Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1In8uYbvZJ.ps1

Overview

General Information

Sample name:1In8uYbvZJ.ps1
renamed because original name is a hash value
Original sample name:ba373cfb9f7ee777a6dd98913b6fb167.ps1
Analysis ID:1586504
MD5:ba373cfb9f7ee777a6dd98913b6fb167
SHA1:39b30f324643e6873c55847f5a5f9a84accfaacf
SHA256:1e16b85998768f725d0a25e7ef42659157ff97b1225cdf40de229debe764328e
Tags:ps1user-abuse_ch
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ipconfig to lookup or modify the Windows network settings
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • powershell.exe (PID: 7788 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1In8uYbvZJ.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • ipconfig.exe (PID: 7996 cmdline: "C:\Windows\system32\ipconfig.exe" /flushdns MD5: 62F170FB07FDBB79CEB7147101406EB8)
    • RegSvcs.exe (PID: 8028 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.3808094845.0000000004E50000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Process Memory Space: RegSvcs.exe PID: 8028JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          SourceRuleDescriptionAuthorStrings
          4.2.RegSvcs.exe.4e50000.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            4.2.RegSvcs.exe.379d790.4.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

              System Summary

              barindex
              Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1In8uYbvZJ.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1In8uYbvZJ.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1In8uYbvZJ.ps1", ProcessId: 7788, ProcessName: powershell.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1In8uYbvZJ.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1In8uYbvZJ.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1In8uYbvZJ.ps1", ProcessId: 7788, ProcessName: powershell.exe
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 1In8uYbvZJ.ps1ReversingLabs: Detection: 21%
              Source: 1In8uYbvZJ.ps1Virustotal: Detection: 29%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: Binary string: #.dll.pdb source: powershell.exe, 00000001.00000002.1421076683.00000172F0950000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172D8777000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172D9919000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: RegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: RegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmp
              Source: global trafficTCP traffic: 192.168.2.10:49761 -> 176.113.115.177:7702
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.177
              Source: powershell.exe, 00000001.00000002.1405160832.00000172E8820000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172DA294000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: powershell.exe, 00000001.00000002.1384006471.00000172DA14A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172D9ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000001.00000002.1384006471.00000172D8551000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000001.00000002.1384006471.00000172D9ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: powershell.exe, 00000001.00000002.1384006471.00000172DA14A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172D9ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: powershell.exe, 00000001.00000002.1384006471.00000172D8551000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
              Source: RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://archive.torproject.org/tor-package-archive/torbrowser/13.0.9/tor-expert-bundle-windows-i686-
              Source: powershell.exe, 00000001.00000002.1384006471.00000172DA294000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000001.00000002.1384006471.00000172DA294000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000001.00000002.1384006471.00000172DA294000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000001.00000002.1384006471.00000172DA14A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172D9ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: RegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
              Source: RegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
              Source: RegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
              Source: powershell.exe, 00000001.00000002.1384006471.00000172D9919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
              Source: powershell.exe, 00000001.00000002.1405160832.00000172E8820000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172DA294000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: powershell.exe, 00000001.00000002.1384006471.00000172D9ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
              Source: powershell.exe, 00000001.00000002.1384006471.00000172D9ED2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
              Source: RegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
              Source: RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
              Source: RegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

              System Summary

              barindex
              Source: 1.2.powershell.exe.172e8752b38.4.raw.unpack, SorterCollector.csLarge array initialization: RemoveCollector: array initializer size 361184
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C0EB0F251_2_00007FF7C0EB0F25
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C0F80FA41_2_00007FF7C0F80FA4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_025EDAA84_2_025EDAA8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_025E5B084_2_025E5B08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_025E5B044_2_025E5B04
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_025E1F304_2_025E1F30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_025E1F2B4_2_025E1F2B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_025E4D534_2_025E4D53
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_025E4D604_2_025E4D60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_04E4D9F84_2_04E4D9F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_04E489B84_2_04E489B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_04E4098D4_2_04E4098D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_04E42D3A4_2_04E42D3A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_04E4CE484_2_04E4CE48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_04E4CE384_2_04E4CE38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_04E4D9EA4_2_04E4D9EA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_04E489A84_2_04E489A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05189C984_2_05189C98
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_051870804_2_05187080
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_051857634_2_05185763
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_051871634_2_05187163
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05189C884_2_05189C88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_051974204_2_05197420
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_051984B84_2_051984B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_051977474_2_05197747
              Source: 1.2.powershell.exe.172e8752b38.4.raw.unpack, SorterCollector.csCryptographic APIs: 'CreateDecryptor'
              Source: 1.2.powershell.exe.172e8752b38.4.raw.unpack, ValueGateway.csCryptographic APIs: 'CreateDecryptor'
              Source: 1.2.powershell.exe.172e8752b38.4.raw.unpack, ValueGateway.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, QMUdLZZR29erUuhvemI.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, QMUdLZZR29erUuhvemI.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, QMUdLZZR29erUuhvemI.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, CrTxExT1QiMoxixk0jU.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, CrTxExT1QiMoxixk0jU.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal84.evad.winPS1@6/5@0/1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\d39a6c8f7bf45e6d
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7824:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oeatxu1r.okc.ps1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
              Source: 1In8uYbvZJ.ps1ReversingLabs: Detection: 21%
              Source: 1In8uYbvZJ.ps1Virustotal: Detection: 29%
              Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1In8uYbvZJ.ps1"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\ipconfig.exe "C:\Windows\system32\ipconfig.exe" /flushdns
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\ipconfig.exe "C:\Windows\system32\ipconfig.exe" /flushdnsJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: Binary string: #.dll.pdb source: powershell.exe, 00000001.00000002.1421076683.00000172F0950000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172D8777000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172D9919000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: RegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: RegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: 1.2.powershell.exe.172e8752b38.4.raw.unpack, ValueGateway.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, QMUdLZZR29erUuhvemI.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 4.2.RegSvcs.exe.5100000.8.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
              Source: 4.2.RegSvcs.exe.5100000.8.raw.unpack, ListDecorator.cs.Net Code: Read
              Source: 4.2.RegSvcs.exe.5100000.8.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
              Source: 4.2.RegSvcs.exe.5100000.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
              Source: 4.2.RegSvcs.exe.5100000.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, T1Aa4g30A3jVnqGHQAd.cs.Net Code: ILNHcuUfc1
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, T1Aa4g30A3jVnqGHQAd.cs.Net Code: x54JJLiT6j
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, PGqajPQkjsFqm5PDpc.cs.Net Code: zGqFh4uTu System.AppDomain.Load(byte[])
              Source: 4.2.RegSvcs.exe.37ed9d0.3.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
              Source: 4.2.RegSvcs.exe.37ed9d0.3.raw.unpack, ListDecorator.cs.Net Code: Read
              Source: 4.2.RegSvcs.exe.37ed9d0.3.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
              Source: 4.2.RegSvcs.exe.37ed9d0.3.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
              Source: 4.2.RegSvcs.exe.37ed9d0.3.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4e50000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.379d790.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3808094845.0000000004E50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8028, type: MEMORYSTR
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C0EB81B2 push edx; ret 1_2_00007FF7C0EB81B3
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C0EB9D3D push 14FFFFFFh; retf 1_2_00007FF7C0EB9D42
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C0EB00BD pushad ; iretd 1_2_00007FF7C0EB00C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_04E41B60 push esp; retf 4_2_04E41B61
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0519ECB8 push esp; retn 0515h4_2_0519ECC5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05193104 push eax; iretd 4_2_0519310F
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, MeyaSx3AXGcb9quLxVn.csHigh entropy of concatenated method names: 'gdk3JXedsw', 'UAS3WRLFJm', 'El33V1WQch', 'WEC3G7IbO6', 'ubp3ol0QuB', 'smw3QTGseH', 'JmF39ded4E', 'Elg3icnHf3', 'IQ63qrmaLI', 'nGY3F8fjgH'
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, wOZsjwBxZXy1BXCFga3.csHigh entropy of concatenated method names: 'mShZXOg1hu', 'M439kE8xyVPy1cFG0Nh', 'lwo18U8vnFdWaE6KxvW', 'Sk8BRCP9yt', 'W0CBTfbQe9', 'hDKBZ75DVN', 'SX4BauZaka', 'wvIB3CdsdH', 'yS0BtWmlto', 'M46hkbFqn3IK0bGnDsy'
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, VQPeLrPP4DkOFeVAUE.csHigh entropy of concatenated method names: 'x0N1bJWPS', 'VS1YCMd64', 'Ghv2STqRc', 'bGdf8YNNE', 'NP6ss0r5G', 'sfQUmKTgb', 'SfWkOZkOW', 'OPwSucThX', 'EkNerCJkE', 'LZTtOIFQ1mB06ACyLwQ'
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, QMUdLZZR29erUuhvemI.csHigh entropy of concatenated method names: 'kS6jCU8Wy3jMeQAbn8K', 'Egnt9a8VEE3DHVgnSmh', 'guaaM4LxIn', 'vh0ry9Sq2v', 'qdTaPGDwaa', 'LjWajtXyjg', 'EJ4a1JiSv2', 'kG0aYcJWnj', 'UL2pWuwCAK', 'QsyZZKFHUp'
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, T1Aa4g30A3jVnqGHQAd.csHigh entropy of concatenated method names: 'IVFVWGgZLP', 'Ow9VV8XFit', 'AofVGMkIc8', 'rKoVoux2sL', 'd8IVQ4JFwe', 'fHDV96dkJ8', 'I3cViSFBJX', 'EMe3Yeb7Fr', 'aP0Vqgb7tc', 'geUVFveI28'
              Source: 4.2.RegSvcs.exe.4d90000.6.raw.unpack, PGqajPQkjsFqm5PDpc.csHigh entropy of concatenated method names: 'JdsuLkeSe', 'qtFpnLuAg', 'RMBm9CdVa', 'NJGl5P2gq', 'j7YihjM1r', 'hBYq8LUwT', 'zGqFh4uTu', 'rwp0IY4nL', 'MOl8q9tSS', 'j6cnRfpxa'

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\ipconfig.exe "C:\Windows\system32\ipconfig.exe" /flushdns
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3708Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3457Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3221Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6633Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8012Thread sleep time: -4611686018427385s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7968Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 35000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 34874Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 34765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 34656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 34547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 34437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 34328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 34218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 34107Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 34000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 33890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 33781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 33671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 33562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 33453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 33344Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 33234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 33125Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 33015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 32906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 32797Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 32682Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 32578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 32463Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 32359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 32250Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 32139Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 32025Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 31922Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 31795Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 31686Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 31578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 31468Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 31351Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 31249Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 31140Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 31028Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 30921Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 30812Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 30702Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 30544Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 30437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 30328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 30219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 30109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 30000Jump to behavior
              Source: RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0VMware|VIRTUAL|A M I|Xen4win32_process.handle='{0}'
              Source: RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmGuestLib.dllDselect * from Win32_ComputerSystem
              Source: RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
              Source: RegSvcs.exe, 00000004.00000002.3808408747.0000000004FB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 46A000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 46C000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 627008Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\ipconfig.exe "C:\Windows\system32\ipconfig.exe" /flushdnsJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              211
              Process Injection
              1
              Disable or Modify Tools
              OS Credential Dumping11
              Security Software Discovery
              Remote Services11
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              21
              Virtualization/Sandbox Evasion
              LSASS Memory1
              Process Discovery
              Remote Desktop Protocol1
              Clipboard Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)211
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Deobfuscate/Decode Files or Information
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Obfuscated Files or Information
              LSA Secrets1
              System Network Configuration Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Software Packing
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              DLL Side-Loading
              DCSync12
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              1In8uYbvZJ.ps121%ReversingLabsScript-PowerShell.Spyware.AsyncRAT
              1In8uYbvZJ.ps130%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              s-part-0017.t-0009.t-msedge.net
              13.107.246.45
              truefalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1405160832.00000172E8820000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172DA294000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000001.00000002.1384006471.00000172D9ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://github.com/mgravell/protobuf-netiRegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://stackoverflow.com/q/14436606/23354RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://github.com/mgravell/protobuf-netJRegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1384006471.00000172DA14A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172D9ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1384006471.00000172DA14A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172D9ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://go.micropowershell.exe, 00000001.00000002.1384006471.00000172D9919000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://stackoverflow.com/q/11564914/23354;RegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://stackoverflow.com/q/2152978/23354RegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://contoso.com/powershell.exe, 00000001.00000002.1384006471.00000172DA294000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1405160832.00000172E8820000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172DA294000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/Licensepowershell.exe, 00000001.00000002.1384006471.00000172DA294000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://contoso.com/Iconpowershell.exe, 00000001.00000002.1384006471.00000172DA294000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://oneget.orgXpowershell.exe, 00000001.00000002.1384006471.00000172D9ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://github.com/mgravell/protobuf-netRegSvcs.exe, 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3808807889.0000000005100000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3804713253.000000000383D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://aka.ms/pscore68powershell.exe, 00000001.00000002.1384006471.00000172D8551000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1384006471.00000172D8551000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1384006471.00000172DA14A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1384006471.00000172D9ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://oneget.orgpowershell.exe, 00000001.00000002.1384006471.00000172D9ED2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        176.113.115.177
                                                        unknownRussian Federation
                                                        49505SELECTELRUfalse
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1586504
                                                        Start date and time:2025-01-09 08:35:14 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 8m 5s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:9
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:1In8uYbvZJ.ps1
                                                        renamed because original name is a hash value
                                                        Original Sample Name:ba373cfb9f7ee777a6dd98913b6fb167.ps1
                                                        Detection:MAL
                                                        Classification:mal84.evad.winPS1@6/5@0/1
                                                        EGA Information:
                                                        • Successful, ratio: 50%
                                                        HCA Information:
                                                        • Successful, ratio: 86%
                                                        • Number of executed functions: 203
                                                        • Number of non-executed functions: 1
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .ps1
                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
                                                        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                        • Execution Graph export aborted for target powershell.exe, PID 7788 because it is empty
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        TimeTypeDescription
                                                        02:36:15API Interceptor10x Sleep call for process: powershell.exe modified
                                                        02:36:17API Interceptor9684356x Sleep call for process: RegSvcs.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        176.113.115.177file.exeGet hashmaliciousXenoRATBrowse
                                                        • 176.113.115.177/x/5.png
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        s-part-0017.t-0009.t-msedge.netfuk7RfLrD3.exeGet hashmaliciousLummaCBrowse
                                                        • 13.107.246.45
                                                        Subscription_Renewal_Invoice_2025_FGHDCS.htmlGet hashmaliciousHTMLPhisherBrowse
                                                        • 13.107.246.45
                                                        GT98765009064.xlsxGet hashmaliciousUnknownBrowse
                                                        • 13.107.246.45
                                                        https://lap.gnoqwwhpwe.ru/3aeK/#Dmestevao@iif.comGet hashmaliciousUnknownBrowse
                                                        • 13.107.246.45
                                                        Condenast eCHECK- Payment Advice.htmlGet hashmaliciousUnknownBrowse
                                                        • 13.107.246.45
                                                        http://indyhumane.orgGet hashmaliciousUnknownBrowse
                                                        • 13.107.246.45
                                                        https://email.analystratings.net/ls/click?upn=u001.WeKo-2BCuHku2kJmVIsYmGxsYmJ5tlN1JIFNOQtoSEGkLgECYxMchW4UXMllXUALJmesTsjgTR1H-2FvUTVSSAEe4R1GQy-2Bvbd8Zmmy4leDYmh9UNV6oDPX-2BT4wzcyKrfAdXvv6hKSBoru3q77depPs43qOB1DgUqmMdQP-2BNz7H62jYGp-2BH9nmpPKVjXmtKn9w5STVYGL4aqMBL65ruXSYeXZw-3D-3Didct_tUVFAbhJxF44ufbifaYzyYApcQooCC4WsuZoiwe419OCcA-2Bhorh4noX10R0htjc0oQD2shNvY2qd7sBvACS4ZxcOvRGqgf-2FzJzWjtjVb7R-2Fc1EPJdReLV-2BtujCvON-2Bc7V1MBDoLDS-2FjF655eEyLK512HQYbp-2FAbQ3P7q3sD01OmQtuWrJdDi7i9EqNYnB7vGsmi9YvC3tf2fi-2F59j5CgE2Yo8KxAbs4pwwxMvCRmFfOK49lsAVAfn3guJ7HTuaWXGet hashmaliciousUnknownBrowse
                                                        • 13.107.246.45
                                                        https://ik.imagekit.io/nrof2h909/Paul%20W.%20Shaffer.pdf?updatedAt=1736369068440Get hashmaliciousHTMLPhisherBrowse
                                                        • 13.107.246.45
                                                        https://ar.inderave.ru/jKDI30/#Tapodoll@wc.comGet hashmaliciousHTMLPhisherBrowse
                                                        • 13.107.246.45
                                                        https://clicktoviewdocumentonadovemacroreader.federalcourtbiz.com/lhvBR/?e=amFtZXMuYm9zd2VsbEBvdmVybGFrZWhvc3BpdGFsLm9yZw==Get hashmaliciousHTMLPhisherBrowse
                                                        • 13.107.246.45
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        SELECTELRUDLKs2Qeljg.exeGet hashmaliciousLummaCBrowse
                                                        • 176.113.115.19
                                                        fuk7RfLrD3.exeGet hashmaliciousLummaCBrowse
                                                        • 176.113.115.19
                                                        Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                        • 176.113.115.19
                                                        chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                        • 176.113.115.19
                                                        xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                        • 176.113.115.19
                                                        nYT1CaXH9N.ps1Get hashmaliciousAmadeyBrowse
                                                        • 176.113.115.131
                                                        iy2.dat.exeGet hashmaliciousXWormBrowse
                                                        • 176.113.115.170
                                                        z0r0.sh4.elfGet hashmaliciousMiraiBrowse
                                                        • 82.148.27.5
                                                        K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
                                                        • 176.113.115.19
                                                        IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                        • 176.113.115.19
                                                        No context
                                                        No context
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):64
                                                        Entropy (8bit):1.1628158735648508
                                                        Encrypted:false
                                                        SSDEEP:3:NlllulLhwlz:NllUO
                                                        MD5:F442CD24937ABD508058EA44FD91378E
                                                        SHA1:FDE63CECA441AA1C5C9C401498F9032A23B38085
                                                        SHA-256:E2960AF08E2EE7C9C72EEA31DBBFE1B55B9BF84DE2DD7BB7204487E6AF37B8F6
                                                        SHA-512:927E2EEA0BB3FC3D3A0DA7F45644F594CE29F11D90A84B005D723500258DE9E8B3780EB87242F4C62B64B9FEEA1869FC16076FA3AC89EC34E0546CDE1BEF7631
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:@...e................................................@..........
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):6220
                                                        Entropy (8bit):3.73358344319953
                                                        Encrypted:false
                                                        SSDEEP:96:5Sw0cCgf4ckvhkvCCt+hgUbApiZH9hgUbApieHJ:5l08fb+hJbwKhJbwB
                                                        MD5:459FCC18EDA30E5F91FAEDBD7A2574B2
                                                        SHA1:5D49FEC63AA3CC81CCFF5941083B0B0F6AC9BB2D
                                                        SHA-256:DAE25DAED9633694AC516E2B20B1710A4E95D1B9096AFBCE10D46451CDDB3023
                                                        SHA-512:BAE2564EA56F3C76F4F5E3FFCC09A262076F3FD21C462BCE45F8010CDADB3665918CC3E7DF84EC20BA40698499B0C456E773E75C7FCC81686D9A794C27CB8D9A
                                                        Malicious:false
                                                        Preview:...................................FL..................F.".. ....N.5q....]Q(ib..z.:{.............................:..DG..Yr?.D..U..k0.&...&.........5q......"ib..1!u(ib......t...CFSF..1.....EW)N..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)N)Z.<...........................c..A.p.p.D.a.t.a...B.V.1.....)Z.<..Roaming.@......EW)N)Z.<...........................qF.R.o.a.m.i.n.g.....\.1.....EW.R..MICROS~1..D......EW)N)Z}<..........................O~X.M.i.c.r.o.s.o.f.t.....V.1.....EW.S..Windows.@......EW)N)Z}<...........................).W.i.n.d.o.w.s.......1.....EW+N..STARTM~1..n......EW)N)Z}<....................D......H..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EW#O..Programs..j......EW)N)Z}<....................@.......|.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW)NEW)N..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~2.LNK..^......EW)N)Z.<................
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):6220
                                                        Entropy (8bit):3.73358344319953
                                                        Encrypted:false
                                                        SSDEEP:96:5Sw0cCgf4ckvhkvCCt+hgUbApiZH9hgUbApieHJ:5l08fb+hJbwKhJbwB
                                                        MD5:459FCC18EDA30E5F91FAEDBD7A2574B2
                                                        SHA1:5D49FEC63AA3CC81CCFF5941083B0B0F6AC9BB2D
                                                        SHA-256:DAE25DAED9633694AC516E2B20B1710A4E95D1B9096AFBCE10D46451CDDB3023
                                                        SHA-512:BAE2564EA56F3C76F4F5E3FFCC09A262076F3FD21C462BCE45F8010CDADB3665918CC3E7DF84EC20BA40698499B0C456E773E75C7FCC81686D9A794C27CB8D9A
                                                        Malicious:false
                                                        Preview:...................................FL..................F.".. ....N.5q....]Q(ib..z.:{.............................:..DG..Yr?.D..U..k0.&...&.........5q......"ib..1!u(ib......t...CFSF..1.....EW)N..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)N)Z.<...........................c..A.p.p.D.a.t.a...B.V.1.....)Z.<..Roaming.@......EW)N)Z.<...........................qF.R.o.a.m.i.n.g.....\.1.....EW.R..MICROS~1..D......EW)N)Z}<..........................O~X.M.i.c.r.o.s.o.f.t.....V.1.....EW.S..Windows.@......EW)N)Z}<...........................).W.i.n.d.o.w.s.......1.....EW+N..STARTM~1..n......EW)N)Z}<....................D......H..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EW#O..Programs..j......EW)N)Z}<....................@.......|.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW)NEW)N..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~2.LNK..^......EW)N)Z.<................
                                                        File type:ASCII text, with very long lines (65459), with CRLF line terminators
                                                        Entropy (8bit):5.868935898663187
                                                        TrID:
                                                          File name:1In8uYbvZJ.ps1
                                                          File size:680'460 bytes
                                                          MD5:ba373cfb9f7ee777a6dd98913b6fb167
                                                          SHA1:39b30f324643e6873c55847f5a5f9a84accfaacf
                                                          SHA256:1e16b85998768f725d0a25e7ef42659157ff97b1225cdf40de229debe764328e
                                                          SHA512:6c50e5a6475d57295eae999a2dcbeb3dd00dfe3f99455f3599e5aad594d7914f1ddb03bc3cec9042c169f6a85f203543bdb285ccde658bc2a1ba3471702e23df
                                                          SSDEEP:12288:iY3oNJkNolmkS+EvhxWoVffP3cPp7NWQf28qPNx/C7H4ELA4kyv:iY3SJkNCbASo1fPsPXWQf4/0XsDyv
                                                          TLSH:CBE4F1321247BC8F9F7F5E89D4402A501C9DBD7B6B64C58CFAC80AE861AA414DE7DDB0
                                                          File Content Preview:ipconfig /flushdns...... $t0='AZAZAZIEX'.replace('AZAZAZ','');sal GG $t0;....$OE="qQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQA
                                                          Icon Hash:3270d6baae77db44
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 9, 2025 08:36:18.045586109 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:36:18.050533056 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:36:18.050620079 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:36:18.066639900 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:36:18.071455002 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:36:18.071511030 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:36:18.076395988 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:36:53.076673985 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:36:53.081516981 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:36:53.081604958 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:36:53.086358070 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:37:28.090560913 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:37:28.095508099 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:37:28.095603943 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:37:28.100488901 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:37:55.153482914 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:37:55.158269882 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:37:55.158324003 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:37:55.163099051 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:37:56.090476990 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:37:56.095500946 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:37:56.095601082 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:37:56.100451946 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:37:56.716404915 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:37:56.721362114 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:37:56.721524000 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:37:56.726370096 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:37:59.418797016 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:37:59.745733976 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:00.271859884 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:00.271872997 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:05.293903112 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:05.298877001 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:05.298989058 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:05.303863049 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:08.418739080 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:08.423616886 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:08.423751116 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:08.428558111 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:11.840647936 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:11.845422983 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:11.845494032 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:11.850272894 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:18.530428886 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:18.535254955 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:18.535351992 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:18.540302992 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:19.153599024 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:19.158601046 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:19.158658028 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:19.163489103 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:22.668658018 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:22.673537970 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:22.676531076 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:22.681389093 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:27.903172970 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:27.908113956 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:27.908282995 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:27.913090944 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:39.715599060 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:39.720808029 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:39.720890045 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:39.725879908 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:43.137799025 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:43.142640114 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:43.142690897 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:43.147589922 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:46.215723038 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:46.220652103 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:46.228545904 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:46.233491898 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:47.966240883 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:47.971139908 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:47.971189976 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:47.975945950 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:49.325613976 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:49.330524921 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:49.330575943 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:49.335338116 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:49.753139973 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:49.757992029 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:49.758126974 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:49.762882948 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:51.437748909 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:51.442709923 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:51.442751884 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:51.447596073 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:55.654875040 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:55.659645081 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:55.659698009 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:55.664443970 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:56.546534061 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:56.551358938 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:38:56.551487923 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:38:56.556258917 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:08.249571085 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:08.254522085 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:08.260591030 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:08.265465975 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:13.075345039 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:13.080333948 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:13.080491066 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:13.085357904 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:14.043909073 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:14.048922062 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:14.049068928 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:14.053905010 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:14.059364080 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:14.064239979 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:14.064326048 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:14.069163084 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:16.984709978 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:16.989741087 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:16.989813089 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:16.994678020 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:20.824951887 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:20.829915047 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:20.829999924 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:20.834876060 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:21.637645006 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:21.642607927 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:21.642651081 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:21.647501945 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:21.731342077 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:21.736357927 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:21.736444950 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:21.741285086 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:24.842550993 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:24.847481012 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:24.848661900 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:24.853482008 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:30.840728998 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:30.845637083 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:30.845752954 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:30.850620985 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:32.903501034 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:32.908490896 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:39:32.908730030 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:39:32.913593054 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:40:04.897562981 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:40:04.902420044 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:40:04.902471066 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:40:04.907268047 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:40:15.466496944 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:40:15.471474886 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:40:15.471520901 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:40:15.476289988 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:40:17.544043064 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:40:17.554805040 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:40:17.555001020 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:40:17.565850973 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:40:20.530613899 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:40:20.535521984 CET770249761176.113.115.177192.168.2.10
                                                          Jan 9, 2025 08:40:20.535742998 CET497617702192.168.2.10176.113.115.177
                                                          Jan 9, 2025 08:40:20.541208982 CET770249761176.113.115.177192.168.2.10
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jan 9, 2025 08:36:08.459943056 CET1.1.1.1192.168.2.100x2c6aNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                          Jan 9, 2025 08:36:08.459943056 CET1.1.1.1192.168.2.100x2c6aNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:1
                                                          Start time:02:36:12
                                                          Start date:09/01/2025
                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\1In8uYbvZJ.ps1"
                                                          Imagebase:0x7ff7b2bb0000
                                                          File size:452'608 bytes
                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:2
                                                          Start time:02:36:12
                                                          Start date:09/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff620390000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:02:36:15
                                                          Start date:09/01/2025
                                                          Path:C:\Windows\System32\ipconfig.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\system32\ipconfig.exe" /flushdns
                                                          Imagebase:0x7ff7c88b0000
                                                          File size:35'840 bytes
                                                          MD5 hash:62F170FB07FDBB79CEB7147101406EB8
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:02:36:16
                                                          Start date:09/01/2025
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                          Imagebase:0x500000
                                                          File size:45'984 bytes
                                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.3808094845.0000000004E50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.3804713253.0000000003771000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.3800395573.0000000002771000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:false

                                                          Reset < >
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1423397957.00007FF7C0F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff7c0f80000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 64fbc3c8d036872e2ce5646b32964c7dee9ac6545307fd58844e57bd7d365018
                                                            • Instruction ID: d84de92c8d43f26be201510ed2c4d7a0cb4e98bbd75a3152e7423250712c1e03
                                                            • Opcode Fuzzy Hash: 64fbc3c8d036872e2ce5646b32964c7dee9ac6545307fd58844e57bd7d365018
                                                            • Instruction Fuzzy Hash: 4BD21621A0DB894FE756AB2858552F4BBE5FF47720B4803FBD04DD7293DA18BC4683A1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1423397957.00007FF7C0F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff7c0f80000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: baced6756850ba02cf85121a0796ca96e5acb4b166763a011f401381864ca23a
                                                            • Instruction ID: f4185ab3a78e1860e07e73da7ed17aaec4b02e6caed4739b92bd97b7340797ad
                                                            • Opcode Fuzzy Hash: baced6756850ba02cf85121a0796ca96e5acb4b166763a011f401381864ca23a
                                                            • Instruction Fuzzy Hash: 2451D721E0DA894FE756AA2844646B4BBE5FF57720B8D03FAC44DDB293DA18BC458390
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1423397957.00007FF7C0F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff7c0f80000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 69c856a8a648002e6130337c53825eb76417cc675a728d5f2c2185556dc8fdf9
                                                            • Instruction ID: bfdbeae8813223c03e288a0f5c4b95e23c58e16f9de3a04b727d2b4e6682fd1f
                                                            • Opcode Fuzzy Hash: 69c856a8a648002e6130337c53825eb76417cc675a728d5f2c2185556dc8fdf9
                                                            • Instruction Fuzzy Hash: A3115E3180D7C98FC7429F3048292917FB0EF53210F1A01EBC494CB5E3D7286855C792
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1422480806.00007FF7C0EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0EB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff7c0eb0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f19a00d4f8f189f1d94aa75710177ac3495ecd0297a690d7c7366bb97b5b08b7
                                                            • Instruction ID: 45ffb98ba48407398eb8ae3d126e48bbc4b8bd7cf6fecbdbece7be019ec47b65
                                                            • Opcode Fuzzy Hash: f19a00d4f8f189f1d94aa75710177ac3495ecd0297a690d7c7366bb97b5b08b7
                                                            • Instruction Fuzzy Hash: 08112D70918A4D8FDB89EF68C85CAAABBF0FF64305F0005EBD819D72A1DB34A544CB41
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1422480806.00007FF7C0EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0EB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff7c0eb0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                            • Instruction ID: 37279ebecb1d48eb42851782cad6bdfada433b85463237a750df3d463b31f13d
                                                            • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                            • Instruction Fuzzy Hash: DB01A77010CB0C4FD744EF0CE491AA6B3E0FB85360F50052EE58AC3651DB32E882CB45
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1422480806.00007FF7C0EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0EB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff7c0eb0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1b96a51c50db043ec36af74de80a41978607f820c3bd0385e29dd7d46c279ebf
                                                            • Instruction ID: b521a1a88e6dcde36686c4972f7cb7c52234e6d79f0816b4de94db3e24f41eed
                                                            • Opcode Fuzzy Hash: 1b96a51c50db043ec36af74de80a41978607f820c3bd0385e29dd7d46c279ebf
                                                            • Instruction Fuzzy Hash: 4B018F7090864C9FCB49EF64C958AA8BFB1EF19304F0502DAC449DB1A2DB35A558CB41
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1422480806.00007FF7C0EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0EB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff7c0eb0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a0c06e3ecb7a1eabff8184062f109301f1aa4a70223ea038fa946f4d788e6f74
                                                            • Instruction ID: 185bdccfce0646dad10b0ef7124f0690f9f13abe984dd8d104d439645e1e453e
                                                            • Opcode Fuzzy Hash: a0c06e3ecb7a1eabff8184062f109301f1aa4a70223ea038fa946f4d788e6f74
                                                            • Instruction Fuzzy Hash: 95E0683148C2498BF3013E0498042E6B710EF40310F810376E41DCA2C3DB28A45AC2A1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1422480806.00007FF7C0EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0EB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff7c0eb0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e2d3487ff4fe8b86e7872b013d746ebbb43da73d526bb585c6594a6cdd9ec8df
                                                            • Instruction ID: dd10e93fe5dcc8862475a81d5c12c5fa638a84731071b5f7776e99b23fda60fb
                                                            • Opcode Fuzzy Hash: e2d3487ff4fe8b86e7872b013d746ebbb43da73d526bb585c6594a6cdd9ec8df
                                                            • Instruction Fuzzy Hash: D3D0173084521A8FCB85EF6485516ADB7B5BB08340B600439D40AEB6A0D739AA018B64
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1422480806.00007FF7C0EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0EB0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff7c0eb0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3b7ec687efc4d08823bee10efe3643dba7760a1e5d684316a916d84e08e388a6
                                                            • Instruction ID: 34593bdc9436d60c82ae11feb1bdc0ed8f47a0b4e761b23195c4b4a0f90e05e7
                                                            • Opcode Fuzzy Hash: 3b7ec687efc4d08823bee10efe3643dba7760a1e5d684316a916d84e08e388a6
                                                            • Instruction Fuzzy Hash: EB51C862E4E6C14FE3667E781825175BFA0AF13B707CC01FAC4888F1D79914794993AA

                                                            Execution Graph

                                                            Execution Coverage:11.5%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:8
                                                            Total number of Limit Nodes:0
                                                            execution_graph 35482 25ed600 35484 25ed613 35482->35484 35486 25ed6b0 35484->35486 35487 25ed6f8 VirtualProtect 35486->35487 35489 25ed695 35487->35489 35490 25ed860 35491 25ed8a0 CloseHandle 35490->35491 35493 25ed8d1 35491->35493
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4
                                                            • API String ID: 0-4088798008
                                                            • Opcode ID: acad082809b3d4082debee48bc0c5df541449ca97273013d902b4363585fc67a
                                                            • Instruction ID: 3fa7effd43e0e830cb5c539a4855580ee353930ba12cc7a171654077ed48ab29
                                                            • Opcode Fuzzy Hash: acad082809b3d4082debee48bc0c5df541449ca97273013d902b4363585fc67a
                                                            • Instruction Fuzzy Hash: D8B20634A10218DFDB18DFA4C884BADB7B6FF89300F148599E506AB3A5DB71AD81CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4
                                                            • API String ID: 0-4088798008
                                                            • Opcode ID: 1769581587831e7998356091a0a33c5d0861bd5659dfdd9b800fed1305e97e85
                                                            • Instruction ID: 652f99fd287ffd3cb204d8adb91f4975fda16061c0c19252bd66337123b15c2f
                                                            • Opcode Fuzzy Hash: 1769581587831e7998356091a0a33c5d0861bd5659dfdd9b800fed1305e97e85
                                                            • Instruction Fuzzy Hash: CC22D934A10214DFDF28DF64C994BA9B7B2FF89300F1485A9E509AB395DB71AD81CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 820 5187080-518709c 821 51870a1-51870a4 820->821 822 518711d-5187125 821->822 823 51870a6 821->823 824 5187129-5187137 822->824 825 5187127 822->825 826 51870ad-51870ca 823->826 828 5187139 824->828 829 518713b-518713e 824->829 827 5187147-518715a 825->827 860 51870cc-51870d1 826->860 861 51870fd-5187102 826->861 827->829 843 518715c-5187161 827->843 828->829 830 518719f-51871b1 829->830 831 5187140 829->831 862 51871bc-51871d8 830->862 831->826 831->827 831->830 832 5187359-51873b4 call 5186890 831->832 833 51871de-5187209 831->833 834 5187260-51872e9 831->834 835 5187452-5187457 831->835 836 5187404-518741f 831->836 837 5187185-5187198 831->837 838 5187216-5187255 831->838 839 5187426-518744c 831->839 840 5187317-5187326 831->840 949 51873b6 call 518852c 832->949 950 51873b6 call 5188530 832->950 849 5187175-5187178 833->849 891 518720f-5187211 833->891 939 51872f0-518730c 834->939 835->826 856 5187517-518751a 835->856 858 51873f8-51873fb 836->858 859 5187421-5187424 836->859 837->830 838->849 925 518725b 838->925 839->858 892 518744e-5187450 839->892 866 5187332-5187334 840->866 843->829 843->849 849->832 857 518717e 849->857 869 518751c 856->869 870 5187571-5187579 856->870 857->826 857->830 857->832 857->833 857->834 857->835 857->836 857->837 857->838 857->839 857->840 858->835 863 51873fd 858->863 859->858 860->821 861->821 862->849 895 51871da-51871dc 862->895 863->835 863->836 863->839 863->870 874 5187759-518776d 863->874 875 518773a-518774e 863->875 876 518757b-518758f 863->876 877 518777b-518779b 863->877 878 518753d-518756a 863->878 879 51876d0-51876d2 863->879 880 5187593-51875b1 863->880 881 51875b6-51875b8 863->881 882 518770a-518771e 863->882 883 518772c-518772e 863->883 884 51877ce-51877d0 863->884 885 51877e0-51877ef 863->885 886 51876e2-51876e4 863->886 887 5187523-5187536 863->887 888 51875e5-51875f9 863->888 889 5187606-5187629 863->889 866->837 893 518733a-518734b 866->893 869->870 869->874 869->875 869->876 869->877 869->878 869->879 869->880 869->881 869->882 869->883 869->884 869->885 869->886 869->887 869->888 869->889 870->856 874->856 896 5187773-5187776 874->896 875->856 894 5187754 875->894 876->856 899 5187591 876->899 877->856 917 51877a1-51877a4 877->917 878->870 879->885 905 51876d8-51876dd 879->905 880->856 881->884 902 51875be-51875c3 881->902 882->856 908 5187724-5187727 882->908 883->879 909 5187730-5187735 883->909 897 5187648-51876cb call 5186890 884->897 898 51877d6-51877db 884->898 912 51877f6-5187807 885->912 886->887 907 51876ea-51876ef 886->907 887->878 888->856 903 51875ff-5187601 888->903 889->856 921 518762f 889->921 891->849 892->858 893->849 900 5187351-5187354 893->900 894->856 895->849 896->856 897->856 897->879 898->856 899->856 900->849 902->856 903->856 905->856 907->856 908->856 909->856 912->856 918 518780d-5187810 912->918 917->856 918->856 921->856 925->849 937 51873bc-51873d5 call 5189790 942 51873db-51873e0 937->942 939->849 945 5187312 939->945 942->849 945->849 949->937 950->937
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: {7
                                                            • API String ID: 0-2420609454
                                                            • Opcode ID: 333ae965b30ccf6dd37932fb048a0eace8936d7ee243fdafd9493bc36725bfc0
                                                            • Instruction ID: 48f40f7a93535a7f256a2dad074d80548e706d25335328846d32c9d27985ae71
                                                            • Opcode Fuzzy Hash: 333ae965b30ccf6dd37932fb048a0eace8936d7ee243fdafd9493bc36725bfc0
                                                            • Instruction Fuzzy Hash: DDE18A30B002048BE728EB69E494BBE76A3FB85301F25C529E4025B7D9DF35AD85CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 951 5187163-5187173 954 518719f-51871d8 951->954 958 51871da-51871dc 954->958 959 5187175-5187178 954->959 958->959 960 5187359-51873b4 call 5186890 959->960 961 518717e 959->961 1081 51873b6 call 518852c 960->1081 1082 51873b6 call 5188530 960->1082 961->954 961->960 962 51870ad-51870ca 961->962 963 51871de-5187209 961->963 964 5187260-51872e9 961->964 965 5187452-5187457 961->965 966 5187404-518741f 961->966 967 5187185-5187198 961->967 968 5187216-5187255 961->968 969 5187426-518744c 961->969 970 5187317-5187326 961->970 1014 51870cc-51870d1 962->1014 1015 51870fd-5187102 962->1015 963->959 1013 518720f-5187211 963->1013 1073 51872f0-518730c 964->1073 965->962 981 5187517-518751a 965->981 983 51873f8-51873fb 966->983 984 5187421-5187424 966->984 967->954 968->959 1052 518725b 968->1052 969->983 1016 518744e-5187450 969->1016 994 5187332-5187334 970->994 987 518751c 981->987 988 5187571-5187579 981->988 983->965 985 51873fd 983->985 984->983 985->965 985->966 985->969 985->988 996 5187759-518776d 985->996 997 518773a-518774e 985->997 998 518757b-518758f 985->998 999 518777b-518779b 985->999 1000 518753d-518756a 985->1000 1001 51876d0-51876d2 985->1001 1002 5187593-51875b1 985->1002 1003 51875b6-51875b8 985->1003 1004 518770a-518771e 985->1004 1005 518772c-518772e 985->1005 1006 51877ce-51877d0 985->1006 1007 51877e0-51877ef 985->1007 1008 51876e2-51876e4 985->1008 1009 5187523-5187536 985->1009 1010 51875e5-51875f9 985->1010 1011 5187606-5187629 985->1011 987->988 987->996 987->997 987->998 987->999 987->1000 987->1001 987->1002 987->1003 987->1004 987->1005 987->1006 987->1007 987->1008 987->1009 987->1010 987->1011 988->981 994->967 1017 518733a-518734b 994->1017 996->981 1027 5187773-5187776 996->1027 997->981 1026 5187754 997->1026 998->981 1018 5187591 998->1018 999->981 1045 51877a1-51877a4 999->1045 1000->988 1001->1007 1022 51876d8-51876dd 1001->1022 1002->981 1003->1006 1020 51875be-51875c3 1003->1020 1004->981 1024 5187724-5187727 1004->1024 1005->1001 1025 5187730-5187735 1005->1025 1028 5187648-51876cb call 5186890 1006->1028 1029 51877d6-51877db 1006->1029 1035 51877f6-5187807 1007->1035 1008->1009 1023 51876ea-51876ef 1008->1023 1009->1000 1010->981 1021 51875ff-5187601 1010->1021 1011->981 1043 518762f 1011->1043 1013->959 1032 51870a1-51870a4 1014->1032 1015->1032 1016->983 1017->959 1019 5187351-5187354 1017->1019 1018->981 1019->959 1020->981 1021->981 1022->981 1023->981 1024->981 1025->981 1026->981 1027->981 1028->981 1028->1001 1029->981 1037 518711d-5187125 1032->1037 1038 51870a6 1032->1038 1035->981 1046 518780d-5187810 1035->1046 1049 5187129-5187137 1037->1049 1050 5187127 1037->1050 1038->962 1043->981 1045->981 1046->981 1056 5187139 1049->1056 1057 518713b-518713e 1049->1057 1055 5187147-518715a 1050->1055 1052->959 1055->1057 1064 518715c-5187161 1055->1064 1056->1057 1057->954 1058 5187140 1057->1058 1058->954 1058->960 1058->962 1058->963 1058->964 1058->965 1058->966 1058->967 1058->968 1058->969 1058->970 1058->1055 1064->959 1064->1057 1068 51873bc-51873d5 call 5189790 1075 51873db-51873e0 1068->1075 1073->959 1078 5187312 1073->1078 1075->959 1078->959 1081->1068 1082->1068
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: {7
                                                            • API String ID: 0-2420609454
                                                            • Opcode ID: 4a18f789debb7855e26f8d5fa2f6c7f29875c342aa1cbc6bac8c8b71a6a57d83
                                                            • Instruction ID: cdcdc06ab5131f5a72dec3ba7c7de54880a8c78128526a32a1eb5e901af3bcb5
                                                            • Opcode Fuzzy Hash: 4a18f789debb7855e26f8d5fa2f6c7f29875c342aa1cbc6bac8c8b71a6a57d83
                                                            • Instruction Fuzzy Hash: 69C18B30A00204CBE728EB69E054BBE76A3FB85701F25C569E4025B6D9DF36AD45CF92

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2355 5185763-518577d 2356 5185785-5185789 2355->2356 2357 518578b-51857b2 2356->2357 2358 51857b3-5185801 2356->2358 2364 5185811-5185815 2358->2364 2365 5185803-518580c call 5185418 2358->2365 2367 518582b-518583c 2364->2367 2368 5185817-5185826 2364->2368 2365->2364 2369 5185d3a-5185d64 call 5185d4b 2367->2369 2370 5185842-5185857 2367->2370 2371 5185bc0-5185bc7 2368->2371 2372 5185859-518585e 2370->2372 2373 5185863-5185876 2370->2373 2372->2371 2374 5185bc8-5185be6 2373->2374 2375 518587c-5185888 2373->2375 2384 5185bed-5185c0b 2374->2384 2375->2369 2377 518588e-51858c5 2375->2377 2379 51858d1-51858d5 2377->2379 2380 51858c7-51858cc 2377->2380 2383 51858db-51858e7 2379->2383 2379->2384 2380->2371 2383->2369 2385 51858ed-5185924 2383->2385 2392 5185c12-5185c30 2384->2392 2389 5185930-5185934 2385->2389 2390 5185926-518592b 2385->2390 2391 518593a-5185946 2389->2391 2389->2392 2390->2371 2391->2369 2396 518594c-5185983 2391->2396 2402 5185c37-5185c55 2392->2402 2398 518598f-5185993 2396->2398 2399 5185985-518598a 2396->2399 2401 5185999-51859a5 2398->2401 2398->2402 2399->2371 2401->2369 2403 51859ab-51859e2 2401->2403 2409 5185c5c-5185c7a 2402->2409 2405 51859ee-51859f2 2403->2405 2406 51859e4-51859e9 2403->2406 2408 51859f8-5185a04 2405->2408 2405->2409 2406->2371 2408->2369 2412 5185a0a-5185a41 2408->2412 2417 5185c81-5185c9f 2409->2417 2413 5185a4d-5185a51 2412->2413 2414 5185a43-5185a48 2412->2414 2413->2417 2418 5185a57-5185a63 2413->2418 2414->2371 2424 5185ca6-5185cc4 2417->2424 2418->2369 2419 5185a69-5185aa0 2418->2419 2422 5185aac-5185ab0 2419->2422 2423 5185aa2-5185aa7 2419->2423 2422->2424 2425 5185ab6-5185ac2 2422->2425 2423->2371 2433 5185ccb-5185ce9 2424->2433 2425->2369 2428 5185ac8-5185aff 2425->2428 2430 5185b0b-5185b0f 2428->2430 2431 5185b01-5185b06 2428->2431 2430->2433 2434 5185b15-5185b21 2430->2434 2431->2371 2440 5185cf0-5185d0e 2433->2440 2434->2369 2435 5185b27-5185b5e 2434->2435 2438 5185b60-5185b65 2435->2438 2439 5185b67-5185b6b 2435->2439 2438->2371 2439->2440 2441 5185b71-5185b7a 2439->2441 2446 5185d15-5185d33 2440->2446 2441->2369 2444 5185b80-5185bb5 2441->2444 2445 5185bbb 2444->2445 2444->2446 2445->2371 2446->2369
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 237a79f2e9494d17324d7f68d91b1e4e01032855eed13f9f51181365a5400e37
                                                            • Instruction ID: 254b982538d11e94831e527a6743b80d042ffff14ee8cc543308d79252cc6d86
                                                            • Opcode Fuzzy Hash: 237a79f2e9494d17324d7f68d91b1e4e01032855eed13f9f51181365a5400e37
                                                            • Instruction Fuzzy Hash: B5028774B002059FDB29DBA8C494A7EFBF2FB88300F248629D55A97381CB34AD51CF95

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2696 4e4098d-4e409f9 2702 4e40a2e-4e40a40 2696->2702 2703 4e409fb-4e40a25 2696->2703 2706 4e40b25-4e40b63 2702->2706 2707 4e40a46-4e40a69 2702->2707 2703->2702 2714 4e40a27 2703->2714 2723 4e40b65-4e40bda 2706->2723 2724 4e40bdc-4e40c16 2706->2724 2715 4e40b11-4e40b1a 2707->2715 2714->2702 2716 4e40a86-4e40a8f 2715->2716 2717 4e40b20 2715->2717 2719 4e40a95-4e40abc 2716->2719 2720 4e412ca-4e412cf 2716->2720 2721 4e40d22-4e40d66 2717->2721 2719->2720 2728 4e40ac2-4e40b0b 2719->2728 2741 4e40f44-4e40f60 2721->2741 2742 4e40d6c-4e40d8d 2721->2742 2738 4e40c1d-4e40c28 2723->2738 2724->2738 2749 4e40b10 2728->2749 2750 4e40b0d 2728->2750 2738->2721 2743 4e40c2e-4e40c37 2738->2743 2799 4e40f66 call 4e427c0 2741->2799 2800 4e40f66 call 4e427b0 2741->2800 2751 4e40d93 2742->2751 2752 4e40f2b-4e40f3e 2742->2752 2743->2720 2744 4e40c3d-4e40c57 2743->2744 2775 4e40cb8-4e40cd0 2744->2775 2776 4e40c59-4e40c71 2744->2776 2749->2715 2750->2749 2755 4e40df4-4e40e35 2751->2755 2756 4e40db7-4e40def 2751->2756 2757 4e40f02-4e40f24 2751->2757 2758 4e40ebd-4e40ee6 2751->2758 2759 4e40e88-4e40ebb 2751->2759 2760 4e40ee8-4e40ef4 2751->2760 2761 4e40d9a-4e40da6 2751->2761 2762 4e40e3a-4e40e83 2751->2762 2752->2741 2752->2742 2755->2752 2756->2752 2757->2752 2758->2752 2759->2752 2760->2720 2769 4e40efa-4e40f00 2760->2769 2761->2720 2765 4e40dac-4e40db2 2761->2765 2762->2752 2763 4e40f6c-4e40f9d 2801 4e40fa3 call 4e487a0 2763->2801 2802 4e40fa3 call 4e48790 2763->2802 2765->2752 2769->2752 2775->2720 2778 4e40cd6-4e40d07 2775->2778 2776->2720 2779 4e40c77-4e40cb6 2776->2779 2798 4e40d12-4e40d1c 2778->2798 2779->2798 2787 4e40fa9 2787->2720 2798->2721 2798->2743 2799->2763 2800->2763 2801->2787 2802->2787
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a645fdea37bea1663be2d3273a8304099323d442a71e6777c3bbbde726499de5
                                                            • Instruction ID: 41d1462e63fdc4f80500bce2bc2e334138ca722b95e793472d53a53715f1136e
                                                            • Opcode Fuzzy Hash: a645fdea37bea1663be2d3273a8304099323d442a71e6777c3bbbde726499de5
                                                            • Instruction Fuzzy Hash: C802E874A002189FDB55DF68D894B99B7B2FF88300F51C5A9E50AAB361DB30EE81CF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9b93e6e678e4e14d50c5bf43565cc0ada2c118c99dd6c816f946f7bf6e3f01d3
                                                            • Instruction ID: 3bef7d3708e114c519fbaa3487feca9bae0bcf51b599b3a48d1e2b92c92209a3
                                                            • Opcode Fuzzy Hash: 9b93e6e678e4e14d50c5bf43565cc0ada2c118c99dd6c816f946f7bf6e3f01d3
                                                            • Instruction Fuzzy Hash: 56914930A04208CFEB04DF56E884FE977F2ABC5308F19D5A9D405AB299D778A982DB44
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cadfa8b91c398a288fa339f7c76e15a80830bf5de3604b26cc6d6d9b900cfcf9
                                                            • Instruction ID: 0273c746db880915061c0c814d6d91e51bc79433730a649cccdedfbd0b8c9e42
                                                            • Opcode Fuzzy Hash: cadfa8b91c398a288fa339f7c76e15a80830bf5de3604b26cc6d6d9b900cfcf9
                                                            • Instruction Fuzzy Hash: A0517B34A00104CFDB28EF59D889BB977F3FB89315F258169E506AB7A5CB359881CF44
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f48733d085af9d38bb1070dcb1bf37a43d9c9f98e7e64b4ca8e35565b360a329
                                                            • Instruction ID: d1c6a7ee15280cd564fdae5450075e68aedb0cff5510eeb06c283ae00083bc3b
                                                            • Opcode Fuzzy Hash: f48733d085af9d38bb1070dcb1bf37a43d9c9f98e7e64b4ca8e35565b360a329
                                                            • Instruction Fuzzy Hash: 8D516E74A04208CFCB44EFAAE495BEDB7F2BB89308F10C05ED416A7251DB796945CF46
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8267b8d9dd82c6350bef1cd8abfe07623917bf692083c92a96041349c078fc50
                                                            • Instruction ID: 66f75588b0397abb0fd8764fc4c4848800953caee622d39121c5836ea771804c
                                                            • Opcode Fuzzy Hash: 8267b8d9dd82c6350bef1cd8abfe07623917bf692083c92a96041349c078fc50
                                                            • Instruction Fuzzy Hash: EE515934A00104CFEB28EB59D889BB977F3FB89315F258169E506AB7A4CB759881CF44
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6768f4164ed00091a0b6f32c0da1a07c261cd593f1f09f73bf876d9cfad3b546
                                                            • Instruction ID: 294b3586b0f0ab926b445f948d037584f6331388f18b34493ebcd949ce89410e
                                                            • Opcode Fuzzy Hash: 6768f4164ed00091a0b6f32c0da1a07c261cd593f1f09f73bf876d9cfad3b546
                                                            • Instruction Fuzzy Hash: 67514E74A00208DFCB44EFAAE455BAEB7F2BB89308F50C05AD416A7251DB79A944CF46

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 330 4e40040-4e4007f 331 4e40086-4e40098 330->331 332 4e40081 330->332 334 4e400bc-4e400c8 331->334 335 4e4009a-4e400b6 call 4e4138b 331->335 332->331 336 4e40842 334->336 337 4e400ce-4e400d3 334->337 335->334 342 4e40847-4e4084b 336->342 338 4e400d5-4e400de 337->338 339 4e40106-4e40126 337->339 338->336 341 4e400e4-4e40101 338->341 339->336 352 4e4012c-4e4026b 339->352 343 4e4097a-4e40980 341->343 344 4e4084d 342->344 345 4e407fe-4e40815 342->345 353 4e40982 343->353 354 4e4098a 343->354 347 4e40854-4e40889 344->347 348 4e408b5-4e408d4 344->348 349 4e4088e-4e408b0 344->349 350 4e408d9-4e408f8 344->350 351 4e408fa-4e40938 344->351 371 4e40820-4e40837 345->371 370 4e4096d-4e40975 347->370 348->370 349->370 350->370 372 4e40967 351->372 373 4e4093a-4e40957 351->373 392 4e40271-4e4027d 352->392 393 4e4044f-4e40480 352->393 353->354 362 4e4098b 354->362 362->362 370->343 371->336 372->370 373->336 378 4e4095d-4e40965 373->378 378->372 378->373 392->336 394 4e40283-4e4029d 392->394 400 4e40482-4e404b4 393->400 401 4e404eb-4e4051c 393->401 402 4e402a5-4e402d2 394->402 412 4e404b6-4e404b9 400->412 413 4e404ce-4e404e9 400->413 416 4e40522-4e405dd 401->416 417 4e4067f-4e406c7 401->417 414 4e402d4-4e402dd 402->414 415 4e402df-4e402eb 402->415 412->413 418 4e404bb-4e404cb 412->418 413->400 413->401 414->415 426 4e402f7-4e40303 415->426 427 4e402ed-4e402f2 415->427 472 4e4061d-4e40620 416->472 473 4e405df-4e4061b 416->473 424 4e40724-4e40768 417->424 425 4e406c9-4e4071e 417->425 418->413 449 4e407d7-4e407f9 424->449 450 4e4076a-4e40776 424->450 425->424 434 4e40305-4e4030a 426->434 435 4e4030f-4e4031b 426->435 429 4e40437-4e40449 427->429 429->392 429->393 434->429 440 4e40327-4e40333 435->440 441 4e4031d-4e40322 435->441 447 4e40335-4e4033a 440->447 448 4e4033f-4e4034b 440->448 441->429 447->429 456 4e40357-4e40363 448->456 457 4e4034d-4e40352 448->457 449->343 458 4e4077e-4e4079a 450->458 463 4e40365-4e4036a 456->463 464 4e4036f-4e4037b 456->464 457->429 458->371 465 4e407a0-4e407a8 458->465 463->429 470 4e40387-4e40393 464->470 471 4e4037d-4e40382 464->471 465->336 468 4e407ae-4e407b5 465->468 468->342 469 4e407bb-4e407d5 468->469 469->449 469->450 480 4e40395-4e4039a 470->480 481 4e4039f-4e403ab 470->481 471->429 474 4e40640-4e40658 472->474 475 4e40622-4e4063e 472->475 479 4e40664-4e40679 473->479 474->479 475->479 479->416 479->417 480->429 486 4e403b7-4e403c3 481->486 487 4e403ad-4e403b2 481->487 490 4e403c5-4e403ca 486->490 491 4e403cc-4e403d8 486->491 487->429 490->429 493 4e403e1-4e403ed 491->493 494 4e403da-4e403df 491->494 496 4e403f6-4e40402 493->496 497 4e403ef-4e403f4 493->497 494->429 499 4e40404-4e40409 496->499 500 4e4040b-4e40417 496->500 497->429 499->429 502 4e40420-4e4042c 500->502 503 4e40419-4e4041e 500->503 505 4e40435 502->505 506 4e4042e-4e40433 502->506 503->429 505->429 506->429
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 2
                                                            • API String ID: 0-450215437
                                                            • Opcode ID: 88cdb8bfe5e05453e3f6a09f11f5820a7621b6c125c99025b8a8d780617bfae8
                                                            • Instruction ID: 924cfca6f35ff166b88a7f7006ebd801c7b4f0b119416c16453aa1746cb8de2f
                                                            • Opcode Fuzzy Hash: 88cdb8bfe5e05453e3f6a09f11f5820a7621b6c125c99025b8a8d780617bfae8
                                                            • Instruction Fuzzy Hash: BB422774A04218CFDB64DF69E894BADB7F2BF88304F5084AAD51AA7355DB30AD81CF41

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1084 25ed6b0-25ed731 VirtualProtect 1087 25ed73a-25ed75f 1084->1087 1088 25ed733-25ed739 1084->1088 1088->1087
                                                            APIs
                                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 025ED724
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3800142239.00000000025E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_25e0000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: 8da336358864d1827b59fb3c7ad0aba170a095218f62eae6ad0793724382131b
                                                            • Instruction ID: 0cb2efb477c74ad154ed5aae92aa288a52415c43f511edc106c6e2c3d21d5eb4
                                                            • Opcode Fuzzy Hash: 8da336358864d1827b59fb3c7ad0aba170a095218f62eae6ad0793724382131b
                                                            • Instruction Fuzzy Hash: 9F1102B1D003088FDB24DFAAC480BAEFBF5BB48220F14842AD419A7200C775A945CBA4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3806613775.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4d00000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 275f5172f6d02001c965760bfde7fb84163273f120fdabe66af619345ee7c3c0
                                                            • Instruction ID: 4daf76442044e251777f765c9c605f6ad3b86b3a481e587276ee32d531c67499
                                                            • Opcode Fuzzy Hash: 275f5172f6d02001c965760bfde7fb84163273f120fdabe66af619345ee7c3c0
                                                            • Instruction Fuzzy Hash: EEA2E130F00325CBEF261A68555433EA5F7BBC9B10B858029E956EB3C4EF75EC818792

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1727 25ed860-25ed8cf CloseHandle 1730 25ed8d8-25ed8fd 1727->1730 1731 25ed8d1-25ed8d7 1727->1731 1731->1730
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3800142239.00000000025E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_25e0000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: 1c1c4beefe009f87122e1e876f0011f8de111388665d4b4990adb37215cb2975
                                                            • Instruction ID: 5a110661e5f2ab33922be377538649d3b99feee760df83ce09df441fd413bd6e
                                                            • Opcode Fuzzy Hash: 1c1c4beefe009f87122e1e876f0011f8de111388665d4b4990adb37215cb2975
                                                            • Instruction Fuzzy Hash: 49113AB1D043488FDB24DFAAC4447DEFBF9EF88324F248419D519A7640CB756945CBA4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1883 518a1e9-518a5e5 1886 518a5f0-518a5f2 1883->1886 1887 518a5eb call 5187ad0 1883->1887 1888 518a6a8-518a6ad 1886->1888 1889 518a5f8-518a603 1886->1889 1887->1886 1890 518a605 1889->1890 1891 518a607-518a60a 1889->1891 1890->1891 1892 518a60c 1891->1892 1893 518a613-518a62f call 5188530 1891->1893 1892->1888 1892->1893 1894 518a673-518a69f 1892->1894 1895 518a6a3 1892->1895 1901 518a634-518a63c call 5189790 1893->1901 1902 518a6a1 1894->1902 1903 518a667-518a66a 1894->1903 1895->1888 1906 518a641-518a652 1901->1906 1902->1903 1903->1894 1905 518a66c 1903->1905 1905->1894 1905->1895 1906->1891 1907 518a654-518a656 1906->1907 1907->1891
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e0b8818ad479a472e136b5edeb4243b5d6eac667a5708c002927a0c54ee2e6ac
                                                            • Instruction ID: 6dbcc8b7753097a333dddf2d6156a02c748de565ace2c2001c1c9c02410b26ca
                                                            • Opcode Fuzzy Hash: e0b8818ad479a472e136b5edeb4243b5d6eac667a5708c002927a0c54ee2e6ac
                                                            • Instruction Fuzzy Hash: 99219A30A00200CFD760FB65E499B7A3BA2FF84320F65846AC002972A9EB349982CF41

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1908 519a0af-519a0b2 1909 519a0b8-519a0ba 1908->1909 1910 519a0b4-519a0b6 1908->1910 1911 519a0bc-519a0be 1909->1911 1912 519a0c0-519a0e3 1909->1912 1910->1909 1911->1912 1913 519a0f2-519a0fb 1912->1913 1914 519a0e5-519a0f0 1912->1914 1914->1913 1915 519a0fe-519a120 1914->1915 2046 519a123 call 519a848 1915->2046 2047 519a123 call 519a83b 1915->2047 1917 519a129-519a132 1918 519a183-519a1aa call 51991c8 1917->1918 1919 519a134-519a145 call 5195c78 1917->1919 1925 519a3af-519a3c1 call 5199c08 1918->1925 1926 519a1b0 1918->1926 1922 519a14a-519a14c 1919->1922 1922->1918 1924 519a14e-519a179 call 5198ca8 1922->1924 1924->1918 1934 519a17b-519a180 1924->1934 1932 519a3e0-519a3e6 1925->1932 1933 519a3c3-519a3db 1925->1933 1931 519a1b9-519a1c1 1926->1931 1935 519a1ca-519a1cd 1931->1935 1936 519a1c3 1931->1936 1937 519a3e8-519a3ef 1932->1937 1938 519a3f5-519a43d 1932->1938 1933->1932 1961 519a3dd 1933->1961 1934->1918 1952 519a350-519a381 1935->1952 1953 519a1d3-519a1d6 1935->1953 1936->1935 1939 519a298-519a2ac 1936->1939 1940 519a238-519a24b 1936->1940 1941 519a1f8-519a233 1936->1941 1942 519a31a-519a32d 1936->1942 1943 519a27f-519a293 1936->1943 1944 519a2b1-519a2c4 1936->1944 1945 519a250-519a263 1936->1945 1946 519a332-519a34e 1936->1946 1947 519a2c9-519a2e5 1936->1947 1948 519a268-519a27a 1936->1948 1949 519a2ea-519a2fc 1936->1949 1950 519a1e1-519a1f3 1936->1950 1951 519a301-519a315 1936->1951 1937->1938 1955 519a3f1-519a3f3 1937->1955 1978 519a445 1938->1978 1939->1925 1940->1925 1941->1925 1942->1925 1943->1925 1944->1925 1945->1925 1946->1925 1947->1925 1948->1925 1949->1925 1950->1925 1951->1925 1952->1925 1956 519a1dc 1953->1956 1957 519a383-519a3ad 1953->1957 1963 519a447-519a449 1955->1963 1956->1925 1957->1925 1961->1932 1976 519a76d-519a776 1963->1976 1977 519a44f-519a458 1963->1977 1979 519a46a-519a4aa call 5199388 1977->1979 1980 519a45a-519a462 1977->1980 1978->1963 1989 519a4ac-519a4bc 1979->1989 1990 519a4be 1979->1990 1980->1979 1989->1990 1991 519a4c0-519a4c2 1989->1991 1990->1991 1993 519a4e1-519a510 1991->1993 1994 519a4c4-519a4df 1991->1994 1999 519a54d-519a555 1993->1999 2003 519a512-519a53e 1993->2003 1994->1999 2001 519a563 1999->2001 2002 519a557-519a561 1999->2002 2004 519a568-519a56a 2001->2004 2002->2004 2003->1999 2013 519a540-519a544 2003->2013 2005 519a57a-519a5ec 2004->2005 2006 519a56c-519a572 2004->2006 2014 519a5ee-519a605 2005->2014 2015 519a610-519a636 2005->2015 2006->2005 2013->1999 2014->2015 2017 519a638-519a645 call 519b9a8 2015->2017 2018 519a64d 2015->2018 2020 519a64b 2017->2020 2019 519a64f-519a66e 2018->2019 2019->1976 2022 519a674-519a686 call 5199c08 2019->2022 2020->2019 2022->1976 2025 519a68c-519a6a4 2022->2025 2027 519a6dd-519a6f5 2025->2027 2028 519a6a6-519a6af 2025->2028 2033 519a725-519a73d 2027->2033 2034 519a6f7-519a700 2027->2034 2029 519a6be-519a6c5 2028->2029 2030 519a6b1-519a6b4 2028->2030 2029->2027 2032 519a6c7-519a6d8 2029->2032 2030->2029 2032->1976 2033->1976 2040 519a73f-519a748 2033->2040 2035 519a70f-519a718 2034->2035 2036 519a702-519a705 2034->2036 2035->2033 2038 519a71a-519a722 2035->2038 2036->2035 2038->2033 2042 519a74a-519a74d 2040->2042 2043 519a757-519a760 2040->2043 2042->2043 2043->1976 2044 519a762-519a76a 2043->2044 2044->1976 2046->1917 2047->1917
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 365bd9e1266d8fe31b73764b039630161220d996052fa5930eeadea0e5eb68c0
                                                            • Instruction ID: 4ffc5930d77c1794639a382ea3449d1956e9e6b52706632f2d95e8d598d21995
                                                            • Opcode Fuzzy Hash: 365bd9e1266d8fe31b73764b039630161220d996052fa5930eeadea0e5eb68c0
                                                            • Instruction Fuzzy Hash: ED22AD35A10204DFDB18DF69D490B6DBBB2FF88300F158469E906AB3A2DB71ED84CB51

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2049 51994e8-519950e 2050 519951f-5199528 2049->2050 2051 5199510-519951d 2049->2051 2051->2050 2052 519952b-5199538 2051->2052 2053 519953a-5199541 2052->2053 2054 5199543 2052->2054 2055 519954a-5199574 2053->2055 2054->2055 2056 519957d-5199590 call 51991c8 2055->2056 2057 5199576 2055->2057 2060 51996d4-51996db 2056->2060 2061 5199596-51995a9 2056->2061 2057->2056 2062 51996e1-51996f6 2060->2062 2063 5199975-519997c 2060->2063 2069 51995ab-51995b2 2061->2069 2070 51995b7-51995d1 2061->2070 2076 51996f8-51996fa 2062->2076 2077 5199716-519971c 2062->2077 2064 51999eb-51999f2 2063->2064 2065 519997e-5199987 2063->2065 2071 51999f8-5199a01 2064->2071 2072 5199a8e-5199a95 2064->2072 2065->2064 2068 5199989-519999c 2065->2068 2068->2064 2089 519999e-51999e3 call 5196c80 2068->2089 2078 51996cd 2069->2078 2093 51995d8-51995e5 2070->2093 2094 51995d3-51995d6 2070->2094 2071->2072 2073 5199a07-5199a1a 2071->2073 2074 5199ab1-5199ab7 2072->2074 2075 5199a97-5199aa8 2072->2075 2096 5199a2d-5199a31 2073->2096 2097 5199a1c-5199a2b 2073->2097 2081 5199ac9-5199ad2 2074->2081 2082 5199ab9-5199abf 2074->2082 2075->2074 2098 5199aaa 2075->2098 2076->2077 2079 51996fc-5199713 2076->2079 2083 5199722-5199724 2077->2083 2084 51997e4-51997e8 2077->2084 2078->2060 2079->2077 2090 5199ac1-5199ac7 2082->2090 2091 5199ad5-5199b31 2082->2091 2083->2084 2092 519972a-51997ab call 5196c80 * 4 2083->2092 2084->2063 2086 51997ee-51997f0 2084->2086 2086->2063 2095 51997f6-51997ff 2086->2095 2089->2064 2132 51999e5-51999e8 2089->2132 2090->2081 2090->2091 2157 5199b39-5199b4a 2091->2157 2161 51997ad-51997bf call 5196c80 2092->2161 2162 51997c2-51997e1 call 5196c80 2092->2162 2100 51995e7-51995fb 2093->2100 2094->2100 2101 5199952-5199958 2095->2101 2102 5199a51-5199a53 2096->2102 2103 5199a33-5199a35 2096->2103 2097->2096 2098->2074 2100->2078 2127 5199601-5199655 2100->2127 2112 519996b 2101->2112 2113 519995a-5199969 2101->2113 2102->2072 2111 5199a55-5199a5b 2102->2111 2103->2102 2110 5199a37-5199a4e 2103->2110 2110->2102 2111->2072 2116 5199a5d-5199a8b 2111->2116 2114 519996d-519996f 2112->2114 2113->2114 2114->2063 2119 5199804-5199812 call 5198450 2114->2119 2116->2072 2136 519982a-5199844 2119->2136 2137 5199814-519981a 2119->2137 2167 5199663-5199667 2127->2167 2168 5199657-5199659 2127->2168 2132->2064 2136->2101 2146 519984a-519984e 2136->2146 2140 519981c 2137->2140 2141 519981e-5199820 2137->2141 2140->2136 2141->2136 2150 519986f 2146->2150 2151 5199850-5199859 2146->2151 2152 5199872-519988c 2150->2152 2154 519985b-519985e 2151->2154 2155 5199860-5199863 2151->2155 2152->2101 2175 5199892-5199913 call 5196c80 * 4 2152->2175 2159 519986d 2154->2159 2155->2159 2171 5199b58 2157->2171 2172 5199b4c-5199b56 2157->2172 2159->2152 2161->2162 2162->2084 2167->2078 2174 5199669-5199681 2167->2174 2168->2167 2176 5199b5d-5199b5f 2171->2176 2172->2176 2174->2078 2182 5199683-519968f 2174->2182 2202 519992a-5199950 call 5196c80 2175->2202 2203 5199915-5199927 call 5196c80 2175->2203 2177 5199b61-5199b64 2176->2177 2178 5199b66-5199b6b 2176->2178 2179 5199b71-5199b9e 2177->2179 2178->2179 2184 519969e-51996a4 2182->2184 2185 5199691-5199694 2182->2185 2187 51996ac-51996b5 2184->2187 2188 51996a6-51996a9 2184->2188 2185->2184 2191 51996c4-51996ca 2187->2191 2192 51996b7-51996ba 2187->2192 2188->2187 2191->2078 2192->2191 2202->2063 2202->2101 2203->2202
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d2a64eba83c838896ff5ba8e5fbbce998bbafdaa8bd38b2a4f7e0d792675d4a6
                                                            • Instruction ID: 14ffb1951bb229512fa4af0ffca7536283498f1ecf22ea11b7e3b4ae22b564ca
                                                            • Opcode Fuzzy Hash: d2a64eba83c838896ff5ba8e5fbbce998bbafdaa8bd38b2a4f7e0d792675d4a6
                                                            • Instruction Fuzzy Hash: 63224A30A04219DFDF19DFA5C854AAEBBB2FF48710F148519E812AB395DB38AD41CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2208 519db80-519dba8 2210 519dbaa-519dbf1 2208->2210 2211 519dbf6-519dc04 2208->2211 2259 519e04d-519e054 2210->2259 2212 519dc13 2211->2212 2213 519dc06-519dc11 call 519ab08 2211->2213 2216 519dc15-519dc1c 2212->2216 2213->2216 2218 519dc22-519dc26 2216->2218 2219 519dd05-519dd09 2216->2219 2223 519dc2c-519dc30 2218->2223 2224 519e055-519e07d 2218->2224 2220 519dd0b-519dd1a call 5198ca8 2219->2220 2221 519dd5f-519dd69 2219->2221 2238 519dd1e-519dd23 2220->2238 2225 519dd6b-519dd7a call 51984b8 2221->2225 2226 519dda2-519ddc8 2221->2226 2228 519dc42-519dca0 call 519a848 call 519b2b0 2223->2228 2229 519dc32-519dc3c 2223->2229 2230 519e084-519e0ae 2224->2230 2241 519dd80-519dd9d 2225->2241 2242 519e0b6-519e0cc 2225->2242 2256 519ddca-519ddd3 2226->2256 2257 519ddd5 2226->2257 2270 519e113-519e122 2228->2270 2271 519dca6-519dd00 2228->2271 2229->2228 2229->2230 2230->2242 2243 519dd1c 2238->2243 2244 519dd25-519dd5a call 519da50 2238->2244 2241->2259 2268 519e0d4-519e10c 2242->2268 2243->2238 2244->2259 2258 519ddd7-519ddff 2256->2258 2257->2258 2274 519ded0-519ded4 2258->2274 2275 519de05-519de1e 2258->2275 2268->2270 2280 519e128-519e12a 2270->2280 2281 519e124-519e126 2270->2281 2271->2259 2278 519df4e-519df58 2274->2278 2279 519ded6-519deef 2274->2279 2275->2274 2304 519de24-519de33 call 5198450 2275->2304 2283 519df5a-519df64 2278->2283 2284 519dfb5-519dfbe 2278->2284 2279->2278 2309 519def1-519df00 call 5198450 2279->2309 2287 519e12c-519e12d 2280->2287 2288 519e130-519e13d 2280->2288 2281->2280 2302 519df6a-519df7c 2283->2302 2303 519df66-519df68 2283->2303 2292 519dfc0-519dfee call 519a040 call 519a060 2284->2292 2293 519dff6-519e045 call 519e3c0 2284->2293 2287->2288 2289 519e13f-519e145 2288->2289 2290 519e147-519e14d 2288->2290 2289->2290 2294 519e14e-519e18b 2289->2294 2292->2293 2315 519e04b 2293->2315 2310 519df7e-519df80 2302->2310 2303->2310 2325 519de4b-519de60 2304->2325 2326 519de35-519de3b 2304->2326 2332 519df18-519df23 2309->2332 2333 519df02-519df08 2309->2333 2313 519dfae-519dfb3 2310->2313 2314 519df82-519df86 2310->2314 2313->2283 2313->2284 2321 519df88-519dfa1 2314->2321 2322 519dfa4-519dfa9 call 5197250 2314->2322 2315->2259 2321->2322 2322->2313 2329 519de62-519de8e call 5199190 2325->2329 2330 519de94-519de9d 2325->2330 2334 519de3d 2326->2334 2335 519de3f-519de41 2326->2335 2329->2268 2329->2330 2330->2270 2340 519dea3-519deca 2330->2340 2332->2270 2336 519df29-519df4c 2332->2336 2341 519df0a 2333->2341 2342 519df0c-519df0e 2333->2342 2334->2325 2335->2325 2336->2278 2336->2309 2340->2274 2340->2304 2341->2332 2342->2332
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c1adc3f2ed220ca777bd178d37cb03e508c5fa9956e810d11bfe12ddc6a97967
                                                            • Instruction ID: d4cd1a102e86fd698200b40c71fdb9c01326e8ca33f160492d4562d909ac1318
                                                            • Opcode Fuzzy Hash: c1adc3f2ed220ca777bd178d37cb03e508c5fa9956e810d11bfe12ddc6a97967
                                                            • Instruction Fuzzy Hash: 66124A71A00204DFDB29DFA5D485A6EB7F2FF88300B14852DE446AB391DB75AC46CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2454 5180cd0-5180d73 2461 5180d79-5180d8f 2454->2461 2462 5180e56-5180edc 2454->2462 2465 5180d91-5180d9b 2461->2465 2466 5180dd5-5180e0e call 5180920 2461->2466 2481 518111d-518112c 2462->2481 2465->2462 2468 5180da1-5180db4 2465->2468 2478 5180e3b-5180e51 2466->2478 2479 5180e10-5180e23 2466->2479 2468->2462 2472 5180dba-5180dd0 2468->2472 2472->2462 2478->2462 2479->2478 2486 5180e25-5180e33 2479->2486 2482 518112e-5181143 2481->2482 2483 5181145 2481->2483 2485 5181147-5181149 2482->2485 2483->2485 2487 518114f-5181174 2485->2487 2488 5180ee1-5180ef4 2485->2488 2486->2478 2497 51811b8-51811e4 2487->2497 2498 5181176-51811b6 2487->2498 2491 5180f0c-5180f31 2488->2491 2492 5180ef6-5180efc 2488->2492 2499 5180ff0-5181031 2491->2499 2500 5180f37-5180fe5 call 51813af 2491->2500 2493 5180efe 2492->2493 2494 5180f00-5180f02 2492->2494 2493->2491 2494->2491 2513 51811eb-5181282 2497->2513 2498->2513 2517 5181069-5181095 2499->2517 2518 5181033-5181049 2499->2518 2538 5180feb 2500->2538 2548 51812af-51812b3 2513->2548 2549 5181284-5181297 2513->2549 2532 5181102-5181118 2517->2532 2533 5181097-51810a0 2517->2533 2526 518104f-5181067 2518->2526 2527 5181304 2518->2527 2526->2517 2526->2518 2531 5181309-5181310 2527->2531 2534 518131e 2531->2534 2535 5181312 2531->2535 2532->2481 2533->2527 2537 51810a6-5181100 2533->2537 2539 518131f 2534->2539 2535->2534 2537->2532 2537->2533 2538->2532 2539->2539 2550 51812ef-5181302 2548->2550 2551 51812b5-51812c8 2548->2551 2549->2548 2553 5181299-51812a7 2549->2553 2550->2531 2551->2550 2555 51812ca-51812e7 2551->2555 2553->2548 2555->2550
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cd43bd3902d1d5eb4524221284d48012b3933ff65cb2d4a202a6a213e276245a
                                                            • Instruction ID: 5f9ce775e6886435c027c169b4d77eead31ce0b57bb9122f3ad0d7f07ebd667a
                                                            • Opcode Fuzzy Hash: cd43bd3902d1d5eb4524221284d48012b3933ff65cb2d4a202a6a213e276245a
                                                            • Instruction Fuzzy Hash: C512E935B002199FDB15EF64C898BADB7B2BF89300F5185A8D44AAB355DF70AD86CF40

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2559 4d022d0-4d022dc 2560 4d022f4-4d022f8 2559->2560 2561 4d022de-4d022e4 2559->2561 2564 4d02830-4d02834 2560->2564 2565 4d022fe-4d0230e 2560->2565 2562 4d022e6 2561->2562 2563 4d022e8-4d022f2 2561->2563 2562->2560 2563->2560 2568 4d02310-4d0232d 2565->2568 2569 4d02332-4d02342 2565->2569 2568->2564 2572 4d02344-4d02360 2569->2572 2573 4d02365-4d02375 2569->2573 2572->2564 2577 4d02377-4d02394 2573->2577 2578 4d02399-4d023a9 2573->2578 2577->2564 2582 4d023ab-4d023c8 2578->2582 2583 4d023cd-4d023dd 2578->2583 2582->2564 2587 4d02401-4d02411 2583->2587 2588 4d023df-4d023fc 2583->2588 2592 4d02413-4d02430 2587->2592 2593 4d02435-4d02445 2587->2593 2588->2564 2592->2564 2597 4d02447-4d0245e call 5188e8f 2593->2597 2598 4d02469-4d02479 2593->2598 2604 4d02464 2597->2604 2602 4d0247b-4d02498 2598->2602 2603 4d0249d-4d024ad 2598->2603 2602->2564 2607 4d024d1-4d024e1 2603->2607 2608 4d024af-4d024cc 2603->2608 2604->2564 2612 4d024e3-4d02500 2607->2612 2613 4d02505-4d02515 2607->2613 2608->2564 2612->2564 2617 4d02517-4d02534 2613->2617 2618 4d02539-4d02549 2613->2618 2617->2564 2622 4d0254b-4d02568 2618->2622 2623 4d0256d-4d0257d 2618->2623 2622->2564 2627 4d025a1-4d025b1 2623->2627 2628 4d0257f-4d0259c 2623->2628 2632 4d025b3-4d025d0 2627->2632 2633 4d025d5-4d025e5 2627->2633 2628->2564 2632->2564 2637 4d025e7-4d02604 2633->2637 2638 4d02609-4d02619 2633->2638 2637->2564 2642 4d0261b-4d02638 2638->2642 2643 4d0263d-4d0264d 2638->2643 2642->2564 2647 4d02671-4d02681 2643->2647 2648 4d0264f-4d0266c 2643->2648 2652 4d02683-4d026a0 2647->2652 2653 4d026a5-4d026b5 2647->2653 2648->2564 2652->2564 2657 4d026b7-4d026d4 2653->2657 2658 4d026d9-4d026e9 2653->2658 2657->2564 2662 4d026eb-4d02708 2658->2662 2663 4d0270d-4d0271d 2658->2663 2662->2564 2667 4d02741-4d02751 2663->2667 2668 4d0271f-4d0273c 2663->2668 2672 4d02753-4d02770 2667->2672 2673 4d02775-4d02785 2667->2673 2668->2564 2672->2564 2677 4d02787-4d027a4 2673->2677 2678 4d027a9-4d027b9 2673->2678 2677->2564 2682 4d027da-4d027ea 2678->2682 2683 4d027bb-4d027d8 2678->2683 2687 4d0280b-4d02811 2682->2687 2688 4d027ec-4d02809 2682->2688 2683->2564 2687->2564 2689 4d02813-4d02828 2687->2689 2688->2564 2689->2564
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3806613775.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4d00000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d674f3989513c98f633802f1eca08b12f0ea04acf8b6aaf5ab4ebc727d78b443
                                                            • Instruction ID: 979e29ee5b41b1caf48f9ea1c628b4e635946d907e7a9f13758f806d0fb899a9
                                                            • Opcode Fuzzy Hash: d674f3989513c98f633802f1eca08b12f0ea04acf8b6aaf5ab4ebc727d78b443
                                                            • Instruction Fuzzy Hash: B0D14C307103018BE7185AA994EC72BE6BBABD5704B90847DAA02DB3D4DFF4DD4587A2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3438bbf6df7947610beaf1acc90e8b7bbd7b25437abc51fa2bfa763dde4cea50
                                                            • Instruction ID: e63ffae7d5d0ddba3ed752b6b3e7163bebeeb90050976f0e5b62aa786f976889
                                                            • Opcode Fuzzy Hash: 3438bbf6df7947610beaf1acc90e8b7bbd7b25437abc51fa2bfa763dde4cea50
                                                            • Instruction Fuzzy Hash: 1BF1C934B10218DFDB09DFA4D599AADB7B2FF89304F158558E406AB3A5DB71EC42CB80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7ad7bea61b5564a05a1565b911012bc4eb0fb9763657a680fa5595e2025c79c8
                                                            • Instruction ID: 3e01cc56eb61f867dc6103fad77bf54ef95e83fdea09addcaa730d32799c8249
                                                            • Opcode Fuzzy Hash: 7ad7bea61b5564a05a1565b911012bc4eb0fb9763657a680fa5595e2025c79c8
                                                            • Instruction Fuzzy Hash: 63E14035B00209DFCB15EFA4D494AADBBB2FF89310F508559E406AB365DB30AD46CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cfdae562e3c48238f5e0f7bceb5dc14d222190b822b27572da391bc54959b64d
                                                            • Instruction ID: ed1d6ae377598071720946ff011311c6e411cd9cfa39e848dc637f5cf2e175d8
                                                            • Opcode Fuzzy Hash: cfdae562e3c48238f5e0f7bceb5dc14d222190b822b27572da391bc54959b64d
                                                            • Instruction Fuzzy Hash: 8AD1C0747006159FDF18DF28C484BAEB7A6FF88314F158668E8059B3A1DB34ED46CB91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 28fa0cea10564df64da559e1ff1412eb4c1ea6b58d2cb123c2542d778c1e6a63
                                                            • Instruction ID: a5683fe8658c9bb601fb8ba08022b96a4f7e742b34c777ef1a30420189acaa52
                                                            • Opcode Fuzzy Hash: 28fa0cea10564df64da559e1ff1412eb4c1ea6b58d2cb123c2542d778c1e6a63
                                                            • Instruction Fuzzy Hash: FB913872B043005FDB25AB34985073E77A3EFC6220B54856AD446DB392EF34DD078BA6
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c79634dcd4f7410a52c95af59ac88f9e606a11ba22a3544d2424f634ac2561a3
                                                            • Instruction ID: 55b86aabbb7402c81a9df48941069364e58ab7d8d28eff209bb40410005c1ccc
                                                            • Opcode Fuzzy Hash: c79634dcd4f7410a52c95af59ac88f9e606a11ba22a3544d2424f634ac2561a3
                                                            • Instruction Fuzzy Hash: 00C1FA75B00218DFCB09EFA4C994AADB7B2FF89700F504569E506AB3A5DB71AC42CF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a6a02d882ff5b7b707125e2f0d5af8dab0424bbfdf0649c470e8d5505e67b985
                                                            • Instruction ID: ebfd385df484fa1a26f18fa8d915c1b2b83f9efee5a9ff92e3dc278acffb2606
                                                            • Opcode Fuzzy Hash: a6a02d882ff5b7b707125e2f0d5af8dab0424bbfdf0649c470e8d5505e67b985
                                                            • Instruction Fuzzy Hash: C6C1B475B00218DFDB08EFA4D994AADB7B2FF89700F104569E506AB3A5DB71AC42CF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fcafe305fd0a2389826c7437773c903f2f076cb9519a425843a8dcf861a1af6b
                                                            • Instruction ID: 0197b9aa733c4a379ecf1e7512b730bdd7d2e0e7f659a1aad1d1bf7d1803cd2b
                                                            • Opcode Fuzzy Hash: fcafe305fd0a2389826c7437773c903f2f076cb9519a425843a8dcf861a1af6b
                                                            • Instruction Fuzzy Hash: BAB18C34A012049FC714EF69D494A6ABBF2BFC9310F25C5A9E406AB3A1DB71EC45CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 457a09601dba59e5353b97d51f2e1d598d327e68af0b54f60beb1364cf7d1116
                                                            • Instruction ID: 36667153dd5914976bf2715ca289cfb26513a8727c76af860c36e4533e5e286a
                                                            • Opcode Fuzzy Hash: 457a09601dba59e5353b97d51f2e1d598d327e68af0b54f60beb1364cf7d1116
                                                            • Instruction Fuzzy Hash: F5A16D35B006149FCB09EF68C494AAE77B3BF8D700F108A58E5169B3A5DF70AD42CB91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5e74fa5d7fd37d374f0e03ab1107e449950b64cef5920f5c28ce87c667e395c6
                                                            • Instruction ID: c6c80d7d48f25b53b13b0216dcb4ffd40555387dccba5d55b41f32264a475495
                                                            • Opcode Fuzzy Hash: 5e74fa5d7fd37d374f0e03ab1107e449950b64cef5920f5c28ce87c667e395c6
                                                            • Instruction Fuzzy Hash: 23A17A35B012049FDB1ACFA5D498AADBBB2FF88211F158469E912EB391CB35DD41CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fcb1e83c11e35f22030c4c0dddb173291e34bf4c91ceea6e81aaacabf18c15c1
                                                            • Instruction ID: b5ab1fa6618fc68419840f1b7553789320f50b9f8fcd8af9e2e9f2e2825d860b
                                                            • Opcode Fuzzy Hash: fcb1e83c11e35f22030c4c0dddb173291e34bf4c91ceea6e81aaacabf18c15c1
                                                            • Instruction Fuzzy Hash: BD91F274B006148FDB18DF29C494AAA7BE6FF89711F1180A9E502DB3B1DB70ED45CB91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ae568210ca2d02db07170c88360b216953e3a870892e0fa682236cf7b451707
                                                            • Instruction ID: 1a428ffefd3b3ca31e2b7d469373a772b7789abc12acbc6fdff40756c60ec6d3
                                                            • Opcode Fuzzy Hash: 3ae568210ca2d02db07170c88360b216953e3a870892e0fa682236cf7b451707
                                                            • Instruction Fuzzy Hash: DFB1DC34A10218DFCB09EFA4D899E9DBBB2FF89300F558155E506AB365DB70EC46CB80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3810413248.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5390000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ac31916669c3b9d12fa3f2b85eee67edccba46cdc1bc4c56aab8ed167adfde74
                                                            • Instruction ID: 00b16760f22cc3f75095c13fe93c17829ad8d6212b934667ccc56e24b16bb7f6
                                                            • Opcode Fuzzy Hash: ac31916669c3b9d12fa3f2b85eee67edccba46cdc1bc4c56aab8ed167adfde74
                                                            • Instruction Fuzzy Hash: CF81F8B5B046158FDB0AEF38C45496E7BB6FFC5200B1081AAD106DB3A1DB74DD06CB92
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c16e2132fa0d341a0b09fca740cb67293e7a5ffc987e130d981fa6c49e793684
                                                            • Instruction ID: 467af30e9c46ac5f46135009e5c49e02adeb875aa7a8f6011a31f90329c1446a
                                                            • Opcode Fuzzy Hash: c16e2132fa0d341a0b09fca740cb67293e7a5ffc987e130d981fa6c49e793684
                                                            • Instruction Fuzzy Hash: 6A9106353012049FDB14EF28D894E6A77A2EF89715F2485A9EA168F3B5CB71EC41CB90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a64db7efe84d738dac7d940d813f83ae2dd12d4ca3685cfb75561a804dbc886f
                                                            • Instruction ID: 912b08716acf3df3764310593344717bff32d05c291359bcfc7464d2ef539fab
                                                            • Opcode Fuzzy Hash: a64db7efe84d738dac7d940d813f83ae2dd12d4ca3685cfb75561a804dbc886f
                                                            • Instruction Fuzzy Hash: 6BA10E35B002159FDB24EF64C894BA9B7B2BF88300F5185A8E54AAB3A5DF70DD85CF40
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 16e63ba9d50f4901f6288e84ca231988777845377a0434f53147187d53d9cace
                                                            • Instruction ID: 9e1afcdf04bc848d9c6275958b5fadee9ed106a7468dd7a7e6a21e2321d2d74e
                                                            • Opcode Fuzzy Hash: 16e63ba9d50f4901f6288e84ca231988777845377a0434f53147187d53d9cace
                                                            • Instruction Fuzzy Hash: C3814A35B50614DFDB19EF68D498AADB7B6BF88710F148169E506DB3A1CB30EC42CB90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b165325c0038b9d74cf4126d3a61c865ea3f17c62d23a2f80eb52892b471ce00
                                                            • Instruction ID: 0ad6d287672858533de06f1d4c983ab6799011799a7efe4e9e1110914ba3e5ff
                                                            • Opcode Fuzzy Hash: b165325c0038b9d74cf4126d3a61c865ea3f17c62d23a2f80eb52892b471ce00
                                                            • Instruction Fuzzy Hash: 48811A75A04618DFCB28DF68D484E9DB7F5FF88310B158569E816AB360DB70ED81CB90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 32069c0e525d00f85ef30d8f4c7620aabffdbe9f8bb18d8e45f7ffdc6e9fbad4
                                                            • Instruction ID: 6add1073366563f7edc43cd72430ff9d65da5b2cde892fa7b4d0018f096e14d7
                                                            • Opcode Fuzzy Hash: 32069c0e525d00f85ef30d8f4c7620aabffdbe9f8bb18d8e45f7ffdc6e9fbad4
                                                            • Instruction Fuzzy Hash: 9C814F34B00609DFCB29EF68C498AADB7B6BF89704F144969D412973A1CB759D46CF80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f4e45db339e07141facdd2914c63c2ed684f7f7bf0ed7d540c9d676274220822
                                                            • Instruction ID: d82db4135484d6674f58f7387e149f0adf52521797763d6ee4581221ea1e81d8
                                                            • Opcode Fuzzy Hash: f4e45db339e07141facdd2914c63c2ed684f7f7bf0ed7d540c9d676274220822
                                                            • Instruction Fuzzy Hash: 2F618C317002049FDB29AF34D454A6EB7A7FF86350B54886DE9069B3A1DF35EC02CB96
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: faab19f2bd41bd49681461ba9efc07f8ce3c97395e41f8163505c9aa4f37119e
                                                            • Instruction ID: 4af58ca6d3ebd66d38b9352dc065fa2f52fff898cf52c5006793893f2479b3e2
                                                            • Opcode Fuzzy Hash: faab19f2bd41bd49681461ba9efc07f8ce3c97395e41f8163505c9aa4f37119e
                                                            • Instruction Fuzzy Hash: 547182347006459FCB19EF78C458A6DBBB2BF89700F1849A9E4129B3A1DB74ED46CF90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c3db89f7f82578545ff7d0eca4a7e51ac0111b58082aa460a4843ae6d3533fb5
                                                            • Instruction ID: 9a9dd89ba816af19eeb48fad8bbcefb4b366e9302c59c10f10472d735333377e
                                                            • Opcode Fuzzy Hash: c3db89f7f82578545ff7d0eca4a7e51ac0111b58082aa460a4843ae6d3533fb5
                                                            • Instruction Fuzzy Hash: CA611975B50614DFCB19EF68D498AADB7B6BF88710F148169E5069B361CB30EC42CF90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9c33f03b6a2d8eb230a088ef1b537e29ed7b09b902fe7d825729aa5254b54ae2
                                                            • Instruction ID: eaf69ba43f652d13ab350d05f7d8049e92b39632f1adc0ba50aa4d4221efc8a3
                                                            • Opcode Fuzzy Hash: 9c33f03b6a2d8eb230a088ef1b537e29ed7b09b902fe7d825729aa5254b54ae2
                                                            • Instruction Fuzzy Hash: C6617B30A01604CBDB38EB59E044BBEB2A3FB81705F79C969D4015B6C9DB369D49CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5e5bf27738eb03c6a134986ab734d5131653c75fc0462a83a76925d25cdf9701
                                                            • Instruction ID: 0a636befb3ec33b0ba252e6b99f9d2830ae640c9d6e55fc55998941983a74ce8
                                                            • Opcode Fuzzy Hash: 5e5bf27738eb03c6a134986ab734d5131653c75fc0462a83a76925d25cdf9701
                                                            • Instruction Fuzzy Hash: F1616778A016049FC714EF69E484A59BBF2BF88314F56C5A9E416AB3A5DB30FC41CF90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9053daa7a53b132e546e2f4c5b1709d17c90e8e6ab2085ad02b251362eaf58d9
                                                            • Instruction ID: 778c96a0ee4e5d531f32de00ce98f0e00d3906c94f49adaf1678a8db7ec78b22
                                                            • Opcode Fuzzy Hash: 9053daa7a53b132e546e2f4c5b1709d17c90e8e6ab2085ad02b251362eaf58d9
                                                            • Instruction Fuzzy Hash: BE51BF30B00100CFEB04DF6DF449BAA73E2BBC9304F25A5AAD0069BB95DB74AC81CB45
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 24c9f74d0264ebf5c773767be91302afda81a95733698a33d8d44fd99a687cab
                                                            • Instruction ID: af5ebe015239ff39aefaa4c593d822c2586f1c7bad67666a02c612a892ebd750
                                                            • Opcode Fuzzy Hash: 24c9f74d0264ebf5c773767be91302afda81a95733698a33d8d44fd99a687cab
                                                            • Instruction Fuzzy Hash: 07517C357002108FDB15DF69D890AAEBBE2FFC9310B5581AAE506DB361CB31ED01CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8f6da0d3240dec88bb8fce8f023fddc4ea838cb8fc200236140672e868628657
                                                            • Instruction ID: 477aa500c417934d08b8cf707b6c63ffc94c249df089e56b9c9dba23a5eb561e
                                                            • Opcode Fuzzy Hash: 8f6da0d3240dec88bb8fce8f023fddc4ea838cb8fc200236140672e868628657
                                                            • Instruction Fuzzy Hash: 0B515F76600104AFDB499FA8D804E697BB3FF8D3147198098E2099B372DB36DC22EF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b99e4991b0916e5c1d69ff65b676219c6ef08a939c258b3857c91f4137911de3
                                                            • Instruction ID: 4f2b2f6d3dbca2c55e2ec918a2198da131054c65943fc848397cc793337a40a8
                                                            • Opcode Fuzzy Hash: b99e4991b0916e5c1d69ff65b676219c6ef08a939c258b3857c91f4137911de3
                                                            • Instruction Fuzzy Hash: 6351D471A003048FDB09DB79C4507AEB7A7BFC9200F54886DD44AE7391EF74AD468BA2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 33931c56d73f63b6e2eb909b315705dc0300d1aa4a9fb7245560c67318710e70
                                                            • Instruction ID: 27e3b3e05a16ab0c8b0b3262011a55917c2638e044b79148e35c73fd01552f92
                                                            • Opcode Fuzzy Hash: 33931c56d73f63b6e2eb909b315705dc0300d1aa4a9fb7245560c67318710e70
                                                            • Instruction Fuzzy Hash: 51517F34704201CFEB14AB65E855FAA33A3EBC4704F15D16AD4028BB99DF38ED52CB89
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0a6c0d2540e92e8d7dc0726a9363361def71619720b28d480ebeb44b6aa18160
                                                            • Instruction ID: f5d55661eb855f8e00c497d3da8123bf4e675e66c4bda6e0ad5afd755e4684e4
                                                            • Opcode Fuzzy Hash: 0a6c0d2540e92e8d7dc0726a9363361def71619720b28d480ebeb44b6aa18160
                                                            • Instruction Fuzzy Hash: 7A515C31A01604CBDB38EB59E044BBEB2A3FB85701F79C969D4055B288DB369D49CFE1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 686cd99bea58bb8084e585bceee05ead5d80142f2731f5ced0d26c38d4cb35e9
                                                            • Instruction ID: 9993f05541f407c6f77a07be947d3b27c8ce974ff826187868047c26b626b0a5
                                                            • Opcode Fuzzy Hash: 686cd99bea58bb8084e585bceee05ead5d80142f2731f5ced0d26c38d4cb35e9
                                                            • Instruction Fuzzy Hash: 54513C34B10609DFDB059F64E499AAEBBB6FF88705F008119F5029B3A4DF349D46CB81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 201377947ef367a0e4a0cab5c1bf5e9b670b7763ca2d39f56cad7f68f16b4cb0
                                                            • Instruction ID: 5a1ef329a7c833a92180db7b5bb3643d4126998cbf254223bb094aa2bc103117
                                                            • Opcode Fuzzy Hash: 201377947ef367a0e4a0cab5c1bf5e9b670b7763ca2d39f56cad7f68f16b4cb0
                                                            • Instruction Fuzzy Hash: 2841DF35A04246CFDB06DF68C484A6ABBB7FF89310B5681AAE515AB352D730EC51CB90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bd4121e4b583eff3146cd366a4f300c9988fa7f0d8dcbb8bbed83ca877ccb3aa
                                                            • Instruction ID: 65e7b739b119f1cb2466f2fe3940823567fc73ef6fd2cb7633eb9a45e22b2d0c
                                                            • Opcode Fuzzy Hash: bd4121e4b583eff3146cd366a4f300c9988fa7f0d8dcbb8bbed83ca877ccb3aa
                                                            • Instruction Fuzzy Hash: 6C516C35A10104CFD728EB69D489BB97BE3FF89314F25806AE00697B95CB78AC81CF41
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e991b2b9e5d6bddd4bc45a31934fc6ec467a0ef107e7d3bc3195d60ce7bd663e
                                                            • Instruction ID: 57922900e5379f14ca16af38f5d7e3f77e6242679f4f08e3614bbe776aea842d
                                                            • Opcode Fuzzy Hash: e991b2b9e5d6bddd4bc45a31934fc6ec467a0ef107e7d3bc3195d60ce7bd663e
                                                            • Instruction Fuzzy Hash: E0515E347042008BEB14AB65E855FAA33E3E7C8705F15D169D5028BB9DDF38ED52CB8A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: db03ab011bea870ccfd2de40def4a42e87f361cfcd9f5df5420f2633c85f953a
                                                            • Instruction ID: cdb09bdd9e2486b9256a44bd936cdb1e7e693c16ead637e3207bed091ec67a47
                                                            • Opcode Fuzzy Hash: db03ab011bea870ccfd2de40def4a42e87f361cfcd9f5df5420f2633c85f953a
                                                            • Instruction Fuzzy Hash: F7514A30A10104CFD728EB69D489BB97BE3FF89314F65806AE00697B95CB78AC85CF55
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 45a6abb2c69cf0c66e39f946ab228b8eba35ed0eb192fe9a4a543c10b6306d38
                                                            • Instruction ID: a61ff568f0e10e12860fb36a608719d1f1afb4b0a8b65e210ad3aea3233e59f4
                                                            • Opcode Fuzzy Hash: 45a6abb2c69cf0c66e39f946ab228b8eba35ed0eb192fe9a4a543c10b6306d38
                                                            • Instruction Fuzzy Hash: 6E514930A01604CFDB38EA59E044BBEB2A3FB80705F79C969D4055B289DB369D49CFE1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 64f8028389c474579d5a43a82b2c277cf93514d3ec728e274ecedbd6743f64c2
                                                            • Instruction ID: 081161e377bcff3293deb46dd137c34cf2f4430e309f74fcf757d737f36b98f2
                                                            • Opcode Fuzzy Hash: 64f8028389c474579d5a43a82b2c277cf93514d3ec728e274ecedbd6743f64c2
                                                            • Instruction Fuzzy Hash: 84418D30B102189FCB19BB64C498A6EB7BBAFC8700F104429E406AB3A5DF749C468B91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9908d65ea25eb55e04069717f6924d671ff57a95dd4224fd69b9460890eaeac8
                                                            • Instruction ID: 49730fc3627740d5fe0ca8dd0b59ed70dbe70aa459245d0e1efee5c035cd1aa3
                                                            • Opcode Fuzzy Hash: 9908d65ea25eb55e04069717f6924d671ff57a95dd4224fd69b9460890eaeac8
                                                            • Instruction Fuzzy Hash: BE514930A01604CBDB38EB59E040BBEB2A3FB84705F79C969D4055B685DB369D49CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf5f97aeabce81799abfb3100f565cfdf4393e9eb78181505681c4cb197079e9
                                                            • Instruction ID: f36835dba5503c02da15321a40fb8a87cefb0a7d1baf558f4fa7a3222195e28d
                                                            • Opcode Fuzzy Hash: bf5f97aeabce81799abfb3100f565cfdf4393e9eb78181505681c4cb197079e9
                                                            • Instruction Fuzzy Hash: 6A513930A01604CBDB38EA59E044BBEB2A3FB80705F79C969D4055B689DB369D49CFE1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60c2215e2169bb4e858e82cc7173a2c283708905e5c8f42301beb216ec3358ec
                                                            • Instruction ID: b2253893019e000b57055b52d31d6419b98dfc3133b08eda717722825fa1a30b
                                                            • Opcode Fuzzy Hash: 60c2215e2169bb4e858e82cc7173a2c283708905e5c8f42301beb216ec3358ec
                                                            • Instruction Fuzzy Hash: 36515C31A01604CBDB38EB59E040BBEB2A3FB80701F79C969D4055B689DB369D49CFE1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60bbfb820580a41b5d3d9e56e9c1c98a7799345bf9385db143ee7d526562b5f0
                                                            • Instruction ID: 30369d9a0394bc1885ebf5fb28bedefbf0ba33d8afe20e3333a4bb788d690700
                                                            • Opcode Fuzzy Hash: 60bbfb820580a41b5d3d9e56e9c1c98a7799345bf9385db143ee7d526562b5f0
                                                            • Instruction Fuzzy Hash: CB514A31A01604CBDB38EB59E040BBEB2A3FB80701F79C969D4055B689DB369D49CFE1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9eba07d28cd2d16714c6b1ef134324830639e37fadde518af10b83e81fa8db29
                                                            • Instruction ID: a9fbf596060c88b0a4f928555effd1808475790e3b0b4f6af1386c8763b90506
                                                            • Opcode Fuzzy Hash: 9eba07d28cd2d16714c6b1ef134324830639e37fadde518af10b83e81fa8db29
                                                            • Instruction Fuzzy Hash: DC517A39B001009BD714EB66D485B6A73E3FBC8305F25C469E51287399CB38AD46CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1d1179c6f8b6ef7b49bdf73c453d7bdd55f8c0ea25dd72087230dc1838c0fa11
                                                            • Instruction ID: 0312cbba87562e64f680e1ba5c92138b499d3f5e41719a633217bb64c626cd81
                                                            • Opcode Fuzzy Hash: 1d1179c6f8b6ef7b49bdf73c453d7bdd55f8c0ea25dd72087230dc1838c0fa11
                                                            • Instruction Fuzzy Hash: 34516B397001049BD724EB66E485B6AB3E3FBC8305F25C469E50687399CF38AD46CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1a2f288bd7039de02918d77be9f5236d284eb5c06c90466c75275c9186f0864b
                                                            • Instruction ID: f788db70cb98eb5a24752e64ca4c42078e75a6442ca783dc203e5c49d4c03f9e
                                                            • Opcode Fuzzy Hash: 1a2f288bd7039de02918d77be9f5236d284eb5c06c90466c75275c9186f0864b
                                                            • Instruction Fuzzy Hash: A041A079F007119FCB24EB68D85466EB7F2FFC8221754892ED96AD3740DB30A901CB91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f29574f40424a99d820c54bfb731b3cbcf423a93f8a5b7f679251e43ebb6d75e
                                                            • Instruction ID: b64bc894c0001745b8d048670cbda81d825cde205a72385c61c1b7d25265bf24
                                                            • Opcode Fuzzy Hash: f29574f40424a99d820c54bfb731b3cbcf423a93f8a5b7f679251e43ebb6d75e
                                                            • Instruction Fuzzy Hash: C241A971F007149FDB74EB68D5542AEBBF2FF84210B05886ED49AD7A80EB34E9418B81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f8526135511e2e921b47128648ebaf59523d88588253affbfb3f3afa5089ef38
                                                            • Instruction ID: 1706c1401a0562b14686ca28ca8dff67b38ba89f12c9179ae2bb6931cc9f6525
                                                            • Opcode Fuzzy Hash: f8526135511e2e921b47128648ebaf59523d88588253affbfb3f3afa5089ef38
                                                            • Instruction Fuzzy Hash: B831F23AB006114BE7257B65B81472F37A7EBC4358F15952ACE0A87794EF24EC0287D6
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 15055daf21d67d1278fd902006c863eb06909130f962eb80b6ad485e82f7cb44
                                                            • Instruction ID: 3e7c615a5fa3f88f4a4a8f67f442b894e86179b38b785b56723a255c031a04a3
                                                            • Opcode Fuzzy Hash: 15055daf21d67d1278fd902006c863eb06909130f962eb80b6ad485e82f7cb44
                                                            • Instruction Fuzzy Hash: 47419236A401089FCB15EF64D895BEEB7B1FB88310F14806AD502BB391DB359D16CFA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1d9a6abf3f6745be1fbe1bf5b7685d0d1b17f7e15369d16a2ccddfce3e517c7f
                                                            • Instruction ID: 4751156183d45f066d8e905c77523fdca3cb6b56d202ff3d2e3a849160fad02d
                                                            • Opcode Fuzzy Hash: 1d9a6abf3f6745be1fbe1bf5b7685d0d1b17f7e15369d16a2ccddfce3e517c7f
                                                            • Instruction Fuzzy Hash: 79416F34B00209DFDB29DF64C894B6ABBF2FB88750F15C429E816AB381DB75E841CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a61fb8c5810c6e1989fddad198823f3b350ab78763c7e0018bf9230b4454f8b2
                                                            • Instruction ID: 793d160c116c7baf2973df44b538d8940dee6c384ec30335e8b8eb6e588b790d
                                                            • Opcode Fuzzy Hash: a61fb8c5810c6e1989fddad198823f3b350ab78763c7e0018bf9230b4454f8b2
                                                            • Instruction Fuzzy Hash: E7418B75A00744AFCB31DFA9C448A6ABBF2FF88201F198559D58697B51EB30E844CF61
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a2742866b02f92a6ab086b58c7597439e52e938fe92280f322ccee740ca23806
                                                            • Instruction ID: 995c5eb411e12a943ea4cb1b633e00773e5cbe4cc8f9679d45a3e1de98dfb30f
                                                            • Opcode Fuzzy Hash: a2742866b02f92a6ab086b58c7597439e52e938fe92280f322ccee740ca23806
                                                            • Instruction Fuzzy Hash: 2041BD31B00645CFDB05CF28C484A6AFBB6FF89320F168699D569AB282D730F851CB90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 86afc5a82a8f2fcfb2f39467c33b2bbd0b4376891abff80b0f82a1310dc54bb2
                                                            • Instruction ID: bd262d0f28a41604f03c0d550e56c34b2bc1d163c3f09b114935483b455d28bd
                                                            • Opcode Fuzzy Hash: 86afc5a82a8f2fcfb2f39467c33b2bbd0b4376891abff80b0f82a1310dc54bb2
                                                            • Instruction Fuzzy Hash: 79411571F04305AFCB249B68C804BADBBB3FF85311F11806AE556DB290DB309905CB51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ea919987b4ec0bb95c11feb8c0b61c136ec11e3c7ac4bd890e45c204dccf3e93
                                                            • Instruction ID: 5b9be156819a57fe40185eb7e43c589349bdc5829f458e4fc564492448df8889
                                                            • Opcode Fuzzy Hash: ea919987b4ec0bb95c11feb8c0b61c136ec11e3c7ac4bd890e45c204dccf3e93
                                                            • Instruction Fuzzy Hash: F2419E71A003049FDB19DB68D8407AEB7B7BFC9200F54C92CD44AA7351EBB5A9468BA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 63b346abaa761ff714bad5d4f7f94152b71c1a6ae187e3411d4fe1bd2632ff02
                                                            • Instruction ID: 39776108ce2384bd7ad91857856d18c7a6bff10d50fb4e0df032223167bf5eeb
                                                            • Opcode Fuzzy Hash: 63b346abaa761ff714bad5d4f7f94152b71c1a6ae187e3411d4fe1bd2632ff02
                                                            • Instruction Fuzzy Hash: AA415B38A00104CFEB24EF55D889FB977B3FB89315F258169E5029B6A5CB759881CF48
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fc4eacaedad782ce0478fffa8aab431d821995e718209af58b0e61e6ccfc083d
                                                            • Instruction ID: 7f016a32ad18cc54af95b1f8917140ec638489456e0951cce37900b258e50828
                                                            • Opcode Fuzzy Hash: fc4eacaedad782ce0478fffa8aab431d821995e718209af58b0e61e6ccfc083d
                                                            • Instruction Fuzzy Hash: F7317C353401108FDB14DF39E49CB2ABBE5AF89714F1641A9E50ACB372DA70EC418B92
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 618648dd27f648fa32db82fbd016a8acb0d5d6224c0d1c5c753a783c0115bbcc
                                                            • Instruction ID: 237ba80e172ca1f3081435499651439a6a333865d23651ebce55a85e2996fc45
                                                            • Opcode Fuzzy Hash: 618648dd27f648fa32db82fbd016a8acb0d5d6224c0d1c5c753a783c0115bbcc
                                                            • Instruction Fuzzy Hash: E531D9366101049FDB05DF98E988EA9BBB2FF48724B1680A8F5099F372C731ED55DB40
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a24da0135eccd5a585537a318c83dbd0f0b22e2794e267143a07a97823aef50a
                                                            • Instruction ID: 95a828bae2782e1709dbe564441685ef23863ce7e6f5db95ec2528eddb915fc7
                                                            • Opcode Fuzzy Hash: a24da0135eccd5a585537a318c83dbd0f0b22e2794e267143a07a97823aef50a
                                                            • Instruction Fuzzy Hash: EF316C353402108FDB14DF79E49CB2AB7E6AF89715F1641A9E50ACB372DB74EC408B92
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2bdb5f4d848e2cd8c33d28dd741f18022dbf80dcd01b5d5deb3830125243b16b
                                                            • Instruction ID: 3f3a5c204d71d7a039edec1f74759c7f399fbe268e0f1ea254124d9044608ec7
                                                            • Opcode Fuzzy Hash: 2bdb5f4d848e2cd8c33d28dd741f18022dbf80dcd01b5d5deb3830125243b16b
                                                            • Instruction Fuzzy Hash: 6A414875A00219CFDF18DFA5C844ABEBBB1FB88314F11842AE526E7295D734E945CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 963c0f8104f9b37daa3ae4c0babde9fdd417e692011d3abc5f82d33a728dc7e9
                                                            • Instruction ID: 13009fd8b9d54437362f662d9a132cea8bd2481a51d68def9c18957610305853
                                                            • Opcode Fuzzy Hash: 963c0f8104f9b37daa3ae4c0babde9fdd417e692011d3abc5f82d33a728dc7e9
                                                            • Instruction Fuzzy Hash: 41312736B042505FEB049F68D840AAE7BA2FFC9220B14807EF905CB391DFB58C428791
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e225057183fb90b6f0c04249a58fc1fc8bd14df8c1cb33574e7bda4f6b06260b
                                                            • Instruction ID: 440be1cddca8fb217b2cd5faec71bdc363a67dc6820f8d1692460013dd51e658
                                                            • Opcode Fuzzy Hash: e225057183fb90b6f0c04249a58fc1fc8bd14df8c1cb33574e7bda4f6b06260b
                                                            • Instruction Fuzzy Hash: 3A41F674A112188FEB68DB24C990FA9B7B1FF49710F5041E5EA05AB3D1C731AD81CFA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5e3917d9809d0b0224a8041b68671dc42fa85838593f04c753e2fce9977cb4a0
                                                            • Instruction ID: 5628890edd86ceaa96f161048f660d250a88508bbedb93f0d18b471c70267e36
                                                            • Opcode Fuzzy Hash: 5e3917d9809d0b0224a8041b68671dc42fa85838593f04c753e2fce9977cb4a0
                                                            • Instruction Fuzzy Hash: E2317F35A00304DFDF09DF64D954A99BBB6FF88314B0541A9EA06AB3A1DB71EC52CB90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0d6132dd23eae8ac5cde502534b7a50ad0c49c777533f65e75614721de48b86d
                                                            • Instruction ID: aa0690313f9a9c1c428701e790518a1362038c13f8daf7493692bf9538742338
                                                            • Opcode Fuzzy Hash: 0d6132dd23eae8ac5cde502534b7a50ad0c49c777533f65e75614721de48b86d
                                                            • Instruction Fuzzy Hash: FF317035A00108CFEF58CF55E4A9BE973F3FBC8314F65886AD0159B294CB745986CB91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 858bdaa82955c85bc1cb7838488f3e626fa9d2fccdb73e3f2ad1059df3118c4a
                                                            • Instruction ID: 674cb13153955d511cbcf1d728c4f878d204007dfb9f213ce37ea7bd8ae46af2
                                                            • Opcode Fuzzy Hash: 858bdaa82955c85bc1cb7838488f3e626fa9d2fccdb73e3f2ad1059df3118c4a
                                                            • Instruction Fuzzy Hash: BF316D31600304DFCB299F34D894A2ABBB6FF86351754886DE8028B3A1DF35EC46CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b58cd3199fb042e8ed16ef02cb82b7deaa2deb1261a2efa96cb702d56c3f0e43
                                                            • Instruction ID: 53390a5a6ebaa3131aa073d541a1efd88f4569cfae56f49441d10e0d0acb4f9d
                                                            • Opcode Fuzzy Hash: b58cd3199fb042e8ed16ef02cb82b7deaa2deb1261a2efa96cb702d56c3f0e43
                                                            • Instruction Fuzzy Hash: EA2188717043005FEB05EB65D40076E3BE7EFCA70075581AAE506DF3A2DE74AD0687A6
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3806613775.0000000004D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4d00000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4cbb571e691bb6d6c94291263c71392113581836b59dc983ff4b16d471f03724
                                                            • Instruction ID: fb3f43681a238734d7f9b12b24530fca9b251c4eaec85986aae1856e3f1ce38f
                                                            • Opcode Fuzzy Hash: 4cbb571e691bb6d6c94291263c71392113581836b59dc983ff4b16d471f03724
                                                            • Instruction Fuzzy Hash: 7D219531A093948FDB134B7498557A9BF71FF47310F0A80EAD895AB2E3D634AC4AC752
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aee2f42472e3acd3be7ac1ceb02e35ecf06f4468a05cda1bd38dc794b3aa359a
                                                            • Instruction ID: 57fe0fc5e3fb5b5f1ee378176a209b41c5741e29ab4347de73ab1de5cfe0ad61
                                                            • Opcode Fuzzy Hash: aee2f42472e3acd3be7ac1ceb02e35ecf06f4468a05cda1bd38dc794b3aa359a
                                                            • Instruction Fuzzy Hash: 2621C276348384AFCB034F25ACA4F9A7FB5EF46610F0640E7F640CF292C6A599058721
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4afd514fd3d75fbd955cbc11630a2873d18d5fc0428b3892d0c3e79dfa6844e1
                                                            • Instruction ID: 9309c0e614fa81d6fa5f2a546d3fa8528c3e05b9dfd1f7c06d10770117549e9e
                                                            • Opcode Fuzzy Hash: 4afd514fd3d75fbd955cbc11630a2873d18d5fc0428b3892d0c3e79dfa6844e1
                                                            • Instruction Fuzzy Hash: 02317C34A00108CFEF58CB55E469BAA73F3FBC8314F65C86AD016AB694CB749885CB95
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: baa2d813a00eb13a68c863b0204d5ae249272ae69fa7d6be04dfa0a5401afb5f
                                                            • Instruction ID: 0b163c73acc90ea27af700c39e996bf338ac5c171d0391e2c0daf371218648d4
                                                            • Opcode Fuzzy Hash: baa2d813a00eb13a68c863b0204d5ae249272ae69fa7d6be04dfa0a5401afb5f
                                                            • Instruction Fuzzy Hash: 29218330B102189BDB19AF64C499B7EB7A7BFC8700F14442DE406EB395CF744D0A9B85
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8c997ecd360a8ca608d86dea4d51b0387cb9fdfe1052c18a028415d699998cbf
                                                            • Instruction ID: 6e924b7d0a0cbc99ed256dc62db8f81903ff79b91cdd0b4341cea09cf01b8b6e
                                                            • Opcode Fuzzy Hash: 8c997ecd360a8ca608d86dea4d51b0387cb9fdfe1052c18a028415d699998cbf
                                                            • Instruction Fuzzy Hash: 512181B53042449FDF1ACF6AC940AAA7FE6BF8A300B054099F859CB3A1DB31DC51CB61
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f7701d7192323a019ef39cd1a26df2f28a6afaabbd5a13cbdbeb60bacace421c
                                                            • Instruction ID: c9b6167ef419594c0c9288c8b8b82055de4dc63431777647345243cfe0805bd4
                                                            • Opcode Fuzzy Hash: f7701d7192323a019ef39cd1a26df2f28a6afaabbd5a13cbdbeb60bacace421c
                                                            • Instruction Fuzzy Hash: 3E210239900605EFCF08EF68C884ABAFBBDFF44300B4186AAD51657242D730B895CBD6
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 53f60ef8c88546ec26abe22ba3a5c3049d73510904558b91c11a27c72caeee2b
                                                            • Instruction ID: 92488c16c34ba54f855a70b2cb5da9025115ed15f4eba1bfe73da0a426858360
                                                            • Opcode Fuzzy Hash: 53f60ef8c88546ec26abe22ba3a5c3049d73510904558b91c11a27c72caeee2b
                                                            • Instruction Fuzzy Hash: 1A213039A00209DFDF199F64C458ADEBBB6FB8C720F144529E911A7390CFB15882CB94
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cb21e6559d82d78dc01dbb3db4bcbdb16351484db52dcf225a24c5ddacd4f821
                                                            • Instruction ID: de0676e1ab2d40e63ae63c8bcb2f9a594011aaa78f31c26015249d91d340b7f7
                                                            • Opcode Fuzzy Hash: cb21e6559d82d78dc01dbb3db4bcbdb16351484db52dcf225a24c5ddacd4f821
                                                            • Instruction Fuzzy Hash: 0A213632A00219EFDF28DAB9C904BAEBBA5BB45340F108066D519D7291E734DA51CB92
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 30fc092d4e01bd3e5d86a76247c8230b15a0ea720c01f1caa6bdc03aa08ff04b
                                                            • Instruction ID: 11f09966929423801ccbc54577f8f273a671a9bffa5708be4dc54b3d826aa2c8
                                                            • Opcode Fuzzy Hash: 30fc092d4e01bd3e5d86a76247c8230b15a0ea720c01f1caa6bdc03aa08ff04b
                                                            • Instruction Fuzzy Hash: D721CF71A103019FDB04EB64E8597AE7BAAFBC9310F40C42DD00AEB645DFB459068BA2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 454c098c6297228542b708f65e35d49bd171c11889764065d172c22fef03bc88
                                                            • Instruction ID: 57a13af35a1f9260a7b2e0b03728bdce254bce79a34e37b719a568ddba704baa
                                                            • Opcode Fuzzy Hash: 454c098c6297228542b708f65e35d49bd171c11889764065d172c22fef03bc88
                                                            • Instruction Fuzzy Hash: 80218C74A00219CFCF18DF65D884AAFBBF1BF88614F118439D916A7356E730E945CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2ba0279d76535044df7bc953cf748c3cdb3a4ebc1624a93dd218aebe1b47e37f
                                                            • Instruction ID: 8eb4725833cb74dc693612119c3732f52fa6e63a5cd7d6c8823ff6f2d733f929
                                                            • Opcode Fuzzy Hash: 2ba0279d76535044df7bc953cf748c3cdb3a4ebc1624a93dd218aebe1b47e37f
                                                            • Instruction Fuzzy Hash: 3521F1B0D092449FEB11CF65E9847EEBFB2EF85300F2580AAD10597292DB746D86CF80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f76066d4552d084f6a893281d296d84297ed2824e11e0077fdfe3088d7194a9
                                                            • Instruction ID: eaeb5a4df32e1896d992a67f653e91485bef205cb632d68f90cd9d447eb768a0
                                                            • Opcode Fuzzy Hash: 2f76066d4552d084f6a893281d296d84297ed2824e11e0077fdfe3088d7194a9
                                                            • Instruction Fuzzy Hash: C121B235E04309CFCB25AFA4D4088BDBBB2BF4A206B01856DE44667356DB31E9C9CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 80917c387da76038b2fb92daa8837fa1ab952db3b62fe94a2ef1ea3561b5d555
                                                            • Instruction ID: cee331aef958bd5440ec9854f0adf761ab9b32f91ed12cf6c6fadd6e7c8b81a6
                                                            • Opcode Fuzzy Hash: 80917c387da76038b2fb92daa8837fa1ab952db3b62fe94a2ef1ea3561b5d555
                                                            • Instruction Fuzzy Hash: C6219D77608250AFCB169FA8D844D597FB6EF8A71030A80D6E205DB272C731D811DB62
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a17637d4140dcdb177e358c345a8574a4822f888cfec6a42569ab41f8be6052f
                                                            • Instruction ID: c08f0d8609578a9492b0de284e183b62a9916cc6f588dab3dbae0ae63b13e68b
                                                            • Opcode Fuzzy Hash: a17637d4140dcdb177e358c345a8574a4822f888cfec6a42569ab41f8be6052f
                                                            • Instruction Fuzzy Hash: 0621E875A00209CFDF08DF68D585ADDB7F2FF49300F1045A4E405AB2A1CB75AD41CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 20758a669d4dc29f8f3141a06959208e09f11bbcb65fc044a3f06457b70d6c09
                                                            • Instruction ID: cdbcba94e177894ecdd5b97e485ab9f4dfa69b5fd9511b78aea78009e6344e16
                                                            • Opcode Fuzzy Hash: 20758a669d4dc29f8f3141a06959208e09f11bbcb65fc044a3f06457b70d6c09
                                                            • Instruction Fuzzy Hash: 73216D74A00204DFDB18DF79D958AADBBF2BF88304F118169D412A77A0DB71AC46CFA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c391311d79dd753bd7c7799bb86a4e169c41674f6afd1711c0dd6826299c38a2
                                                            • Instruction ID: ba824e5bb6461d63ac51774f9cf0731f624844c723f8e0c6944a60dfe5431812
                                                            • Opcode Fuzzy Hash: c391311d79dd753bd7c7799bb86a4e169c41674f6afd1711c0dd6826299c38a2
                                                            • Instruction Fuzzy Hash: 75211C35A10208CFDF09DF64D984ADDB7F2BF49301F5145A8E406AB3A1CB759D41CB60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0bb7844a199332d8131f0ad2ba8839c37713e6a718796af47e9295f7163135a5
                                                            • Instruction ID: d949d071e87d0d407a06d3361a1e66338e2e0aa098bae2015dcf18f46d49a149
                                                            • Opcode Fuzzy Hash: 0bb7844a199332d8131f0ad2ba8839c37713e6a718796af47e9295f7163135a5
                                                            • Instruction Fuzzy Hash: 61210E39A00209DFDF19DF65C458ADEBBB6FB8C720F148129E815A7390DF719881CB90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 14f4d9ce8f56012f170a96b13c9ea9c54c2eef5bd93b74264e9f937fba678a0a
                                                            • Instruction ID: 99c9d114b3b30c4d0a4f3837dc977825045d8a85340dc8aa056a8f291b586ecc
                                                            • Opcode Fuzzy Hash: 14f4d9ce8f56012f170a96b13c9ea9c54c2eef5bd93b74264e9f937fba678a0a
                                                            • Instruction Fuzzy Hash: B51181316091049FEB18CF5AD8C5F66BBE3EB85310F26C5AAE41687B69D7709C42CB00
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 87f2cb133fbcad8307a8f1a56d58f54b1fb7553cb2ec50251d794ce3234efcb7
                                                            • Instruction ID: 41b740f285f3e848f3bfbe6097b9624a7903cec2c67eab731b3c2b8a0b3b108f
                                                            • Opcode Fuzzy Hash: 87f2cb133fbcad8307a8f1a56d58f54b1fb7553cb2ec50251d794ce3234efcb7
                                                            • Instruction Fuzzy Hash: EB11E5B57043141FE308DA794C91BAB6BDAFFCA250F24807DE549EB3D2DDA1AC028791
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7234dac8a3a999e46def738da58993308cf79248e8fa3708d6a155ab1f6e16fc
                                                            • Instruction ID: e5324bbb79a1423a7786a2f736601eb2f75cfd1ba3b641d0322af134c37cd172
                                                            • Opcode Fuzzy Hash: 7234dac8a3a999e46def738da58993308cf79248e8fa3708d6a155ab1f6e16fc
                                                            • Instruction Fuzzy Hash: 7511BF30A18345DFDF1E8B649854DAA7FB6EF83211F0584AAD806CB1D2EB348B40C756
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ab8b5060b6c7f92b4b4d629b1a5cbed783357558181fc92188083cbf0f9e6911
                                                            • Instruction ID: 8e384d9c25def3b9f22f4ea7e97064bfa838f68fbc261156ad90b04380c494c8
                                                            • Opcode Fuzzy Hash: ab8b5060b6c7f92b4b4d629b1a5cbed783357558181fc92188083cbf0f9e6911
                                                            • Instruction Fuzzy Hash: 3E11AF397012118FDF05DF69C854A6EBBF2EF85300B1580AAE941DB361D730ED01CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 33531d30c4a4922e87e2ad2cbec21fb64a1991f333d3aa138e79a79b9f6a2791
                                                            • Instruction ID: 8398091643460a9582640a26034408837ad059f6b146f69b79ab5674f39b921d
                                                            • Opcode Fuzzy Hash: 33531d30c4a4922e87e2ad2cbec21fb64a1991f333d3aa138e79a79b9f6a2791
                                                            • Instruction Fuzzy Hash: C0215E74A00205CFDB18DF69D958BADBBF1BF88308F209069D412A77A0DB75AC41CF60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dc1a3b0ef9fa410ea3d2acfd054bf1049da220ea3a135c1066876accbaa37c78
                                                            • Instruction ID: 824c01d61696a18ad636ad8dd2be8547fa922af7ebf39e7ee8d6c0e59f973721
                                                            • Opcode Fuzzy Hash: dc1a3b0ef9fa410ea3d2acfd054bf1049da220ea3a135c1066876accbaa37c78
                                                            • Instruction Fuzzy Hash: 271151317081149FDB18CE4AD8C4F66B7E7FBC5711F22C46AE52A87B69D7709C41CA44
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5eca98ae9afe417f6e5bc19c0840159bd1b3d80a3f958266d026ff18220990dc
                                                            • Instruction ID: 37f2f053bbf43312851615e123ac6d974c3d5d5669b97ecc752189b2311e1646
                                                            • Opcode Fuzzy Hash: 5eca98ae9afe417f6e5bc19c0840159bd1b3d80a3f958266d026ff18220990dc
                                                            • Instruction Fuzzy Hash: F0118B30A00100CFD764FB65E449B7A37A3FB84320F61C02AC40693299EB759D81CF85
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c70fad5108a182cdf13f50cee3f87b9b91ca84c84e3a631e03186013012d07a0
                                                            • Instruction ID: 097b58461489dffd10098f33ae16257556fd1d961c25c3a117f0a7df14608e55
                                                            • Opcode Fuzzy Hash: c70fad5108a182cdf13f50cee3f87b9b91ca84c84e3a631e03186013012d07a0
                                                            • Instruction Fuzzy Hash: 7911A935710200CF8F1A6F3AE419A3D37A7FB852A27044829E90ACB390DF35CC22DB91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fe1a81e5e43417204675d26cd68a58d457cccdfb8da8084366b632f4412a562d
                                                            • Instruction ID: f8ef2efb7173638d6c422b1476e5c4858dcc3d979378988d7f2457730b5a722e
                                                            • Opcode Fuzzy Hash: fe1a81e5e43417204675d26cd68a58d457cccdfb8da8084366b632f4412a562d
                                                            • Instruction Fuzzy Hash: E82162B8A42219EFDB04CF98D594EADB7F2BF49301F214158E802AB361DB34AD41CB50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1238a220b5fff05dab71b8a68197133f5df6c8cc93b119ed78496b237703f3ad
                                                            • Instruction ID: e4debb8010a01cf7bebd7eb90205071784505e1b866851bde9d1f941709e1d13
                                                            • Opcode Fuzzy Hash: 1238a220b5fff05dab71b8a68197133f5df6c8cc93b119ed78496b237703f3ad
                                                            • Instruction Fuzzy Hash: 3B11A339700204DFCF2ADF799855BAE7BF7AF88650F114429E916EB380DB75C9018BA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7931e8d7ec45c452ebe4b5722481409d5c8b74a393be8dfab8eff150d56335a0
                                                            • Instruction ID: 872e0b64709b3d18058dc36833f621c30ba1797d811ce22ab0e9de403258d95e
                                                            • Opcode Fuzzy Hash: 7931e8d7ec45c452ebe4b5722481409d5c8b74a393be8dfab8eff150d56335a0
                                                            • Instruction Fuzzy Hash: 70110770A02209EBDB18DFA4E944AEEBBF6AF48311F214125E915B7390DB70AD408B90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2c9fc636cd7e15cf855d8c28ff675173d221f487abdd1497135a1e8d1a391f52
                                                            • Instruction ID: 29facbbb1477e46366df74b6288b09d7b650f59ee7855abe7a84d9a1ab198351
                                                            • Opcode Fuzzy Hash: 2c9fc636cd7e15cf855d8c28ff675173d221f487abdd1497135a1e8d1a391f52
                                                            • Instruction Fuzzy Hash: 1B01C431A00604EBDB25AF64C8596EEBBB6EB88304F108429F802A7381CF764D06CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 46c87cf2e33fa977d9ee035f8066d16d3ac1542da7ea50a123170a126c46dffd
                                                            • Instruction ID: 51e5f7e854c0ff56d7a4aa882faff4d007bda3dfde26664d33394e069ee5198f
                                                            • Opcode Fuzzy Hash: 46c87cf2e33fa977d9ee035f8066d16d3ac1542da7ea50a123170a126c46dffd
                                                            • Instruction Fuzzy Hash: 3701CC36714601CFCF1A6F35E019A3D3BA2FB862613094468E80BCB391DF35C812CB51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e029529fc318db7d1383719906ec0c23612ad33432113af3b3c41569b22e0d6b
                                                            • Instruction ID: 541cfa3213fc5f6713f67c0f0d74259475faa5f6071c98c254284e134f191df5
                                                            • Opcode Fuzzy Hash: e029529fc318db7d1383719906ec0c23612ad33432113af3b3c41569b22e0d6b
                                                            • Instruction Fuzzy Hash: BD01DF31B19228CFD7219BADB444B6677E8FBC5328B56D4A6E449D7201CB24FC41CBA2
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4095ee2b0702833f291072e2fe679944ce0d021ba5d05a3436850d389fa6b505
                                                            • Instruction ID: 0b7b40ca9b5e64bd0f9cd49519754253cde091091fc3e36bc7e6a7496fbd72cb
                                                            • Opcode Fuzzy Hash: 4095ee2b0702833f291072e2fe679944ce0d021ba5d05a3436850d389fa6b505
                                                            • Instruction Fuzzy Hash: ECF02B62B0D2904FDF1A9768AD94289AFA5EB4790034D82FFE846CF353D6148C06C391
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a04203d12b11428453a8475a9a8b7bdeaa2389d2cc1c9140066be5f5265b5ce1
                                                            • Instruction ID: 915e52e76df84df5ace9a927800d183d1e98ac82032480967659ebfc34cabfa3
                                                            • Opcode Fuzzy Hash: a04203d12b11428453a8475a9a8b7bdeaa2389d2cc1c9140066be5f5265b5ce1
                                                            • Instruction Fuzzy Hash: 9001B531A00304EBDB18AF64C9596AEBFB6EB88304F10842DF802A7380CF754D04CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 742423ade53940357742deacfb0998023a22603372914c5d60f377ed6be72989
                                                            • Instruction ID: 74cd23b8c0cbbe1f54ded9b11db9659b7d37e45a65b3255617516a55ea064e8e
                                                            • Opcode Fuzzy Hash: 742423ade53940357742deacfb0998023a22603372914c5d60f377ed6be72989
                                                            • Instruction Fuzzy Hash: 58F0F63AB10004AFDF199A18D4589AEB766EB84220F048026FA16DB360DB30DE178780
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d0f986d6dd4a82e22818a4bd6503357f981cb2f311d5aa34da38583d7d263370
                                                            • Instruction ID: cb037ac667f9cb78926c5a68da4aaf75d5877dae110b9f5d14a22d8a06cce2a0
                                                            • Opcode Fuzzy Hash: d0f986d6dd4a82e22818a4bd6503357f981cb2f311d5aa34da38583d7d263370
                                                            • Instruction Fuzzy Hash: 4FF04C76F083541FEB1D9A15981472AB7B5FBCA210F14406ED5099F390DBE1AC4183C4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ff77a448ad8fa40963e2e270f7459e3273d34ad752a9792868b59f00b0f3d117
                                                            • Instruction ID: 9ec4331c9f6b6eb377a415e8fa6427c7606f481a913890d1fca0592ed77e2282
                                                            • Opcode Fuzzy Hash: ff77a448ad8fa40963e2e270f7459e3273d34ad752a9792868b59f00b0f3d117
                                                            • Instruction Fuzzy Hash: 1EF084F634EB406FE72793347800B9ABF466F81B19F05406FE249CB686EA2068028381
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 30d47bfe35e312a56935c047e50ab3af27bd499841f48a358fb892f80ba3bce0
                                                            • Instruction ID: d36f9f24b88d98b82ed5fb6c0c528857683f62c4730fdb5dd97e075164eb477a
                                                            • Opcode Fuzzy Hash: 30d47bfe35e312a56935c047e50ab3af27bd499841f48a358fb892f80ba3bce0
                                                            • Instruction Fuzzy Hash: 59F06836E081249BC7149F6AA808ADFB7E5EFC4351B06C1BBE60AD3250DE345801EB95
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3810413248.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5390000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6597384d38ac901988c59984cf5f2fdc93e91e887c1842ce5f1a25e7304cfbbf
                                                            • Instruction ID: 9ac3729900acfa748cfdd3fb53a4bfc8b13e0913477983a7355f787385a029d1
                                                            • Opcode Fuzzy Hash: 6597384d38ac901988c59984cf5f2fdc93e91e887c1842ce5f1a25e7304cfbbf
                                                            • Instruction Fuzzy Hash: 7D016D35300714DFC7089F24D055A1ABBA2EBCDB257108529E90A8B390CF31EC42CBC1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8140d7e1760c1c76887b4e2f9a1394596716cc32ade6e65c0b072871292e056f
                                                            • Instruction ID: 53c54764bf02a5e25fbb018ff5a289531c552af2cbaec50e2b7bc1759095a697
                                                            • Opcode Fuzzy Hash: 8140d7e1760c1c76887b4e2f9a1394596716cc32ade6e65c0b072871292e056f
                                                            • Instruction Fuzzy Hash: 7EF02B66B0D3904FEF2E577458503656BA2ABC7600F09409AC046CF2A1DBD68C038351
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aee04771dbbca419f0fefc12cacbb2d6695ff34f028e91d9dad89d4282a4efd2
                                                            • Instruction ID: c09d614d4694a2484037e89482ddf834fc5372a3c51ebb504ebafa146c9683b6
                                                            • Opcode Fuzzy Hash: aee04771dbbca419f0fefc12cacbb2d6695ff34f028e91d9dad89d4282a4efd2
                                                            • Instruction Fuzzy Hash: CEF09C36E0812497C7149F6AA80899FB7E9EFC4751F06C077F609D3100DE349C01EB95
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: afd37e60e61849388a62b2427b6556e828e7977bc73aacd80c7715693e2bc291
                                                            • Instruction ID: a7b032f6168379cee81467a9e36864277e9978c7780c52750dfd6fc8084593e1
                                                            • Opcode Fuzzy Hash: afd37e60e61849388a62b2427b6556e828e7977bc73aacd80c7715693e2bc291
                                                            • Instruction Fuzzy Hash: 82F02B31B052148FC7318FACF4446A57BA8FBC4358F0694A6C804C7202CB24FC46C7A1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3810413248.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5390000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f5b821b2e557e0294fcef82d1809ebda37f1d8d5d5ef004fee01069f077363c
                                                            • Instruction ID: 0a0a9cf673c071d3cea30cc5b0d5096e72ac0e2f926bbc56a4801f98593311ca
                                                            • Opcode Fuzzy Hash: 2f5b821b2e557e0294fcef82d1809ebda37f1d8d5d5ef004fee01069f077363c
                                                            • Instruction Fuzzy Hash: 7001C578A002248FDB68DF58CC94B9EB7B5FB48311F1481EAE909A7365DF349E848F51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9da29710f53ceea4c7384ce9e3527e2248647ba625e3be2991a0ecc18c93ddc0
                                                            • Instruction ID: f84cbac6ec057ec9768e85bcebd6363294f450f8fdc329ffefebe0de2a51f238
                                                            • Opcode Fuzzy Hash: 9da29710f53ceea4c7384ce9e3527e2248647ba625e3be2991a0ecc18c93ddc0
                                                            • Instruction Fuzzy Hash: FFF027243093541FD708577E2C61B6FAE8AABC2754F28C06FE04EC7793CCA18C0643AA
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1fd541e67976c15ae0ac64e5ed180c6e8b6703fa42ffd362486349031ec6a6da
                                                            • Instruction ID: b9f4befe95189acc593b98f5ffae12772cbe0804b911dc7ccc87930a4a654188
                                                            • Opcode Fuzzy Hash: 1fd541e67976c15ae0ac64e5ed180c6e8b6703fa42ffd362486349031ec6a6da
                                                            • Instruction Fuzzy Hash: A7F0EC716043018FD7008A15E8849CBFBA6DEE5714350C537E04A8B221ED705D87C7E0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 010b504bf81294806383495c2a1a7d1dc8a9b466ef4ac431baf4e74d58b93193
                                                            • Instruction ID: f0dc29715d9a4cf421376d758174e77cb344a6ee7ac8d14a71a0cd225c815735
                                                            • Opcode Fuzzy Hash: 010b504bf81294806383495c2a1a7d1dc8a9b466ef4ac431baf4e74d58b93193
                                                            • Instruction Fuzzy Hash: A5F0E5A650D7C40FD302ABB0BCA14947F358A9311830990E7D149CF293E416AD07835A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cd45775532e876a3db0331f94752b1abdc6e72a492691917f6a4ee70f2c3f64f
                                                            • Instruction ID: b3d61d9c0c423b29db49f4abc48eeddfb8aa21cc38ab1be2d8538822cf2bedad
                                                            • Opcode Fuzzy Hash: cd45775532e876a3db0331f94752b1abdc6e72a492691917f6a4ee70f2c3f64f
                                                            • Instruction Fuzzy Hash: 52E012617002182BE708656A5856B6BA58EEBC5A60F64C02EA50ED7796DCA19C4103E5
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 74ba357ea18fa7cea75f8199f35271165145756719307722d461152228d04f9b
                                                            • Instruction ID: 5162de2216bda56f693f3e52ad3476b21e5a29596ee1080f438fd4f1ecb6cfe5
                                                            • Opcode Fuzzy Hash: 74ba357ea18fa7cea75f8199f35271165145756719307722d461152228d04f9b
                                                            • Instruction Fuzzy Hash: 9EF0A7B19052449FCF40EFA4E89079E7BB4EB86105F5081BEC845D7342EB756E0187D6
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 63bb6000611fc67600ff0a1d2528d1c6ef1d5dd720df1b94e8f322cd79c66dfb
                                                            • Instruction ID: e2f2a9fef0e509a1f087f2e83866f2ad67c409072225af7b64c7ead3a212ee06
                                                            • Opcode Fuzzy Hash: 63bb6000611fc67600ff0a1d2528d1c6ef1d5dd720df1b94e8f322cd79c66dfb
                                                            • Instruction Fuzzy Hash: 88F037B1E44110DFEB248F349848B9AB3A0FF41354F0615E4DA46AB292D730B9018B50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8ee6c4a21a67264ed94dc13f4fcd2f473615b9b1a9b09655e66ba2c41ad8ae66
                                                            • Instruction ID: 97480c6a73144244905652524c1d8cc29fb460a2b7a852d7510f51cc67983442
                                                            • Opcode Fuzzy Hash: 8ee6c4a21a67264ed94dc13f4fcd2f473615b9b1a9b09655e66ba2c41ad8ae66
                                                            • Instruction Fuzzy Hash: 16F054757002459FD710CFA8D884AAAB775FF99714B14806DE10597292CA329906CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 730727ff9d905fee9f8cdbd4138f4d893f3db6c17fee0f519a18fbe2cebb94c1
                                                            • Instruction ID: f86fc39a8f99eaa8de1ff2e605effb0d1fa3943f015ad4bd4988c79e837ec094
                                                            • Opcode Fuzzy Hash: 730727ff9d905fee9f8cdbd4138f4d893f3db6c17fee0f519a18fbe2cebb94c1
                                                            • Instruction Fuzzy Hash: 91F0B439B002258BE7249F62E8043AE73B1BB84340F05A8798945A33C1DF38AC45DB43
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3810413248.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5390000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1bff5cce1276505f0221853e6d0ab42ff62393b8dfa6c9c037108aaffe88eef7
                                                            • Instruction ID: f04c57ac7a8ccb94aac14190e1b2a71466ec74f88b895c7b7e5d384c083ef9c5
                                                            • Opcode Fuzzy Hash: 1bff5cce1276505f0221853e6d0ab42ff62393b8dfa6c9c037108aaffe88eef7
                                                            • Instruction Fuzzy Hash: 9D01A8B4A012298FD754DF58C894BDAB7F5EB88310F10C1E9A509A7366DB349E808F51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3810413248.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5390000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f1001b3aedf0180f0c5e5c4f6e5b1a0b58ee768ce76679e69c1d1d395043bf50
                                                            • Instruction ID: a0dfc8365e1ed6840ce387c2e4773a778477a24d11814ff434676db614608a5d
                                                            • Opcode Fuzzy Hash: f1001b3aedf0180f0c5e5c4f6e5b1a0b58ee768ce76679e69c1d1d395043bf50
                                                            • Instruction Fuzzy Hash: F3016674A402188FC759DF58C894A9AB7F5FB88710F10C0AAA949A7365DA349E81CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b5bd0f4c289668088620d36972069bd28f84ce079d2d5e4a730f676234d03161
                                                            • Instruction ID: 0c32736c348f7cfb070f3dec464cd68ddfd81f0e25857b6fc5eaab4a967414ee
                                                            • Opcode Fuzzy Hash: b5bd0f4c289668088620d36972069bd28f84ce079d2d5e4a730f676234d03161
                                                            • Instruction Fuzzy Hash: FCF01C75B006108FDB58FB789468A2D32E7ABCD340B5580ADA40ADB361DE749D018B42
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ab5b4e96ad4ef046e20c6b0945b85d271062342a7e618a00398ca9a15b3b54d1
                                                            • Instruction ID: 97b2ecf19e2315754b16e43cb13cd3c129d16e1f17c96c457cfcadc2a1007585
                                                            • Opcode Fuzzy Hash: ab5b4e96ad4ef046e20c6b0945b85d271062342a7e618a00398ca9a15b3b54d1
                                                            • Instruction Fuzzy Hash: 3AE0D87130030587D7109A16EC84D4BFB9EDFC5624340C639E04B87221DEB0AC85C7E0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ac54b5dc3d5d768ab8113a14c63a8da8fc6af7e7b8175fd6dd7aa021534fb26
                                                            • Instruction ID: e7ae88f6fc9a728f79f385ed63cef58338206447b6e2b8142ac657f3577f9871
                                                            • Opcode Fuzzy Hash: 5ac54b5dc3d5d768ab8113a14c63a8da8fc6af7e7b8175fd6dd7aa021534fb26
                                                            • Instruction Fuzzy Hash: A4E0867544A344AFCB01DB749D915DA7B79AA0124071041FBC805D7292E5329A06D700
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1dcada880d6f510a312ebeb000e72be6862f0d79f6c3753eccebedda3899dd8a
                                                            • Instruction ID: 5f049b5a4571427256d1b954c96304a5c5eb4c653cb8f597e0a1046e297b335c
                                                            • Opcode Fuzzy Hash: 1dcada880d6f510a312ebeb000e72be6862f0d79f6c3753eccebedda3899dd8a
                                                            • Instruction Fuzzy Hash: 29E08630305304AFDE296A6149007A6329A7F476A4F510C65D625AF2C1DB72EC4183E1
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ea1d667978db8b44c06fb270da2fb3fa957b29a377a9208e3b240f3e9adff828
                                                            • Instruction ID: 57dc77a175d9c9e34bb2699e511f438dd40c50a18226db2f7fc16372d8f0e459
                                                            • Opcode Fuzzy Hash: ea1d667978db8b44c06fb270da2fb3fa957b29a377a9208e3b240f3e9adff828
                                                            • Instruction Fuzzy Hash: 16E06D31F04024CBDB15AF99E90466EB3B6EFC4345F0190A2EA069B256EB24FC019B51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 55309cb0b4737a5fe55ef0bc554dbfb0604429feb389e5ee4339021993dc812a
                                                            • Instruction ID: 52f35cfc6a44941e04335e4cd756e4d08d45f888a746d228d0ea0bf13a2096e8
                                                            • Opcode Fuzzy Hash: 55309cb0b4737a5fe55ef0bc554dbfb0604429feb389e5ee4339021993dc812a
                                                            • Instruction Fuzzy Hash: 06E086751082982FC311C659C821DA67FAC9F4A160B08C09BFE94C7253D569D903D7A0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9ac8352ff7d9ee530c5d0642760052e0af0bd4bc3b9b4f85637b78c30c783895
                                                            • Instruction ID: 74919ed1247cd553ed90e8346b3dee2205a01ab19fd315882331cab5223c1692
                                                            • Opcode Fuzzy Hash: 9ac8352ff7d9ee530c5d0642760052e0af0bd4bc3b9b4f85637b78c30c783895
                                                            • Instruction Fuzzy Hash: E8E0867254D3646FDB2256756C41F563F58AB12B55F0A40AAEB441F292C1A0AC00C395
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ef0c5e0034d8b477577289a4268bc4eff85b0fae8ff82e09b44a6311a3fe2920
                                                            • Instruction ID: bb0fc85fac53a7c8d0d9cb5abb0c469d5ad55286df3d14451cb1bba83c082acf
                                                            • Opcode Fuzzy Hash: ef0c5e0034d8b477577289a4268bc4eff85b0fae8ff82e09b44a6311a3fe2920
                                                            • Instruction Fuzzy Hash: 2BE0D8B1E45344DFD701CBB0A99576D7FB1EB85304F1581DED405DB145E9744F018742
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8c02a19b01515865c3a6c2e5ee2a46ccb2771deafc67b9adc542061b535b5f7c
                                                            • Instruction ID: 1af9821986b2ba021be2a1888bb32d0bb9ba41220e30d080079864881b09d55c
                                                            • Opcode Fuzzy Hash: 8c02a19b01515865c3a6c2e5ee2a46ccb2771deafc67b9adc542061b535b5f7c
                                                            • Instruction Fuzzy Hash: 36D05E712657051FD344C559C892991B7A5DBC5258718C4B9E808CB243D92BFD079250
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1d5bb583ecc04270bf3c34dd1508d770fd916b562c7d1e9d6de64ca581b3b6b4
                                                            • Instruction ID: 2ef8faa47bf719bcd35b1c567e4d59c17b41f399c78f61a69a291fde6bcbb24d
                                                            • Opcode Fuzzy Hash: 1d5bb583ecc04270bf3c34dd1508d770fd916b562c7d1e9d6de64ca581b3b6b4
                                                            • Instruction Fuzzy Hash: A9E0C2B3C05209AFCF019BB0CA821DE7BF1EE8720035009E7C046EB112FA354B179B80
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c422ae0edcb3cb70e06f6d3e0f87011d0e0baec1fdc2791d1ebb6668f4ec3001
                                                            • Instruction ID: 0f0e71abcaaab8dee939ac3c3abc7b52c990e1341e37f4eff24fed83a146ccbc
                                                            • Opcode Fuzzy Hash: c422ae0edcb3cb70e06f6d3e0f87011d0e0baec1fdc2791d1ebb6668f4ec3001
                                                            • Instruction Fuzzy Hash: 9DE08CA1C0520CABDB04EAB0C91155E77BD9F86214B5009A29606EB120F8319B109B91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c9926feeb76dfde25effd7be36c8452be770c95370844dd88641abfc2949de5d
                                                            • Instruction ID: 077e8027b557c99453de85b3d57d579e1bf94df76503e23d9b94a5d2e82535d4
                                                            • Opcode Fuzzy Hash: c9926feeb76dfde25effd7be36c8452be770c95370844dd88641abfc2949de5d
                                                            • Instruction Fuzzy Hash: ACD05E72A4520CEFCB10DFB8ED015AAB7ADEB45215B1006FA9D0DD3240FA32EE10D790
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8b5db568a6ddb7758f60a87efeaa29055def500db5c2fdce6a8ac29e4515a46d
                                                            • Instruction ID: e2ce1d8e38a9071454c1a9a6ed45a7d1c26cc22cd82b1b865cf127c046457c86
                                                            • Opcode Fuzzy Hash: 8b5db568a6ddb7758f60a87efeaa29055def500db5c2fdce6a8ac29e4515a46d
                                                            • Instruction Fuzzy Hash: 0AD05EB2A041005FE300CA58D8A6895B7B0DBA5530314C059AC59CB392FA25AD038250
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cdc6aa4ea66bd54e7c5b11bbdf33fdde32d4e18e663d7b7087e2379da8e87037
                                                            • Instruction ID: 5dd2b2c1a7e11a8140759dd1a94ca929d3102e0cdacc92926bfc3a92c5945d2b
                                                            • Opcode Fuzzy Hash: cdc6aa4ea66bd54e7c5b11bbdf33fdde32d4e18e663d7b7087e2379da8e87037
                                                            • Instruction Fuzzy Hash: E4E0EC70A10208EFDB00DBB5E985B6DB7BAEB89200F508598E80997244EA715F009B92
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0f19d37c5be942c7eb8c5dbade7b2f30f68df288b3b813892e958b3d8b480907
                                                            • Instruction ID: 4c05d425cc51a9a7a387b45d16d56c75ce1771996e1000c5cc24fcc25d44ab9d
                                                            • Opcode Fuzzy Hash: 0f19d37c5be942c7eb8c5dbade7b2f30f68df288b3b813892e958b3d8b480907
                                                            • Instruction Fuzzy Hash: 17E086B4E5460E8BDF18AB74C848B643277BB46320F6983A584675A3D3DB5488818F92
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: da3c9a557a3d19c187dc8b8e1102ac9fc832f3c4aa4c001506221ba679db3cd6
                                                            • Instruction ID: 6cb47297e675629f9505064903853177d1ed47882c00c62b4122758a13bc45a5
                                                            • Opcode Fuzzy Hash: da3c9a557a3d19c187dc8b8e1102ac9fc832f3c4aa4c001506221ba679db3cd6
                                                            • Instruction Fuzzy Hash: D5E04F39B04228CBD710DF55E8547AE73B1FB88305F01A86AD546933C6DB386D45DB43
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6619c281a0c6f01b83faec400e273f457da4e3e33f378a4acfe17613f1fb30d1
                                                            • Instruction ID: 3f4c6557586e3b05a23d8fea6d7edaa3d38721dfab4d9e0cc8bc4779cb6a7642
                                                            • Opcode Fuzzy Hash: 6619c281a0c6f01b83faec400e273f457da4e3e33f378a4acfe17613f1fb30d1
                                                            • Instruction Fuzzy Hash: 8DE01271A01208EFDB00DFE8E54076D77F9EB89204F10C5AC9809D7341DA716F009B92
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a402a8dc584ac6d2299575bc4e0b6b5cc765cc3706504d505813531a9ad8338e
                                                            • Instruction ID: d8c28b029612ea3da50869906115e90d41c9ae40cae7a3f63df55dbc4f1dd4a0
                                                            • Opcode Fuzzy Hash: a402a8dc584ac6d2299575bc4e0b6b5cc765cc3706504d505813531a9ad8338e
                                                            • Instruction Fuzzy Hash: 19D05EB57092482FD306CA68D856890BBA1DF95514714C0AED848CB293E932EE0B8351
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 61cb6eb0c2bb6e897218618b6b5390077a8f722db0d7936c049c9ac793e91f32
                                                            • Instruction ID: bb559cd9e63285f842ffa59cec69cfb130f4eb354ed15726ef19bdad66fad4c8
                                                            • Opcode Fuzzy Hash: 61cb6eb0c2bb6e897218618b6b5390077a8f722db0d7936c049c9ac793e91f32
                                                            • Instruction Fuzzy Hash: 63D05E322041686F8300CA89C810CB6BBEC9A8D120708C05BB958C7241C976ED0287A0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 57cc4dfb971227784ffc78c582290c45eaa8fa4b301a594c06449886b9f4bc3b
                                                            • Instruction ID: 850a2a2f15c8837aaae23f06e93db3fcfcb54b2749a1246993723d3a01f64556
                                                            • Opcode Fuzzy Hash: 57cc4dfb971227784ffc78c582290c45eaa8fa4b301a594c06449886b9f4bc3b
                                                            • Instruction Fuzzy Hash: 1DD05E9A64E7C05BE72386202891A963F208B93224B1844DAD8408B153C60D4A9AC765
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e6d80f6896058ebedfa524a88a5997d0bfe5894c4d4cda5b61b97ce64ae34e23
                                                            • Instruction ID: 16e8347b1749e18735e9dcc9257b18ac349e341f31674dcafe489cf9265880b2
                                                            • Opcode Fuzzy Hash: e6d80f6896058ebedfa524a88a5997d0bfe5894c4d4cda5b61b97ce64ae34e23
                                                            • Instruction Fuzzy Hash: 2BD0C733585334A7DA3555556C01F56771CAB15BA1F054055FF042F2848571BC4096D4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d6e498ddc77c47c4e6a59debbc97129acc0b8e60aa3bd9d99aff413044c0505a
                                                            • Instruction ID: 3382e804d64f2b41984179526778e23fd6a03c23dadad7f0894112291de0e450
                                                            • Opcode Fuzzy Hash: d6e498ddc77c47c4e6a59debbc97129acc0b8e60aa3bd9d99aff413044c0505a
                                                            • Instruction Fuzzy Hash: 42D05E71C0120CAB8F04EFB0C50048E77F9AA8520078005A58406AB110EA314B105B91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6a2ad75b9c73e47aa72d9592af8ea65c1756dcda0f6923212e6dd72b6d40fdbb
                                                            • Instruction ID: d6b92f6cf3c7f697ad41c21047c00445ee0e6cf5e6dd47c5e51646dd0c830d00
                                                            • Opcode Fuzzy Hash: 6a2ad75b9c73e47aa72d9592af8ea65c1756dcda0f6923212e6dd72b6d40fdbb
                                                            • Instruction Fuzzy Hash: D0D0A9FB1D8284AFC3619F34AD81EA27B30AB2370070608E3E200CF1B7C3208802CA19
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 30369c07372dfb8cf3e1a04889a902da429ce3a68a10dc1bfb98da157ebea38f
                                                            • Instruction ID: 577dc7f57700e2aef75ac8d6712e38227094f2f3b5db1e76a69cf4073dc7ec84
                                                            • Opcode Fuzzy Hash: 30369c07372dfb8cf3e1a04889a902da429ce3a68a10dc1bfb98da157ebea38f
                                                            • Instruction Fuzzy Hash: 5ED0A771C0120CAB8F04FFF0C50058EB7FDEF8620074005E59406E7210FD319B105B81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f94255a4f2bf4de026b9fc40f34713e03614c46854a56360c7ab3aed138f640
                                                            • Instruction ID: c54eaf96175a384ea14f7b389e293c04fd1b307b98961e87c3e96afc974ec2e1
                                                            • Opcode Fuzzy Hash: 2f94255a4f2bf4de026b9fc40f34713e03614c46854a56360c7ab3aed138f640
                                                            • Instruction Fuzzy Hash: 0ED0A721808240DEFF1A4B958C0C1D477E1BB012A6B0A066DCC8753152E7289A47CA31
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: af4583d5eb6ef5ff11a66a3a9e3939595ceb4d2602a38d3ad1808113dd2b2f53
                                                            • Instruction ID: 37ed90306c9643db00e5b9f1bfb991b922d39a5f00cd673a2e9f00747ff9b92f
                                                            • Opcode Fuzzy Hash: af4583d5eb6ef5ff11a66a3a9e3939595ceb4d2602a38d3ad1808113dd2b2f53
                                                            • Instruction Fuzzy Hash: D7C02B7142F7040FC3800B3234AF6C47B24D1130E431480A2C80EC41039C06161F1380
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c93b2278e9024730f02d5575f7ac7a38ef7999db7d0c05b4630b769278f95319
                                                            • Instruction ID: eb8ea2fadf5ec54f7c17769226f6d4368277e42ab7c5b86bdec8869b474cf0ba
                                                            • Opcode Fuzzy Hash: c93b2278e9024730f02d5575f7ac7a38ef7999db7d0c05b4630b769278f95319
                                                            • Instruction Fuzzy Hash: 8CC012B13402086B9244CA88C891822F3AADBC8A24320C039AA0DC7301EA72FC138690
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e2df3408042580dc0b03947f7f994082d5043341b879ff17c2eed820093806cb
                                                            • Instruction ID: d2779a484aba3bd42e37686e6ff5984111cd18bf46ab6306a5fa362aebd353ed
                                                            • Opcode Fuzzy Hash: e2df3408042580dc0b03947f7f994082d5043341b879ff17c2eed820093806cb
                                                            • Instruction Fuzzy Hash: EEC012739491000FE705A6A0A886484BB36DA9561831980EED81DCB212EE2BE9078681
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e01cdfa256bd1bbc5354d1bef7a9ec2c359bd89ec5bbec0ab55f7904bf453999
                                                            • Instruction ID: 194e1cde5d24aa652075523686e5eac5d46c1bfb44d8b5b3d57f5da7361b3e36
                                                            • Opcode Fuzzy Hash: e01cdfa256bd1bbc5354d1bef7a9ec2c359bd89ec5bbec0ab55f7904bf453999
                                                            • Instruction Fuzzy Hash: E5D0127154D2404FD34296A4A8915C0BB30DB46698315C0EFDC5C8F553E6239A17D341
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 820be5b14b53c4e5e2408f73e36a44c3f87d6f6f0f090536ddf2ea731fb63a64
                                                            • Instruction ID: 7c7b66cc5b639a55f7b0607373a13cd5562ae02c4acb020fe8046bf205ba875c
                                                            • Opcode Fuzzy Hash: 820be5b14b53c4e5e2408f73e36a44c3f87d6f6f0f090536ddf2ea731fb63a64
                                                            • Instruction Fuzzy Hash: 2FE0EC71D05124CAFF249B21E804B9E7364FB85294F4299F4CA4AB3140D634FD828F81
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 885f68233fad5ce2b17232b448fd52e7cd3397162d2e7dc70c554905b6517d02
                                                            • Instruction ID: 30f428846da160f7c6d67f7e55a7532f3fb1e316bad1ed9ac25291705f73054b
                                                            • Opcode Fuzzy Hash: 885f68233fad5ce2b17232b448fd52e7cd3397162d2e7dc70c554905b6517d02
                                                            • Instruction Fuzzy Hash: 51D022B010C7441FC301A2B0AC21481BB698981108704C0FFD40D8B103C923E8038389
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1111c3ca058f8614bac19ce1bf3140fdb093d7ba377dc3b003ba5887c5cb60f7
                                                            • Instruction ID: e873f148f8aa6e0c86c3af8891abbdf8286f855dc7e8b043d6120be8c92e63e9
                                                            • Opcode Fuzzy Hash: 1111c3ca058f8614bac19ce1bf3140fdb093d7ba377dc3b003ba5887c5cb60f7
                                                            • Instruction Fuzzy Hash: A8D0C9301096449FC38397B89861418BF659E87134308C6DED86C8B2E7DA369917C692
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 25f3a56448638a80d19a78ba5195ce2916f1568bc49407fa1cb078c9d2e7377d
                                                            • Instruction ID: f99b6a7dfd024669cce8a56e5f7d290e93140da958dc01852578a8ee5bdb9b99
                                                            • Opcode Fuzzy Hash: 25f3a56448638a80d19a78ba5195ce2916f1568bc49407fa1cb078c9d2e7377d
                                                            • Instruction Fuzzy Hash: CCC012F69541446BCA00B6F0959F4E57F40AB6125571949DA845A8B003CB29D123DA10
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b878580622a1907a73f241e8b842e14185256e58d2a4e8ac18c27d9019c565ad
                                                            • Instruction ID: 64519ccfe7729403fd596a9a4ecbcaa83760b197ae26b16c0dfb3401a376c4e0
                                                            • Opcode Fuzzy Hash: b878580622a1907a73f241e8b842e14185256e58d2a4e8ac18c27d9019c565ad
                                                            • Instruction Fuzzy Hash: 25C080706185045B8245E6E4E8A0C54BB5EDE50118354C05DA54D87117EF33FD1285C4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8ae5817a3df5315c0028acdd428f7dd07433fcc5bbec95c639aa754089ef7e68
                                                            • Instruction ID: a9bdf74e0df357f8c3375256a3334a4eefac077f1b6a5c80e42ce291c50e3906
                                                            • Opcode Fuzzy Hash: 8ae5817a3df5315c0028acdd428f7dd07433fcc5bbec95c639aa754089ef7e68
                                                            • Instruction Fuzzy Hash: 4ED01231904615DBEF189B21D81C7997369BF04345F458574D44752150DF645D85CF52
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 456b27671e0230d24b9fa34dce9942fed306119345e35941def40739e15e0a81
                                                            • Instruction ID: 88a3f1d0c48037a1ebfad6038e4ab7ac3521855f9b6094a185c01df365a0e6b7
                                                            • Opcode Fuzzy Hash: 456b27671e0230d24b9fa34dce9942fed306119345e35941def40739e15e0a81
                                                            • Instruction Fuzzy Hash: 04C08CB291FB880BC7021EB178911D47B2299E220A71400FBC92E481239426823B834A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 88bad814c2b2e286d4c835365825d48daadd6f9aaf8df8f9b2f364ab1f2d2b29
                                                            • Instruction ID: aa2d60146cd44287da3c30749c0cbe4795861eef183cca55617b864f7d2c597a
                                                            • Opcode Fuzzy Hash: 88bad814c2b2e286d4c835365825d48daadd6f9aaf8df8f9b2f364ab1f2d2b29
                                                            • Instruction Fuzzy Hash: 25D022B680C3845EC7039320942544B3F30CA4320170280EBC140CB033AE310C00CB62
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dbcef5c395f5c673d87ed76c55c2f1c93d814102d17bdb09fc090918b690f88a
                                                            • Instruction ID: 58c7e918dc9fc6e739d0296992eb27fcb8a7bf4254ad48f247067e0340e6a738
                                                            • Opcode Fuzzy Hash: dbcef5c395f5c673d87ed76c55c2f1c93d814102d17bdb09fc090918b690f88a
                                                            • Instruction Fuzzy Hash: A6C012313402095BD304CA88C842A22B3AADBC8614B14C079A808C7746DE36EC028694
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e510a7e7d0d9006ded3a26831827a498d953f14517cb15eda609935e5c887a20
                                                            • Instruction ID: ca7432d79e15bfa53e238f48532e156cef24cd882d36bb41ec3e2378b2d156d2
                                                            • Opcode Fuzzy Hash: e510a7e7d0d9006ded3a26831827a498d953f14517cb15eda609935e5c887a20
                                                            • Instruction Fuzzy Hash: 94C04CA95593C01EFF470B200A697813F219F53B09F0A45E6E6D9AA1D3C5851845CB67
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3810413248.0000000005390000.00000040.00000800.00020000.00000000.sdmp, Offset: 05390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5390000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                                            • Instruction ID: 89f7625bcd3042e5662e2b0f59687678129b36ffb3fe7dec0c562e4284fda470
                                                            • Opcode Fuzzy Hash: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                                            • Instruction Fuzzy Hash: 05C04C753042085F9344DA9DD851C26F7E9DBD8614714C06DA90DC7351EA72FD13C694
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ec0f80fa08439757cf94bc1d904d30404f7ce22f7959f1c716c558b8feecb111
                                                            • Instruction ID: 9e04b6bb78ca8f6c8aecde45d9b61bc3e3fba240d69fcc31596d5e9cc1c7f5ab
                                                            • Opcode Fuzzy Hash: ec0f80fa08439757cf94bc1d904d30404f7ce22f7959f1c716c558b8feecb111
                                                            • Instruction Fuzzy Hash: E9C08C7220C2C08FE602C2D4E892A14BB309F81218768C0BFE58DCF352EA27EC03C390
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                                            • Instruction ID: 89f7625bcd3042e5662e2b0f59687678129b36ffb3fe7dec0c562e4284fda470
                                                            • Opcode Fuzzy Hash: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                                            • Instruction Fuzzy Hash: 05C04C753042085F9344DA9DD851C26F7E9DBD8614714C06DA90DC7351EA72FD13C694
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                                            • Instruction ID: 89f7625bcd3042e5662e2b0f59687678129b36ffb3fe7dec0c562e4284fda470
                                                            • Opcode Fuzzy Hash: 2f9c937b705b733c9644217cffe37b903ab6a11d94893328ab2d7921f8117b8c
                                                            • Instruction Fuzzy Hash: 05C04C753042085F9344DA9DD851C26F7E9DBD8614714C06DA90DC7351EA72FD13C694
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 061c6b78c5f3f818be10772692b3b20efc7625ff161a24da4d1b5a9a5089116f
                                                            • Instruction ID: 761058ae3e8e644dd0343906eca810b9cfeae7cdd6a8ef85fb8cbae87f1082b7
                                                            • Opcode Fuzzy Hash: 061c6b78c5f3f818be10772692b3b20efc7625ff161a24da4d1b5a9a5089116f
                                                            • Instruction Fuzzy Hash: F5D09234A003148FEF189B30D92DB5976BBFB89301F0440E9991E93351DE381D458F02
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 10d50580a976d6ab8a6f726c38940223735e0597a71cd03702ec0311c430ebfe
                                                            • Instruction ID: 476902ae52922c721b491ad8effc14425bc45f79e7cfaa5e5602a94dfd7b3f1c
                                                            • Opcode Fuzzy Hash: 10d50580a976d6ab8a6f726c38940223735e0597a71cd03702ec0311c430ebfe
                                                            • Instruction Fuzzy Hash: 51C092356091044B9746DA94F8D1998B7A9DB84A28354C0ADE81C8BA02CA33DA038BC0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 67c00e35afc57875313ee494e81cef70058ac03873699df5c5f438d5ad03ce2f
                                                            • Instruction ID: 064c337a9d8d76753c619dece5c43029fd835da25a7c8059265dceeda08e2b38
                                                            • Opcode Fuzzy Hash: 67c00e35afc57875313ee494e81cef70058ac03873699df5c5f438d5ad03ce2f
                                                            • Instruction Fuzzy Hash: DFB0123114420C5BC740D6CCE891892F39CDB8853C364C1A9EA0C4B322DA63FE13C580
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0a1a7cd8dcb9a18faec6ad7b5a605520a4b0aacbf332f4629fe5a4ac2ab06c42
                                                            • Instruction ID: f47dcbf6ef0f4294380c5b5bf4a2f6771eb1764873d6cd766984be53b91e4b94
                                                            • Opcode Fuzzy Hash: 0a1a7cd8dcb9a18faec6ad7b5a605520a4b0aacbf332f4629fe5a4ac2ab06c42
                                                            • Instruction Fuzzy Hash: FEC02BF70010445BC340CAA0EAD34D2BF01EB60360749449ED44A0F003C726832BEB02
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                                            • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                                            • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e9a0d6d2f97a646a5b6f8a50e2a6723090a1d57de7c7da7757b106e235840e79
                                                            • Instruction ID: 60d58c608dc1bf67252553c288f50be987ad02a62105f1aa38afe9a1ae113cac
                                                            • Opcode Fuzzy Hash: e9a0d6d2f97a646a5b6f8a50e2a6723090a1d57de7c7da7757b106e235840e79
                                                            • Instruction Fuzzy Hash: 17B09230A480045B8244D6D8E441914B3659B84628358C4ADA80DCB202DB73DD0386C0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: af8e06a732ca707132f27ef7a83e288a845aad2dfe2584e40d54ff240b01922d
                                                            • Instruction ID: 2ad57114494cc740969b95bee8f444b209d5990da35e5c480c7824bf6c3857fe
                                                            • Opcode Fuzzy Hash: af8e06a732ca707132f27ef7a83e288a845aad2dfe2584e40d54ff240b01922d
                                                            • Instruction Fuzzy Hash: B7C09276140208EFC700DF69E844C45BBB8FF1976071180A1FA088B332C732E820DA94
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                                            • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                                            • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                                            • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                                            • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                                                            • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                                                            • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7a59cd3075cfa095ebd7dee9175ea28bb92354134834cb39d19dbda94601af58
                                                            • Instruction ID: 05ad78c5a76788e0d6b2caa98d8081a2dd8baef43ff9fd59d51243a56a43183e
                                                            • Opcode Fuzzy Hash: 7a59cd3075cfa095ebd7dee9175ea28bb92354134834cb39d19dbda94601af58
                                                            • Instruction Fuzzy Hash: 4AB012302080044F8244D6D4E441814B355DBC4218314C0ADE80CCB202CB33DC0385C0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3807982756.0000000004E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E40000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_4e40000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0975440b71d2972ae2b4c22c278a36e97646582ff13823afd27cae5a5bae913e
                                                            • Instruction ID: 43193d58c792e5d1b388fdccb85984eee8dcb17f4c9cfed27c489ffc4ac89ec5
                                                            • Opcode Fuzzy Hash: 0975440b71d2972ae2b4c22c278a36e97646582ff13823afd27cae5a5bae913e
                                                            • Instruction Fuzzy Hash: F8B0923BA0002986CA00D688E4404DCBB31DA98232F408033C200620008621157A8A60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809586295.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5180000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0253d29c5b3d38886c79932c3bbefe7a3308ce59e5b312c3b69203876629f9dc
                                                            • Instruction ID: e3792ae4c24523b0461560050c4a67d8257194d5107971ab69802e02a953a818
                                                            • Opcode Fuzzy Hash: 0253d29c5b3d38886c79932c3bbefe7a3308ce59e5b312c3b69203876629f9dc
                                                            • Instruction Fuzzy Hash: EEB01274100000ABC601CF04CD44C05FBA1EFE5305B18C46EB84897315DB33DC13EA10
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0ed44aecb405a7745a621663e02df84954dbf47740a7551d6cc00075eb9a20ae
                                                            • Instruction ID: 0211bc2cc40ebc3e4ddc0c555dd3853ec5b908a756772a4239254573067e955c
                                                            • Opcode Fuzzy Hash: 0ed44aecb405a7745a621663e02df84954dbf47740a7551d6cc00075eb9a20ae
                                                            • Instruction Fuzzy Hash: C4A0223000AB0C82CA0832B0B800020B38C28C020A3C000BA822E08B200833E0B0888E
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.3809827498.0000000005190000.00000040.00000800.00020000.00000000.sdmp, Offset: 05190000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_5190000_RegSvcs.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 79120e8edd241c7c070638671b39e2c95166af69227e5b00f019a8cc9ddc85e5
                                                            • Instruction ID: 541973be635c200469c3d377e456a05afaca387ba92eb0aef9f16f191444c702
                                                            • Opcode Fuzzy Hash: 79120e8edd241c7c070638671b39e2c95166af69227e5b00f019a8cc9ddc85e5
                                                            • Instruction Fuzzy Hash: 2790023104570C8B46402799741D959775DE5495197844051A50E816056E59A85445A5