eb0089c8edf0a9fa445b
                                  • Opcode Fuzzy Hash: e0d493f580a50aa11207fc89bd1ec7c3f9c0bbbea4648ced9dd9eead8b4eedd5
                                  • Instruction Fuzzy Hash: 9CD0C77591510CAF8B00DFE5951055E7BF9DB4524075141AA9508E7210ED315F115791
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fc2588331bbfb509a38ba95ed8d415262644eca9929cbb1608fcfbcfae3cec13
                                  • Instruction ID: 7dfd6b3c0e952902d649328310b1912b5574669e0d2714a929de761dcb04558a
                                  • Opcode Fuzzy Hash: fc2588331bbfb509a38ba95ed8d415262644eca9929cbb1608fcfbcfae3cec13
                                  • Instruction Fuzzy Hash: 01D0A7F5508350ABD341CE54D851943BB91EF95341F068C0EE88083381C623D803CB51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 652b3fd440d310ce2b0279dc9ff2f0524df9c0ec0329e74c8709b9ec826aa092
                                  • Instruction ID: e6fdd287eabe98cd55400f248d9e5f9c091f4e2a67cbde3dab96384738c0512c
                                  • Opcode Fuzzy Hash: 652b3fd440d310ce2b0279dc9ff2f0524df9c0ec0329e74c8709b9ec826aa092
                                  • Instruction Fuzzy Hash: 05D0C97590510CAF8B00DFE5A90069EBBFADB45200BA041EA9509E7210ED326F115B92
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 67b68cf38af636274bb06b26460ea56602ac04f6120795172adcc72c24ba7845
                                  • Instruction ID: 3141da8ffb65df2842bd3c3a971b6d06c131481d5c910734975a2ba00dfc5494
                                  • Opcode Fuzzy Hash: 67b68cf38af636274bb06b26460ea56602ac04f6120795172adcc72c24ba7845
                                  • Instruction Fuzzy Hash: 0DD0C9352145009BD344CB24C982A12B7B9EB88314F10C468A889C7351DF35EC02CA51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9f58b004b62403ffdd2358d1d949c90d9110a4fb6c62678cae14a8b4e9e6e957
                                  • Instruction ID: deb89f421cf602be4e7831cd3aeb17ef1c53b3a38d77c58fb265bab83686f745
                                  • Opcode Fuzzy Hash: 9f58b004b62403ffdd2358d1d949c90d9110a4fb6c62678cae14a8b4e9e6e957
                                  • Instruction Fuzzy Hash: AED0A9338186009BC304EE68C840B88F3B2EBD2300F00C12FE0949B201EF32EA0EAA41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14641e689b3b5d75b6892e8d7aa19ce19c8a0b405d45e6606c2a0fd5eee4799f
                                  • Instruction ID: de784c5aea3bf192dc32ed48bb4508719432b86cb54d87273faa53b71110e0a0
                                  • Opcode Fuzzy Hash: 14641e689b3b5d75b6892e8d7aa19ce19c8a0b405d45e6606c2a0fd5eee4799f
                                  • Instruction Fuzzy Hash: 6BD0C97590510CAB8B00DFE9A90069EBBFADF45200BA041AA9508E7210ED326F145BD2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3b30319a07a66fec4d5dbeda7e2f4f00487c401c66ef2b3eb59a2102f9a65ef3
                                  • Instruction ID: 05d396d02e5be3014e8e120c980ec6e3adc041e2a563130cc5a36e8747528af1
                                  • Opcode Fuzzy Hash: 3b30319a07a66fec4d5dbeda7e2f4f00487c401c66ef2b3eb59a2102f9a65ef3
                                  • Instruction Fuzzy Hash: 5AD017711082029FD345CF84FA40A09B7A2AB88600F50884EE44063222CB329C46CB62
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ad18dd7e0b44e443382a29da5fbb810ad57943f54ea3b7a51fae4aacd20d3264
                                  • Instruction ID: ab9853b342209a07eb518332671dd019397d3cfb17a8bbc5b8aa374df9e26b8d
                                  • Opcode Fuzzy Hash: ad18dd7e0b44e443382a29da5fbb810ad57943f54ea3b7a51fae4aacd20d3264
                                  • Instruction Fuzzy Hash: 67D05E756083808FC741CB14E856915BBA1FF96200B08888AE89087252C761D91ACB52
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ce40bc91febe934c453772ca6af4392c38009cb3533c108e64af9ab4a1de2497
                                  • Instruction ID: b61407b6d4db2e85315d99c57ae7a5009724e9ba6afb20798920e9d0691d3a15
                                  • Opcode Fuzzy Hash: ce40bc91febe934c453772ca6af4392c38009cb3533c108e64af9ab4a1de2497
                                  • Instruction Fuzzy Hash: 98C080E2A755001BD344C634DD16D157791D775641714C965A04CC72D2D935D907CF51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d2810592b8e147b0ab7f89c22952067b6d004d74d250a86bfff3daf8c54cf5ce
                                  • Instruction ID: c3f67320c51adbb4f0840b3b5f7fc57aae918fb435ba2e2cb776641c8ce0836b
                                  • Opcode Fuzzy Hash: d2810592b8e147b0ab7f89c22952067b6d004d74d250a86bfff3daf8c54cf5ce
                                  • Instruction Fuzzy Hash: 32D0C9B66082508BE644DA84E841A86B752BB94254F258C19E45193381CA62D81BCB60
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 791868b2b6d4904eca63423b42afb3773cf3bd7afed7f015f908fe64dc81cf6d
                                  • Instruction ID: 1d2c5b51030abd186a83bee4b09449a282c16bbf154cb9b97365610c327b5c4c
                                  • Opcode Fuzzy Hash: 791868b2b6d4904eca63423b42afb3773cf3bd7afed7f015f908fe64dc81cf6d
                                  • Instruction Fuzzy Hash: B8D0C9712081219F9244CA48E950C6BB7E9DBC9A10B14884EB88493241CA62DC16CBB2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a7b1c69afded95d040df6cffb530b19f4e16af27161e2c3c7f4999ea6947fecc
                                  • Instruction ID: 4b79acd2a65af52eda9df27409a674b8b4c107746da92b99021c3ab62408905b
                                  • Opcode Fuzzy Hash: a7b1c69afded95d040df6cffb530b19f4e16af27161e2c3c7f4999ea6947fecc
                                  • Instruction Fuzzy Hash: 83D0C9752081219F9204CA48E950C6BF7E9DFC9A10B14884EB88093351CA62DC06CBB2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c236dcce06da09b16da9faad11d4c2dd6bfb7fd0c6fd2ed0a1e4a5b130cd61e1
                                  • Instruction ID: 476a329d253bd1e0c7b5ef536b87a0824749b4d6adeb6f583992467a0953672a
                                  • Opcode Fuzzy Hash: c236dcce06da09b16da9faad11d4c2dd6bfb7fd0c6fd2ed0a1e4a5b130cd61e1
                                  • Instruction Fuzzy Hash: AAD05E351082818BD301CF78F554A1AFBA2EB95604F15889EE48057212C7328C17CB23
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1536334406ff1dc596f6d3a5782871ffd470a42d56bf09256e1e78c3eb87a748
                                  • Instruction ID: e093eac02c48a94ad7426b5a71cd12aec4c9ca58aec833757d7fdff6c30e3768
                                  • Opcode Fuzzy Hash: 1536334406ff1dc596f6d3a5782871ffd470a42d56bf09256e1e78c3eb87a748
                                  • Instruction Fuzzy Hash: 61D0C9352001009BD394CA18C996B52B7E1EF98304F14C469E889C7355EA31EC03CA41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f19ef488d0abcdf602c467ee36910835b4ae157d40e68f359ae122bc2a34e656
                                  • Instruction ID: 860fb34466dd9ff45c84c4dacfd305e85f9b4c73584b8fc83b436269d010d695
                                  • Opcode Fuzzy Hash: f19ef488d0abcdf602c467ee36910835b4ae157d40e68f359ae122bc2a34e656
                                  • Instruction Fuzzy Hash: 49D0A7305042408FD344DE14D840A51B3A1FB98300F158C1DEC5087345CB31CD0BCBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 791868b2b6d4904eca63423b42afb3773cf3bd7afed7f015f908fe64dc81cf6d
                                  • Instruction ID: 1d2c5b51030abd186a83bee4b09449a282c16bbf154cb9b97365610c327b5c4c
                                  • Opcode Fuzzy Hash: 791868b2b6d4904eca63423b42afb3773cf3bd7afed7f015f908fe64dc81cf6d
                                  • Instruction Fuzzy Hash: B8D0C9712081219F9244CA48E950C6BB7E9DBC9A10B14884EB88493241CA62DC16CBB2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fef3c2699f9e88ef4866e8ec7aa3bb507c77cabd0b749426e76aea6f6ef0f459
                                  • Instruction ID: 21a67b14a1c04d734f8959fe14d26eba1d664cb89fa31b2957ee8c17b23aa2fb
                                  • Opcode Fuzzy Hash: fef3c2699f9e88ef4866e8ec7aa3bb507c77cabd0b749426e76aea6f6ef0f459
                                  • Instruction Fuzzy Hash: D8C08CF3A350004BE300CA60CD4674AB3C2FBE02D2F66D8248889C62D1EA22EC038B00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                  • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                  • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 12af346410960f74f2b01f4a49ae3bfe02469ca3dc9c7c9861d168d939eb31d3
                                  • Instruction ID: dbf9252d2228933573478c2d798e5e85af30842e3a05fb282cdce6761d218660
                                  • Opcode Fuzzy Hash: 12af346410960f74f2b01f4a49ae3bfe02469ca3dc9c7c9861d168d939eb31d3
                                  • Instruction Fuzzy Hash: 9DD0C9743051815FD344C765CC91A12BBB1ABC5210F18C1AEA489C7353DA25DC52C701
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6fd5862abba9300e25b077a0ac4af4b5da7c8fab61ce18239a04dd38772a8edf
                                  • Instruction ID: 805465856a0e97f1801a7b9e58a9ccc16fe6aa036e262aa7ced1ad80dc8590cd
                                  • Opcode Fuzzy Hash: 6fd5862abba9300e25b077a0ac4af4b5da7c8fab61ce18239a04dd38772a8edf
                                  • Instruction Fuzzy Hash: 59C012752142125BD254DA04C841D66B3A6FFC8314F14C86EE85083345CF76DC07C7A0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d7c0a8d62f9efdebfdc5bf0ef43df5f5ca3062e9f926ef61c456533752d0343
                                  • Instruction ID: b740e0fddb010fe065d20ed5dfd7f2dff3176edc5e44888fbc3df486aa3cf954
                                  • Opcode Fuzzy Hash: 8d7c0a8d62f9efdebfdc5bf0ef43df5f5ca3062e9f926ef61c456533752d0343
                                  • Instruction Fuzzy Hash: FAC012F256500017D340C670CE52682A781D751282B56D866C008C6296E521D803CB51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 243c4224153437286ae1aa7d63b2c74e818d508e49a08b22c61d485c3a5b055b
                                  • Instruction ID: fc952164b7ac2bd4841a5d9d345f3194c03ab55dbaee4577ab81b7e12738ac18
                                  • Opcode Fuzzy Hash: 243c4224153437286ae1aa7d63b2c74e818d508e49a08b22c61d485c3a5b055b
                                  • Instruction Fuzzy Hash: 2CC012A47084004BC748D228DCA1626B7E28BD9381F6988ADA40CC7785EA26DC068A41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d1dd53d454c03506e38a762c7acaf20785d6dce4c6a2058cecd020eeea6b4d47
                                  • Instruction ID: a661a057fb7d3b1d815e99437db745e63f323203abb16411943c9beedf6fc107
                                  • Opcode Fuzzy Hash: d1dd53d454c03506e38a762c7acaf20785d6dce4c6a2058cecd020eeea6b4d47
                                  • Instruction Fuzzy Hash: 31C08C340883E80FC3871BE0681A1E03FA0DC8701030A11D2CDD94B1239811159BAF15
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7eef998ec7db8fbc5a555d0e4635c0c0446d18d14346e76d0519e2b125ba8cd5
                                  • Instruction ID: 7fe97dc30034f72732d82b0e8c313cc496bc43681c4178dd4dca8aa8aedf790b
                                  • Opcode Fuzzy Hash: 7eef998ec7db8fbc5a555d0e4635c0c0446d18d14346e76d0519e2b125ba8cd5
                                  • Instruction Fuzzy Hash: 1FD0A93810B2808FD302E7308C29A207FE08F8720230CC0EBC080AB123CA22CA03C765
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52714933daaae277e53dba3b1afe33ee22c0d7d4ee27f2d47c9ed8284924e05a
                                  • Instruction ID: d09ae0f4fd0f63864e4a978fbc548987f9cb70904c13dc74e09ddf1db204b8c5
                                  • Opcode Fuzzy Hash: 52714933daaae277e53dba3b1afe33ee22c0d7d4ee27f2d47c9ed8284924e05a
                                  • Instruction Fuzzy Hash: 3CD0CA782140009BD2C8DB28E889A13B7E5EB88304F14C828A80AC33A6DA32E803CA00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                  • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96674a8203f5d0dadd060537b2a7ad1259f225be978770267ef54471a74128f3
                                  • Instruction ID: 1bc5d9dead856c5ecbb60ac763b514705a623db05af6a36ad3fc902e069d9811
                                  • Opcode Fuzzy Hash: 96674a8203f5d0dadd060537b2a7ad1259f225be978770267ef54471a74128f3
                                  • Instruction Fuzzy Hash: 15D0C97270A3C05FC309C765CC5A816BFA5AFD6624718C09FE598CB3A6EE319D06DB11
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d8f08d21f774e0548807ce75b8506ffde3543316bcdcbdd5788bc2b68125c542
                                  • Instruction ID: bcf9ef9c82f7d3924de405cb1b01dc34d2668a849c410a3a4cb9bba8efa29a2e
                                  • Opcode Fuzzy Hash: d8f08d21f774e0548807ce75b8506ffde3543316bcdcbdd5788bc2b68125c542
                                  • Instruction Fuzzy Hash: 91C012712082605F8244DA48C850C67F7E9AFCD110718C84FB494C3341CA61DC07C7A0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                  • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dc06f5966d875f34c08d6bbf669723f761e6bec2850319c08aa883975978385f
                                  • Instruction ID: 3b5fe39a9f7e1f7fb1d917651c6f09836a0d9a241542e37c07d070d0b85ef106
                                  • Opcode Fuzzy Hash: dc06f5966d875f34c08d6bbf669723f761e6bec2850319c08aa883975978385f
                                  • Instruction Fuzzy Hash: FAD0A7B560C3805FC301CE14EC10811BB61BF99610B08888FEC51C7352D726DC1AC761
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                  • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                  • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1cd91ab97fa3cdc9f19ad56177822b683c37f60f0f66e23f558192e3b5c78ded
                                  • Instruction ID: 46c06c0436c4a89d137cccd769c5fc7a0117da769ebb642b26b19040c23b0fe0
                                  • Opcode Fuzzy Hash: 1cd91ab97fa3cdc9f19ad56177822b683c37f60f0f66e23f558192e3b5c78ded
                                  • Instruction Fuzzy Hash: 28D0C970200200AFC344CB28C9A5A16BBA5AB85204F16C4ADA448C7221DB32EC02DB10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d113c463684bb4bb5bc7d89b62b851ee542917459da9a3c901f94e197c18d775
                                  • Instruction ID: fe59de4608177b84ddbdab4c9f366e5d6a35c2c5f3ba3434191057d4db532e9f
                                  • Opcode Fuzzy Hash: d113c463684bb4bb5bc7d89b62b851ee542917459da9a3c901f94e197c18d775
                                  • Instruction Fuzzy Hash: 3BD012765291004BD280C724CD66B967BD19B51315F55C469D14887266E627DD03CB42
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b2a70ffc7634446954146ac8ef50e0aca89f3751ccca5fd252f6e1ff48aa475c
                                  • Instruction ID: 1534b1f192928a35e44f6b0a3daa92f802a3651af89599e68ee034cb604568d6
                                  • Opcode Fuzzy Hash: b2a70ffc7634446954146ac8ef50e0aca89f3751ccca5fd252f6e1ff48aa475c
                                  • Instruction Fuzzy Hash: 3CD0126155414047D244C7288D16B817FF2DFD6115B58C5A9894886293D52F98138718
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c560356d82dead76ed704d536b232c9545770e1115fa15b3ccec74e482264a5a
                                  • Instruction ID: 86b4690f15f564301944b5e5090abdcaf4387094da26b5a9bd305a377034b04a
                                  • Opcode Fuzzy Hash: c560356d82dead76ed704d536b232c9545770e1115fa15b3ccec74e482264a5a
                                  • Instruction Fuzzy Hash: 25D022B11091804BC300C720CC9ABB97BD0CB5131AF28C4FAD408CB143CE31E607CB00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1920bd300429fc41804c3bf915c58e619daa8388e81c8a1baa9c650a66951ede
                                  • Instruction ID: 0cdf239093cd9c432367aa6f220047fbe4623b64ef843e44e2aba9acc70ae5ef
                                  • Opcode Fuzzy Hash: 1920bd300429fc41804c3bf915c58e619daa8388e81c8a1baa9c650a66951ede
                                  • Instruction Fuzzy Hash: 13C08CF09064802EF381C3649A026067F22D799200F08C0EEB45C8B203CF2284038380
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c4457c43b8cd08c0e4695b39974910533007c71015ddf53279fbc53eee67f83f
                                  • Instruction ID: eebb482483892f39ff8cc042ff3e1955f63304c1d055890edc5d29f9db4d149c
                                  • Opcode Fuzzy Hash: c4457c43b8cd08c0e4695b39974910533007c71015ddf53279fbc53eee67f83f
                                  • Instruction Fuzzy Hash: E6C08CB05064803FE30AD350AF22E017F30B78A301F08C09EA4048B343CB22A786CB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5585a056a36819e9ba639a14a1fa92dedad7f997e16906452388e3c50eb44994
                                  • Instruction ID: 5799687cefcc97fcee362c76c7e60fecb911f1345e18f35b0e443ac874a98f17
                                  • Opcode Fuzzy Hash: 5585a056a36819e9ba639a14a1fa92dedad7f997e16906452388e3c50eb44994
                                  • Instruction Fuzzy Hash: 94C08CF05050C12AE305DBD09841E027F6497C9300F28C9FFE824CF203CB2684C2C300
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 277c0f0706bcc7f9e53876ef8924582fe41976a8269a4aaf13252ab2d89dcb02
                                  • Instruction ID: f9c8edd5bf467571ec0ed994342f179e01da93f0277218e2d85ccfe4c274bac2
                                  • Opcode Fuzzy Hash: 277c0f0706bcc7f9e53876ef8924582fe41976a8269a4aaf13252ab2d89dcb02
                                  • Instruction Fuzzy Hash: EFC08CF26200004BE340C614CD42B42B3D1EB95286F15C834800CD72D6DE36DC078F8D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96e48e3e8722bb7a7874c43d155291ff1d4398968e796cbe8b3aa4154dad41f4
                                  • Instruction ID: 24f4e6f02dbf8bc2f192e83e5181bec97bebfab86e0316e1cd97351574bdb8c2
                                  • Opcode Fuzzy Hash: 96e48e3e8722bb7a7874c43d155291ff1d4398968e796cbe8b3aa4154dad41f4
                                  • Instruction Fuzzy Hash: A5D012717051406FD305CA14C865B11BFA59BD9210F19C4ADA448C7352DB71DC02C711
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6c16139269c15cef907d1af141c795f4ebec904a169eb0a4770e37d54b3e9e96
                                  • Instruction ID: 08779871dba7fccd0c26afe84f45436a28710b1789fbdd01a0f8b93d368d3c91
                                  • Opcode Fuzzy Hash: 6c16139269c15cef907d1af141c795f4ebec904a169eb0a4770e37d54b3e9e96
                                  • Instruction Fuzzy Hash: 45D012B57042445FC345C694CCD5A23B7A5DBD4355F14D46D6449C7399EA35DC02C700
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a86ad8872c6e24283aa0dfa52d954dd7d4bcd4e581717911ee5cfcc2cb3681e0
                                  • Instruction ID: f78f12079ca89ced120c19138a78c46178c524f1191a7ff4b3e9d062f6fede79
                                  • Opcode Fuzzy Hash: a86ad8872c6e24283aa0dfa52d954dd7d4bcd4e581717911ee5cfcc2cb3681e0
                                  • Instruction Fuzzy Hash: 83D012BE1081405BC705C650C890A02B771DBA5345F1AC499B9088B3D2C673DD03DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 54316b768291b032e5ba360986befa72c2ccf9ee8b937c709ac9c9b5e6e70c63
                                  • Instruction ID: 9864505f54cc220194b1d4c1b4108c186aa7798758afdb24a148c8ba19f97323
                                  • Opcode Fuzzy Hash: 54316b768291b032e5ba360986befa72c2ccf9ee8b937c709ac9c9b5e6e70c63
                                  • Instruction Fuzzy Hash: A2D012B67041405BC304C618CC96B15B7A1DFE9205F18C46D6849C7356EA31EC02C711
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7670a42df0320efb770e19e0cd383d9bcd74494801d40ec7bbf85d356a6392bc
                                  • Instruction ID: 9f4d0b10a7a4a6174c5b2981e7cffa058abc2d44a48ac24be47fa4cf33a33858
                                  • Opcode Fuzzy Hash: 7670a42df0320efb770e19e0cd383d9bcd74494801d40ec7bbf85d356a6392bc
                                  • Instruction Fuzzy Hash: 95D012762050804FD301DB7588197A47FA1DB55205F18C49BC498A7213DF319643D710
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                  • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                  • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9d0345fb8212506c60af304acafd50a262e22be5a19401b3807144f382894573
                                  • Instruction ID: 1fc96308319b9f7434dee7cccffe902bc4d950673a472fbee3045855143ff002
                                  • Opcode Fuzzy Hash: 9d0345fb8212506c60af304acafd50a262e22be5a19401b3807144f382894573
                                  • Instruction Fuzzy Hash: 99C08CF2A210000BD300C260CD53642E381D7A1286F17C8AA8008C7292EA22D8038B00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                  • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4845dc3cb7d137b2531a0305de0d5555e701ad11428794160c1f0c870c2e53d3
                                  • Instruction ID: ac1bfd6de067a96fddf992f3e1d1b2f08916d4b41115a4ec2697f48592788f3a
                                  • Opcode Fuzzy Hash: 4845dc3cb7d137b2531a0305de0d5555e701ad11428794160c1f0c870c2e53d3
                                  • Instruction Fuzzy Hash: DDC080752140400BD340C738CD66B817FD2DFC2505F18C4ACD19897253CD23D417C708
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                  • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                  • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6bd43781e1456381a034d932e5c7ced113c56330465d87a17e305f77c29d4526
                                  • Instruction ID: 1185ebfb24702ad86b76f53e6b5945a8dbf1cd9839799b508b5664a0e6a060e0
                                  • Opcode Fuzzy Hash: 6bd43781e1456381a034d932e5c7ced113c56330465d87a17e305f77c29d4526
                                  • Instruction Fuzzy Hash: AED0CA382101009FCB44CB18C886E16B7E6ABC8224F20C829A809C73A0DE36FC52CA10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 42847d181efe405fb1b95f457ff6f0b3e50e34cf5ff34bc72aa14e384670f6ec
                                  • Instruction ID: 236c34439d8d2fbf57dc45d83b8344bb7d271bc5847418fe78b7d83db60845a8
                                  • Opcode Fuzzy Hash: 42847d181efe405fb1b95f457ff6f0b3e50e34cf5ff34bc72aa14e384670f6ec
                                  • Instruction Fuzzy Hash: CBC08C301000108BCB11EAA4CC8270073B0EF81308FACC8E8B819CB2C9CB36E8038A40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d542890c30dbd39be4e52c7ab6fb7994abe5792884bd71ade316d5d2cdbbeff6
                                  • Instruction ID: 471a0eaa8ae875ac006b7cf4c8139c7fb0ab4c35d8e2f6fc4dc6efc509dcef5a
                                  • Opcode Fuzzy Hash: d542890c30dbd39be4e52c7ab6fb7994abe5792884bd71ade316d5d2cdbbeff6
                                  • Instruction Fuzzy Hash: 8EC08CB12045008BD380CB20CC82B45B7A2EB91301F24C87AE015CB302CB32ED03CB08
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a2359e55c6b0e414baec1d93f02666509b566e2a3043659ef370d9e618e8327e
                                  • Instruction ID: 6049782a2986038bd5be6f62f9177daec1d6de3e4f16f55131bf637b173e675f
                                  • Opcode Fuzzy Hash: a2359e55c6b0e414baec1d93f02666509b566e2a3043659ef370d9e618e8327e
                                  • Instruction Fuzzy Hash: 79C09BF396508307D700D9B6CC01795264397713C6F57B4745110CA289EE17D4035540
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7940d7a060e28b8c9076d8c246554c81920008dda8c1bf7a79c652af199ea5f9
                                  • Instruction ID: cd33fd06c3db9a6d4aff96b43dc9499a939ac95ad27bb0ea990369dafdd5535b
                                  • Opcode Fuzzy Hash: 7940d7a060e28b8c9076d8c246554c81920008dda8c1bf7a79c652af199ea5f9
                                  • Instruction Fuzzy Hash: 36C02BE0402E000BC2858600CE821347B64CB51100B348CD9EC08CB663CF22CC03CA41
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9ae8f30ea59d4143d6420b5c95a1a6cfe9338fb0b3d72c5e5b00e863e20dd6c6
                                  • Instruction ID: 6956bca5320558304befacee52594a616f0179c6d739a48b9e2515be237b848b
                                  • Opcode Fuzzy Hash: 9ae8f30ea59d4143d6420b5c95a1a6cfe9338fb0b3d72c5e5b00e863e20dd6c6
                                  • Instruction Fuzzy Hash: C1C04C352055909BD756DB28EC81B047BE5EB86209F1888D99459CB216CB36E857DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c8868603c59d4e0cf64856aad009ff8232c2ce81a0b676431f851be1f0d07591
                                  • Instruction ID: dda048447b5a78dd30d7c5ec7379f099428931325db60105153e84ff324805c5
                                  • Opcode Fuzzy Hash: c8868603c59d4e0cf64856aad009ff8232c2ce81a0b676431f851be1f0d07591
                                  • Instruction Fuzzy Hash: F5C04C705091817AEB55C764984175ABFB197C6204F19C0AFE444CB267CB229547AB46
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1c59c5151d66767c2e9749b2230eb335da8420fe661dee70f00a7c678dc93ad4
                                  • Instruction ID: 2b2a595654630689837f9367ac504605c546843a033671177ee02283f1972fbe
                                  • Opcode Fuzzy Hash: 1c59c5151d66767c2e9749b2230eb335da8420fe661dee70f00a7c678dc93ad4
                                  • Instruction Fuzzy Hash: 81C08C70605280AEEB41C360A5826017F60D781208F18C4DFE004CB203CF2694438300
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6fcbc955126de8a3fd0d2ed27c7072b1df43cffbc33fb5ec2a9aeafb70effb95
                                  • Instruction ID: 83345e844453c6c4bd5707a455b2e4fcd508191bacf3262f5a1632710b6bbfd0
                                  • Opcode Fuzzy Hash: 6fcbc955126de8a3fd0d2ed27c7072b1df43cffbc33fb5ec2a9aeafb70effb95
                                  • Instruction Fuzzy Hash: D9C04C39200100ABC648CA94CA55B56F7A2EF99308F18C46DE9098F351CB33DC13EB40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1a3cf7497cd351cf8ce5e0686a75a02cd8048fad36b2724b68b9541a0effce53
                                  • Instruction ID: c09d097293ead1465534de2204b48e6b2ca032757325491752d76a43b962dc10
                                  • Opcode Fuzzy Hash: 1a3cf7497cd351cf8ce5e0686a75a02cd8048fad36b2724b68b9541a0effce53
                                  • Instruction Fuzzy Hash: F0C09B765161806ED341D754EC45F907F219B92304F19C1DDE54546253CF179947CF00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aa07ba34fd0f2dbdd9bf1d39cdd18e14240856fe760781fe36c6f447663c5158
                                  • Instruction ID: c907ddd082259ee2c04da1bf35abb978192ab70ba62c4207e2ffac070aea66e4
                                  • Opcode Fuzzy Hash: aa07ba34fd0f2dbdd9bf1d39cdd18e14240856fe760781fe36c6f447663c5158
                                  • Instruction Fuzzy Hash: E2C04C655261905ED345D7A4D8416507F21BB92205F18C29E948546253CB169947DB00
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 39cf0988b0a60487c01b99af7eb4ed1af631beebfad5cd0bb77384f1477b142d
                                  • Instruction ID: 3b976743e1064c12a77631356a8dce17e54db1f1e23f8c2ab207a066128d9aa2
                                  • Opcode Fuzzy Hash: 39cf0988b0a60487c01b99af7eb4ed1af631beebfad5cd0bb77384f1477b142d
                                  • Instruction Fuzzy Hash: 57C02BB120D0404BC300D228C8905157770CB80306F16C4FD9004CB187CF37C803C500
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 88f3bf7b4e1b72ca733ad93c48ee042bfca544c84dfc468fa171661d4be59dbb
                                  • Instruction ID: 13fcb1c1f9d6233a0d1f0e78124c92f7a145af11c0c8198c260b72b0b5c1e2b7
                                  • Opcode Fuzzy Hash: 88f3bf7b4e1b72ca733ad93c48ee042bfca544c84dfc468fa171661d4be59dbb
                                  • Instruction Fuzzy Hash: 17C048321100409FE384CBA9CD82701B3A2EF8A204F19889A94089B261CB36F913EE80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8fc2c07be58d5375cd622ddba051cf104526c94b6e3992d8e0dab32e12a9fa09
                                  • Instruction ID: 14e138d6e860b96a7dd918ab162c73df6444593d65eba6a51785808ec0a3a6d7
                                  • Opcode Fuzzy Hash: 8fc2c07be58d5375cd622ddba051cf104526c94b6e3992d8e0dab32e12a9fa09
                                  • Instruction Fuzzy Hash: C8C08C30E40124EFEF086FD0E8109BC7A33FF44700F10042AF8426A259CA215C10EF01
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52ac3b5d7494b58d5f30efca7598e4453529dd7ac01c6e2ea5ac251df92be767
                                  • Instruction ID: 9ae4edede16abcae29b7955b8b20d70e273017e7c881c140657b4c0161287b09
                                  • Opcode Fuzzy Hash: 52ac3b5d7494b58d5f30efca7598e4453529dd7ac01c6e2ea5ac251df92be767
                                  • Instruction Fuzzy Hash: CAC01234E10008ABEF0D6AA0E845AACBE73EF48A00F60851AF802622A4CE326C108F11
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 379f9f26c713593a56f3e08dba0e07b61f58715698b4e9dd78e0267c0d26de31
                                  • Instruction ID: c1e00c2af882cf281e1886b83a7503099a5241a7ed070ff7986808dd6b9ee9cb
                                  • Opcode Fuzzy Hash: 379f9f26c713593a56f3e08dba0e07b61f58715698b4e9dd78e0267c0d26de31
                                  • Instruction Fuzzy Hash: 64B092331F492A4BE2092244AC8B39D7A1C8B00329F848025610DC73C3CE5CD4020886
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fed3e026773089d2b407fa59ca7b65754b0f1ef60c435e2f814e1216690b2d3c
                                  • Instruction ID: 572f6bab32e6e0320b56e09eb13312fef53700647e2dd85391b12f1ecd44584d
                                  • Opcode Fuzzy Hash: fed3e026773089d2b407fa59ca7b65754b0f1ef60c435e2f814e1216690b2d3c
                                  • Instruction Fuzzy Hash: E8C04CB15492404FD705DF60C5554447B71EB5522531984DED4148B252DF269807CB10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 06df73506d69b90787cbf6c6ff1b6879786699946a619911b4b410e395f3552a
                                  • Instruction ID: 8680abcf93284282b1bbecc2bb77e66148cb05611202447801bf3f66a73807d3
                                  • Opcode Fuzzy Hash: 06df73506d69b90787cbf6c6ff1b6879786699946a619911b4b410e395f3552a
                                  • Instruction Fuzzy Hash: B3C08CB268C0114BC349CA14CC9160567618B80306F28C0ED5408CB686CB22F4038500
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ae80de3bd18d761448384677dde21b63cdb4330de9a60e837861cfd25869e602
                                  • Instruction ID: 12e90b74b21d360648c12d8840b76a5889fb0127349704eea705e1d1c71de0c3
                                  • Opcode Fuzzy Hash: ae80de3bd18d761448384677dde21b63cdb4330de9a60e837861cfd25869e602
                                  • Instruction Fuzzy Hash: D9C012312081808FC702CA28D9A58007F609B83204349C4EEA404CB166CA26AA06CA20
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 51a7955170f73e96f21b4efaf93eadafce2dcbbd5b607f3c4d970caa38a12556
                                  • Instruction ID: 87618313ce90b1d38fa6a3df7cb812e8fb137f56cfd98afb2620357d11338e9d
                                  • Opcode Fuzzy Hash: 51a7955170f73e96f21b4efaf93eadafce2dcbbd5b607f3c4d970caa38a12556
                                  • Instruction Fuzzy Hash: 71C048342210119BC688DB68E8D1B15B7A5AB85B09F14C999A409CB269CF36EE03DA88
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c8339207df2a15f44197f03ea3e9ed6b0cd580343ff78d70a85f9e14f216fae
                                  • Instruction ID: 82bdf423512beb1b6d645c929bd92918696f550945adaabffb4d555b4fe6e06d
                                  • Opcode Fuzzy Hash: 3c8339207df2a15f44197f03ea3e9ed6b0cd580343ff78d70a85f9e14f216fae
                                  • Instruction Fuzzy Hash: 71C04C745500008FD684DB96E482A4577A5F78A358F548458E408CB115CF36E403DE40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e7510b7448b6904ec8e1802b1b113c933fb20dffeb69ee161b0e4b1334412f07
                                  • Instruction ID: cfbd8724a7b4789972873fb3d9c345b0d1abdf6573ea52ce658278351840af02
                                  • Opcode Fuzzy Hash: e7510b7448b6904ec8e1802b1b113c933fb20dffeb69ee161b0e4b1334412f07
                                  • Instruction Fuzzy Hash: D5C09B749092805FDF55C750DE927447F759B46919F1CC4CFD4444A553CB1A9547CF02
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                  • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                  • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0edf55beb7fd7fc37702ded0de942b7ca4caa1c95f25a32eacbed0cdda20d48d
                                  • Instruction ID: ff9a208aa15449e9726aa69ac631608f3c4b4352ac617fc2e2a10de806524a30
                                  • Opcode Fuzzy Hash: 0edf55beb7fd7fc37702ded0de942b7ca4caa1c95f25a32eacbed0cdda20d48d
                                  • Instruction Fuzzy Hash: 8EC08CA09090801BDB06C7909C822807F609B5A100F08C08AD00042113CB168987CF02
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4655e2d6e4f1bf863709a2486ad41243d4f5a8a5e1b03abc7c128a7e256e24c7
                                  • Instruction ID: 0230f4adbd425e5839afb6661c19df8e2b7822fcb01cf3c9280ecb212192cd8b
                                  • Opcode Fuzzy Hash: 4655e2d6e4f1bf863709a2486ad41243d4f5a8a5e1b03abc7c128a7e256e24c7
                                  • Instruction Fuzzy Hash: 86C09BA45171C16ED755DB70D555700BF60DF86118F1CC0DFD44447153CB229547D701
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dd31050de56d59f19aee28d52d56b97fb8ae0b411db5ee90d6a3fcdb62a67146
                                  • Instruction ID: e5f04d580a952bc608bce3f67f9c95f3d1d14938ae9b006ebffb0dd4d4519c24
                                  • Opcode Fuzzy Hash: dd31050de56d59f19aee28d52d56b97fb8ae0b411db5ee90d6a3fcdb62a67146
                                  • Instruction Fuzzy Hash: 47C04CE4505180BEDB15C760D4556447FA0DB82204F18C4DED45686153CB12A547DB02
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0e8cc938ea37ec3eb26e1e96c38f49af37639a9598daa241e7f35f21ff6596bb
                                  • Instruction ID: 5fe189353944a0138d697d21caf39ec40dea6a48b60a6959bf6241052b85716e
                                  • Opcode Fuzzy Hash: 0e8cc938ea37ec3eb26e1e96c38f49af37639a9598daa241e7f35f21ff6596bb
                                  • Instruction Fuzzy Hash: 96B092F362100047E244C620CC82748E3A0DB96225F98C89A98048A351EA33DB03CA50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                  • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                  • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                  • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                  • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                  • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                  • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cdfec89ecf4d227c2e3f2741df1fca2c4e7a0756e2f1ba050c9a008d3bdc9887
                                  • Instruction ID: e80b9cbb32ce7aa80f269217a2acaa4f8c5de131eb2df65f765f3a476441bad2
                                  • Opcode Fuzzy Hash: cdfec89ecf4d227c2e3f2741df1fca2c4e7a0756e2f1ba050c9a008d3bdc9887
                                  • Instruction Fuzzy Hash: 3DB002747054005B8748D65DD951515A7D29BC9215728C4AD641DC7355DE22DD039644
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fc184c30e6c2cb4a51f8e3fd204777d387a9e2a4fe394648f8ceee9d7659db33
                                  • Instruction ID: f424c5630f83b2895819a523455cae45db3d3332440d4c032bd3a830bbb6f0d1
                                  • Opcode Fuzzy Hash: fc184c30e6c2cb4a51f8e3fd204777d387a9e2a4fe394648f8ceee9d7659db33
                                  • Instruction Fuzzy Hash: 65C092710044419BD340CB35EEE9B467FE0FB99309F459988A0908AEA7CB76FA19DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ad8e39d4419bf3a8e09621c4c39fbb99ed32459ebecc34bd9218eca3eb3689f7
                                  • Instruction ID: eb389942a877c840ea1ea8767fc6269f42d50d6e4367d97cad6a9a3b7d4fb7a0
                                  • Opcode Fuzzy Hash: ad8e39d4419bf3a8e09621c4c39fbb99ed32459ebecc34bd9218eca3eb3689f7
                                  • Instruction Fuzzy Hash: 66C092742004568BD705DF32EE88B04BF62BB82200F5CD2ACE431CB9DADB26E406CB10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9fc20007596551da467b8162214abca3d48ae768b836818cc51918fe9f02510a
                                  • Instruction ID: 0dbc09053b27f6388dce5860e7db0e15b537efe7cd68690635811f1128b5caa3
                                  • Opcode Fuzzy Hash: 9fc20007596551da467b8162214abca3d48ae768b836818cc51918fe9f02510a
                                  • Instruction Fuzzy Hash: 1590223008030C8B02002BC23008000330CA2800003800000A00C022020E00A02008A0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8ada4eabdcb39d84045f3d3d58be5eaab36ab729e22eb1553b3a13ade303c5ef
                                  • Instruction ID: f6fd741af55d8b170a367350d2df806ec41683c34abfdf036fdca10d7b821b1e
                                  • Opcode Fuzzy Hash: 8ada4eabdcb39d84045f3d3d58be5eaab36ab729e22eb1553b3a13ade303c5ef
                                  • Instruction Fuzzy Hash: FF902230020A0C8B00002380300E008BB0C88000083808000B20E002020E202000088A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                  • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                  • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 39c4297f70462fe2c7805639a0c65c6b595c4bbe11137f10e2f1b8600947c89f
                                  • Instruction ID: 5ececba30890e9234ac07ab07dc7753fac7b6684824d95853c9616f3498ca4aa
                                  • Opcode Fuzzy Hash: 39c4297f70462fe2c7805639a0c65c6b595c4bbe11137f10e2f1b8600947c89f
                                  • Instruction Fuzzy Hash: A6A002D081B3C328FBA283B02C02788AF38E303904F084BCFD5920603BCB06008EA346
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31297127054.0000000005D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5d80000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                  • Instruction ID: 2108930940694c1c8b8ad4272d9396267f2db374b9021a0985f6588530823504
                                  • Opcode Fuzzy Hash: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                  • Instruction Fuzzy Hash: 6BA002742010009BC644DB54C991814F761EFC5219728C4DDA8198B256CF33ED03DA40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                  • Instruction ID: 2108930940694c1c8b8ad4272d9396267f2db374b9021a0985f6588530823504
                                  • Opcode Fuzzy Hash: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                  • Instruction Fuzzy Hash: 6BA002742010009BC644DB54C991814F761EFC5219728C4DDA8198B256CF33ED03DA40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: @
                                  • API String ID: 0-2766056989
                                  • Opcode ID: 7d58ce99e14cd4456ae23e5809613514da7f6838dea5dcaaa26db1aac14b0b8b
                                  • Instruction ID: 7547be7aafe2187f63a6a44526ff20a0b661169f36616b8fc8b819da1ab91542
                                  • Opcode Fuzzy Hash: 7d58ce99e14cd4456ae23e5809613514da7f6838dea5dcaaa26db1aac14b0b8b
                                  • Instruction Fuzzy Hash: E4729031618B498BDB79DF2CC8857A9B7E1FB98314F14462DD88BC7241EB34E942CB85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $
                                  • API String ID: 0-3993045852
                                  • Opcode ID: a396ead0deac45c17a56194a796a2563d15c93b1da3a86bbeddba6bfb1e9d555
                                  • Instruction ID: 7f4b33f6d6ed8e36bb3b178043e7de39a84cdf1fa262706b0dad606daa38bbf8
                                  • Opcode Fuzzy Hash: a396ead0deac45c17a56194a796a2563d15c93b1da3a86bbeddba6bfb1e9d555
                                  • Instruction Fuzzy Hash: 16B17C71E0012A8BDB15CBA8C9916ADFBF1FF88305F288669D459EB205D734ED42CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @
                                  • API String ID: 0-2766056989
                                  • Opcode ID: 22901d251d0bcf7e3f29cc31dcead8c574363b1977310e5e393271d67bcf5108
                                  • Instruction ID: 3a260a4f5d15512a0c7f67f37f599da570f9ab6c3c54a3f85dd6df27025d9f26
                                  • Opcode Fuzzy Hash: 22901d251d0bcf7e3f29cc31dcead8c574363b1977310e5e393271d67bcf5108
                                  • Instruction Fuzzy Hash: 9EA10B382121408FD745FF24EAA5E6A37A7BB9830871585A9F506DF358DF70AC21CF92
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 12b27c64b8d65c3d30804399f0e7967c8fa4c81ab84509e1d5c532a7c66f9c01
                                  • Instruction ID: 1c9dab481729dc53db642f428bca72519038fbb7cd8f57d1b34bb0e5f45fa168
                                  • Opcode Fuzzy Hash: 12b27c64b8d65c3d30804399f0e7967c8fa4c81ab84509e1d5c532a7c66f9c01
                                  • Instruction Fuzzy Hash: 0E722C35A111058FDB09EF68E894BAE77B6FF98300F508019E506EB398DB74AC52CF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ff471fed8362e1f6680916959444b0539dd2ef4160a15e649cb06b76fd5f0269
                                  • Instruction ID: 0e8fd0f46f993091c76d68eb67daeea9e42899fbaa9ef2b9758842fda82be277
                                  • Opcode Fuzzy Hash: ff471fed8362e1f6680916959444b0539dd2ef4160a15e649cb06b76fd5f0269
                                  • Instruction Fuzzy Hash: F5427B716087419FDB28CF25C844B6ABBE9FF88714F08892DF98A9B241D770ED44CB56
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 06fbf5f00c39fc824967f9e32ed5d37a65b0d85d4d2a71f1975b9500b21d9467
                                  • Instruction ID: e44e3e0096bc5513408e1b511c39ebbd2016b5e6258cd13a2455d1aeb116e5fc
                                  • Opcode Fuzzy Hash: 06fbf5f00c39fc824967f9e32ed5d37a65b0d85d4d2a71f1975b9500b21d9467
                                  • Instruction Fuzzy Hash: 84522B39B01208CFDB18EF64D994B6DBBB2FB88300F5045A9E40AAB365DB35AD55DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a432b2aa4860ae019289dd9050de077c39b1d636c97a88e7050ee079a552f1dd
                                  • Instruction ID: 916a1a9ccd3016587d0351387606c9f6619479fdc464472493f6b19f5adabf22
                                  • Opcode Fuzzy Hash: a432b2aa4860ae019289dd9050de077c39b1d636c97a88e7050ee079a552f1dd
                                  • Instruction Fuzzy Hash: 03521B39B012088FDB14FF64D994B6DBBB2FB89300F5045A9E40AAB368DB35AD55DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ef8f11eb7552acce62d27ee1bdbc0f2633f41afbf52909c6d1509576d81dbc88
                                  • Instruction ID: 0f50b9393df1e4878909d2facb7a6f97e759246ebf4cd02a32e62101a21e9c9e
                                  • Opcode Fuzzy Hash: ef8f11eb7552acce62d27ee1bdbc0f2633f41afbf52909c6d1509576d81dbc88
                                  • Instruction Fuzzy Hash: 7F422B39B012088FDB18FF64D994B6D7BB2FB89300F5045A9E40AAB369DB31AD55DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f19ee8109fd0a4f5279659d7b52dd98bf68b830a1095196556d37b1097d0289a
                                  • Instruction ID: 0176d9d510304d63fe209cec89984f8b55f290e102272aa84a7b80bb4ea61ee3
                                  • Opcode Fuzzy Hash: f19ee8109fd0a4f5279659d7b52dd98bf68b830a1095196556d37b1097d0289a
                                  • Instruction Fuzzy Hash: EB42F939B111098FD719EF64E998B6E7BB2FB88300F508069E806EB358DB749C51CF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ba1fe66e1f5a545b41df0b63b52c8948e466e9c6b513deb4558d4d42f77003f2
                                  • Instruction ID: d27a7571f021e4849a52492ff3e11399bd1d07e73afe9e1f2332ca7206d8ac93
                                  • Opcode Fuzzy Hash: ba1fe66e1f5a545b41df0b63b52c8948e466e9c6b513deb4558d4d42f77003f2
                                  • Instruction Fuzzy Hash: 69422B39B012088FCB15FF64D994BADBBB2FB89300F5045A9E40AAB368DB359D55DF40
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6090d82c1ce371f4f416d37e343490593cb90b375bf8cbb2e304a41b7c208af9
                                  • Instruction ID: 45de98a0fbedd37629491decb7471667e060da7ccc1cd156fc86c3ba0bcc5740
                                  • Opcode Fuzzy Hash: 6090d82c1ce371f4f416d37e343490593cb90b375bf8cbb2e304a41b7c208af9
                                  • Instruction Fuzzy Hash: 5E222E39B011049FCB19FF64D994B6E7BB7FB88700B508159E406EB3A8DB35AC12DB81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5bb7002fc0c7a41af7d0894aa67ad9bea283be67e5616b7e643052158db811a8
                                  • Instruction ID: 729835cc34a165903adc32e91a2f20bd9ea472c5553d834684cab5ce25ba54fb
                                  • Opcode Fuzzy Hash: 5bb7002fc0c7a41af7d0894aa67ad9bea283be67e5616b7e643052158db811a8
                                  • Instruction Fuzzy Hash: 9722FE729153248FD728CF79EC8525D7FA2FFA2314F42821DC446AB266CB74158BAF84
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 71f4bd9def802326f5c48f152924e8a0ba26b0130115fddf916434cdb4ef5c52
                                  • Instruction ID: 41da1bab6e508b75acf0cb7df34aaa14ba2c879fa55c6e2dbcbb1c24dac939ea
                                  • Opcode Fuzzy Hash: 71f4bd9def802326f5c48f152924e8a0ba26b0130115fddf916434cdb4ef5c52
                                  • Instruction Fuzzy Hash: A5023135B11208DFCB04FFA4D994AADBBB6FF88300B518529E406AB359DF34AD55CB90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3f25aa825a39bec38ad6b6d36dd1a7b58a115f37f7b46c95bc86c5f4f7415b87
                                  • Instruction ID: 60ba1f5fd46dc3de7c209c9f6ed0694bde3d80d9dbe340112c5e4c0e75dc531c
                                  • Opcode Fuzzy Hash: 3f25aa825a39bec38ad6b6d36dd1a7b58a115f37f7b46c95bc86c5f4f7415b87
                                  • Instruction Fuzzy Hash: CFD16631718B498BDB68DF68D889BAEB7E5FB98705F00422ED84AC7240DF30E555CB85
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e021e9e269ac9283b45675f2e75f5e37062b2da2602c541043e5d7e7fc45714
                                  • Instruction ID: 3f9415dcdbe92368797d8cedf42dcd505ac8dbe63df98a55e077a9e583948e00
                                  • Opcode Fuzzy Hash: 8e021e9e269ac9283b45675f2e75f5e37062b2da2602c541043e5d7e7fc45714
                                  • Instruction Fuzzy Hash: 62025B74A012168FDB18DFA8C4A4A6EFBB2FB88301F20866DD5569B745DB74EC51CF80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3e74d2aa687a79bc353c1e30e2761018af6d861ea5a8c8f1c92844b65f1d9ba9
                                  • Instruction ID: 652fd46b7857beb22e4103ff5a2bd753e6602cb4b215859308d8198869c18e95
                                  • Opcode Fuzzy Hash: 3e74d2aa687a79bc353c1e30e2761018af6d861ea5a8c8f1c92844b65f1d9ba9
                                  • Instruction Fuzzy Hash: 4AD15E31518A488FDB59EF28C899AEA77F1FF98310F04466DE84AC7255DF30E945CB82
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 133238a03936ee66cba09d7d275d9333fe2cad50e3d36f14a89ebbfbc080c4e6
                                  • Instruction ID: 9808f5ee038b54812a287217994b69947a3ba1b5e1d5c758d546a85ebb8f9719
                                  • Opcode Fuzzy Hash: 133238a03936ee66cba09d7d275d9333fe2cad50e3d36f14a89ebbfbc080c4e6
                                  • Instruction Fuzzy Hash: 94F1B939B111189FDB15FFA5E894AAE7BB7FF88700F508419E806AB358CB35AC11DB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31294467128.00000000052A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_52a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 148951381d0912bf2a6354c3b9e2d956a68c4d26e70a05edfba89a2a863528c6
                                  • Instruction ID: 5e7ac2ea75a934dc54b79b88a0cde5fec7c2d6380959efcacc058e16d5a0284d
                                  • Opcode Fuzzy Hash: 148951381d0912bf2a6354c3b9e2d956a68c4d26e70a05edfba89a2a863528c6
                                  • Instruction Fuzzy Hash: 0CF13A35A211158FDB05EFA9D484AAEBBF2FF88700F698059E406E7394CB74EC418F91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e45004cfa00b96cc07e21d80348e0ecc464919f4c4bc6f170ace2c42d415ba2b
                                  • Instruction ID: 31105869cf7af6cf29a8dfdc70d140358e04a3c6ade1121acb08233670d6e193
                                  • Opcode Fuzzy Hash: e45004cfa00b96cc07e21d80348e0ecc464919f4c4bc6f170ace2c42d415ba2b
                                  • Instruction Fuzzy Hash: CFB1A331315E098BCB79EA2CC8D57BAB7E2FB98304F140269C44AC7145DB25F946CBC5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cdc3060d832e1c7673c77ab0bb2de2e9cf33d3dedc29bb814f35230debfdf7f2
                                  • Instruction ID: e1c503c5e7f819dd3660b1ded24ebbdd40710436706141831792d48990543133
                                  • Opcode Fuzzy Hash: cdc3060d832e1c7673c77ab0bb2de2e9cf33d3dedc29bb814f35230debfdf7f2
                                  • Instruction Fuzzy Hash: 6AC1D471E0519A8FDB12CBB8C8A56EDBFF2FF45310B2C85A9D4949B602C3349957CB90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 28ec8e8bd62c8526057a6a4a67c60ac401b40cd104eb89a4fa080d8b4b2c7e9c
                                  • Instruction ID: ce27680e3d3c0077c8e8a15cf478e284b1de8d653843f63e6c7cf5fc89eb8ae8
                                  • Opcode Fuzzy Hash: 28ec8e8bd62c8526057a6a4a67c60ac401b40cd104eb89a4fa080d8b4b2c7e9c
                                  • Instruction Fuzzy Hash: 35D1C939B111189FDB15FFA5E894AAE77B7FF88700F108529E806A7358DB34AC11DB50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8cca1a035daae0b770665a0cf24e9a046eef94f9737484d2108c7b415efd0b11
                                  • Instruction ID: 0cf9a48acd596c654ef699ffce8e317441a28e4e39c04da0a3b9bd6d8b55b4af
                                  • Opcode Fuzzy Hash: 8cca1a035daae0b770665a0cf24e9a046eef94f9737484d2108c7b415efd0b11
                                  • Instruction Fuzzy Hash: DFC18D357012059FDB15FF68D894A6E77A7FB88300B61842DE906DB398DF34AD128B91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295035732.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5370000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ab32ee8698551d316099ad54c377b76408d7c649363047fc746c15d216cc4c4e
                                  • Instruction ID: 707ff7802a85250b9c6b11361a132b1b14af369626ca75c82a8782a3f5742b41
                                  • Opcode Fuzzy Hash: ab32ee8698551d316099ad54c377b76408d7c649363047fc746c15d216cc4c4e
                                  • Instruction Fuzzy Hash: 09C1AC346015498FDB19EF68D491AAE7BB3FF88300B158569E806DB398DB34EC52CF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ebf261606ae56286347d42574e3f592f39f74f603c34f734bcca56a6e6fe2072
                                  • Instruction ID: 397e8b2d873d7d53d268c4e5ffe6b3cc99c7f4ebc4eed66e0e98ca2b93a0db80
                                  • Opcode Fuzzy Hash: ebf261606ae56286347d42574e3f592f39f74f603c34f734bcca56a6e6fe2072
                                  • Instruction Fuzzy Hash: F1B1396644E3C09FC7478B309CB56D17FB0AE1721471E85EFC4C18E4A3E25AA55BDB22
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5acbc3226e4ae8519473a8cbba5888aa130f033090f942e447cf67849b1942e6
                                  • Instruction ID: 0cfc5f6037adc6eac0a97bbd7b8ff2c6b4356d5396628b2cfc658a19c9488107
                                  • Opcode Fuzzy Hash: 5acbc3226e4ae8519473a8cbba5888aa130f033090f942e447cf67849b1942e6
                                  • Instruction Fuzzy Hash: 8DD1D734B011148FD759FF28E994BAA77F6BB88740F5081A9A50ADB358DF34AC41CF81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a30624eba2523081eb24c03b54a881b9a6cabef09eff328cf90cd4a53ef25101
                                  • Instruction ID: 65b9dfeed8debbdf1935d1334a9ebfea604ceb3525677c22c014745bd5b4cdac
                                  • Opcode Fuzzy Hash: a30624eba2523081eb24c03b54a881b9a6cabef09eff328cf90cd4a53ef25101
                                  • Instruction Fuzzy Hash: ACD1C834B011148FD759FF28E994B6A77F6BB88740F5481A9A50ADB358DF34AC41CF81
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e2e903f92329977da97ab707699d6460e74b4fcfb6d1b984767a57618237eb95
                                  • Instruction ID: fbc0a32362c7c6828d85b1fd36707b9e13a13d6a31d63c7ab86844126721dc4d
                                  • Opcode Fuzzy Hash: e2e903f92329977da97ab707699d6460e74b4fcfb6d1b984767a57618237eb95
                                  • Instruction Fuzzy Hash: 69A12F31508A4C8FDB65EF28C889BEA77F5FB58315F10466EE84AC7160EB30D645CB85
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295232876.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53a0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 296f2bc4109e42470b9005c5400b26f8a06e567be3043efe8ffbecf425cbac64
                                  • Instruction ID: 61f5d602f4c80994054fbc427f36bcda68494a8276bd9705695e479dbd45e285
                                  • Opcode Fuzzy Hash: 296f2bc4109e42470b9005c5400b26f8a06e567be3043efe8ffbecf425cbac64
                                  • Instruction Fuzzy Hash: 4BA10B3A7011059FDB05FF64E994B6E77A3FF88300B518129E906DB3A8DB74AC21DB91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0525fd771110e79a3ce5da77c92ea3f241fd19e305f471bd3ceef81d934a7f68
                                  • Instruction ID: 54a5f14f92c94f4c83947866f68191197d0fb5d2e95078c20dad9d43840cc7a4
                                  • Opcode Fuzzy Hash: 0525fd771110e79a3ce5da77c92ea3f241fd19e305f471bd3ceef81d934a7f68
                                  • Instruction Fuzzy Hash: 80B17D71F0052A8BDB15CBA8C9906ADFBF1FF88300F649669D455EB202D734ED42CBA5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5d59267df77c7ebb04842f0acdfc555376772fea4f394b0c957d8c8d0d3984c1
                                  • Instruction ID: 35a60e868093627f215b256b214a5344e7a1417247a631f7efa878dbeb2d0176
                                  • Opcode Fuzzy Hash: 5d59267df77c7ebb04842f0acdfc555376772fea4f394b0c957d8c8d0d3984c1
                                  • Instruction Fuzzy Hash: E0A1459255A2C26FD3135BF4C0FB6E2BFE29D8B22836D84D9E9C409E03D51A55AB8340
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31295420758.00000000053C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_53c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52388b03c6a714c6b42e6e1f8c3c44713786945751251132dd5ca2d7a3ab9a7f
                                  • Instruction ID: 593aea6aaaab07a191739a4c683ede73ca7bb3ba5be1921a7a1f3732f2d4cc0f
                                  • Opcode Fuzzy Hash: 52388b03c6a714c6b42e6e1f8c3c44713786945751251132dd5ca2d7a3ab9a7f
                                  • Instruction Fuzzy Hash: 25B1E838B011148FD759FB28E994BAA37F6BB8C740F5481A9A50ADB358DF34AC41CF91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 97b4ae5ece8d8ea3e01079b00a2d0e542c2bb8d96745e33f282990c1431716d9
                                  • Instruction ID: c09bcf2af37d7645a12100e5eed399433f71eb409e62ffd58f42a2f3f03ba27f
                                  • Opcode Fuzzy Hash: 97b4ae5ece8d8ea3e01079b00a2d0e542c2bb8d96745e33f282990c1431716d9
                                  • Instruction Fuzzy Hash: 73512F71E016888FD70AEF6BE54168A7BF3BFC8300B14C82AD545DB269EF3498459F50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a5c9b37ce8057844b29e2e81af3a49a5a5549938ffcf1fcbc7517d459fc32862
                                  • Instruction ID: accaaa2a4af521049f7b2c1152c2aa2b4c64978c56e5a1baa88f22e820c67745
                                  • Opcode Fuzzy Hash: a5c9b37ce8057844b29e2e81af3a49a5a5549938ffcf1fcbc7517d459fc32862
                                  • Instruction Fuzzy Hash: 87510D71E016888FD70AEF6BE54168ABBE3BFC8300B14C86AD545DB269EF3498459F50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b09967ac5482500bc099009dc95111bd7cc7545dcabcf40ba633cd1a509d9f95
                                  • Instruction ID: ec584b92d99cc23d4a653865c520c23e9b7df6634f19734642edc96b2ba59e68
                                  • Opcode Fuzzy Hash: b09967ac5482500bc099009dc95111bd7cc7545dcabcf40ba633cd1a509d9f95
                                  • Instruction Fuzzy Hash: BA517374E00609DFCB08DF88C590AAEBBB1FF88314F208599D815AB355D771AE92CF94
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4e64317625e06953a0030493f718403388be9115d8c6a0e5777c3d8d6dbedd3d
                                  • Instruction ID: 9a882544d3e6c0d99bd33ff73ff8f721be8c40bd44ef73edb966819631229445
                                  • Opcode Fuzzy Hash: 4e64317625e06953a0030493f718403388be9115d8c6a0e5777c3d8d6dbedd3d
                                  • Instruction Fuzzy Hash: A93192B4E00209DFCB08CF98C590AAEBBB1FF48314F248599D815AB355D775AA82CF94
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31284903701.0000000002580000.00000040.00001000.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2580000_nXNMsYXFFc.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2f432f6d4d57ddd5edf10f0a55197208a6667e030cc273150dee4b63bd6a15e3
                                  • Instruction ID: 243e44928e8f3e12e6e4240f225a251bbd21cdbbadf4648efb5a866b9c076555
                                  • Opcode Fuzzy Hash: 2f432f6d4d57ddd5edf10f0a55197208a6667e030cc273150dee4b63bd6a15e3
                                  • Instruction Fuzzy Hash: 2601CD34A01508EFCB15EF94C684AADF7B5FF44355F208599D8056B380D771AF42DB44
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.31285552459.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_29c0000_nXNMsYXFFc.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: &(,k$('Y{$e'o$}IIS
                                  • API String ID: 0-1374273654
                                  • Opcode ID: b20d5ff807e54ed95e9eacc9ddf0c46a79022f4de9f11373bcf77795e78b1e1d
                                  • Instruction ID: 96764fe09e8d7d455d8b70ac228b841abb9125c1a93b197f77c55a7fe1d33ede
                                  • Opcode Fuzzy Hash: b20d5ff807e54ed95e9eacc9ddf0c46a79022f4de9f11373bcf77795e78b1e1d
                                  • Instruction Fuzzy Hash: 8F8145B0815A448FD349DF1A8589BE5BBE1BF89310F5A86FAC15D8F232EB708045CF95