Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Fqtwswg.exe

Overview

General Information

Sample name:Fqtwswg.exe
Analysis ID:1586803
MD5:cdcf5fc744c188addfdc8d48cdb85088
SHA1:438750ef4642aefcb412d4009136846fdfd438bd
SHA256:876d19e89d52fa650fd3f1d1b0533c18522bbb853571033b721e30a27c96784c
Tags:exeuser-lowmal3
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AntiVM3
AI detected suspicious sample
Drops VBS files to the startup folder
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Fqtwswg.exe (PID: 7396 cmdline: "C:\Users\user\Desktop\Fqtwswg.exe" MD5: CDCF5FC744C188ADDFDC8D48CDB85088)
    • InstallUtil.exe (PID: 7480 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • WerFault.exe (PID: 7620 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7480 -s 1148 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1384843220.00000000051D0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      Process Memory Space: Fqtwswg.exe PID: 7396JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Process Memory Space: Fqtwswg.exe PID: 7396JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Process Memory Space: InstallUtil.exe PID: 7480JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.Fqtwswg.exe.51d0000.7.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.Fqtwswg.exe.51d0000.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Fqtwswg.exe, ProcessId: 7396, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Method.vbs
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Fqtwswg.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\Method.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen
                Source: C:\Users\user\AppData\Roaming\Method.exeReversingLabs: Detection: 71%
                Source: Fqtwswg.exeReversingLabs: Detection: 68%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\Method.exeJoe Sandbox ML: detected
                Source: Fqtwswg.exeJoe Sandbox ML: detected
                Source: Fqtwswg.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Fqtwswg.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: InstallUtil.pdb8U source: InstallUtil.exe, 00000002.00000002.2585978574.000000000062E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb@ source: InstallUtil.exe, 00000002.00000002.2585978574.000000000062E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.2585978574.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B70000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Fqtwswg.exe, 00000000.00000002.1386173196.00000000057D9000.00000004.00000800.00020000.00000000.sdmp, Fqtwswg.exe, 00000000.00000002.1392570933.0000000006A10000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: ((.pdb source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Fqtwswg.exe, 00000000.00000002.1386173196.00000000057D9000.00000004.00000800.00020000.00000000.sdmp, Fqtwswg.exe, 00000000.00000002.1392570933.0000000006A10000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2585978574.000000000062E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\InstallUtil.pdb/^ source: InstallUtil.exe, 00000002.00000002.2585978574.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdbork source: InstallUtil.exe, 00000002.00000002.2585978574.000000000062E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B70000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdbQ source: InstallUtil.exe, 00000002.00000002.2585978574.00000000005E8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ?eoC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdbPCa source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.pdb source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B70000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdb\ source: InstallUtil.exe, 00000002.00000002.2585978574.00000000005E8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdbz source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdb source: InstallUtil.exe, 00000002.00000002.2585978574.000000000062E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.pdb source: InstallUtil.exe, 00000002.00000002.2585978574.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B70000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdb.NETFrameworkv4.0.30319InstallUtil.exe source: InstallUtil.exe, 00000002.00000002.2585978574.000000000066A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb7 source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B80000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B80000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.2585978574.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B70000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: @eo.pdb source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdbr source: InstallUtil.exe, 00000002.00000002.2585978574.00000000005E8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.PDBpn source: InstallUtil.exe, 00000002.00000002.2585978574.000000000062E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2585978574.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: @+eHPYo8C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 4x nop then jmp 0247F8AAh0_2_0247F698
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 4x nop then jmp 0247F8AAh0_2_0247F688
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_051AD218
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 4x nop then jmp 05320F68h0_2_05320EB0
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 4x nop then jmp 05320F68h0_2_05320EA8
                Source: global trafficTCP traffic: 192.168.2.9:55659 -> 1.1.1.1:53
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: Fqtwswg.exe, 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                Source: Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                Source: Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                Source: Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmp, Fqtwswg.exe, 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_05322BA0 NtProtectVirtualMemory,0_2_05322BA0
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_05326790 NtResumeThread,0_2_05326790
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_05322B9B NtProtectVirtualMemory,0_2_05322B9B
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_05326789 NtResumeThread,0_2_05326789
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_00B18B880_2_00B18B88
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_00B150F80_2_00B150F8
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_00B150E80_2_00B150E8
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_00B1EEE00_2_00B1EEE0
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_00B147680_2_00B14768
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_00B1474D0_2_00B1474D
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0247B8980_2_0247B898
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_04FB1DC00_2_04FB1DC0
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_04FB00400_2_04FB0040
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_04FB5C170_2_04FB5C17
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_04FB1DB10_2_04FB1DB1
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_04FB97B00_2_04FB97B0
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_04FBBF0D0_2_04FBBF0D
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_04FB90F80_2_04FB90F8
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_04FB90E80_2_04FB90E8
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_04FB00320_2_04FB0032
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_04FB31600_2_04FB3160
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_04FB31500_2_04FB3150
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051AFC280_2_051AFC28
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051A72230_2_051A7223
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051A001A0_2_051A001A
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051A00400_2_051A0040
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051BA5780_2_051BA578
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051BA5880_2_051BA588
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051B15B80_2_051B15B8
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051B15C80_2_051B15C8
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051BC7300_2_051BC730
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051B2A900_2_051B2A90
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051B2AA00_2_051B2AA0
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051B62C80_2_051B62C8
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051B0AF80_2_051B0AF8
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051B0AE80_2_051B0AE8
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_05321C7F0_2_05321C7F
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_05321C900_2_05321C90
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_05320A120_2_05320A12
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_053313590_2_05331359
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_053373880_2_05337388
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_053399F80_2_053399F8
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0533DAB00_2_0533DAB0
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0533A7300_2_0533A730
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0533A7400_2_0533A740
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_053373780_2_05337378
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_05333DB20_2_05333DB2
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0533DDD70_2_0533DDD7
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_054700400_2_05470040
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_054700320_2_05470032
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0548E7180_2_0548E718
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_065277180_2_06527718
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0652F2E80_2_0652F2E8
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_065277080_2_06527708
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0652F2D80_2_0652F2D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_02185AB02_2_02185AB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_02184F582_2_02184F58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_02185AA22_2_02185AA2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_02184EE52_2_02184EE5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_02184F582_2_02184F58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_02184CD92_2_02184CD9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_021821582_2_02182158
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_021821682_2_02182168
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7480 -s 1148
                Source: Fqtwswg.exe, 00000000.00000002.1358725586.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNuzfblcfzx.exe" vs Fqtwswg.exe
                Source: Fqtwswg.exe, 00000000.00000002.1358725586.0000000002971000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNuzfblcfzx.exe" vs Fqtwswg.exe
                Source: Fqtwswg.exe, 00000000.00000002.1386173196.00000000057D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Fqtwswg.exe
                Source: Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Fqtwswg.exe
                Source: Fqtwswg.exe, 00000000.00000002.1357492813.00000000006DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Fqtwswg.exe
                Source: Fqtwswg.exe, 00000000.00000002.1392570933.0000000006A10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Fqtwswg.exe
                Source: Fqtwswg.exe, 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Fqtwswg.exe
                Source: Fqtwswg.exe, 00000000.00000002.1375645031.0000000004DE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameJhlujx.dll" vs Fqtwswg.exe
                Source: Fqtwswg.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Fqtwswg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Method.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: classification engineClassification label: mal100.expl.evad.winEXE@4/3@0/0
                Source: C:\Users\user\Desktop\Fqtwswg.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Method.vbsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7620:64:WilError_03
                Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\8eef01f8-ca6e-4b44-8ded-e5894a62c4a5Jump to behavior
                Source: Fqtwswg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Fqtwswg.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\Fqtwswg.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Fqtwswg.exeReversingLabs: Detection: 68%
                Source: C:\Users\user\Desktop\Fqtwswg.exeFile read: C:\Users\user\Desktop\Fqtwswg.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Fqtwswg.exe "C:\Users\user\Desktop\Fqtwswg.exe"
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7480 -s 1148
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: Fqtwswg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Fqtwswg.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: Fqtwswg.exeStatic file information: File size 1449472 > 1048576
                Source: Fqtwswg.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x161400
                Source: Fqtwswg.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: InstallUtil.pdb8U source: InstallUtil.exe, 00000002.00000002.2585978574.000000000062E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb@ source: InstallUtil.exe, 00000002.00000002.2585978574.000000000062E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.2585978574.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B70000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Fqtwswg.exe, 00000000.00000002.1386173196.00000000057D9000.00000004.00000800.00020000.00000000.sdmp, Fqtwswg.exe, 00000000.00000002.1392570933.0000000006A10000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: ((.pdb source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Fqtwswg.exe, 00000000.00000002.1386173196.00000000057D9000.00000004.00000800.00020000.00000000.sdmp, Fqtwswg.exe, 00000000.00000002.1392570933.0000000006A10000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2585978574.000000000062E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\InstallUtil.pdb/^ source: InstallUtil.exe, 00000002.00000002.2585978574.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdbork source: InstallUtil.exe, 00000002.00000002.2585978574.000000000062E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B70000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdbQ source: InstallUtil.exe, 00000002.00000002.2585978574.00000000005E8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ?eoC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdbPCa source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.pdb source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B70000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdb\ source: InstallUtil.exe, 00000002.00000002.2585978574.00000000005E8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdbz source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdb source: InstallUtil.exe, 00000002.00000002.2585978574.000000000062E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.pdb source: InstallUtil.exe, 00000002.00000002.2585978574.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B70000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdb.NETFrameworkv4.0.30319InstallUtil.exe source: InstallUtil.exe, 00000002.00000002.2585978574.000000000066A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb7 source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B80000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B80000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.2585978574.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe, 00000002.00000002.2592660745.0000000004B70000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: @eo.pdb source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdbr source: InstallUtil.exe, 00000002.00000002.2585978574.00000000005E8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.PDBpn source: InstallUtil.exe, 00000002.00000002.2585978574.000000000062E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2585978574.0000000000617000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: @+eHPYo8C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.2584822816.00000000001A8000.00000004.00000010.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: Yara matchFile source: 0.2.Fqtwswg.exe.51d0000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Fqtwswg.exe.51d0000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1384843220.00000000051D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Fqtwswg.exe PID: 7396, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7480, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_04FB3C81 push eax; ret 0_2_04FB3C82
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051BC5D8 push ds; ret 0_2_051BC5D9
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_051BC4E8 push ds; ret 0_2_051BC529
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_05337AB8 push esp; iretd 0_2_05337AB9
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0652D27A push es; retf 0_2_0652D284
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_065261C9 push es; ret 0_2_065261D4
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0652D1E6 push es; iretd 0_2_0652D20C
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_065261BD push es; iretd 0_2_065261C8
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0652DEBA push es; retf 0_2_0652DEC0
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0652ED57 push es; iretd 0_2_0652ED54
                Source: C:\Users\user\Desktop\Fqtwswg.exeCode function: 0_2_0652ED4C push es; iretd 0_2_0652ED54
                Source: Fqtwswg.exeStatic PE information: section name: .text entropy: 7.994312528671897
                Source: Method.exe.0.drStatic PE information: section name: .text entropy: 7.994312528671897
                Source: C:\Users\user\Desktop\Fqtwswg.exeFile created: C:\Users\user\AppData\Roaming\Method.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\Fqtwswg.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Method.vbsJump to dropped file
                Source: C:\Users\user\Desktop\Fqtwswg.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Method.vbsJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Method.vbsJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: Fqtwswg.exe PID: 7396, type: MEMORYSTR
                Source: Fqtwswg.exe, 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\Fqtwswg.exeMemory allocated: B10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeMemory allocated: 2640000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeMemory allocated: 2450000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeMemory allocated: 5490000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeMemory allocated: 5340000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2180000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2310000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 4310000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                Source: C:\Users\user\Desktop\Fqtwswg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                Source: Fqtwswg.exe, 00000000.00000002.1375645031.0000000004DE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: U7oQm1fSGLB2lnaQemu
                Source: Fqtwswg.exe, 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: Fqtwswg.exe, 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q 1:en-CH:Microsoft|VMWare|Virtual
                Source: Fqtwswg.exe, 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                Source: Fqtwswg.exe, 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q 1:en-CH:VMware|VIRTUAL|A M I|Xen
                Source: Fqtwswg.exe, 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Fqtwswg.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 46E000Jump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 470000Jump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 3CA008Jump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeQueries volume information: C:\Users\user\Desktop\Fqtwswg.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Fqtwswg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts2
                Windows Management Instrumentation
                1
                Scripting
                211
                Process Injection
                1
                Masquerading
                OS Credential Dumping221
                Security Software Discovery
                Remote Services1
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Registry Run Keys / Startup Folder
                2
                Registry Run Keys / Startup Folder
                3
                Virtualization/Sandbox Evasion
                LSASS Memory3
                Virtualization/Sandbox Evasion
                Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook211
                Process Injection
                NTDS32
                System Information Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                Obfuscated Files or Information
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Software Packing
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Fqtwswg.exe68%ReversingLabsByteCode-MSIL.Trojan.Leonem
                Fqtwswg.exe100%AviraTR/Dropper.MSIL.Gen
                Fqtwswg.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\Method.exe100%AviraTR/Dropper.MSIL.Gen
                C:\Users\user\AppData\Roaming\Method.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Method.exe71%ReversingLabsByteCode-MSIL.Trojan.Leonem
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                s-part-0017.t-0009.t-msedge.net
                13.107.246.45
                truefalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://github.com/mgravell/protobuf-netFqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmpfalse
                    high
                    https://github.com/mgravell/protobuf-netiFqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmpfalse
                      high
                      https://stackoverflow.com/q/14436606/23354Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmp, Fqtwswg.exe, 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://github.com/mgravell/protobuf-netJFqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFqtwswg.exe, 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/11564914/23354;Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmpfalse
                              high
                              https://stackoverflow.com/q/2152978/23354Fqtwswg.exe, 00000000.00000002.1385406917.00000000052A0000.00000004.08000000.00040000.00000000.sdmpfalse
                                high
                                No contacted IP infos
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1586803
                                Start date and time:2025-01-09 16:37:11 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 28s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:10
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:Fqtwswg.exe
                                Detection:MAL
                                Classification:mal100.expl.evad.winEXE@4/3@0/0
                                EGA Information:
                                • Successful, ratio: 50%
                                HCA Information:
                                • Successful, ratio: 91%
                                • Number of executed functions: 352
                                • Number of non-executed functions: 39
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
                                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target InstallUtil.exe, PID 7480 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • VT rate limit hit for: Fqtwswg.exe
                                TimeTypeDescription
                                15:38:06AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Method.vbs
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                s-part-0017.t-0009.t-msedge.netBPD-003777.exeGet hashmaliciousUnknownBrowse
                                • 13.107.246.45
                                new.batGet hashmaliciousUnknownBrowse
                                • 13.107.246.45
                                https://bryf.atchirlisc.ru/EeMAGvIe/Get hashmaliciousHTMLPhisherBrowse
                                • 13.107.246.45
                                Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                • 13.107.246.45
                                24EPV9vjc5.exeGet hashmaliciousUnknownBrowse
                                • 13.107.246.45
                                VmjvNTbD5J.exeGet hashmaliciousUnknownBrowse
                                • 13.107.246.45
                                https://combatironapparel.com/collections/ranger-panty-shortsGet hashmaliciousUnknownBrowse
                                • 13.107.246.45
                                cLm7ThwEvh.msiGet hashmaliciousUnknownBrowse
                                • 13.107.246.45
                                EMfRi659Ir.exeGet hashmaliciousUnknownBrowse
                                • 13.107.246.45
                                https://laserglow-technologies-industrial-48815730.hubspotpagebuilder.com/laserglowGet hashmaliciousHTMLPhisherBrowse
                                • 13.107.246.45
                                No context
                                No context
                                No context
                                Process:C:\Users\user\Desktop\Fqtwswg.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):1449472
                                Entropy (8bit):7.992778702101576
                                Encrypted:true
                                SSDEEP:24576:dnZlxDqF+ArdCimnybya6zeI7+pizBOLYDUtlNBuzXKgQ8scFJzM8zonUUha/:hZlcvrd5Ic76zzMilO9gzXRQVshzF8a/
                                MD5:CDCF5FC744C188ADDFDC8D48CDB85088
                                SHA1:438750EF4642AEFCB412D4009136846FDFD438BD
                                SHA-256:876D19E89D52FA650FD3F1D1B0533C18522BBB853571033B721E30A27C96784C
                                SHA-512:031EDAF3FB6D4D08329A0CE04EA593DA2C51DA798E215A4D01B28A5A9CF725B3ADC02847F272CC0B09B41502991C918FFB69918E7D35105CFC5AE4BBAAE9CD87
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 71%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Q.}g.............................3... ...@....@.. ....................................`..................................3..J....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................3......H.......,r..D1......L...p...(............................................(\...(n...*..(....*.~....-.r...p.....+.+.+......~....*(....+.o....+.s....+..~....*..+......*.+..+.r?..p~....+.t....*(....+.o....+....(....*..(....*..(....*..(....*.0..s.......+5+:+?+D+I.-(+GrQ..p+C.,.,..-..+?.H+>rc..p(....,....6.2(....+.o....+.o....+.o....+..+..+.(....+..+..+.&...*.,...-.*.........ff........(....*>+......*s ...+..0..........8....8....8....8....{....8....&.-E8....,28....{.....8.....,.,.8.
                                Process:C:\Users\user\Desktop\Fqtwswg.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\Fqtwswg.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):80
                                Entropy (8bit):4.740634426587137
                                Encrypted:false
                                SSDEEP:3:FER/n0eFHHoqLTVSREaKC51AHn:FER/lFHIqLTwiaZ51O
                                MD5:D5C938279C992A2CFBB59BDE9AA6052F
                                SHA1:B933D3E80B47A9B8BB62D8CFCF15E4283014CE8F
                                SHA-256:7832A9CC8F146613C6E307E7451A18C2677CDB2FF4DF3BE86E52F6B0D02876BB
                                SHA-512:2FB4D1000FD3DDA27D01156AE7284F4A36495B22E5E471504F7D69E6C7E65FE15A4CC1BE9DE9773C433CB935FC2969BE3B09D9997D597D23F38B338F2D16D68E
                                Malicious:true
                                Reputation:low
                                Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Roaming\Method.exe"""
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.992778702101576
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:Fqtwswg.exe
                                File size:1'449'472 bytes
                                MD5:cdcf5fc744c188addfdc8d48cdb85088
                                SHA1:438750ef4642aefcb412d4009136846fdfd438bd
                                SHA256:876d19e89d52fa650fd3f1d1b0533c18522bbb853571033b721e30a27c96784c
                                SHA512:031edaf3fb6d4d08329a0ce04ea593da2c51da798e215a4d01b28a5a9cf725b3adc02847f272cc0b09b41502991c918ffb69918e7d35105cfc5ae4bbaae9cd87
                                SSDEEP:24576:dnZlxDqF+ArdCimnybya6zeI7+pizBOLYDUtlNBuzXKgQ8scFJzM8zonUUha/:hZlcvrd5Ic76zzMilO9gzXRQVshzF8a/
                                TLSH:416533BC7A9D5DB0E2668A769CE360D1DB61C1AFA3A6E351158063F840313984DC7ECB
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Q.}g.............................3... ...@....@.. ....................................`................................
                                Icon Hash:00928e8e8686b000
                                Entrypoint:0x5633e2
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x677DDD51 [Wed Jan 8 02:05:05 2025 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1633980x4a.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1640000x58e.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1660000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x1613e80x16140068eaf1c586c519b99118489fc47399deFalse0.9898155520169851data7.994312528671897IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0x1640000x58e0x60025565ac4dee59bc77e2a203da924eda2False0.4173177083333333data4.080570157734367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x1660000xc0x200bdf0eba6a4d801c519406fb845d6112fFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_VERSION0x16405c0x30cdata0.42435897435897435
                                RT_MANIFEST0x1643a40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 9, 2025 16:38:21.731292963 CET5565953192.168.2.91.1.1.1
                                Jan 9, 2025 16:38:21.736093044 CET53556591.1.1.1192.168.2.9
                                Jan 9, 2025 16:38:21.736253023 CET5565953192.168.2.91.1.1.1
                                Jan 9, 2025 16:38:21.741048098 CET53556591.1.1.1192.168.2.9
                                Jan 9, 2025 16:38:22.192846060 CET5565953192.168.2.91.1.1.1
                                Jan 9, 2025 16:38:22.197856903 CET53556591.1.1.1192.168.2.9
                                Jan 9, 2025 16:38:22.199141026 CET5565953192.168.2.91.1.1.1
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 9, 2025 16:38:21.730513096 CET53549421.1.1.1192.168.2.9
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Jan 9, 2025 16:38:00.563544035 CET1.1.1.1192.168.2.90xc733No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                Jan 9, 2025 16:38:00.563544035 CET1.1.1.1192.168.2.90xc733No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:10:38:02
                                Start date:09/01/2025
                                Path:C:\Users\user\Desktop\Fqtwswg.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\Fqtwswg.exe"
                                Imagebase:0x40000
                                File size:1'449'472 bytes
                                MD5 hash:CDCF5FC744C188ADDFDC8D48CDB85088
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1384843220.00000000051D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1358725586.0000000002641000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:true

                                Target ID:2
                                Start time:10:38:03
                                Start date:09/01/2025
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                Imagebase:0x10000
                                File size:42'064 bytes
                                MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:false

                                Target ID:5
                                Start time:10:38:05
                                Start date:09/01/2025
                                Path:C:\Windows\SysWOW64\WerFault.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7480 -s 1148
                                Imagebase:0x100000
                                File size:483'680 bytes
                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:11.6%
                                  Dynamic/Decrypted Code Coverage:93.1%
                                  Signature Coverage:4.4%
                                  Total number of Nodes:203
                                  Total number of Limit Nodes:5
                                  execution_graph 59517 b14200 59518 b1421d 59517->59518 59519 b1422d 59518->59519 59525 51a9050 59518->59525 59529 51a3987 59518->59529 59532 51a8a26 59518->59532 59536 51a4f94 59518->59536 59540 51a4fb7 59518->59540 59526 51a906f 59525->59526 59543 51aced0 59526->59543 59531 51aced0 VirtualProtect 59529->59531 59530 51a39a5 59531->59530 59533 51a8a45 59532->59533 59535 51aced0 VirtualProtect 59533->59535 59534 51a01ce 59535->59534 59537 51a4f9c 59536->59537 59538 51a4fd1 59537->59538 59539 51aced0 VirtualProtect 59537->59539 59538->59519 59539->59538 59541 51a4fd1 59540->59541 59542 51aced0 VirtualProtect 59540->59542 59541->59519 59542->59541 59545 51acef7 59543->59545 59547 51ad3d0 59545->59547 59548 51ad419 VirtualProtect 59547->59548 59550 51a909a 59548->59550 59328 51ae508 59329 51ae54c VirtualAlloc 59328->59329 59331 51ae5b9 59329->59331 59332 5322ba0 59333 5322bef NtProtectVirtualMemory 59332->59333 59335 5322c67 59333->59335 59551 53387d6 59552 53387e0 59551->59552 59556 6523530 59552->59556 59561 6523520 59552->59561 59553 533881e 59557 6523545 59556->59557 59558 652355b 59557->59558 59566 6525339 59557->59566 59572 6524dce 59557->59572 59558->59553 59562 6523545 59561->59562 59563 652355b 59562->59563 59564 6525339 2 API calls 59562->59564 59565 6524dce 2 API calls 59562->59565 59563->59553 59564->59563 59565->59563 59567 6525343 59566->59567 59568 6524dcf 59566->59568 59577 65288b0 59568->59577 59581 65288a4 59568->59581 59576 6524dd4 59572->59576 59573 6524e60 59574 65288b0 CopyFileA 59574->59573 59575 65288a4 CopyFileA 59575->59573 59576->59574 59576->59575 59578 652890c CopyFileA 59577->59578 59580 6528a3d 59578->59580 59582 652890c CopyFileA 59581->59582 59584 6528a3d 59582->59584 59585 6bd01c 59586 6bd034 59585->59586 59587 6bd08f 59586->59587 59589 51ada58 59586->59589 59590 51adab1 59589->59590 59593 51adfb8 59590->59593 59591 51adae6 59594 51adfe5 59593->59594 59595 51aced0 VirtualProtect 59594->59595 59597 51ae17b 59594->59597 59596 51ae16c 59595->59596 59596->59591 59597->59591 59336 533882c 59337 5338836 59336->59337 59341 65294f8 59337->59341 59345 65294e8 59337->59345 59338 5338137 59342 652950d 59341->59342 59344 6529523 59342->59344 59349 65299b2 59342->59349 59344->59338 59346 652950d 59345->59346 59347 6529523 59346->59347 59348 65299b2 10 API calls 59346->59348 59347->59338 59348->59347 59350 6529997 59349->59350 59351 65299ba 59349->59351 59350->59344 59351->59350 59354 652ae50 59351->59354 59359 652ae41 59351->59359 59355 652ae65 59354->59355 59364 652ae90 59355->59364 59369 652aea0 59355->59369 59356 652ae87 59356->59350 59360 652ae4e 59359->59360 59362 652ae90 10 API calls 59360->59362 59363 652aea0 10 API calls 59360->59363 59361 652ae87 59361->59350 59362->59361 59363->59361 59366 652aea0 59364->59366 59365 652afad 59365->59356 59366->59365 59374 652b600 59366->59374 59389 652b5f1 59366->59389 59371 652aecd 59369->59371 59370 652afad 59370->59356 59371->59370 59372 652b600 10 API calls 59371->59372 59373 652b5f1 10 API calls 59371->59373 59372->59371 59373->59371 59375 652b615 59374->59375 59388 652b637 59375->59388 59404 652bff6 59375->59404 59409 652cda4 59375->59409 59414 652bbe6 59375->59414 59419 652c0c1 59375->59419 59424 652bd43 59375->59424 59429 652c7e2 59375->59429 59434 652bca2 59375->59434 59439 652c3d5 59375->59439 59444 652c5b5 59375->59444 59449 652ca35 59375->59449 59454 652bf37 59375->59454 59459 652c897 59375->59459 59388->59366 59390 652b600 59389->59390 59391 652b637 59390->59391 59392 652bff6 2 API calls 59390->59392 59393 652c897 2 API calls 59390->59393 59394 652bf37 2 API calls 59390->59394 59395 652ca35 2 API calls 59390->59395 59396 652c5b5 2 API calls 59390->59396 59397 652c3d5 2 API calls 59390->59397 59398 652bca2 2 API calls 59390->59398 59399 652c7e2 2 API calls 59390->59399 59400 652bd43 2 API calls 59390->59400 59401 652c0c1 2 API calls 59390->59401 59402 652bbe6 2 API calls 59390->59402 59403 652cda4 2 API calls 59390->59403 59391->59366 59392->59391 59393->59391 59394->59391 59395->59391 59396->59391 59397->59391 59398->59391 59399->59391 59400->59391 59401->59391 59402->59391 59403->59391 59405 652c005 59404->59405 59464 5325d08 59405->59464 59468 5325d01 59405->59468 59406 652c09e 59410 652cdb3 59409->59410 59412 5325d01 WriteProcessMemory 59410->59412 59413 5325d08 WriteProcessMemory 59410->59413 59411 652bbce 59412->59411 59413->59411 59415 652bbf0 59414->59415 59472 5326790 59415->59472 59476 5326789 59415->59476 59416 652bbce 59420 652c0d9 59419->59420 59480 652d398 59420->59480 59484 652d389 59420->59484 59421 652c0f1 59425 652bd45 59424->59425 59501 53253e0 59425->59501 59505 53253de 59425->59505 59426 652bbce 59430 652c7f1 59429->59430 59432 53253e0 Wow64SetThreadContext 59430->59432 59433 53253de Wow64SetThreadContext 59430->59433 59431 652bbce 59432->59431 59433->59431 59435 652bcac 59434->59435 59436 652bbce 59435->59436 59509 5325a30 59435->59509 59513 5325a28 59435->59513 59440 652c3df 59439->59440 59442 5325a30 VirtualAllocEx 59440->59442 59443 5325a28 VirtualAllocEx 59440->59443 59441 652bbce 59442->59441 59443->59441 59445 652bbce 59444->59445 59446 652c3d5 59444->59446 59447 5325a30 VirtualAllocEx 59446->59447 59448 5325a28 VirtualAllocEx 59446->59448 59447->59445 59448->59445 59450 652ca44 59449->59450 59452 5325d01 WriteProcessMemory 59450->59452 59453 5325d08 WriteProcessMemory 59450->59453 59451 652bbce 59452->59451 59453->59451 59455 652bc0c 59454->59455 59456 652bbce 59455->59456 59457 5326790 NtResumeThread 59455->59457 59458 5326789 NtResumeThread 59455->59458 59457->59456 59458->59456 59460 652bbce 59459->59460 59461 652c7e1 59459->59461 59462 53253e0 Wow64SetThreadContext 59461->59462 59463 53253de Wow64SetThreadContext 59461->59463 59462->59460 59463->59460 59465 5325d54 WriteProcessMemory 59464->59465 59467 5325ded 59465->59467 59467->59406 59469 5325d08 WriteProcessMemory 59468->59469 59471 5325ded 59469->59471 59471->59406 59473 53267d9 NtResumeThread 59472->59473 59475 5326830 59473->59475 59475->59416 59477 5326790 NtResumeThread 59476->59477 59479 5326830 59477->59479 59479->59416 59481 652d3af 59480->59481 59483 652d3d1 59481->59483 59488 652d552 59481->59488 59483->59421 59485 652d398 59484->59485 59486 652d3d1 59485->59486 59487 652d552 2 API calls 59485->59487 59486->59421 59487->59486 59489 652d561 59488->59489 59493 53236f8 59489->59493 59497 53236ed 59489->59497 59494 5323778 CreateProcessA 59493->59494 59496 5323974 59494->59496 59498 53236f8 59497->59498 59498->59498 59499 5323917 CreateProcessA 59498->59499 59500 5323974 59499->59500 59502 5325429 Wow64SetThreadContext 59501->59502 59504 53254a1 59502->59504 59504->59426 59506 53253e0 Wow64SetThreadContext 59505->59506 59508 53254a1 59506->59508 59508->59426 59510 5325a74 VirtualAllocEx 59509->59510 59512 5325aec 59510->59512 59512->59436 59514 5325a30 VirtualAllocEx 59513->59514 59516 5325aec 59514->59516 59516->59436

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 5331359-533171a 40 5331721-533174b 0->40 41 533171c 0->41 218 5331751 call 5334820 40->218 219 5331751 call 5334810 40->219 41->40 43 5331757-5331aad 64 5331ab4-5331c97 43->64 65 5331aaf 43->65 78 5331c99 64->78 79 5331c9e-5331ec1 64->79 65->64 78->79 92 5331ec3 79->92 93 5331ec8-53320ce 79->93 92->93 106 53320d0 93->106 107 53320d5-5333083 93->107 106->107 218->43 219->43
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: >$ZFg)$aVp
                                  • API String ID: 0-3088637625
                                  • Opcode ID: 271759024e9fffb5cfe355650ac0a7dd776909c4e147d1d1ee2a844f818a9a2c
                                  • Instruction ID: 0cd31178dd1aa01a0d1c6a1b5088f27a1e758c1c8890d5fb28cacbbce3c579a7
                                  • Opcode Fuzzy Hash: 271759024e9fffb5cfe355650ac0a7dd776909c4e147d1d1ee2a844f818a9a2c
                                  • Instruction Fuzzy Hash: 2013C37A900114AFDB469F94DD44D95BBB3FB4D310B169098E2099B33ACB32DEA1EF50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4
                                  • API String ID: 0-4088798008
                                  • Opcode ID: dbb1648a1884b076d0fa46b093f73c1a2023540bcd23ce3a18e1716e74617d56
                                  • Instruction ID: 5d8e69ef393bb2fdafdf95dea2816e3e4a12c1d9a0a72cf4a4a569aefabf22c8
                                  • Opcode Fuzzy Hash: dbb1648a1884b076d0fa46b093f73c1a2023540bcd23ce3a18e1716e74617d56
                                  • Instruction Fuzzy Hash: 40B2E634A00228CFDB14DFA4C995BADB7BABF88701F158599E505AB3A5DB70EC81CF50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 685 652f2e8-652f309 686 652f310-652f39a 685->686 687 652f30b 685->687 777 652f3a0 call 652fe38 686->777 778 652f3a0 call 652fe28 686->778 687->686 692 652f3a6-652f3e3 694 652f3f2 692->694 695 652f3e5-652f3f0 692->695 696 652f3fc-652f517 694->696 695->696 707 652f529-652f554 696->707 708 652f519-652f51f 696->708 709 652fd08-652fd24 707->709 708->707 710 652fd2a-652fd45 709->710 711 652f559-652f6bc call 652df50 709->711 722 652f6ce-652f84b 711->722 723 652f6be-652f6c4 711->723 733 652f8b0-652f8ba 722->733 734 652f84d-652f851 722->734 723->722 737 652fae1-652fb00 733->737 735 652f853-652f854 734->735 736 652f859-652f8ab 734->736 738 652fb86-652fbf1 735->738 736->738 739 652fb06-652fb30 737->739 740 652f8bf-652fa05 call 652df50 737->740 757 652fc03-652fc4e 738->757 758 652fbf3-652fbf9 738->758 746 652fb32-652fb80 739->746 747 652fb83-652fb84 739->747 769 652fada-652fadb 740->769 770 652fa0b-652fad7 call 652df50 740->770 746->747 747->738 760 652fc54-652fcec 757->760 761 652fced-652fd05 757->761 758->757 760->761 761->709 769->737 770->769 777->692 778->692
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1391934584.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6520000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8
                                  • API String ID: 0-4194326291
                                  • Opcode ID: d3a73be6c18acbe09a15747927cd8a31a0afee081accfcd2edbb5621d862b376
                                  • Instruction ID: f0850eff94de3d89d142d2f9304a4a9aecafc1c44c907a1028d28859eb57f136
                                  • Opcode Fuzzy Hash: d3a73be6c18acbe09a15747927cd8a31a0afee081accfcd2edbb5621d862b376
                                  • Instruction Fuzzy Hash: 6152CB75E006298FDB65DF65C850AD9B7B2FF89300F2085EAD909A7355DB30AE81CF90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4
                                  • API String ID: 0-4088798008
                                  • Opcode ID: dc56d87dc2ff4eafe45539a971d162df10cdea11e341a23793e48f796b8eff1c
                                  • Instruction ID: fd47ccdd49a0025be1b88b7dd51abe1d185f8d3bf73bed6b1df3b5bc132f3584
                                  • Opcode Fuzzy Hash: dc56d87dc2ff4eafe45539a971d162df10cdea11e341a23793e48f796b8eff1c
                                  • Instruction Fuzzy Hash: 8D22E734A00218CFDB24DFA4C995BADB7B6FF48710F1481A9E509AB3A5DB70AD81DF50
                                  APIs
                                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05322C55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: MemoryProtectVirtual
                                  • String ID:
                                  • API String ID: 2706961497-0
                                  • Opcode ID: 072ec17db97310da268264ff9b3b96a83e6e5cf949d17adc98fcea414e50b524
                                  • Instruction ID: 0454ebd20900d24f74957500dea7a74409289ba4ebb0cfe9e5961caee186e9df
                                  • Opcode Fuzzy Hash: 072ec17db97310da268264ff9b3b96a83e6e5cf949d17adc98fcea414e50b524
                                  • Instruction Fuzzy Hash: 5441A9B9D042599FCF10CFA9D980AEEFBB1BF49310F14942AE819B7200C775A945CF64
                                  APIs
                                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05322C55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: MemoryProtectVirtual
                                  • String ID:
                                  • API String ID: 2706961497-0
                                  • Opcode ID: 697ff6cb1b617e3cc76c118693b25ba4b437a2d731c54b7194b07eae4881ebb1
                                  • Instruction ID: 63e68abc3a941295a461e8107db8119d473c31a43dabf3c1b37980379f8ebd93
                                  • Opcode Fuzzy Hash: 697ff6cb1b617e3cc76c118693b25ba4b437a2d731c54b7194b07eae4881ebb1
                                  • Instruction Fuzzy Hash: DA41A7B9D002589FCF10CFAAD980AEEFBB1BB49310F10902AE819B7200D775A945CF64
                                  APIs
                                  • NtResumeThread.NTDLL(?,?), ref: 0532681E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: e0fd6d63fd5f4b5d5be03ecd7f71d0bb100bc3ce9c4d06f87b3433a2ee079a01
                                  • Instruction ID: 4732e4bb39819c193e88545cdd8593dc0ed695f372d1edf2facc596c0b674616
                                  • Opcode Fuzzy Hash: e0fd6d63fd5f4b5d5be03ecd7f71d0bb100bc3ce9c4d06f87b3433a2ee079a01
                                  • Instruction Fuzzy Hash: AD31B8B5D012199FCB10CFAAD980ADEFBF5BF49310F10942AE819B7200C775A945CF94
                                  APIs
                                  • NtResumeThread.NTDLL(?,?), ref: 0532681E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 08c8a7c4b9bba59e369712d504798e8c7b24a68589941ecca9540a00e9a7f41b
                                  • Instruction ID: f535d0c35d01db7c69f41be7144bbee922091d7004ddaf2c5b4ebeaa8e689917
                                  • Opcode Fuzzy Hash: 08c8a7c4b9bba59e369712d504798e8c7b24a68589941ecca9540a00e9a7f41b
                                  • Instruction Fuzzy Hash: E93197B9D012589FDB10CFAAD980AAEFBF5BF49310F14942AE819B7200C775A945CF94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1391934584.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6520000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: h
                                  • API String ID: 0-2439710439
                                  • Opcode ID: 948305091b8916ff04bfeaef73f73e27855c7a05b4bbe066afa7ecc17423b59b
                                  • Instruction ID: 839a2b78a996c45fd0ef1cffdfb79ddcd4f9aac159a5591bb111dd6d202b125d
                                  • Opcode Fuzzy Hash: 948305091b8916ff04bfeaef73f73e27855c7a05b4bbe066afa7ecc17423b59b
                                  • Instruction Fuzzy Hash: CC710A75E006299FEB64DF69D850BD9B7B2FF8A300F1081AAD509A7354DB305E85CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e7c0da5312c13978bdd18222ceddf53918242335b7c772e86afc6300544b1dfb
                                  • Instruction ID: c168f64e58d7a4bc8eb1e0061647d04d14b1ee242d6b641a2cb1137a6a4f8957
                                  • Opcode Fuzzy Hash: e7c0da5312c13978bdd18222ceddf53918242335b7c772e86afc6300544b1dfb
                                  • Instruction Fuzzy Hash: 7CA2B475A00228CFDB64CF69C884AD9BBB2FF89300F1581E9D509AB365DB319E81CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5057241a6ad254c0563beabe92d2a016b32f21bee70737d386c42407437fe09e
                                  • Instruction ID: b8a0652684e9eaff50829c776285f5f6880b3e6791e405323f51c156af737c99
                                  • Opcode Fuzzy Hash: 5057241a6ad254c0563beabe92d2a016b32f21bee70737d386c42407437fe09e
                                  • Instruction Fuzzy Hash: 45021774E05218CFDB64DF69C885BA9B7F6FB89300F2091AAD409A7359DBB09D85CF10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1391934584.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6520000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14e07647a7fa49b8bafc3ce5b5b0c50d3bec0bc281a7566e683b819608e6f260
                                  • Instruction ID: 5695efef004c89411b9d9eb26e83eff77d9f6be53dc205540bedf080cb7098c5
                                  • Opcode Fuzzy Hash: 14e07647a7fa49b8bafc3ce5b5b0c50d3bec0bc281a7566e683b819608e6f260
                                  • Instruction Fuzzy Hash: DFC10674E01229CFDB54DFA9D484B9DBBF2FB4A300F24916AD409A7399D7709A86CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d552e5bca9e29de4a1b62650265d7a20e4fba8d57bd95ca4002a4fdc39e37bce
                                  • Instruction ID: d0532a8065f4c5ff96a7ff253180495b56260daa81c191287a4bc62795040170
                                  • Opcode Fuzzy Hash: d552e5bca9e29de4a1b62650265d7a20e4fba8d57bd95ca4002a4fdc39e37bce
                                  • Instruction Fuzzy Hash: 9FD19278E01218CFDB54DFA9D994A9DBBB2FF49300F2081A9D409AB365DB31AD81CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1391934584.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6520000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 639c800441d6c0b7d9b86984e1cc69a7419e930c751953c489f5dbfff1da3a32
                                  • Instruction ID: 085984ca9972a9e30696af1278f3f8fb5f85c8a1adcd0f5d0a6df58cbf131386
                                  • Opcode Fuzzy Hash: 639c800441d6c0b7d9b86984e1cc69a7419e930c751953c489f5dbfff1da3a32
                                  • Instruction Fuzzy Hash: DFB1D474E01229CFDB54DFA9D484B9DBBF2FB8A300F24916AD409A7395D7709A86CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6085f3205f4cc2fc24abf2d0a545ee46f222a52ac518b0c8f018554f61108820
                                  • Instruction ID: 372d65506bad60cbf5bdeb6b19d3dc2e5b73c4ed50f441edba98dc1d996a0e06
                                  • Opcode Fuzzy Hash: 6085f3205f4cc2fc24abf2d0a545ee46f222a52ac518b0c8f018554f61108820
                                  • Instruction Fuzzy Hash: 54C14575E05658CFDB14CFAAC944BDEBBF1EB4A304F0080AAD449AB355DB349A85CF80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14499c3b7366ce6e8a7cbe345c4ea00fdb9e6d37b62c4466ccf7a0f3ff125f95
                                  • Instruction ID: d867684ee3da29af12a5fda7a1516d5c6e59859e226488c9117274ada195b198
                                  • Opcode Fuzzy Hash: 14499c3b7366ce6e8a7cbe345c4ea00fdb9e6d37b62c4466ccf7a0f3ff125f95
                                  • Instruction Fuzzy Hash: BEB12675E05618CFDB14CFAAD944BDEBBF1EB4A304F1080A9D449AB355DB34AA85CF80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d6ecd0392b9ddd7134f9ad98f6f1e19c6e79a21c0ae01e270818429ddb2872d7
                                  • Instruction ID: ff0f5fdbbe0121ee3a7284d8311882d0b595d45e2a53d80d6a4709e486309fef
                                  • Opcode Fuzzy Hash: d6ecd0392b9ddd7134f9ad98f6f1e19c6e79a21c0ae01e270818429ddb2872d7
                                  • Instruction Fuzzy Hash: C7B138B4E05218CFEB14DFA9D485BADBBF6FB89300F20906AD409A7355DB709A85CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 190a001fd6e9c48b9b481af9c6ec128d397aab7029548317c571ab0a49f53e54
                                  • Instruction ID: 9ba420cc8ab351681520cffcffe9bb488d0159c24d86a2605ffbbd8f36e93f33
                                  • Opcode Fuzzy Hash: 190a001fd6e9c48b9b481af9c6ec128d397aab7029548317c571ab0a49f53e54
                                  • Instruction Fuzzy Hash: 6BB108B4E05218CFEB14DFA9D485BADBBF2FB49300F20906AD419A7355DB709A95CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e5ee2847afe2e2541f58beb4f9b6ec6e0cf4e1b1a57494bc6860f84b7fe5c07e
                                  • Instruction ID: 6d673f77891038f6f6333c3b42fccc413e1699109ea672f2f77cff7f48a68595
                                  • Opcode Fuzzy Hash: e5ee2847afe2e2541f58beb4f9b6ec6e0cf4e1b1a57494bc6860f84b7fe5c07e
                                  • Instruction Fuzzy Hash: C1A1B578E00618CFDB54DF69D994A9DBBF2BF89300F2181A9D449AB364DB30AD81CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a24f351bb3a5d8d11ff61b3050f09f1db069fb514e3630ab342f72b5531bff92
                                  • Instruction ID: 0f086e2c61cee8565b430375dc3a9fa994e0db02db50c1583f85f575a4957617
                                  • Opcode Fuzzy Hash: a24f351bb3a5d8d11ff61b3050f09f1db069fb514e3630ab342f72b5531bff92
                                  • Instruction Fuzzy Hash: 69511274D05218CFDB14DFA9D8447EDBBF2BB49304F21612AD025AB754DB34998ACF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384626861.00000000051A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51a0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dc9d8104c6b85899a5da6129280eb2a851ee0e3e7ee2e3648da278037bb181a3
                                  • Instruction ID: df3ea2a800dd737ac05c2e3bad07f761fefeb820bf7616e373a8ddf9f358329a
                                  • Opcode Fuzzy Hash: dc9d8104c6b85899a5da6129280eb2a851ee0e3e7ee2e3648da278037bb181a3
                                  • Instruction Fuzzy Hash: 82514E79E142099FDB15DFA9D484AEEBBF2FF89300F148525E405E7348D7349982CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 62c1424e88eb4c6972271dfc2f0a0d91e3cb9841b0b9f43e8f029a271aae480c
                                  • Instruction ID: 0ba66d25c0e31a9c2af4a2f7c4a36f36e6b04cefe3034e78239fca9e45963c5b
                                  • Opcode Fuzzy Hash: 62c1424e88eb4c6972271dfc2f0a0d91e3cb9841b0b9f43e8f029a271aae480c
                                  • Instruction Fuzzy Hash: 4351F178D05218CFDB14DFA9D8447EDBBF2BB49304F21612AD029AB794DB74998ACF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384626861.00000000051A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51a0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 443e9a6487f58d36fa42fd0cc2f24798922035293c0b34894c949d344958ea68
                                  • Instruction ID: 7701b6e961cba9e67b1e9335f9cb95238cf4c13c2ac82864a1ea6782fb5d6248
                                  • Opcode Fuzzy Hash: 443e9a6487f58d36fa42fd0cc2f24798922035293c0b34894c949d344958ea68
                                  • Instruction Fuzzy Hash: 37519875D05A28CFDB65CF55CC44BAABBB2FB89302F1091EA9409A6290EB305EC5CF40

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 220 b1265a-b1265e 221 b12664-b1266d 220->221 222 b127b8-b127bd 220->222 224 b12673-b12678 221->224 225 b12834-b1283a 221->225 223 b127dc-b127e2 222->223 226 b127e9-b127ef 223->226 227 b12757 224->227 228 b1267e-b126b1 224->228 229 b12861-b12867 225->229 232 b127f1-b127f6 226->232 233 b127bf-b127d1 226->233 231 b12776-b1277d 227->231 228->229 238 b12759-b1276b 231->238 239 b1277f-b127b5 231->239 236 b12711-b12749 232->236 237 b127fc-b12828 232->237 234 b128a4-b128cb 233->234 235 b127d7 233->235 251 b128d5-b128d9 call b12abc 234->251 235->223 236->226 242 b1274f-b12755 236->242 238->234 241 b12771 238->241 239->222 241->231 242->227 246 b12713-b1289c 242->246 246->234 254 b128df-b128e1 251->254
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $Lnk$Lnk
                                  • API String ID: 0-834502638
                                  • Opcode ID: bc3c1bf7fa3b0c8c832aaae1cd0891fe0509867097b172dd3dfb667c49c2d686
                                  • Instruction ID: 4b2bb8bdf22360b1b166c7daa3c4768f2d9a6cd55670a4a66f9e66798a73dcde
                                  • Opcode Fuzzy Hash: bc3c1bf7fa3b0c8c832aaae1cd0891fe0509867097b172dd3dfb667c49c2d686
                                  • Instruction Fuzzy Hash: 21414874E04249DFCB05DFA8C8845DEBBF2EF49300F6085A6D401EB395D734AE968B51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 257 51bad5b-51bad5c 258 51bad5e-51bad67 257->258 259 51bad76-51badbd 257->259 260 51bacdf-51bace5 258->260 268 51badc7-51badd0 259->268 261 51bacee-51bacef 260->261 262 51bace7 260->262 261->257 262->259 262->261 264 51bac1a-51bac23 262->264 265 51bae3a 262->265 266 51bae60-51bae71 262->266 264->260 265->266 270 51badd3 call 51bb029 268->270 271 51badd3 call 51bb038 268->271 269 51badd9-51bade3 269->265 270->269 271->269
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $#$$
                                  • API String ID: 0-3746766270
                                  • Opcode ID: 8765e9775a39d30603fd8285a2264916eb9144655dd5a57dbb7ab0698ebce927
                                  • Instruction ID: d71e7823a688d1d8f0915d2bc389d5a83ca8b2ac77ac61f1c25b76511afa1941
                                  • Opcode Fuzzy Hash: 8765e9775a39d30603fd8285a2264916eb9144655dd5a57dbb7ab0698ebce927
                                  • Instruction Fuzzy Hash: 8121E078A04218CFEB14CFA9D484ADDBBF2FF0A300F218219E916AB345DB749905CF55

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 291 51b890a-51b8f6b 293 51b8b8c-51b8b90 291->293 294 51b8f71-51b8f8a 291->294 295 51b8cbd-51b8cc1 293->295 296 51b8b96-51b8b9e 293->296 297 51b88b0-51b88b6 294->297 298 51b8f90-51b8f98 294->298 299 51b8cc7-51b8ce0 295->299 300 51b8d65-51b8d89 295->300 296->297 301 51b88b8-51b8d8c call 51b8abb 297->301 302 51b88bf-51b8ee3 297->302 298->297 299->297 303 51b8ce6-51b8cee 299->303 304 51b8d92-51b8dc3 300->304 311 51b8d8c call 51b8abb 300->311 301->304 303->297 304->297 309 51b8dc9-51b8dcf 304->309 309->297 311->304
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $"
                                  • API String ID: 0-3817095088
                                  • Opcode ID: c66df2b7d9fc48a8cc6f7c9abaa11be3fc0d9aa969421f6e381cfbfe18ea59b6
                                  • Instruction ID: f231204eeb64a54d8ef004dff06c1ffd67cb6587def6fb422efb7a95f854e7c0
                                  • Opcode Fuzzy Hash: c66df2b7d9fc48a8cc6f7c9abaa11be3fc0d9aa969421f6e381cfbfe18ea59b6
                                  • Instruction Fuzzy Hash: 1331F774D05218EFEB20CF68D988BEDBBF5BB45704F1481AAE408E7295D7B49985CF00

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 348 4fb55a4-4fb55c4 350 4fb55d0-4fb55dd 348->350 351 4fb4ecb-4fb4ed1 350->351 352 4fb55e3-4fb5608 call 4fb10f0 350->352 351->348 355 4fb323f-4fb3247 352->355 356 4fb560e-4fb5616 352->356 357 4fb3249 355->357 358 4fb3250-4fb3251 355->358 356->355 359 4fb3d57-4fb3d9d 357->359 358->359 359->355
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: %$1
                                  • API String ID: 0-1643232389
                                  • Opcode ID: 42c1f0239397a34a6bd6feb0a72cfb95d9a0747879a37f77105108546837f10f
                                  • Instruction ID: c6cdfdee63af3720d40a34e3a786583e240a38f22d76906cde73f669e64c2583
                                  • Opcode Fuzzy Hash: 42c1f0239397a34a6bd6feb0a72cfb95d9a0747879a37f77105108546837f10f
                                  • Instruction Fuzzy Hash: A40112B0D04228DFDB61EF65E888B89B6B2FB0A300F4044E9E549A3244CB341A81CF84

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 779 53236ed-532378a 782 53237d3-53237fb 779->782 783 532378c-53237a3 779->783 786 5323841-5323897 782->786 787 53237fd-5323811 782->787 783->782 788 53237a5-53237aa 783->788 796 5323899-53238ad 786->796 797 53238dd-5323972 CreateProcessA 786->797 787->786 798 5323813-5323818 787->798 789 53237ac-53237b6 788->789 790 53237cd-53237d0 788->790 793 53237ba-53237c9 789->793 794 53237b8 789->794 790->782 793->793 795 53237cb 793->795 794->793 795->790 796->797 805 53238af-53238b4 796->805 810 5323974-532397a 797->810 811 532397b-53239f1 797->811 799 532381a-5323824 798->799 800 532383b-532383e 798->800 802 5323826 799->802 803 5323828-5323837 799->803 800->786 802->803 803->803 806 5323839 803->806 807 53238b6-53238c0 805->807 808 53238d7-53238da 805->808 806->800 812 53238c2 807->812 813 53238c4-53238d3 807->813 808->797 810->811 819 53239f3-53239f7 811->819 820 5323a01-5323a05 811->820 812->813 813->813 814 53238d5 813->814 814->808 819->820 821 53239f9 819->821 822 5323a07-5323a0b 820->822 823 5323a15-5323a19 820->823 821->820 822->823 826 5323a0d 822->826 824 5323a1b-5323a1f 823->824 825 5323a29 823->825 824->825 827 5323a21 824->827 828 5323a2a 825->828 826->823 827->825 828->828
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0532395F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: f9de26d371b2ce103f938d19e053f16aa4ad007a3531577d11441a2d08a3844c
                                  • Instruction ID: 2fe14fe8f908ee6967f7a21d49943d5803d208a7355e1de9873124b80812742d
                                  • Opcode Fuzzy Hash: f9de26d371b2ce103f938d19e053f16aa4ad007a3531577d11441a2d08a3844c
                                  • Instruction Fuzzy Hash: EAA1F3B4D0466C9FDF10CFA9C845BEEBBB2BF09300F149569E859A7240DB789985CF81

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 829 53236f8-532378a 831 53237d3-53237fb 829->831 832 532378c-53237a3 829->832 835 5323841-5323897 831->835 836 53237fd-5323811 831->836 832->831 837 53237a5-53237aa 832->837 845 5323899-53238ad 835->845 846 53238dd-5323972 CreateProcessA 835->846 836->835 847 5323813-5323818 836->847 838 53237ac-53237b6 837->838 839 53237cd-53237d0 837->839 842 53237ba-53237c9 838->842 843 53237b8 838->843 839->831 842->842 844 53237cb 842->844 843->842 844->839 845->846 854 53238af-53238b4 845->854 859 5323974-532397a 846->859 860 532397b-53239f1 846->860 848 532381a-5323824 847->848 849 532383b-532383e 847->849 851 5323826 848->851 852 5323828-5323837 848->852 849->835 851->852 852->852 855 5323839 852->855 856 53238b6-53238c0 854->856 857 53238d7-53238da 854->857 855->849 861 53238c2 856->861 862 53238c4-53238d3 856->862 857->846 859->860 868 53239f3-53239f7 860->868 869 5323a01-5323a05 860->869 861->862 862->862 863 53238d5 862->863 863->857 868->869 870 53239f9 868->870 871 5323a07-5323a0b 869->871 872 5323a15-5323a19 869->872 870->869 871->872 875 5323a0d 871->875 873 5323a1b-5323a1f 872->873 874 5323a29 872->874 873->874 876 5323a21 873->876 877 5323a2a 874->877 875->872 876->874 877->877
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0532395F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 3e89f69f7ac435059b61488d171c9bebac60203223a94548db754878b8da76a9
                                  • Instruction ID: 3ceb1298d8e782e8a0749e2f05d99cdec790d76c9b479683ee43b4a961344575
                                  • Opcode Fuzzy Hash: 3e89f69f7ac435059b61488d171c9bebac60203223a94548db754878b8da76a9
                                  • Instruction Fuzzy Hash: 58A10374D0466C9FDF10CFA9C845BEEBBB2BF09300F14956AE859A7240DB788985CF81

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1183 65288a4-652891b 1185 6528961-6528986 1183->1185 1186 652891d-6528931 1183->1186 1190 6528988-652899c 1185->1190 1191 65289cc-6528a3b CopyFileA 1185->1191 1186->1185 1189 6528933-6528938 1186->1189 1192 652893a-6528944 1189->1192 1193 652895b-652895e 1189->1193 1190->1191 1198 652899e-65289a3 1190->1198 1205 6528a44-6528aa6 1191->1205 1206 6528a3d-6528a43 1191->1206 1195 6528946 1192->1195 1196 6528948-6528957 1192->1196 1193->1185 1195->1196 1196->1196 1199 6528959 1196->1199 1200 65289c6-65289c9 1198->1200 1201 65289a5-65289af 1198->1201 1199->1193 1200->1191 1203 65289b3-65289c2 1201->1203 1204 65289b1 1201->1204 1203->1203 1207 65289c4 1203->1207 1204->1203 1212 6528ab6-6528aba 1205->1212 1213 6528aa8-6528aac 1205->1213 1206->1205 1207->1200 1215 6528aca 1212->1215 1216 6528abc-6528ac0 1212->1216 1213->1212 1214 6528aae 1213->1214 1214->1212 1218 6528acb 1215->1218 1216->1215 1217 6528ac2 1216->1217 1217->1215 1218->1218
                                  APIs
                                  • CopyFileA.KERNEL32(?,?,?), ref: 06528A2B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1391934584.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6520000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: CopyFile
                                  • String ID:
                                  • API String ID: 1304948518-0
                                  • Opcode ID: ea2fbe77fe3ad7893e7b73c8202eeaa26a823931d9ede3a097ce821d607fda44
                                  • Instruction ID: 4d7e1902dcfccd7dc36c64b2e053fe895a136d7e676a67e50dc4a7a10c5bb843
                                  • Opcode Fuzzy Hash: ea2fbe77fe3ad7893e7b73c8202eeaa26a823931d9ede3a097ce821d607fda44
                                  • Instruction Fuzzy Hash: 15612471D0036A9FEB50CFA9C8857EDBBF1BF09310F248529E855A7280DB749989CF81

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1219 65288b0-652891b 1221 6528961-6528986 1219->1221 1222 652891d-6528931 1219->1222 1226 6528988-652899c 1221->1226 1227 65289cc-6528a3b CopyFileA 1221->1227 1222->1221 1225 6528933-6528938 1222->1225 1228 652893a-6528944 1225->1228 1229 652895b-652895e 1225->1229 1226->1227 1234 652899e-65289a3 1226->1234 1241 6528a44-6528aa6 1227->1241 1242 6528a3d-6528a43 1227->1242 1231 6528946 1228->1231 1232 6528948-6528957 1228->1232 1229->1221 1231->1232 1232->1232 1235 6528959 1232->1235 1236 65289c6-65289c9 1234->1236 1237 65289a5-65289af 1234->1237 1235->1229 1236->1227 1239 65289b3-65289c2 1237->1239 1240 65289b1 1237->1240 1239->1239 1243 65289c4 1239->1243 1240->1239 1248 6528ab6-6528aba 1241->1248 1249 6528aa8-6528aac 1241->1249 1242->1241 1243->1236 1251 6528aca 1248->1251 1252 6528abc-6528ac0 1248->1252 1249->1248 1250 6528aae 1249->1250 1250->1248 1254 6528acb 1251->1254 1252->1251 1253 6528ac2 1252->1253 1253->1251 1254->1254
                                  APIs
                                  • CopyFileA.KERNEL32(?,?,?), ref: 06528A2B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1391934584.0000000006520000.00000040.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6520000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: CopyFile
                                  • String ID:
                                  • API String ID: 1304948518-0
                                  • Opcode ID: 145d739ab25391f1219ea09186ff672f70cffd010dd2e21271f35bcd164f9be4
                                  • Instruction ID: f154e8f15b9b9c6e1f09c5a6628b39f82e465189eef2368e3e1952d5a26edaf9
                                  • Opcode Fuzzy Hash: 145d739ab25391f1219ea09186ff672f70cffd010dd2e21271f35bcd164f9be4
                                  • Instruction Fuzzy Hash: 9A611471D003698FEB50CFA9C8457EDBBF1BB0A310F248529D855A7280DB749989CF81

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1255 5325d01-5325d73 1258 5325d75-5325d87 1255->1258 1259 5325d8a-5325deb WriteProcessMemory 1255->1259 1258->1259 1261 5325df4-5325e46 1259->1261 1262 5325ded-5325df3 1259->1262 1262->1261
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05325DDB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 9aa6a590ca380de024501c4ce97baa47d080c7ceb771e133e613bb9461afd9a0
                                  • Instruction ID: 6c048d3e2fd55663d140c4e6f0f8051045254238d920cf1f4628465036f7afb7
                                  • Opcode Fuzzy Hash: 9aa6a590ca380de024501c4ce97baa47d080c7ceb771e133e613bb9461afd9a0
                                  • Instruction Fuzzy Hash: 4841AAB5D012599FCF00CFA9D984AEEFBF1BB49310F14902AE819BB210D775AA45CF64

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1267 5325d08-5325d73 1269 5325d75-5325d87 1267->1269 1270 5325d8a-5325deb WriteProcessMemory 1267->1270 1269->1270 1272 5325df4-5325e46 1270->1272 1273 5325ded-5325df3 1270->1273 1273->1272
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05325DDB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 5b8e04f49d0be9dfaee028b320513e8add8eb1f3a3fc117759a81ea45c51267e
                                  • Instruction ID: 8edba9edf0399f83623d7845f89ff534dd805d0cc0010af92acb033e00e56173
                                  • Opcode Fuzzy Hash: 5b8e04f49d0be9dfaee028b320513e8add8eb1f3a3fc117759a81ea45c51267e
                                  • Instruction Fuzzy Hash: EF41BAB5D012589FCF00CFA9D984AEEFBF1BB09310F14902AE418BB210D775AA45CF54
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05325ADA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 4f8233468b70b5001657b33395811bbbf83bb1323590171cfa3f0ec390a4be4a
                                  • Instruction ID: 2a7381ba5af6ea81ad5841fbadbf33b83b06d5e78435430adad8cee1d6fb71be
                                  • Opcode Fuzzy Hash: 4f8233468b70b5001657b33395811bbbf83bb1323590171cfa3f0ec390a4be4a
                                  • Instruction Fuzzy Hash: 9331A8B9D002599FCF10CFA9D880AEEFBB5FB49310F14902AE815BB210D775A941CFA5
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05325ADA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 15b1084a1eaffa001f0dd2c088956cd52167426d7c7d95bb2f366875893c6f1b
                                  • Instruction ID: 15590724ae5601f98f88bd4030efe96c7f1575288d3605c85ad4c971ef1d5362
                                  • Opcode Fuzzy Hash: 15b1084a1eaffa001f0dd2c088956cd52167426d7c7d95bb2f366875893c6f1b
                                  • Instruction Fuzzy Hash: D331A8B9D042589FCF10CFA9D880ADEFBB5FB09310F10942AE815BB210D775A901CF64
                                  APIs
                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 051AD474
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384626861.00000000051A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51a0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: 67d98ad479f77ccc5857d316040555c487eb2610f24a56fdece325dee5b0ccb3
                                  • Instruction ID: 6be1c11289843ebaeb5af6d652aeb5fb88ba1c60cbee3b86ca450e29ea313d94
                                  • Opcode Fuzzy Hash: 67d98ad479f77ccc5857d316040555c487eb2610f24a56fdece325dee5b0ccb3
                                  • Instruction Fuzzy Hash: 0631A8B9D012489FDF10CFA9E980AEEFBB1BB09310F14942AE814B7210D775A945CF54
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: d
                                  • API String ID: 0-2564639436
                                  • Opcode ID: f28e9301c0adb95d477beb6da83a6a11c260f6f039fdc34200bb1bc60938194a
                                  • Instruction ID: eed02208834ccddfd160c120bbc3b15cd7587a94baa0a5f20b5c42757547bfd7
                                  • Opcode Fuzzy Hash: f28e9301c0adb95d477beb6da83a6a11c260f6f039fdc34200bb1bc60938194a
                                  • Instruction Fuzzy Hash: 19D16A34600602CFCB15DF28C484AAAB7F6FF88314B55C96AE46A9B751DB31FC46CB94
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 0532548F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 5fc77021604e3b61d2ac92ad88a48bac45ed431ad7ac75cd8a2bdfb8dcab2c50
                                  • Instruction ID: 942784e189d731dc302f9f1cc99f8c20f868fe94309395f2161573d05c9f127d
                                  • Opcode Fuzzy Hash: 5fc77021604e3b61d2ac92ad88a48bac45ed431ad7ac75cd8a2bdfb8dcab2c50
                                  • Instruction Fuzzy Hash: 7441CDB5D002589FDB10CFA9D884AEEFBF1BF49310F14802AE419B7240D779AA45CF94
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 0532548F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 1ae0e9086cc5d09cf99bacfd17d49be8d17ba318cdace923ccc4eee91f127c7e
                                  • Instruction ID: dcd5914a700f5a24b2a43ff5e52d2499614955281531be3954f4f3dfbdfde415
                                  • Opcode Fuzzy Hash: 1ae0e9086cc5d09cf99bacfd17d49be8d17ba318cdace923ccc4eee91f127c7e
                                  • Instruction Fuzzy Hash: 2031CDB5D002589FDB10CFA9D884AEEFBF1BF49310F14802AE419B7240D779AA45CF94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Lnk
                                  • API String ID: 0-2816430927
                                  • Opcode ID: 3a13b7bb5e0e5ebd4e83522255a2e97a6f0d3a3e654a9f26fdf21cd7a0030a3e
                                  • Instruction ID: f8260ec283649a5adf5af9b9c7b7eb946ef0f0136f4e7d94999c657a3cd3b445
                                  • Opcode Fuzzy Hash: 3a13b7bb5e0e5ebd4e83522255a2e97a6f0d3a3e654a9f26fdf21cd7a0030a3e
                                  • Instruction Fuzzy Hash: 52617F74600B018FD724DF29C4D066AF7E3AFA8300BA48AADD49B87B55D774FC968B50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @
                                  • API String ID: 0-2766056989
                                  • Opcode ID: 02dca87f8a86811bf71e4bac30ea3b5c7790919e82a984f15e77e55775ff47dd
                                  • Instruction ID: 7e119e0ef20e366b20fcf6c953dd0fe5604f6d5f53349f08991430693500992e
                                  • Opcode Fuzzy Hash: 02dca87f8a86811bf71e4bac30ea3b5c7790919e82a984f15e77e55775ff47dd
                                  • Instruction Fuzzy Hash: E3718078E042298FDBA5DF54D884BD9BBB2FB49300F2081EAE549A7348DB705E85CF50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0n
                                  • API String ID: 0-3699129202
                                  • Opcode ID: ec6ddae43771522885a26c7bb0d880af31e5bb8dd92179c00c0a10bca4b04dec
                                  • Instruction ID: c363e82ff2aa9bc5ec2322e950cb930da21bc13a74d17133b7b08dbb7e81e6b1
                                  • Opcode Fuzzy Hash: ec6ddae43771522885a26c7bb0d880af31e5bb8dd92179c00c0a10bca4b04dec
                                  • Instruction Fuzzy Hash: C321F836704215AFEB146E69D850A6FBB97EFC9320B144039FA09DB351DE71DC118790
                                  APIs
                                  • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 051AE5A7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384626861.00000000051A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51a0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 068b60840597ed568aa234369cc848da51680e5cfaefd17558ef3983b87c5037
                                  • Instruction ID: a2ad5b2b2be3bf82d15efe6bd3ce4497320c6e060b0b045d7e329164a9181d3c
                                  • Opcode Fuzzy Hash: 068b60840597ed568aa234369cc848da51680e5cfaefd17558ef3983b87c5037
                                  • Instruction Fuzzy Hash: 3A31A6B9D002589FCF10CFA9E980AEEFBB5AB49310F14942AE814B7210D775A9458F94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0n
                                  • API String ID: 0-3699129202
                                  • Opcode ID: 69574ab92384541354077a8513be839a70e66b70fb7b41e5b485c6579a6d71cc
                                  • Instruction ID: d0016e2cf048b1e8461ac073bb81c618dfbd9a93fa735b892840ca21d4602c2e
                                  • Opcode Fuzzy Hash: 69574ab92384541354077a8513be839a70e66b70fb7b41e5b485c6579a6d71cc
                                  • Instruction Fuzzy Hash: B221BF31A10209DFDF05CF68C865ADEBFB6EB8C320F18912AE411AB390DF719945CB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @kk
                                  • API String ID: 0-3551682158
                                  • Opcode ID: 9fc368da415b054dde02c756cdd85acf9086ce2b44b12f714881f3fc5df68e37
                                  • Instruction ID: f269901fe004ca1af967f0e4cd6ddfcc50c416a95ea65a3743820fd7eda3cccb
                                  • Opcode Fuzzy Hash: 9fc368da415b054dde02c756cdd85acf9086ce2b44b12f714881f3fc5df68e37
                                  • Instruction Fuzzy Hash: 94218E75B002588FCB40DFA9D8945ECBBF3EF8A710B6442A9E106D7362CA319D86CB55
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Sk
                                  • API String ID: 0-2949063387
                                  • Opcode ID: 7b0e4196667518e11d53ce668c78d815f741e21ca211e628d749801196aeee58
                                  • Instruction ID: 3f557a2de7ca538f2dc4fcff46b1522322838969322c50040a104f034f98bf84
                                  • Opcode Fuzzy Hash: 7b0e4196667518e11d53ce668c78d815f741e21ca211e628d749801196aeee58
                                  • Instruction Fuzzy Hash: 23018F38D04248DFCB05FBA4E8805EC7BF1AB49340B6084FAD8069B365DB70ADC09F52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: M
                                  • API String ID: 0-3664761504
                                  • Opcode ID: 9e5d9ad933ee5bc1b3498f50f48594f15d2bcf14286b94bdd85c67440e178f7c
                                  • Instruction ID: 1b20e27633b09f02357b95a285673f2ab69d7390aac8516b789bd4f1ab6034b8
                                  • Opcode Fuzzy Hash: 9e5d9ad933ee5bc1b3498f50f48594f15d2bcf14286b94bdd85c67440e178f7c
                                  • Instruction Fuzzy Hash: 081195B8A002288FCB65DF64D8956D9BBF2EB59300F1040EADA19A3348DB345E85CF54
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: -
                                  • API String ID: 0-2547889144
                                  • Opcode ID: a9bfc8bb5fe1af52448db1c902ffd12e7e537e844b8064685523fe58f7200f32
                                  • Instruction ID: 53d88561b01057d871e5a47eea1d53a15d103a5b71f724519361eeafe5d1a9f6
                                  • Opcode Fuzzy Hash: a9bfc8bb5fe1af52448db1c902ffd12e7e537e844b8064685523fe58f7200f32
                                  • Instruction Fuzzy Hash: F50114788052598FDBA4DF24C999B99BBB1FF4A300F1090DAC45DAB362CA345E86CF14
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: %
                                  • API String ID: 0-2567322570
                                  • Opcode ID: ec2770655393031861a7a0f1bed879eca2fcb06bca4de625a54d5d24346936fd
                                  • Instruction ID: 3b01c734ff7abdc524581bb54693a72a620d5003a1c78b4049ed7811d70847d0
                                  • Opcode Fuzzy Hash: ec2770655393031861a7a0f1bed879eca2fcb06bca4de625a54d5d24346936fd
                                  • Instruction Fuzzy Hash: CEF0F278A05248DFEB45EF88E498B9DB7F2EB0A304F258015E415AB398CBB19D41CF04
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: '
                                  • API String ID: 0-1997036262
                                  • Opcode ID: ba519cb87ea1a050f4c33db54e09abab88a318ecbd341966dabb24fa7812ff1d
                                  • Instruction ID: a7449ecbd5f907b6096ac4dd1a0a6ea1945d583a5d15f322b7a3baf5af00279d
                                  • Opcode Fuzzy Hash: ba519cb87ea1a050f4c33db54e09abab88a318ecbd341966dabb24fa7812ff1d
                                  • Instruction Fuzzy Hash: 9FE01774E14228EFEF14CF54D885B9DB7B6BB46B00F40418AE40AA3340C7748E80CF01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: }
                                  • API String ID: 0-4239843852
                                  • Opcode ID: 72faa0f780e9b37bd55240fb8dbda7936c98b7ddb8d2c72a9cd7d983e943ebe3
                                  • Instruction ID: 3f0551201aa80567335567afc2683469e472a9139c1d20c7e48e89aed2b8d5f7
                                  • Opcode Fuzzy Hash: 72faa0f780e9b37bd55240fb8dbda7936c98b7ddb8d2c72a9cd7d983e943ebe3
                                  • Instruction Fuzzy Hash: 9FD0C974E45218EFCB40DFA5E580B8DB7F2BF06300F109189A888A7301D734AE409F45
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ec9f33f15a548695437564a57b7159a093f713bef0feab0e9afc919b78af766a
                                  • Instruction ID: 8e8274d6d248020e870446cd64167400b8bc5698cfe76d8f9b075b342c829f67
                                  • Opcode Fuzzy Hash: ec9f33f15a548695437564a57b7159a093f713bef0feab0e9afc919b78af766a
                                  • Instruction Fuzzy Hash: FD520975A002288FDB64DF68C991BEDBBF6BB89300F1541D9E509AB351DB309E81CF61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b3b2a93aeb7f258bd77badec191d2f3383ce31097282e1fb85408923712ad97b
                                  • Instruction ID: 9ccb66edb1664f5578c4936f74659badd03af726af56b1fb549dedd49b384bc9
                                  • Opcode Fuzzy Hash: b3b2a93aeb7f258bd77badec191d2f3383ce31097282e1fb85408923712ad97b
                                  • Instruction Fuzzy Hash: F4227E35A00214DFEB54DFA4D491AADBBB6FF88310F158169E906AF3A5CBB1ED40CB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2feb30c42f24436140db70d0e9068db8cfce2b5165682f02d40fccd1011da8be
                                  • Instruction ID: ab76ed3710987b0dbad2365f7ef652b57443f1a3fae42f4c1a944c003e638672
                                  • Opcode Fuzzy Hash: 2feb30c42f24436140db70d0e9068db8cfce2b5165682f02d40fccd1011da8be
                                  • Instruction Fuzzy Hash: C4122A34A006048FDB65DFA5D494AAEB7F6FF88300F14852EE51A9B355DB31EC46CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6ad98d96cf8db19b4e7849d68dbef70cd9ec09db337bb5404e2388c7aef89dae
                                  • Instruction ID: b1c13268f0aefd738d2201390b7811ea5c13416b72475812e8d4fde605751445
                                  • Opcode Fuzzy Hash: 6ad98d96cf8db19b4e7849d68dbef70cd9ec09db337bb5404e2388c7aef89dae
                                  • Instruction Fuzzy Hash: 2E02BE747043418FD755AF7884617AEBBB2AF86300F54446EE89ACF392DA34DC86CB21
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f94e848308d37587dfa7c61cbd0dc27b042aed16c386b7ce310c3c358d2329b0
                                  • Instruction ID: 3bfee928917818ba2971a320e65add4825fb78e57b1b3c5e83345caae626e5ec
                                  • Opcode Fuzzy Hash: f94e848308d37587dfa7c61cbd0dc27b042aed16c386b7ce310c3c358d2329b0
                                  • Instruction Fuzzy Hash: 5412F734A006188FDB14EF64C894B9DBBB6BF89300F5185A9E54AAB365DF30ED85CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8032b48f36091466ee4c0747416ce074ce00052987a20ecadb418e31f7de07a0
                                  • Instruction ID: 7b763c8bd33a2a814f2dcdaafb200bedf810e750bc95d8c7176bbbe2e907d42b
                                  • Opcode Fuzzy Hash: 8032b48f36091466ee4c0747416ce074ce00052987a20ecadb418e31f7de07a0
                                  • Instruction Fuzzy Hash: D9F1B934B10218DFDB08DFA4D998A9DBBB2FF89304F118159E815AB3A5DB71EC42CB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 209e4c67257f3a1015f3b98c1fcadaba4de4dc6154d48a74db83e995e18a78d2
                                  • Instruction ID: 741f7e42691eb34dbba1f6abac3adec7263878323851ffd8031a56131495c939
                                  • Opcode Fuzzy Hash: 209e4c67257f3a1015f3b98c1fcadaba4de4dc6154d48a74db83e995e18a78d2
                                  • Instruction Fuzzy Hash: ABE16E71E00215DFDB04DFA8C894BAEBBF2FF85700F658569E505AB2A5DB719C81CB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1376873184.0000000004F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4f70000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e46a6bb075c545de5e36b42d634ee7fd3342d318843ce49333ef09efaa1e863
                                  • Instruction ID: d700f43e2fd43f1e8c22b194b44299521ae6202fcba9575d53dcb2d01234eb8b
                                  • Opcode Fuzzy Hash: 8e46a6bb075c545de5e36b42d634ee7fd3342d318843ce49333ef09efaa1e863
                                  • Instruction Fuzzy Hash: F8F1C434E01218DFDB64DFA9E4946ACBBB6FF89315F20452AE416A7350DB386D82CF01
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 545ef3bb3aab1dd1ae2f2c5e7e52ae0d3476ccbe1fc7d9d66e59bab73ee1f7a1
                                  • Instruction ID: 6b7c10e28ee0765c4248f44bfac0005a4081c7f0feb66097ac02f597aef9f0d4
                                  • Opcode Fuzzy Hash: 545ef3bb3aab1dd1ae2f2c5e7e52ae0d3476ccbe1fc7d9d66e59bab73ee1f7a1
                                  • Instruction Fuzzy Hash: AAE13234A00209DFDB04EFA4D5949AEBBB2EF89310F508569E815AB365DF30ED42CF91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f6d691f95b9fd1d7f50dea273f4256ca1522d578488e6c0df83186d3aeb2b9a7
                                  • Instruction ID: 137759b1ea54ff72328857468f1379c7f09f5fa8c1ac86e0268965dd2df5f21d
                                  • Opcode Fuzzy Hash: f6d691f95b9fd1d7f50dea273f4256ca1522d578488e6c0df83186d3aeb2b9a7
                                  • Instruction Fuzzy Hash: 9CA1A1353042009FD7169F64D854BAA7BB7FF89304F1985AAE5598F3A2CB32EC42DB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f6eaafc93c669bdc03da2ab039042ec789b0f0fab2a1c7e0620fae304f624c01
                                  • Instruction ID: 3dc629b57993235ccdf99d23ab091e0a6fb15a7dbc725426820f8fc3ba990caa
                                  • Opcode Fuzzy Hash: f6eaafc93c669bdc03da2ab039042ec789b0f0fab2a1c7e0620fae304f624c01
                                  • Instruction Fuzzy Hash: 6BB1C374D49209CFEF24CF99C444BEEBBB3AB49304F11901AD425A728AD7F84989CF95
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ac5de6c5231e731feb6125a31033025203a744557ab5a56cc6fb37d6387a23a8
                                  • Instruction ID: 9230d4b0151ff543296469efee06aede29758d67581bf65cdcf97e5d69ed4cf2
                                  • Opcode Fuzzy Hash: ac5de6c5231e731feb6125a31033025203a744557ab5a56cc6fb37d6387a23a8
                                  • Instruction Fuzzy Hash: 7681D170A043148FCB24DB69D1D02AEBBF6EF85314B2499AFD05ADBB41DB35E942CB44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9a40c125defcef3abaf0977f1d520be840e336e1649ba40f585302118d2a0abb
                                  • Instruction ID: caa430e5eaebf56c297e4d3769f657ad9440f6510077ee48988bf996d692e9d7
                                  • Opcode Fuzzy Hash: 9a40c125defcef3abaf0977f1d520be840e336e1649ba40f585302118d2a0abb
                                  • Instruction Fuzzy Hash: 85A1EA34A10618DFCB04EFA4D998A9DBBB6FF88300F558159E416AB361DF70AC46CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 229a71e1a2b195b893e91f29082eb3dcc18aeb3a5eb018eae8cbad16ae9c7c5b
                                  • Instruction ID: 69833e59bae13f1ba649b30ac631007a36ed75f75b253b5d1ca55ce480f75e2e
                                  • Opcode Fuzzy Hash: 229a71e1a2b195b893e91f29082eb3dcc18aeb3a5eb018eae8cbad16ae9c7c5b
                                  • Instruction Fuzzy Hash: A7912A30710614DFDB04DF69D498AAEBBB6AF89710F1441AAE556DB3A1CB70EC42CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 103326a353c27df717758880c9ab8267ce8a20da148d2e40d89f5c6a2e18e2dc
                                  • Instruction ID: 3ca8ee33be06f2ed9cb780571cf6386dee4faf637f61ce0ccc6a8b231a0f8cae
                                  • Opcode Fuzzy Hash: 103326a353c27df717758880c9ab8267ce8a20da148d2e40d89f5c6a2e18e2dc
                                  • Instruction Fuzzy Hash: 64815C35B112089FCB15CFA5D86AAADBBB6FF88311F14506AF802AB390DB75DD41CB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 743b0d9acfa997f6feaf5b0e053d9f66219534580739eb2f451f59780bbd5032
                                  • Instruction ID: f6f2b61c12f06366b82020c8e58ec7fe414f85a6a993f01db64962e205136942
                                  • Opcode Fuzzy Hash: 743b0d9acfa997f6feaf5b0e053d9f66219534580739eb2f451f59780bbd5032
                                  • Instruction Fuzzy Hash: 41A1E175E05258CFDB10CFA9D944BDEBBF4AB0A304F108199D589AB355DB34AA89CF80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d693a7b82d304011e5aa1e3cef36a83b77cbd3c48a245950251b1393ba8019f6
                                  • Instruction ID: 87b88ca99f2014fee2435f0f29a26ba8188d19d5d0f972bacbf00bc44aa730d1
                                  • Opcode Fuzzy Hash: d693a7b82d304011e5aa1e3cef36a83b77cbd3c48a245950251b1393ba8019f6
                                  • Instruction Fuzzy Hash: D971C131A082958FDB15CB6CC8905EDFBF2FF49300B5985EAD556EB242C234ED85CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 41ff6bddc0e231f27aefea3afbfc4972b0c6467121e7ae362c2b193e1283e7b6
                                  • Instruction ID: d4af9eb49f654ccab3efade72f844c80526451add0221742ad7e826d4e8384cf
                                  • Opcode Fuzzy Hash: 41ff6bddc0e231f27aefea3afbfc4972b0c6467121e7ae362c2b193e1283e7b6
                                  • Instruction Fuzzy Hash: 8451BC30B003009FEB19AB68C855B2E77A7EF89301B64446DE40A9B3A0DE75EC42CB95
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c4db3d7f6a97d3428d484a75d94f743537cf67bd4f6bfd71e6a8d31ac7229c06
                                  • Instruction ID: efddb8be850bbe85d84bb936c461fbd284e5ac29e13179d5589df6df5a681fdf
                                  • Opcode Fuzzy Hash: c4db3d7f6a97d3428d484a75d94f743537cf67bd4f6bfd71e6a8d31ac7229c06
                                  • Instruction Fuzzy Hash: 7871D7B8E01218DFCB44EFA9E5856DEBBF2EB89300F209029E515A7358DB345E45CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: da3a15b55c1739c16858ccdd6137f3b55c2d44064e164186ed9c3db4a55a4111
                                  • Instruction ID: 574fb6ce451acb1a45a741e39ee3af97c80bbc1ca4b234cae0068db6a9a8dc20
                                  • Opcode Fuzzy Hash: da3a15b55c1739c16858ccdd6137f3b55c2d44064e164186ed9c3db4a55a4111
                                  • Instruction Fuzzy Hash: 92711C74E00218DFDB54EFA9D485A9EBBF2FB89300F208029E509A7348DB745E85CF90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 802c098065edfe7c34a1847d8601c304949243ac2c6a21b280377b2363b5d6f5
                                  • Instruction ID: cb0fd1ae3ed74e0f46293627ff03874c520b635f64086deec218b88cc3a62362
                                  • Opcode Fuzzy Hash: 802c098065edfe7c34a1847d8601c304949243ac2c6a21b280377b2363b5d6f5
                                  • Instruction Fuzzy Hash: 6D612A34710614DFCB04DF68C498AAEBBB6FF89710F1481AAE9169B361CB70EC41CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3caa97c919286df08964d23d88f53ce9dac7e2d0a851bc08a7fb0b8a6c23b03f
                                  • Instruction ID: b6abbc0fd8981ca6f13e90df1dfa6cc0d197b310a8b256eca49fb7d581e13355
                                  • Opcode Fuzzy Hash: 3caa97c919286df08964d23d88f53ce9dac7e2d0a851bc08a7fb0b8a6c23b03f
                                  • Instruction Fuzzy Hash: EA510036B0021ACFCB00CF68D485AAAF7B5FF89321F199666E515AB241C730FC52CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 213db4acea4cbc4e86c690a42693896361939d34356ff7fbc131d53bdcf0a71c
                                  • Instruction ID: 6607451ff94945307cb0847da28b0dc29e843265fea004ce2217539015b60fbc
                                  • Opcode Fuzzy Hash: 213db4acea4cbc4e86c690a42693896361939d34356ff7fbc131d53bdcf0a71c
                                  • Instruction Fuzzy Hash: 67510478D05209CFEF14DF98E484BEEBBF2BB49304F109029D519A7356E7B459948F82
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c2e5cb58817d744d061a79af311c32c881165857652d019c218b088a47efd04d
                                  • Instruction ID: ed5ecf6f402aba4621edc8e24e1f89f085a5403013ee03f72280edcfce341a23
                                  • Opcode Fuzzy Hash: c2e5cb58817d744d061a79af311c32c881165857652d019c218b088a47efd04d
                                  • Instruction Fuzzy Hash: D4519C3164C615DBCB14CF9DC8C05EBB7F1EB843107A08DAAD6569B610E730E9849BA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1a79f29aaa3daa1f346f389242a5f53b867d69d2b7aa19a5d4f2b6301f87f8f0
                                  • Instruction ID: 5a832bea8aef8dfaacb783761cb1e7a291fd7d77f8895f1f297fc81053c23fa7
                                  • Opcode Fuzzy Hash: 1a79f29aaa3daa1f346f389242a5f53b867d69d2b7aa19a5d4f2b6301f87f8f0
                                  • Instruction Fuzzy Hash: BB513C76600104EFDB469FA8C815E69BBB7FF8D3147168098E2099B376DB32DC21EB51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0dfb5a4305e88d72abd98ceb8c1e82198bc804bfae42783c51160a9104c1852e
                                  • Instruction ID: c24b0aaa794346d6dd785aefedf771fd67fb6dba220de2de9b404314b2cb9418
                                  • Opcode Fuzzy Hash: 0dfb5a4305e88d72abd98ceb8c1e82198bc804bfae42783c51160a9104c1852e
                                  • Instruction Fuzzy Hash: 3A610B74E00218DFDB54EFA9D48569EBBF2FB89300F208129E509A7358DB745E85CF90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4acf05933ccd8b12d25897ac5081580da15e0d8b58c1593f7aec5878a7912954
                                  • Instruction ID: 5a1bac22f3225954328d2a5836b4f3904b78d1cad60b89ad64ce0694921f37f7
                                  • Opcode Fuzzy Hash: 4acf05933ccd8b12d25897ac5081580da15e0d8b58c1593f7aec5878a7912954
                                  • Instruction Fuzzy Hash: 3B511578D05208DFEF04DFA8E484BEEBBF2FB49304F109029E515A7256E7B459948F82
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 601c09a04c0328059d92bc9847fdd03ae00638906480f261ce01bf8f619e0c2c
                                  • Instruction ID: 2bda57ca09ab4b8db0d3a2200e414bb2d981c5366283f80066d09437477847b9
                                  • Opcode Fuzzy Hash: 601c09a04c0328059d92bc9847fdd03ae00638906480f261ce01bf8f619e0c2c
                                  • Instruction Fuzzy Hash: BA51E874D05208CFEB64DF95C848BEEB7F2BB4D300F2191A9D019AB659DBB49A85CF00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 699fa3260f3d746fabd5d9ab0bebd3a256ca4a6de4e9f60f54bca050c0937c7f
                                  • Instruction ID: eb04d59b9e31f5ab1b8e11f65d4c89280be01e64ce6652ce962c91dd0d73453b
                                  • Opcode Fuzzy Hash: 699fa3260f3d746fabd5d9ab0bebd3a256ca4a6de4e9f60f54bca050c0937c7f
                                  • Instruction Fuzzy Hash: BD516F35B10609DFCB04DF64E468AAEBBB6FF88701F00811AF5029B3A4DF749946CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 10b2895b7ce929f1a03f9f62393c44ab173116ef6b2f1d3df1d324c555fe155c
                                  • Instruction ID: 3de151dc365c84380cffaeb8ffad621219e393f645169a3e0013aed779d8168d
                                  • Opcode Fuzzy Hash: 10b2895b7ce929f1a03f9f62393c44ab173116ef6b2f1d3df1d324c555fe155c
                                  • Instruction Fuzzy Hash: DB512B74E00209AFDB04EFA9D944AEDBBF2FB89310F20946AE415A7358DB349E45CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03b8159a58a24fd7be727a95be22c3cf11377799cf4d452f468129dba857cdaf
                                  • Instruction ID: ba9b590f00d7f727ecbd2a46531dd51ca4c5a1fa3a13bd7ff4d5b12c6c791907
                                  • Opcode Fuzzy Hash: 03b8159a58a24fd7be727a95be22c3cf11377799cf4d452f468129dba857cdaf
                                  • Instruction Fuzzy Hash: C1416230B106148FCB04EB65C894AAEBBB7AFC9700F50416EE416AB3A5DF749C46CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 74d86a0a74e6ba6902a4d50b1d3a5418531eea45e355770cdf90a28eb502896a
                                  • Instruction ID: 9e813fc4bed217eb081bfaa62c694eb7407a9316c6cfd3704ea7a3fd8b1282f2
                                  • Opcode Fuzzy Hash: 74d86a0a74e6ba6902a4d50b1d3a5418531eea45e355770cdf90a28eb502896a
                                  • Instruction Fuzzy Hash: 7451E874D05218CFEB64DF95C848BEEB7F2BB49300F2091A9D409AB759DBB49A85CF00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 162ad64be77912398ac903c13889579176d8a1adef50121cf4304924dde8df86
                                  • Instruction ID: 291d6860ed1b2c37d612e230135e7c925310939a3cafc5d2f541cef2259bd389
                                  • Opcode Fuzzy Hash: 162ad64be77912398ac903c13889579176d8a1adef50121cf4304924dde8df86
                                  • Instruction Fuzzy Hash: D0513374945228DFEB25DF14D8A8BEAB7F2FB4A300F115198D009A7284C7B59EC8CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 19205a9bc60f9026b264ac635c78f0c25092c53e5759a2c12dc925fee9393f56
                                  • Instruction ID: c14dbd044b9ac2a5b69a2eaf4a262206e45da8364c76ac26b422b4f3ddb41924
                                  • Opcode Fuzzy Hash: 19205a9bc60f9026b264ac635c78f0c25092c53e5759a2c12dc925fee9393f56
                                  • Instruction Fuzzy Hash: 84416775A00B448FCB21CF69C944AAABBF2FF88304F18895ED5929BB51D730E905CF61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2da3eedfd7bd82e2701ba3a4ea3e317d3b7368e04727536cdc3f1b99e3296ac4
                                  • Instruction ID: a92f46ec53a66971fbbd9e03eaafe560cbb911c9db049b9b7e5098f6fbe718e8
                                  • Opcode Fuzzy Hash: 2da3eedfd7bd82e2701ba3a4ea3e317d3b7368e04727536cdc3f1b99e3296ac4
                                  • Instruction Fuzzy Hash: 49416C34B00309DFDB14DB64D899F6AB7B6FF88710F14946AE806AB390DB71E842CB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0a38a79bc029d65a4cae86a876303ba0501314effc07a99da16c1215471e8087
                                  • Instruction ID: 6a6d7c90e0acacc6cfb94d12ec90c4e0c53641cf94b56d4b05e5b0ad892a4fdf
                                  • Opcode Fuzzy Hash: 0a38a79bc029d65a4cae86a876303ba0501314effc07a99da16c1215471e8087
                                  • Instruction Fuzzy Hash: 5A413B353406109FD308DB65C864B6AB7AAAFCD714F1145A9E60A8F3A2DE71EC42CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8f210260745ada072a43910d224eb7e1026bae1f813f9ec988efc58d984cdfa4
                                  • Instruction ID: 1b1421c29b72f18333a4b57f9eec61677849b203cfaad931ac0207f39ee4573e
                                  • Opcode Fuzzy Hash: 8f210260745ada072a43910d224eb7e1026bae1f813f9ec988efc58d984cdfa4
                                  • Instruction Fuzzy Hash: 72411230B043049FCB259FA8D9557EEBBB6FF85704F1040AAE556EB390DB30A906CB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ea86c2a157ae6ee64049dd6f947e909750e712a1cd5dd2b09428ffdbeca36641
                                  • Instruction ID: fec1660135b1c624f43706d86c4f29220495ce02ada835d2dc7daef983db8980
                                  • Opcode Fuzzy Hash: ea86c2a157ae6ee64049dd6f947e909750e712a1cd5dd2b09428ffdbeca36641
                                  • Instruction Fuzzy Hash: C5313B353406109FD308EB65C864B6B77AAAFCD714F114569E60A8F3A1DE71EC42CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5e444a7a21993af6a34ceaaa557611966b6d25b3e36822aca33c500f7e8268d6
                                  • Instruction ID: 43c719e3292cc925e83491255ff828de632d2c5eec187a42e50eda90da804b92
                                  • Opcode Fuzzy Hash: 5e444a7a21993af6a34ceaaa557611966b6d25b3e36822aca33c500f7e8268d6
                                  • Instruction Fuzzy Hash: CD410778905118CFEB28DF14D858BEAB7F2FB4A305F105295D12AA7254C7B49EC9CF41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a3668a533f2272221deaa06562a9530f887e62119900d53afc06d05cc2b764cf
                                  • Instruction ID: dcee9eaaf9b8eb35122c53e3d9b8e22f84182e44027298e8bac054d575a81e66
                                  • Opcode Fuzzy Hash: a3668a533f2272221deaa06562a9530f887e62119900d53afc06d05cc2b764cf
                                  • Instruction Fuzzy Hash: F0418035A002189FDB05DFA4D854AEEBBB6FF89310F14806AD856B73A1DB319C05CFA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52d3f44e2d1769341febae213338c714923e390ebd72c9a798f5fd9f168bdb32
                                  • Instruction ID: 42d7319e59353afe20cb089cc2a16f2f950a13b99d47fe8a97c9c2acf4018a5f
                                  • Opcode Fuzzy Hash: 52d3f44e2d1769341febae213338c714923e390ebd72c9a798f5fd9f168bdb32
                                  • Instruction Fuzzy Hash: B131E236A101049FCB05DF68D898E99BBB2FF49320B1680A9E9099F372D731ED55DB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f854d9664193bdf061094d89750bdf6518bd559d08f7daf9926376789fc6c26d
                                  • Instruction ID: a0c1e3948acc85a86e4a49714ef4a26e2eb7641b99d273ce38887c95aaad3c62
                                  • Opcode Fuzzy Hash: f854d9664193bdf061094d89750bdf6518bd559d08f7daf9926376789fc6c26d
                                  • Instruction Fuzzy Hash: F341AE31E002168FDB54DF65C856ABFBBB6FF88351F10882AE906D7264D770DA05CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ddd210e33ecfad2a6f1d909f93ba3b6500c408b0b95006a8b69dde5aec3c57d8
                                  • Instruction ID: 3fe825c12ac45ab9d7fdc621dcfe4b32674fd3791741d937fb14fd86a4a974ec
                                  • Opcode Fuzzy Hash: ddd210e33ecfad2a6f1d909f93ba3b6500c408b0b95006a8b69dde5aec3c57d8
                                  • Instruction Fuzzy Hash: 6541CFB4D052089FDB04DFA9D945BAEBBF6FB48310F20922AE414B7354E7B55A40CF51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c2f179c9a1311991b6b9007c408e2e5f591be196030e2a4688f7fd94140a2e2e
                                  • Instruction ID: 0967e76f3b7c75a74dec904982681a1e9966a420f19931e5b7e01b2c5b98e084
                                  • Opcode Fuzzy Hash: c2f179c9a1311991b6b9007c408e2e5f591be196030e2a4688f7fd94140a2e2e
                                  • Instruction Fuzzy Hash: D241E678905118CFEB68DF14D858BEAB7F2FB4A305F104195D119A7258C7B49EC9CF41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2144be825e787a448d822dca5580aa300191b9d10883c90498602af91ed4eaaf
                                  • Instruction ID: 08ae30958a2052e8328b04f94d86d9dbed641644d8af55cd0c103f5cea2595e3
                                  • Opcode Fuzzy Hash: 2144be825e787a448d822dca5580aa300191b9d10883c90498602af91ed4eaaf
                                  • Instruction Fuzzy Hash: 3541E678905118CFEB68DF14D858BEAB7F2FB4A305F104195D119A7258C7B49EC9CF41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a16c63fe41f0cc552a55346b0a41f6442674b017751732ab1b10d9d689613599
                                  • Instruction ID: 531de599546887b7c21adb686c2c7daf4f5f0d757b49baa75d05504eeb256742
                                  • Opcode Fuzzy Hash: a16c63fe41f0cc552a55346b0a41f6442674b017751732ab1b10d9d689613599
                                  • Instruction Fuzzy Hash: 05417738901268CFDB65DF64D896B99BBF2FF0A300F4040AAE409AB345CB749E84CF51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f0d5bff3de4311d44ed845443392807aa6856c86c38693ba1eead91a188affb6
                                  • Instruction ID: 38cc4b0e0821ee7fbc2aeb7da77869b6b983b38ae115fa4013813209d2bd0f12
                                  • Opcode Fuzzy Hash: f0d5bff3de4311d44ed845443392807aa6856c86c38693ba1eead91a188affb6
                                  • Instruction Fuzzy Hash: BF41DFB4E052089FDB04DFA9D945BEEBBF6FB48310F209229E414B7354E7B55A40CB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 57bc2b2241e6ea1df8d1d69959f2839348d49ea638f90ee9e2e3f70fd4d299a7
                                  • Instruction ID: 859829f5b62f02171c6bdc1edbcd027b67dda9a6f4e1c2636d666e69f1f190bb
                                  • Opcode Fuzzy Hash: 57bc2b2241e6ea1df8d1d69959f2839348d49ea638f90ee9e2e3f70fd4d299a7
                                  • Instruction Fuzzy Hash: E841F378A112288FEB25DB24CC92FA9B7B5FB48750F1045D5EA09AB3E1C671ED81CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b36d812c403c920ef4fac368c9e19b7830559be5eca27959c52a9e2c0b8d8e46
                                  • Instruction ID: 260454e81e644783c1a5ee75553855a9e74f2f5863f6bcd032978095b5c93cfa
                                  • Opcode Fuzzy Hash: b36d812c403c920ef4fac368c9e19b7830559be5eca27959c52a9e2c0b8d8e46
                                  • Instruction Fuzzy Hash: BA314436700214DFCB059F94D855A99BBB6EF8D710B0540A9EA059B3A2CA71DC52CB51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fc8bedfef0cc2f7f2470a7cde3212d5d7811c14084d150ad63755716dbcf5d81
                                  • Instruction ID: 637beaf7dbebe41195e473002eb22c6bd9acdec741e62e9c692310a1babaeb4a
                                  • Opcode Fuzzy Hash: fc8bedfef0cc2f7f2470a7cde3212d5d7811c14084d150ad63755716dbcf5d81
                                  • Instruction Fuzzy Hash: D9311B34A0421CDFEB59DFA8D484BEDBBB2FB48305F205529E112AB385CBB09D95CB51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb95c72c9755cb4b32762638e82e5301248c3bb655152584b5b0a9aab76a8705
                                  • Instruction ID: 03f71a2730beca0dc98c8af4d35386541d4dd2063675c71ea65badb133b0fbd1
                                  • Opcode Fuzzy Hash: bb95c72c9755cb4b32762638e82e5301248c3bb655152584b5b0a9aab76a8705
                                  • Instruction Fuzzy Hash: CC31DD72A042949FCB16CF64D844E96BBB6EF09320F0680E6E6189B233C331E955DB00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 25a432e35ced8058d47837a4b73addc82ef04c0ad2c42628fe68f00dd33c976d
                                  • Instruction ID: e60859174be310e66828eea60f27e712951db6156f0cd3cdb4431653ba41827b
                                  • Opcode Fuzzy Hash: 25a432e35ced8058d47837a4b73addc82ef04c0ad2c42628fe68f00dd33c976d
                                  • Instruction Fuzzy Hash: 7231B475A047458FC701DF79C89459EBFB1EF4A300B0441ABD455DB362EB34990ACBA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 550ec234d93d7a714869579ec254ab9b33475a43f63f3bf1d521913ee04eeb1e
                                  • Instruction ID: fb1b0712ae544ac5cfd63607cbfb3f7ec9090ccbe32c8372eb132be604dd85d8
                                  • Opcode Fuzzy Hash: 550ec234d93d7a714869579ec254ab9b33475a43f63f3bf1d521913ee04eeb1e
                                  • Instruction Fuzzy Hash: 28313478E06218CFDB04DF68C849BA9F7F6FB89300F209469E419AB344D7749981CF11
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: be3a4b1b9523bf828fdd660303dca6e3521f5e33ccb8fe7e68c392c5980a889a
                                  • Instruction ID: 8331fe41a6dfcc29d209252a538c1e9000d63d1ca433dbaa0b2b9f0a352346bb
                                  • Opcode Fuzzy Hash: be3a4b1b9523bf828fdd660303dca6e3521f5e33ccb8fe7e68c392c5980a889a
                                  • Instruction Fuzzy Hash: 4E3169B4E05609DFDB04DFA9D4857AEBBF6FB88300F209029E415A7348DB349A41CF60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 83cc42777ba1765fd2c217bf1be8c2689097dfd20590916ca52439e1bdbd1819
                                  • Instruction ID: 7518faee61f3ee3c754e3256f08252d8c8fa6a03b20b2dac920e324cf93b3e05
                                  • Opcode Fuzzy Hash: 83cc42777ba1765fd2c217bf1be8c2689097dfd20590916ca52439e1bdbd1819
                                  • Instruction Fuzzy Hash: E241F278E012188FDB54EFA4D895BADBBB2FB49300F1090A9E509A7345DB705E85CF54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03e4f737fa8e87bf8737d3e67ea3c3a2f23c1a25a69495a92458eff205f6463d
                                  • Instruction ID: 710c0004cd8f6620360e0d99d0e865ca016b7967541275cf7df4fe29937477b9
                                  • Opcode Fuzzy Hash: 03e4f737fa8e87bf8737d3e67ea3c3a2f23c1a25a69495a92458eff205f6463d
                                  • Instruction Fuzzy Hash: E93113B4E04209CFDB04DFA9D845BEEBBB6FB89310F20912AD428B7355D7719A40CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 55a2bb763d7b9d0aef144efd04cbfa5f810a8c1044fe79292338753e4518352a
                                  • Instruction ID: e8d1e41c15195a2b7df69bfe8b0fd6316dfead47759109f1286f256b1fe66eb0
                                  • Opcode Fuzzy Hash: 55a2bb763d7b9d0aef144efd04cbfa5f810a8c1044fe79292338753e4518352a
                                  • Instruction Fuzzy Hash: 8321D4323056108FD7248F69E884BA7BBE9EBC0365B1684BBE15DC7651DB31EC42C791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e76b08398c07d8e4d45e51791e67dbdca41191369ce56b7f70f0a6c276f772ed
                                  • Instruction ID: a9b2717536e6b75fc47e6767a705757254451d0d58a9761fb75e60d291cef109
                                  • Opcode Fuzzy Hash: e76b08398c07d8e4d45e51791e67dbdca41191369ce56b7f70f0a6c276f772ed
                                  • Instruction Fuzzy Hash: 743132B4E042099FDB04DFA9D845BEEBBB2FB89300F20906AD414B7356D7B49A40CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 76ffb5aced196d7f56a9f999e1d6b4d80b5107f74243b6ba04708cf956ad0438
                                  • Instruction ID: 1a9ec35ff159b84c6448e149cef44959049d68e4664dc71ac9cbe03f294d0051
                                  • Opcode Fuzzy Hash: 76ffb5aced196d7f56a9f999e1d6b4d80b5107f74243b6ba04708cf956ad0438
                                  • Instruction Fuzzy Hash: 8321A071A08510CFC748DB29E4809E9BBF0EF85F10BA181FAD05BDB661E6209EC19B81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9fabec2853c425237efb1aa12f712cf32e918817548e14feeb3de9fad39c37d0
                                  • Instruction ID: e4cd4a622b2567986aa8ffd49b4596c27126faa4d77462c6f2810e9caee96c9b
                                  • Opcode Fuzzy Hash: 9fabec2853c425237efb1aa12f712cf32e918817548e14feeb3de9fad39c37d0
                                  • Instruction Fuzzy Hash: 24414774E05258CFDB58EF68D895BDDBBB2BB49300F5080AAE409A7381DB705E85CF51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dd9f61ed536ee7aff1eb89a3ea508893fbadbd060852b8998e697c3a021d8235
                                  • Instruction ID: cc6eff5e15ef8945b02ffd986972ba7fb31d4990c4452d72a1b82807858e9292
                                  • Opcode Fuzzy Hash: dd9f61ed536ee7aff1eb89a3ea508893fbadbd060852b8998e697c3a021d8235
                                  • Instruction Fuzzy Hash: 643178B4E05609DFDB04EFA9D4456AEBBF7FB89300F209069E415A7349DB349A81CF60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7113c6c30fc832160a57da7b599d3daa65820756925b950addb5060e4e66a787
                                  • Instruction ID: a0d6197f6716e10853b2d198fb6736f417bbc1b3b30aa903e30ee063c067a741
                                  • Opcode Fuzzy Hash: 7113c6c30fc832160a57da7b599d3daa65820756925b950addb5060e4e66a787
                                  • Instruction Fuzzy Hash: AD41E378D05218CFDB64EFA4D495B9DBBB2FB49304F2080AAE409A7384CB709D84CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4db9de8ba68773266bfa7f9940a99ccba91d74a28c196ef49a29988720b07f1d
                                  • Instruction ID: b40a0b8a29f91091e7ce6de0acdc9e03950b2cc7e7d79b88236156ae1e1e7a31
                                  • Opcode Fuzzy Hash: 4db9de8ba68773266bfa7f9940a99ccba91d74a28c196ef49a29988720b07f1d
                                  • Instruction Fuzzy Hash: 233143B4D142098BDB05DFAAC8443EEBBF2FF89300F14956AD515A7291DB380A80CFA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7bd8f1a57818d63bc35a2d94b31ffa941f76ec6cf2da5a07799188370a6bd8ae
                                  • Instruction ID: 8ca090d57f8e18e3c920eeeb1b3daa7bb2960978ba2ad3c7a7690cd64585167c
                                  • Opcode Fuzzy Hash: 7bd8f1a57818d63bc35a2d94b31ffa941f76ec6cf2da5a07799188370a6bd8ae
                                  • Instruction Fuzzy Hash: 7121A138A14104CBCB08EB6CE484AED77F2EBD4341FA008AAD60797244DB319DE4EB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 78f65c9a51fc52504a5b23725491228fa86c2549583c79519ee82cb2bb66f263
                                  • Instruction ID: dbf70be4292fd269178b1a27a7b3bf137fa706617ff1809ffb98ef210cd85d63
                                  • Opcode Fuzzy Hash: 78f65c9a51fc52504a5b23725491228fa86c2549583c79519ee82cb2bb66f263
                                  • Instruction Fuzzy Hash: E841B578E05218CFDB55EFA4D895B9DBBB2FB49300F1044AAA509A7384DB705E85CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 131027254261637658d3eb9c550885a4d1b57ef4fe3fafb01234119d78509c41
                                  • Instruction ID: 34e2ccbc62f837b4d7900252e836668aa6bd04867670e57bc5efef633e163ca7
                                  • Opcode Fuzzy Hash: 131027254261637658d3eb9c550885a4d1b57ef4fe3fafb01234119d78509c41
                                  • Instruction Fuzzy Hash: E4313574E05218CFDB58DF68D895BDDBBB6BB49300F1090AAE509A7384CB705E84CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0ff90e5d09958ea2ac4c5871d9c8bfbf3f0e8cc4fe2b0520f51a2b3d583782d0
                                  • Instruction ID: 5002af20461ca596b18ff5d018cc158fa523eebe86fe623537e259a5d768e7ad
                                  • Opcode Fuzzy Hash: 0ff90e5d09958ea2ac4c5871d9c8bfbf3f0e8cc4fe2b0520f51a2b3d583782d0
                                  • Instruction Fuzzy Hash: 3B3138B4D15208DFDB04DFA8C448BADBBF2EB4A304F2090AAE115A7255D7748AC5CF91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 272fdce0cb40237e88d443a742c1eb0c323ac01e3d75849cfca8201e84897223
                                  • Instruction ID: f1e2eaf8952f9c04d6dd84cc5f63ce432439f4168d9c06b48fa54bed4cb2c940
                                  • Opcode Fuzzy Hash: 272fdce0cb40237e88d443a742c1eb0c323ac01e3d75849cfca8201e84897223
                                  • Instruction Fuzzy Hash: F9217674B10609CFCB00EF69C5549AEBBB6FF89700F10456AD51697324EF709946CBE1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: be4cfae179f74f9fa7aa59339548bb983383d143edb7a00852c18bb0658d8eee
                                  • Instruction ID: 8f73d64cedb27beb9b1a6e0e871754cc798dabeb79ba7fb49cbf30a9ed7e0254
                                  • Opcode Fuzzy Hash: be4cfae179f74f9fa7aa59339548bb983383d143edb7a00852c18bb0658d8eee
                                  • Instruction Fuzzy Hash: E23114B4D15208DFDB04EFA8D4887EEBBF2EB4A305F6090A9E115A3254DB744AC5CF91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6778ddf61372b7c3dd6b2062b3753006e74f237df729c07ef163fc7e71ff44d1
                                  • Instruction ID: b085c92344b33861d53343beb48eac929a644015034de2ebfb888eeae3d9736b
                                  • Opcode Fuzzy Hash: 6778ddf61372b7c3dd6b2062b3753006e74f237df729c07ef163fc7e71ff44d1
                                  • Instruction Fuzzy Hash: 6C41E278E012188FDB64EF64D895B9DBBB2FB49304F5084AAA509A7384DB705EC5CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61bd2a9dea0b8d372670e61c48c0f3cdececab3f1652d8ad3b92d0bbdf4c62e8
                                  • Instruction ID: 3889d042821fe7ff33fbf0f28ca0ec4e09d15095ec51b8dc281e7cf056f0f4a0
                                  • Opcode Fuzzy Hash: 61bd2a9dea0b8d372670e61c48c0f3cdececab3f1652d8ad3b92d0bbdf4c62e8
                                  • Instruction Fuzzy Hash: 6241C078E012288FDB94EF64D895B9DBBB2FB49304F1044AAE509A7384CB705E85CF54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e2a8c1c21d21ef047e1af1948efc0984c406b671ad7befe67a4c5b1c56159a19
                                  • Instruction ID: 584db3843720cba1ddbb27d19994492204e594f71da338427b649e40964e421a
                                  • Opcode Fuzzy Hash: e2a8c1c21d21ef047e1af1948efc0984c406b671ad7befe67a4c5b1c56159a19
                                  • Instruction Fuzzy Hash: 7341C278E00218CFDBA4EF64D895B9DBBB2FB49300F5090AAA549A7384CB705EC5CF54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb6d1e2dc9ff24dc7ec878b19a3b556d44a3516185ce976a97b3f77c3ba3158a
                                  • Instruction ID: fe461106ea418e8647f244de79cd9a31efa2eb9396d9d36140ce7534eaa2d894
                                  • Opcode Fuzzy Hash: bb6d1e2dc9ff24dc7ec878b19a3b556d44a3516185ce976a97b3f77c3ba3158a
                                  • Instruction Fuzzy Hash: 0131C278E01218DFDB98EF64E895B9DBBB2FB49300F5040AAE509A7384CB705E85CF54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f15e47a52d5cfa557b3a8bf165859e61370b945fd2eefd3bbce8d56c8f7db51
                                  • Instruction ID: 588dfec608efc713727973d9ed23ba6117dcaeee2c5a00e68a8f85c699c557f4
                                  • Opcode Fuzzy Hash: 1f15e47a52d5cfa557b3a8bf165859e61370b945fd2eefd3bbce8d56c8f7db51
                                  • Instruction Fuzzy Hash: 342129366101549FCB05DFA8D998E9ABFB2FF49320B0640AAE6499F372D731E815DB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dee447dfde2a34d7ff641ccd04335ff741011c0ad1730664d94e0f2e5f490b04
                                  • Instruction ID: c4a9a518b345d1f4026e98059611aba576111b05bd36b004e6537ed4ec0b9d27
                                  • Opcode Fuzzy Hash: dee447dfde2a34d7ff641ccd04335ff741011c0ad1730664d94e0f2e5f490b04
                                  • Instruction Fuzzy Hash: AD214871E04209DFEB10DFB8C546BAEBBF5AB08340F908076D516D72A0E778DA51CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 99237b581495852b48bd72e932897cbc082ba26f0a0f50bee8cd90303fac889d
                                  • Instruction ID: 2314dc4379232d18e7dcec5de6d90f402921e7221cea3284dd5ed575de41e514
                                  • Opcode Fuzzy Hash: 99237b581495852b48bd72e932897cbc082ba26f0a0f50bee8cd90303fac889d
                                  • Instruction Fuzzy Hash: AA31E474E05218CFDB64EFA5D895BADBBB2BB49300F1090AAA509A7744DB705E84CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1357340681.00000000006AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006AD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6ad000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 87286100fd72b909cb2eeec32e7293ed2cc25ceafa3a511c381ed773099af5fb
                                  • Instruction ID: eb0d5222da7310282ed4a314c355f4875818c415b7a790f5dcb0834cc58f4255
                                  • Opcode Fuzzy Hash: 87286100fd72b909cb2eeec32e7293ed2cc25ceafa3a511c381ed773099af5fb
                                  • Instruction Fuzzy Hash: 742125B6504340DFDB05EF10D9C0B6ABB66FB99314F2481A9E80A0B656C336DC56CFA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3edc72ec6645057345f00f9e4184c5dfcee45ce1a0551a1f28a4c009b9553c0d
                                  • Instruction ID: ac28ef958b0e13329dc2129690664843575539daf9fd2fe098cbcf0254c96ac2
                                  • Opcode Fuzzy Hash: 3edc72ec6645057345f00f9e4184c5dfcee45ce1a0551a1f28a4c009b9553c0d
                                  • Instruction Fuzzy Hash: C6313578E01218CFDB65EF68D895B9DBBB2FB0A300F5050AAE509A7385CB705E84CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1357386313.00000000006BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006BD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6bd000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 81d4794f97a83e3dc37a4d6ccb3845388fea47ff706bd004855af841c7fb6e25
                                  • Instruction ID: 770a3108efdf61dcb61a268db9c8306eb0910c146c2ad713bcbd11c9379c61aa
                                  • Opcode Fuzzy Hash: 81d4794f97a83e3dc37a4d6ccb3845388fea47ff706bd004855af841c7fb6e25
                                  • Instruction Fuzzy Hash: AF2107B5504244DFDB14EF14D9C4BAABB66FB84314F24C569E9090F342D336D887CBA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f34908e99c9b358d236334e04b2aee088518f792587d2ec26e3071a92894f036
                                  • Instruction ID: cad82edf82f4086dc6b581f2e79eda26e34ac9ec95cf0e1f3343cd26665b1a4a
                                  • Opcode Fuzzy Hash: f34908e99c9b358d236334e04b2aee088518f792587d2ec26e3071a92894f036
                                  • Instruction Fuzzy Hash: 6C213A30304194AFCB11DF2AD844ABA7BEAFF8A310B094496FD55CB361CA35DC50DB20
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: db1a975f98ced74fa0a04eee8d2d176a0c1138a4700d8fe733d6f3dc349e4a85
                                  • Instruction ID: ef48749f37c2f0cd47d2fa293800d55513b082002e67d836a3600b9acf3c75fe
                                  • Opcode Fuzzy Hash: db1a975f98ced74fa0a04eee8d2d176a0c1138a4700d8fe733d6f3dc349e4a85
                                  • Instruction Fuzzy Hash: A821C2346103119FDB44EB64D85A7AFBBEAEB88310F508529E00ADB781DFB1AD058BD1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 17bd783a28b0fa8804452f68c01e4ae5486060b878060c9b4679a7f1f38f2573
                                  • Instruction ID: edacb287ea2e89de99083779b4105b5a5cb6b9655ab08c4ab8f3b0b0012094d6
                                  • Opcode Fuzzy Hash: 17bd783a28b0fa8804452f68c01e4ae5486060b878060c9b4679a7f1f38f2573
                                  • Instruction Fuzzy Hash: 43217875E00216CFCB04DF64D896AAEBBB6FF88250F00482AD906A7364E7309905CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f797e3d4733366f0c2d73b55abb7eff67704eb892ede220aa6e06b7d1f59caf
                                  • Instruction ID: e03da30d8569e54ee15e3ed4e2609288499d551660bc5079de29032327028ce1
                                  • Opcode Fuzzy Hash: 1f797e3d4733366f0c2d73b55abb7eff67704eb892ede220aa6e06b7d1f59caf
                                  • Instruction Fuzzy Hash: 1621C471A002198FEF04DF94C595ADDB7F2BB88301F2045A5E409AB7A1DB76AE45CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b75e9d9c12660426adbaca7179e834550bea4fea95a6634ee3dc88b946ea483
                                  • Instruction ID: d7db6c14fc33bed73329e2bc827404489fac151a2f1e9ef95b9b1031e096c9dc
                                  • Opcode Fuzzy Hash: 0b75e9d9c12660426adbaca7179e834550bea4fea95a6634ee3dc88b946ea483
                                  • Instruction Fuzzy Hash: 862119B8E04209DFCB14DFAAC444AAEBBF2FB45300F209559D944A3354D774A982CF90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 31553dbae221b1f0b7c2ad9e7355567a0012965fc38d637d6736858f21cfd2e6
                                  • Instruction ID: 55df8b7695770775968e8e25fa2722637f1eb138853a7dadc6e689b7b3f41c24
                                  • Opcode Fuzzy Hash: 31553dbae221b1f0b7c2ad9e7355567a0012965fc38d637d6736858f21cfd2e6
                                  • Instruction Fuzzy Hash: 1121C0307006448FC715EF68C854AAABBB6EF89300F1485AAE5569B362DB30ED05CBA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c50bf092ae13f05d63140c94b60467e6b5cd83d6e7e1cd643d02c22aa990c849
                                  • Instruction ID: 34ad9e2a0e1d661d822d5b0d2a9867cd44c5dbbbfdf3f63db3fa6d40dc0e26b0
                                  • Opcode Fuzzy Hash: c50bf092ae13f05d63140c94b60467e6b5cd83d6e7e1cd643d02c22aa990c849
                                  • Instruction Fuzzy Hash: 6D118E3062A114DBC7048A5CC5D4AFE7EE5EF49300FB448DAE323A7650CA719DC0AB96
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2bcedae97175ff7543b9b47ee3ce48f46634429c68d6090c7dc02a73f59fdee9
                                  • Instruction ID: e1422857cf3d32fa15fa31e0b84045738438da168307ebaf7c03abf0251792c6
                                  • Opcode Fuzzy Hash: 2bcedae97175ff7543b9b47ee3ce48f46634429c68d6090c7dc02a73f59fdee9
                                  • Instruction Fuzzy Hash: 2531E478E01218CFDB64EF64D895B9DBBB2BB49300F6044AAE509A7385CB709E84CF54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1357386313.00000000006BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006BD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6bd000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fa1cb7c667562d0cb7495b0d123df9ec3f98966c2650084aa802e578e95e6255
                                  • Instruction ID: cba3c0338708f1ce157f1539252b8f3ef3b4ace3e0e054f96fc17489bf572973
                                  • Opcode Fuzzy Hash: fa1cb7c667562d0cb7495b0d123df9ec3f98966c2650084aa802e578e95e6255
                                  • Instruction Fuzzy Hash: 7E2180755093808FCB12DF20D994B55BF72EB86314F2881DAD8458F6A7C33AD85ACB62
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 194b3191a047ba9075745c0246beba98b8f70095faa337956098952650f9efb1
                                  • Instruction ID: cc68312d443786ff09e939c3b58c82a8f063e8ac3487a3fd23338e494c7a0108
                                  • Opcode Fuzzy Hash: 194b3191a047ba9075745c0246beba98b8f70095faa337956098952650f9efb1
                                  • Instruction Fuzzy Hash: 8D217974E0420A9FDB45EFA8E8406EEBBF2FB89300F108169D504A7359DB345E45CFA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b4cbd68df54fc0578da37d79434bcf8bc2cfeb0d8550675ae80131420271139b
                                  • Instruction ID: dd04e2b9bad0e4a96378bab29abdbb12660240742d58549d1f157010d6700c6a
                                  • Opcode Fuzzy Hash: b4cbd68df54fc0578da37d79434bcf8bc2cfeb0d8550675ae80131420271139b
                                  • Instruction Fuzzy Hash: 48115935A0121DDFDB10DBA4D596BEEBBF6AF88310F245425E405B7390CBB09D01CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 68e141138742919ebe0c6baf7d75714ad73bf4980e483b572e845240df5314e6
                                  • Instruction ID: a115f1665a792bad24d3de2a441dee035eaacff4256091b75397be729411497c
                                  • Opcode Fuzzy Hash: 68e141138742919ebe0c6baf7d75714ad73bf4980e483b572e845240df5314e6
                                  • Instruction Fuzzy Hash: 84118235B143159FCB54DBB8C856BAA7BF6AF88301F14942AE505EB380DB70CD01CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 33123f525e0e92e2edf97ffd30fdbccbf614534db9cb097398ca79953bb85884
                                  • Instruction ID: eac5e5f71e96058338e70a1a9737984e650f5c8a8344efad8f2f4b683c36e388
                                  • Opcode Fuzzy Hash: 33123f525e0e92e2edf97ffd30fdbccbf614534db9cb097398ca79953bb85884
                                  • Instruction Fuzzy Hash: FC214774D04249DFCB08CFA9E854AEEBBF2BF89310F14807AD405B2260D7741A84CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: da79c60b5dfd85d0e8748c52326f16eca32dc986e53f28c4b414c8d9bb369669
                                  • Instruction ID: 045f7f60d67d7dda50ea89a26fee70defbd670d7c33e589b18d0b89c162320ca
                                  • Opcode Fuzzy Hash: da79c60b5dfd85d0e8748c52326f16eca32dc986e53f28c4b414c8d9bb369669
                                  • Instruction Fuzzy Hash: 9E214A74E0021A9BDB44EFA8D4446EEBBF2FB89300F108129D505A7358DB316E41CFA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 50e4c5461552c62cec62cf0ded526ce4e33e8c6b69d972ff5b22304a194f5e0b
                                  • Instruction ID: 6edf8958e815622b95ec53e25e6d9d9304e521ce392bfc5499290aed909807c8
                                  • Opcode Fuzzy Hash: 50e4c5461552c62cec62cf0ded526ce4e33e8c6b69d972ff5b22304a194f5e0b
                                  • Instruction Fuzzy Hash: BA1137B5D04249CBCF08CFA9D8946EEBBF6FB89310F10907AD509B3210D7701A84CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5d1bc1e1b7dfcecd1d3fb61df589c72767d728fac42d1976ec0417bf93d33c8d
                                  • Instruction ID: da98f325a963c1ed5c664c0336a8c9a25d3f2ed797e0720a867b7924729e8090
                                  • Opcode Fuzzy Hash: 5d1bc1e1b7dfcecd1d3fb61df589c72767d728fac42d1976ec0417bf93d33c8d
                                  • Instruction Fuzzy Hash: 57016D323102004F9B04AE2AE895AAABBABEFC5624754907BE506CB362CF71DC01D790
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9d4959025423c383975c8eb6b8a1d6830b34c984acd60e6bcb25f8e7cab5da66
                                  • Instruction ID: 21ff7b2544360219589faa3c7fba7601b7a9b150af7e9598a67d8c5c7e542577
                                  • Opcode Fuzzy Hash: 9d4959025423c383975c8eb6b8a1d6830b34c984acd60e6bcb25f8e7cab5da66
                                  • Instruction Fuzzy Hash: 6721E478905218CBEB28DF14D848BDAB7F2FB4A300F104299E209A7398C7749E84CF51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1357340681.00000000006AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006AD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6ad000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                  • Instruction ID: 9a4bd4148ae8730aafb6aa3f99f742bafd9c69413d4a4b446ed5998d1d21ee8f
                                  • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                  • Instruction Fuzzy Hash: EB11B176504280CFCB16DF10D9C4B56BF72FB98324F24C6A9D8090B656C336D856CFA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 22454e3b8345839d2ee0d966e1639eef0213be918cbc226442fe23ec72b3d046
                                  • Instruction ID: 5b94246c83e1d381370f13cf74d478bca71a04b6d3829921d32e5e4d41073bda
                                  • Opcode Fuzzy Hash: 22454e3b8345839d2ee0d966e1639eef0213be918cbc226442fe23ec72b3d046
                                  • Instruction Fuzzy Hash: DB215079A022199FDB05CF98E595EADBBF2BF89700F605054F802AB361CB30AD41CB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 093620b3ea4deff45109c56a57c8399428f4a4d3ad7b4605b371a19642f28829
                                  • Instruction ID: 3933d628fedbf03818970002c448e58f7783c2ae9881656e4c516995793c2bc9
                                  • Opcode Fuzzy Hash: 093620b3ea4deff45109c56a57c8399428f4a4d3ad7b4605b371a19642f28829
                                  • Instruction Fuzzy Hash: B721B678D05218CBEB68DF14D848BDAB7F2FB46304F105299D209A7398CB759E84CF51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 417af9e64ffdd331807f93a5ea995d49116690a10477d169d0612a9f2f55d174
                                  • Instruction ID: 1895ae86f0279f20da09252a04fccf204f1873ee4ef47abe9cd417ec680e4c0a
                                  • Opcode Fuzzy Hash: 417af9e64ffdd331807f93a5ea995d49116690a10477d169d0612a9f2f55d174
                                  • Instruction Fuzzy Hash: C111FB34B101189FDB44EFA9D494AADBBF2BF89704F654059E406FB3A1CBB59C40DB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b5dc2a6c47d03f02b103b2b022297a5086c8fd47176f1c7602e0d7982841c0ab
                                  • Instruction ID: f184603ada815cacc9ca11dc71bb4411021ff4e972c6bbaecde8373ea30aa231
                                  • Opcode Fuzzy Hash: b5dc2a6c47d03f02b103b2b022297a5086c8fd47176f1c7602e0d7982841c0ab
                                  • Instruction Fuzzy Hash: 5821E378D01228CBEB68DF14D848BD9BBF2FB09304F104299E119A7354C7B59E88CF51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 85510c0a347f47a0c12b282ea011d18ad638572f26b566245a07eb069a3ce3ba
                                  • Instruction ID: 9cee68021ac4e52997a77eafc7050148af5d6fd800e196870034b5ffe5bf5c39
                                  • Opcode Fuzzy Hash: 85510c0a347f47a0c12b282ea011d18ad638572f26b566245a07eb069a3ce3ba
                                  • Instruction Fuzzy Hash: 10014436340319AFDB109E59EC95FAA7BADFF88721F108066FA15DB290CAB1D8108B50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 46f8e1501cf3f1a84edaaed095d67feefe9afb9522a1fe9a08757076ffd52a75
                                  • Instruction ID: d9dfc951e0140bda89ae5a7ffa82e9d23e4bdc5c21fe7d91b4ddd11e5b1b2126
                                  • Opcode Fuzzy Hash: 46f8e1501cf3f1a84edaaed095d67feefe9afb9522a1fe9a08757076ffd52a75
                                  • Instruction Fuzzy Hash: 56112375E002199FCB44DFA8D4456EEBBF5FB89315F10006AE609A3344DB755A45CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 120f782cf126d51ec55971ae3be7d9544bfafebb9b7a979493fd5397affb5fd7
                                  • Instruction ID: cf513bfe11a518af62a2859a50f03be460c702ccd8634f8108eab970921657fb
                                  • Opcode Fuzzy Hash: 120f782cf126d51ec55971ae3be7d9544bfafebb9b7a979493fd5397affb5fd7
                                  • Instruction Fuzzy Hash: FC114FB0D042198FDB44DFB5D8417AEBBB1FF89300F108169D415A7391D6345A42CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b1a60d4703273dd408a976f74752fc50a2ba8a0a01f74aa7d37c2cbee423b2a6
                                  • Instruction ID: 73c3178e7b14c6370bc9757b28b471c7c6e585085ec66e45ee984e5c91494d59
                                  • Opcode Fuzzy Hash: b1a60d4703273dd408a976f74752fc50a2ba8a0a01f74aa7d37c2cbee423b2a6
                                  • Instruction Fuzzy Hash: 431175B5E002199FCB48DFA8D4456EEBBF5FB89300F10006AE504A7394DB796E41CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3437098506cbabc4300a2aa8f079e5c2e715b8dc3ac0a827908189b152141760
                                  • Instruction ID: 325e24e963c4cdedbb2a1c57cb8c909d1a5affae49edb6a4f2aa5d83e27f04a5
                                  • Opcode Fuzzy Hash: 3437098506cbabc4300a2aa8f079e5c2e715b8dc3ac0a827908189b152141760
                                  • Instruction Fuzzy Hash: 4E01D1363003148FC7009E69DC81F9A7BA8EF89330B15416AF416DB362DA64DC01C750
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5d3d2838aaaf7967920f2cdf7f08d030bf893d030e1c3558857b03aa123f9ddc
                                  • Instruction ID: 598965980f22d77d90b55913eb6d7f0ef384f2025c48d0a22f63a117a47f0f61
                                  • Opcode Fuzzy Hash: 5d3d2838aaaf7967920f2cdf7f08d030bf893d030e1c3558857b03aa123f9ddc
                                  • Instruction Fuzzy Hash: 290184353007408FD7159B78C454BAB77A3AFCA314F18459ED5A64B7A1DB71E842DB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 354bd29878f8287f4b48d3eff54c2fe5ad50e3ca0f4deb8f66f8a711173a2160
                                  • Instruction ID: ab3eb8c41c68fa91beaaba448137839a8b4593c288edcfface114d081c5b7bf7
                                  • Opcode Fuzzy Hash: 354bd29878f8287f4b48d3eff54c2fe5ad50e3ca0f4deb8f66f8a711173a2160
                                  • Instruction Fuzzy Hash: 9E21E378905218CFEB24DF54D848BDA7BF2FB46304F100295E119A7295C7749E88CF51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cc94c4e37dc3d71147848ea24d6fc0da2ce1a46a3c8c5ca2290fcb3df06c68c9
                                  • Instruction ID: 506d5b53bf361e93ea1e7188301a654c418535b1eab544b09cbc7de1c8d1fa17
                                  • Opcode Fuzzy Hash: cc94c4e37dc3d71147848ea24d6fc0da2ce1a46a3c8c5ca2290fcb3df06c68c9
                                  • Instruction Fuzzy Hash: 961161F4D092499FDB14CFBA84815EDBFF1EF86300F24956AC548E2315E3705582CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1c1595fa012de0cca2e0c62b820387336298e1c93cd2d4f7110714fd174438ce
                                  • Instruction ID: cc5360f1c8a8ef346e90e03d0d777a8da033b61646580e0ede5ae32cb7ae2221
                                  • Opcode Fuzzy Hash: 1c1595fa012de0cca2e0c62b820387336298e1c93cd2d4f7110714fd174438ce
                                  • Instruction Fuzzy Hash: 7B110071504B428FC7229F34E8883AABBF1FF05311F504BAAD0968A4A2DB34E5C6C781
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: da85f509bd280bce451830bdc75314e4cad42ebd0cf29534c06bbf5c3c3195c1
                                  • Instruction ID: 449895d70844f243db2e5aafd41deaae29c2a8d832ed03a739d932048bc5fc92
                                  • Opcode Fuzzy Hash: da85f509bd280bce451830bdc75314e4cad42ebd0cf29534c06bbf5c3c3195c1
                                  • Instruction Fuzzy Hash: 96114F70E00609DBDB009FA4D454799F7B2BF89300F20CA29E459A7395EF749981CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ab28fba69fadb3040a20facca0bafa6cfd1bf5ce058be04454f92c4eabf6a8c4
                                  • Instruction ID: e3509d650eaa3c61be0f8dac31f54e8b5fd450f785e34f2984ceeda679c0cdb2
                                  • Opcode Fuzzy Hash: ab28fba69fadb3040a20facca0bafa6cfd1bf5ce058be04454f92c4eabf6a8c4
                                  • Instruction Fuzzy Hash: 35115E34E04218DFEB68DB98D584BEDB7B2FB44305F214425E1229B385CBB05D95CB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6692151af87a980e4845495b25da0dd2d60f79951bbc9dee663d1d8b236a7134
                                  • Instruction ID: c3b1321a864ea8336ce2ea3a3d900df2429e16e70669468488fca45173b7fb8d
                                  • Opcode Fuzzy Hash: 6692151af87a980e4845495b25da0dd2d60f79951bbc9dee663d1d8b236a7134
                                  • Instruction Fuzzy Hash: D201B135300A009FC724AB34C844F6B77A7EBC9324F24866ED5664B7A0DB71EC42DB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 82b5eb66a41d08844ec7d00585f3e32d916cab31cf42ca1a99af76385777950a
                                  • Instruction ID: 5c43ae1d35073a71e7a5c6aa03d57a44c8201fa38d615ffdccc60ead2d119f41
                                  • Opcode Fuzzy Hash: 82b5eb66a41d08844ec7d00585f3e32d916cab31cf42ca1a99af76385777950a
                                  • Instruction Fuzzy Hash: F9F02433704224A7D720C618DC927A7BAAEEBC8624F54103AFC0CC2740DA91DC4286A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96521a07d9caeeddff450686b025beff087d4948d038d1c3d2dc6b3d55d74e33
                                  • Instruction ID: 973b10f2d68e17b3fbc300a0e06f7715a6fabab048289c4031b38b9727f3be23
                                  • Opcode Fuzzy Hash: 96521a07d9caeeddff450686b025beff087d4948d038d1c3d2dc6b3d55d74e33
                                  • Instruction Fuzzy Hash: 1FF0F036F482156FF3158A14A812B6AFBA9FFC8720F14402AE505DB380CAA6EC418390
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 364d9d06f12728a9f777de0d6fad96bd5a92b067e58799f26cffd6fb2d4b4b2f
                                  • Instruction ID: c466b3e88e48ccdd61af8cb97dd47a80735952a4576593c0db5e362d7a4997a7
                                  • Opcode Fuzzy Hash: 364d9d06f12728a9f777de0d6fad96bd5a92b067e58799f26cffd6fb2d4b4b2f
                                  • Instruction Fuzzy Hash: 2301AF366093805FE3271B74886A7A63F759F47511F0948EBD595CF2A3DB24C806C712
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 53c6a2d7c9ca7d82bc6bb62cd8d96da8a9d1daa1d46c297fb2347a8af79f1f59
                                  • Instruction ID: a65f5641ff2dfcfed9e27bf1faf67f935fcc2273bd75a048dd1e913ffdd7f44c
                                  • Opcode Fuzzy Hash: 53c6a2d7c9ca7d82bc6bb62cd8d96da8a9d1daa1d46c297fb2347a8af79f1f59
                                  • Instruction Fuzzy Hash: 2901A239300610CFD3059B74E469A5ABBA3EFCC321B10856AE90A8B7A1DF35DC42CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8938f631612d829b3e027e75d381a378ce44fdc10cb254765cb9699e8e63330f
                                  • Instruction ID: eb90ca3acbfd9fc5f982663f4734e1e7d34b3c87d154ef618a10c04ed5486d42
                                  • Opcode Fuzzy Hash: 8938f631612d829b3e027e75d381a378ce44fdc10cb254765cb9699e8e63330f
                                  • Instruction Fuzzy Hash: A711F878E01268CFD764EF64D8547A9BBF2FB89301F1041A9A509A7388DB345E84CF90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e88cc26474b45ee6d6046a838a4a2a909815c48e7270c3676d23cae2bc1dd0bc
                                  • Instruction ID: ab9d24144bd4ce6cd153450678820f90c1d5f450143d3f1b3883cf17f920add8
                                  • Opcode Fuzzy Hash: e88cc26474b45ee6d6046a838a4a2a909815c48e7270c3676d23cae2bc1dd0bc
                                  • Instruction Fuzzy Hash: AA011D35300614DFD305AB65E468A5AB7A7EBCC711B108169E90A8B391DF71EC42CBD5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bba3975203e114b12320626b2bc132fe1d7cc1212255262af79ea243ef4c8584
                                  • Instruction ID: f6f8dea6937820031f4a4ca8291de7c99b85fb54c006f77bbaa8f427b7e98bf6
                                  • Opcode Fuzzy Hash: bba3975203e114b12320626b2bc132fe1d7cc1212255262af79ea243ef4c8584
                                  • Instruction Fuzzy Hash: 63F0F67067A115CBD7008A8CC5D4AFD7EE5EF08340FB44CD6D333A6660CA719AC1AB56
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6470273be34fced5173e4e5e03983dbb433d9be3efb985cf2d3cb2820b35fcfd
                                  • Instruction ID: 258e0e00f7e86abc3fe6f7ebaa28550393c4a42a7053b5ee92418c1950d1ab1f
                                  • Opcode Fuzzy Hash: 6470273be34fced5173e4e5e03983dbb433d9be3efb985cf2d3cb2820b35fcfd
                                  • Instruction Fuzzy Hash: 9CF02426B0D3851FE31306745C32369AFA1DFC6200F0804ABD0C2CF2D2EA86C802C341
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 53976b8460ce30ebccde4c7f4bf65461ade40822bd59746f69ceaedac97cf962
                                  • Instruction ID: 83de940ee404c064ee8853312ecd876995aff4faaf9854a244befb794b4b5937
                                  • Opcode Fuzzy Hash: 53976b8460ce30ebccde4c7f4bf65461ade40822bd59746f69ceaedac97cf962
                                  • Instruction Fuzzy Hash: 3BF027577093102BD322951D9C6579B9BB8DF96314F14047FF808CB396EA55CC4687A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d3ad19ff8ea6bdcc52c72be64c8632f5a427174d0c12fe187dd3f069e0e48f69
                                  • Instruction ID: e24233964e3291a8f262e77d36d96ccc31bbc8eabe4719b85ac12546d846e294
                                  • Opcode Fuzzy Hash: d3ad19ff8ea6bdcc52c72be64c8632f5a427174d0c12fe187dd3f069e0e48f69
                                  • Instruction Fuzzy Hash: 13F062393443408FC705DB69D564A7A7BA6EF89711B1444AEF9868F372CA31DC46DB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 572dd8f5b48e535ae7ebf4f5ced28578195e68c0d064e5cca12805abd0324f34
                                  • Instruction ID: 30b1502458e5707bfff6a393f09c58d7ec92fdd166029be943aad6a871b354ca
                                  • Opcode Fuzzy Hash: 572dd8f5b48e535ae7ebf4f5ced28578195e68c0d064e5cca12805abd0324f34
                                  • Instruction Fuzzy Hash: FCF0E935F043155FE3158A149811B6BFBA9FFC8720F14442AE546DF390CBA6EC418784
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7ba0d30eeb7af14417edd4048047bfc537aa86b72ccfd31f8c5beaa53fbd4802
                                  • Instruction ID: b197c1625d187dd6ab6e1fde434f801ec1edd68e32551ea69b4af65020b2f1d3
                                  • Opcode Fuzzy Hash: 7ba0d30eeb7af14417edd4048047bfc537aa86b72ccfd31f8c5beaa53fbd4802
                                  • Instruction Fuzzy Hash: 0AF0F975905208AFDB45DFA4D8429DCBFB1FB49310F15C0AAEC1897261D3329A63DB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0cbaf06f532598065c404ad7e5a382d05202afcaff0fdbe352538e15e9a79e55
                                  • Instruction ID: 69801bb53628932de3755beadfccf413d113df4a61ecc40168a31b97cb07e5aa
                                  • Opcode Fuzzy Hash: 0cbaf06f532598065c404ad7e5a382d05202afcaff0fdbe352538e15e9a79e55
                                  • Instruction Fuzzy Hash: 19F0E937700108ABDB149A19D854AABF7AEDFC8224F058066F915D7361DF719C16C690
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fac3b4eab6aa4f6d9d3956cb6285f0719b32e63639e2e98c32d4bd98cb5c1150
                                  • Instruction ID: 5a99d4d2b4537360d2c0464d82d0ef4d106942455ae07336bcd232cc45ab9e28
                                  • Opcode Fuzzy Hash: fac3b4eab6aa4f6d9d3956cb6285f0719b32e63639e2e98c32d4bd98cb5c1150
                                  • Instruction Fuzzy Hash: 73F0496244E7C04FD30397785C786D67F31DF27214B0E14DBD5C18B1A3D229592AD362
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ecba0b8d6b05a64a02886398ffe97e3ecc1eac173a58fa4949ba55a50dfac281
                                  • Instruction ID: c485d10964217cc4ae0ad8a613884d89c6b6224530579e8076b62577011f5fe1
                                  • Opcode Fuzzy Hash: ecba0b8d6b05a64a02886398ffe97e3ecc1eac173a58fa4949ba55a50dfac281
                                  • Instruction Fuzzy Hash: 1B01C8B4D052099FCB84EFA8D4856AEBBF1FB4A300F604169D509A3348DB305E81CF91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e3d84772a6ae1de54f4b7ff4a3c22071fb470e2517e0e9986f608463f3f91a67
                                  • Instruction ID: ecc253956784956abcdae4838b58df9f7dd19c112daf4c6d1c8376fd0fdae599
                                  • Opcode Fuzzy Hash: e3d84772a6ae1de54f4b7ff4a3c22071fb470e2517e0e9986f608463f3f91a67
                                  • Instruction Fuzzy Hash: 7EF096B11043505FD351AB64D8A178ABFA7EF86310F04C968E1894F257DF74AD0A8BA5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 347536ccd1ec81f860d2abace77f4c428d1d612510325fd8bf90ebb5bc590503
                                  • Instruction ID: eb21ac8b7c94352fa449e6614cb79f658ccc4475a4c6a79d78da227ea0b5cdc4
                                  • Opcode Fuzzy Hash: 347536ccd1ec81f860d2abace77f4c428d1d612510325fd8bf90ebb5bc590503
                                  • Instruction Fuzzy Hash: 53F0C2305AD352CFC342BBB084E00E93BF1AE0175077545E9C0034B206EAF908C1AB21
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 786416560552f44f018cb90b7e409ffd4d80061c1f90c52a4b7c2da68841127a
                                  • Instruction ID: a56be5355442f3acff97c11c61d075a2bfeff6c2e2e6b2121330ce7e76e7ac5f
                                  • Opcode Fuzzy Hash: 786416560552f44f018cb90b7e409ffd4d80061c1f90c52a4b7c2da68841127a
                                  • Instruction Fuzzy Hash: A6F0E5317003148BD72466799819BA633AADFC5616F50447BE50ACF380DF71DC01DB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9d9d839e942f75fb780053519186dc39e47c585b79e5f84bde45eb7f38812a93
                                  • Instruction ID: b84d99b1f3d92e07a1190e06623cd382159a0baef4c13ec411cd09fdff1896c4
                                  • Opcode Fuzzy Hash: 9d9d839e942f75fb780053519186dc39e47c585b79e5f84bde45eb7f38812a93
                                  • Instruction Fuzzy Hash: 14F04F3160E3C49FC70A97689450599BFF59F97300B2A45E7D085DB2A7CA244C8AC76A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1529c9185f821816fc8b2e1e8d86e7aaf44a4880caef88767d921c16ce348701
                                  • Instruction ID: 14965f525f9a51bb172b92c74992561a1cef00e1c9c8cd4fa591cfcf3a6a5082
                                  • Opcode Fuzzy Hash: 1529c9185f821816fc8b2e1e8d86e7aaf44a4880caef88767d921c16ce348701
                                  • Instruction Fuzzy Hash: EA01E870D04118DFEB54DF28D988AA9B7B6FF89300F1481A5E80DE725ADB719E81CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 49edf6c6740d69c9bdc5917d03be4ca691239b40c8b1299ec47e3c7fa9c70572
                                  • Instruction ID: e4f90cbddf48fb6e6e8df0a2eabda05ef5685a0219c584cbffe3adee7d1f8d79
                                  • Opcode Fuzzy Hash: 49edf6c6740d69c9bdc5917d03be4ca691239b40c8b1299ec47e3c7fa9c70572
                                  • Instruction Fuzzy Hash: 08F0CD75E08248AFEB09CFB5D0853DC7BF1EB46300F2181AAC44593292DB380A82CB00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3022ffe086bd15253eaf7607e4aa5a2a570ebb5a2c5f0974d936e1462ef885b2
                                  • Instruction ID: dfbd95438730424e485c5a686d3c98b9774a5631e2c3cb1bbe3c6fd018d1a9c4
                                  • Opcode Fuzzy Hash: 3022ffe086bd15253eaf7607e4aa5a2a570ebb5a2c5f0974d936e1462ef885b2
                                  • Instruction Fuzzy Hash: 6FF06270D08244AFDB41CFA8C851AADBFF1EB4A300F14C09AD858D3352D2359A52DB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0298cec8acc613b362b28d743704fc62fc7dfb6c0b9da7f37360c3716be28ff0
                                  • Instruction ID: 8793af956479fbde4d396af1c180d9dd7e179d37c570eb503e490a717ebd2e89
                                  • Opcode Fuzzy Hash: 0298cec8acc613b362b28d743704fc62fc7dfb6c0b9da7f37360c3716be28ff0
                                  • Instruction Fuzzy Hash: 1DF03A75A09344DFDB45DFBCE49139CBBB0EB8A214F14C1EEC8099B352D6758A46CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16405779e176e06915957ce50ca0827b101c8050fec0aef1581589f4df20dd77
                                  • Instruction ID: 5557f4d1d70c42e7ef5a78c943dbdd301c9708c08aac2820a240e118fa38e840
                                  • Opcode Fuzzy Hash: 16405779e176e06915957ce50ca0827b101c8050fec0aef1581589f4df20dd77
                                  • Instruction Fuzzy Hash: FEF05E3A3106009FC714DF19D854E3A7BAAEFC8721B1040AAFA068B371CA71EC02CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a953102ce718a0049c33360538f1f0c4b414cf3a25f973840c177257ce58c777
                                  • Instruction ID: c850478bc814c39f4d156e70e4e94835fb9802ead89ca55c9e1d92a5770d4d9a
                                  • Opcode Fuzzy Hash: a953102ce718a0049c33360538f1f0c4b414cf3a25f973840c177257ce58c777
                                  • Instruction Fuzzy Hash: 75011A74E062688FD754EF54E85079ABBF3FB49300F1040A9A509A7349DB345F84CF51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c5429d11def6161f384bf15be437489dcfdde89815bede7eff178101e2a1e93
                                  • Instruction ID: 40c42a22bdff88e2244d0c6f23712cca4b85e8cc79598262bbac75e7b94b2b8a
                                  • Opcode Fuzzy Hash: 3c5429d11def6161f384bf15be437489dcfdde89815bede7eff178101e2a1e93
                                  • Instruction Fuzzy Hash: D8F01438E04158DFDB09DFA9E48579CB7F2FB89301F108065E109AB258DB748A44DF00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eb5010f1b80e5848b813911d554e96850b815ac00c8b91d52e0220702ecba0a2
                                  • Instruction ID: fb4c108f452cd4a15c88551515482ee251776950d0197ecb2781c01db8ee0a5b
                                  • Opcode Fuzzy Hash: eb5010f1b80e5848b813911d554e96850b815ac00c8b91d52e0220702ecba0a2
                                  • Instruction Fuzzy Hash: 66E09274809208AFDB04DF64D9839E8BFB1EB46300F21D0A9D84827352C7324E57DB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ebc447e022461ac6614339412f3592edbe91f149edf80c16dca0a81040605c1e
                                  • Instruction ID: 3c5372da3c19ca458b769dc085e45f830651e274ca68952a6a2e536fae1e01ce
                                  • Opcode Fuzzy Hash: ebc447e022461ac6614339412f3592edbe91f149edf80c16dca0a81040605c1e
                                  • Instruction Fuzzy Hash: 06E0653230071657D7109A26EC95A8BF79EDFD4354F14D936E10987215DEB0EC0AC790
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9a23f5f3c30627ded7b5a194cebff25f08200b37eff275bc151c39ba2fd40b2f
                                  • Instruction ID: 6fc560214d75836d5d6dcbdf9254b907fbc9e7485b67214b6324fcd5642f4640
                                  • Opcode Fuzzy Hash: 9a23f5f3c30627ded7b5a194cebff25f08200b37eff275bc151c39ba2fd40b2f
                                  • Instruction Fuzzy Hash: AEF0E931A083049FCB05CB54D85979D7FB9AF45311F0480A7E04A9B181EB701581C788
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c15c96ca719d3ea5520b27f752330b08e4356b581efca7fd010eb2230ba965e2
                                  • Instruction ID: 6de5d831a92e1123755fc687dfdadb039a6614abdaa12265629a9f33aedc26e6
                                  • Opcode Fuzzy Hash: c15c96ca719d3ea5520b27f752330b08e4356b581efca7fd010eb2230ba965e2
                                  • Instruction Fuzzy Hash: B5F06778815248CFEB10CF68E888BD8BBF1FF06340F500284E101AB2A9C775A982CF00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b452940cbf9b17b38e30100f5d3a63b9c6dc2ef88640be95fa259c33ab56592b
                                  • Instruction ID: 8ee30189e1808f6c70a1813084fd97833d2feb16179f00e7db7455ac9b16afc1
                                  • Opcode Fuzzy Hash: b452940cbf9b17b38e30100f5d3a63b9c6dc2ef88640be95fa259c33ab56592b
                                  • Instruction Fuzzy Hash: 48F01CB4D0A208AFDB54DFB8D9866ACBBB0FB49204F15C4EAC84897352D7755A43CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c38649eed64568fa330778724275584007bc6849e638de7c935a0e4a7a90e90f
                                  • Instruction ID: 6762aefde3342ce9dd2f9ba8b1af00906d2e7d007c66b0d009af6e3ff5e602ab
                                  • Opcode Fuzzy Hash: c38649eed64568fa330778724275584007bc6849e638de7c935a0e4a7a90e90f
                                  • Instruction Fuzzy Hash: 5CF03078D09248AFEB44DFB8D4826ECBBF0EB4A200F10C0EAC85997352D7354A87DB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3fbb160b65132ebb35fad114d0db2bd32b20d75d2b2d74fa486ce05b8e0a9ea8
                                  • Instruction ID: 34cfe17edf1058c8a097fba183cba59df131a97526fa1e64830006a1753aecc0
                                  • Opcode Fuzzy Hash: 3fbb160b65132ebb35fad114d0db2bd32b20d75d2b2d74fa486ce05b8e0a9ea8
                                  • Instruction Fuzzy Hash: BFF0A0348092849FCB41CBA8C5516EABFB0EF4B204B1491DAC8AA47663C6350A47DB51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3145547735503de895adcb2c977b7bcb3e4461a1278810d156f3c835780b2c58
                                  • Instruction ID: 7fc36f99886247259eabbb3e9ae36c3f2bcc85067fbde6d5c788971412b65384
                                  • Opcode Fuzzy Hash: 3145547735503de895adcb2c977b7bcb3e4461a1278810d156f3c835780b2c58
                                  • Instruction Fuzzy Hash: 13F09A306093D49FCB06D768D444599BFF6AF86300F2A85E7E081DB2A3CA248C85C76A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5010d8779e48d903ca351867322225e5ebde95f5e89e6a8dd320726181b8970a
                                  • Instruction ID: d9102559251725de32c3735546a5e73f827859502e523e7165ad11ee798cddb2
                                  • Opcode Fuzzy Hash: 5010d8779e48d903ca351867322225e5ebde95f5e89e6a8dd320726181b8970a
                                  • Instruction Fuzzy Hash: FCF03475D09208EFCB80DFA8D852A9CFBB5FB49300F14C0AAD85893351D6318A52DF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16855313cdb2bc4282b1a93c4cea1d683fd4c42a57c10483d11a61815aa49c0b
                                  • Instruction ID: d352dd51eeb1258d1ac16fec50b20f4bbe320a27697f48437c937c4f0f7d62d3
                                  • Opcode Fuzzy Hash: 16855313cdb2bc4282b1a93c4cea1d683fd4c42a57c10483d11a61815aa49c0b
                                  • Instruction Fuzzy Hash: 40F05E74D05208EFDB54DFA8D8406ACBBB1FB48310F10C1AADC1893350D7355A42DF41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 05eab32c04f9ec2b26287418bfac383a0cd5cd867cf9509f6824fdfedec8bb2d
                                  • Instruction ID: 5d1703b454428b6839c79167e51d751c56da9a2468f60303d9ee3f6b9618697c
                                  • Opcode Fuzzy Hash: 05eab32c04f9ec2b26287418bfac383a0cd5cd867cf9509f6824fdfedec8bb2d
                                  • Instruction Fuzzy Hash: 24F05E75D09248AFD744CBA8D4956DCBBB0FB49200F11809AC85897351E7754A42CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a5f6b3ebdf40956933cc5eb20be5c162402440c3fd6cbf321a78518d4d3ba174
                                  • Instruction ID: 32c065e9235e3c740036c9bbe823c429ef17f84148ab4a5eec0486d8c5d1028f
                                  • Opcode Fuzzy Hash: a5f6b3ebdf40956933cc5eb20be5c162402440c3fd6cbf321a78518d4d3ba174
                                  • Instruction Fuzzy Hash: DCF03A75909208EFDF05CFA8D840AACBBB5FB4A300F14809AE845A7361D732AA61DB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0d61cdc3b6544a70e44fed33a42742ada166f0f8ead21b52c727896417b162f2
                                  • Instruction ID: 773bc08a83ebdb24ad00c79c6b7163d055dc9031e985a97fe28522821b734ad6
                                  • Opcode Fuzzy Hash: 0d61cdc3b6544a70e44fed33a42742ada166f0f8ead21b52c727896417b162f2
                                  • Instruction Fuzzy Hash: 9BF0A574E05208AFCB84DFA8D4927ACBBF5EB89200F1085A9D859A7350D6759A46CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 12a8224d713bd51defc944e98a3b4b5fd7cdbf35d87c6a22cb39f09466e5729a
                                  • Instruction ID: e513be10f9ee03064ac95c73afe8d643086fa8c8bb63792856e6de08709b6451
                                  • Opcode Fuzzy Hash: 12a8224d713bd51defc944e98a3b4b5fd7cdbf35d87c6a22cb39f09466e5729a
                                  • Instruction Fuzzy Hash: F3F03AB4D09208AFCB84DFA8D84199CBBB4FB49300F1080AAE84493361E7319A55CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8984b374fdfa44779ba6dbc7881c6e20b8ec45450b2142c71fbb18066f44261f
                                  • Instruction ID: 0486e15b4c6d9f8b0df9820d732c916950f3b611e3af79f405bd10f6a9e84449
                                  • Opcode Fuzzy Hash: 8984b374fdfa44779ba6dbc7881c6e20b8ec45450b2142c71fbb18066f44261f
                                  • Instruction Fuzzy Hash: 69F06D7880D244AFDB44CB64D9829A8BF71FB46300F11859AC88417252C7314A53D781
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2fd015302700fd75460cbe9c7d6d665e365acc06d0860aff7e196f337c85919d
                                  • Instruction ID: 9a5589ba253c720fe66a9209f3a6d95c87687c8f4e5997a2ebd91b00273a15d0
                                  • Opcode Fuzzy Hash: 2fd015302700fd75460cbe9c7d6d665e365acc06d0860aff7e196f337c85919d
                                  • Instruction Fuzzy Hash: 9AE0927890E248AFDB05CFF4E8825ECBF74EB42314F20899EC85817252D7715A47C791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ede503db04a661a80ecfa5fa99459a15c30323dc7e05be712d63ea23c815d87
                                  • Instruction ID: 9bb0dfd3a9bd1f59a64fd07e5efd41cf3499399d89ea4d41f4eeeb81c979ba7e
                                  • Opcode Fuzzy Hash: 4ede503db04a661a80ecfa5fa99459a15c30323dc7e05be712d63ea23c815d87
                                  • Instruction Fuzzy Hash: 9101C0B8E01218CFEB50DFA8D994B9DB7F2BB09300F104199E609A3794DB319E81CF04
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d1a7d372e13f127811b916b7d11a23abdacaf875afbcfdd842deccc0e363bdc2
                                  • Instruction ID: 311cf618d82dd644ccda308af056f72d4e9f383bbca1374fea3572be8e03fa1b
                                  • Opcode Fuzzy Hash: d1a7d372e13f127811b916b7d11a23abdacaf875afbcfdd842deccc0e363bdc2
                                  • Instruction Fuzzy Hash: 31F0DA79D05208EFDB84DFA8D541A99B7F5FB48301F10C1AAD80493350D7355E52DF81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 530d321a3891cfaef0f38e46728789f55a3824844c8965f8e670b3444b4b4ac5
                                  • Instruction ID: 223ed67761ccbd295111e77f19c0e5278df397d14acc827b3704c922456299ce
                                  • Opcode Fuzzy Hash: 530d321a3891cfaef0f38e46728789f55a3824844c8965f8e670b3444b4b4ac5
                                  • Instruction Fuzzy Hash: 1BF09078E092489FD745DFA4D1547DC7FF1EB4A304F1180EAC84493392DA380A82CB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0de9d67d5e054788916d460050362fd4ee4bca7485a7a2a4380a051fd319eede
                                  • Instruction ID: 795e452657beffc3898cd84edbe18fc9dd26d001f3f1919f4a383ed262c33513
                                  • Opcode Fuzzy Hash: 0de9d67d5e054788916d460050362fd4ee4bca7485a7a2a4380a051fd319eede
                                  • Instruction Fuzzy Hash: 34F06574D09244AFDB05CFA5D8921ECBFB0EB4A304F2580DAC89857353D6355A43DB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a605c77f8e58d8660da1cf603eca5d9898f9ffb11c9e724f3906f9092164f132
                                  • Instruction ID: f779e52c6be15475811e044cf623f26b8f09e631ad039c9f52eac8a416200434
                                  • Opcode Fuzzy Hash: a605c77f8e58d8660da1cf603eca5d9898f9ffb11c9e724f3906f9092164f132
                                  • Instruction Fuzzy Hash: 02F0E5B5D09288AFC704DB64E8419E8BFB8AB47301F24C4DED88457362D6314A57DBD1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7428d04f42be3105383c8d3b37d67ec5ea872175867318be9b0023ef334ced47
                                  • Instruction ID: 2e5a200adfdad1f1d452f5f01b69bb0b87e579573c79ee4b9d6975f3c98cf45b
                                  • Opcode Fuzzy Hash: 7428d04f42be3105383c8d3b37d67ec5ea872175867318be9b0023ef334ced47
                                  • Instruction Fuzzy Hash: DE011974A44218CFDB65DF14D999BAABBB2EB4A300F1084DAD10DA3788CB345EC58F61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3e1388444c60930775e1bc95a62d7d57183dc282a16c8e808ca69892f1c15964
                                  • Instruction ID: e9bd731afb01742acd9c4a0b5e91e6fd8733b2ce79f280f6aabfd9d1c5d74c0d
                                  • Opcode Fuzzy Hash: 3e1388444c60930775e1bc95a62d7d57183dc282a16c8e808ca69892f1c15964
                                  • Instruction Fuzzy Hash: 90F09878D05208EFCB44DFA8D4416ACB7F5EB49314F1491A9D81993350E7359A46DF41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4f3df6c5534728b4e64f2c60c641f7847cee39fd775e771f8676a120356f9908
                                  • Instruction ID: e5c6d2ae421bc363ba2be519169c85de4b0632dd4e7ad81e548a1ef77e5b8ddb
                                  • Opcode Fuzzy Hash: 4f3df6c5534728b4e64f2c60c641f7847cee39fd775e771f8676a120356f9908
                                  • Instruction Fuzzy Hash: 86F0D439905208EFDF44CFA8D940BACBBB6FF49700F10C1AAE84897221D7729A52DB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9b91c59178c20283e9118327a7453b9f02240541c932c931f6b951eaaf722c32
                                  • Instruction ID: fbf7bef264d606c4ac1b28e1493b55ba0dc35dfed0cbf6374e7cf621875e5876
                                  • Opcode Fuzzy Hash: 9b91c59178c20283e9118327a7453b9f02240541c932c931f6b951eaaf722c32
                                  • Instruction Fuzzy Hash: 63F0A034809208EFDB04DFA4D8409ADBB75FF46300F1081AEEC0427261DB324E52EB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 81341b5396ae85e87932e2075f89bf48f3ea6425251b0740daf365083c3cdc36
                                  • Instruction ID: 0760f6e78fccfd056e5e17a1e07e5a0b5963f5e5ab47888983b51e8501de11c6
                                  • Opcode Fuzzy Hash: 81341b5396ae85e87932e2075f89bf48f3ea6425251b0740daf365083c3cdc36
                                  • Instruction Fuzzy Hash: 2AF05878D09208EFCB54EFA8D44069CBBB1EB49300F1480AAD80893351D7319A52EB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 809695b1440e3136af83fa8ed90d34d9bfeb2624c893339cc39deb7375282d13
                                  • Instruction ID: 2c04b5a096e15afd74c46b38aabf295b59c46dafcf421fe210cdf10e5464cc85
                                  • Opcode Fuzzy Hash: 809695b1440e3136af83fa8ed90d34d9bfeb2624c893339cc39deb7375282d13
                                  • Instruction Fuzzy Hash: 5DF05834D09208AFDB84DFB8D84069CBBF1EB49200F10C0E9D818A3311D3729A02DB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9a767c0bb45e25db9c667e7c6a9f0b7c980892800d12cbbd56ee0eeda78610e2
                                  • Instruction ID: b5508c1872cf8975977c2185e5d2ad94ad1e29bcdef02a589a1e328ccfe01b46
                                  • Opcode Fuzzy Hash: 9a767c0bb45e25db9c667e7c6a9f0b7c980892800d12cbbd56ee0eeda78610e2
                                  • Instruction Fuzzy Hash: 5BF01C75D05208FFEB94DFA8C84179DBBF4EB49304F1490A9D818A3351E675AA42DB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6622409dc90ff68635ea3cff5005490db4c9bac9d687ff211d1b7186945d39c6
                                  • Instruction ID: 5decc28e58530da2abbf4f9c799159810f28b052dd4c9c2041a286f6db0e62c9
                                  • Opcode Fuzzy Hash: 6622409dc90ff68635ea3cff5005490db4c9bac9d687ff211d1b7186945d39c6
                                  • Instruction Fuzzy Hash: 7EF0DA75904208FFCF45DFA8D8409DDBBB5FB48300F148499ED1992220D7329A61EF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bec17fdf52d942218f780d0e148775a8447f0d710a54999bbc20a1591246d333
                                  • Instruction ID: 96316f0a8d4de3501a200b44d0611b694ca7eb442a377168a3491d760f42cf8a
                                  • Opcode Fuzzy Hash: bec17fdf52d942218f780d0e148775a8447f0d710a54999bbc20a1591246d333
                                  • Instruction Fuzzy Hash: 51F03074D09244AFCB15CBB9D8456ECBFB0EB8A310F1582DAC89457392D6315A43DB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0f3b6ff6d3f9faf90e714e4a160408b437ea08828d309fa7cfedc3f1c19cae54
                                  • Instruction ID: 9eccc6868610587fa66fdfb3790f80fbe6cf8a68a32a1d25a248aaf77c20f3f3
                                  • Opcode Fuzzy Hash: 0f3b6ff6d3f9faf90e714e4a160408b437ea08828d309fa7cfedc3f1c19cae54
                                  • Instruction Fuzzy Hash: 9CF01C75D04248EFCB84DFA9C840AADBBF8EB4A300F14C0AAE858D3351D6359A52DF91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a4bfec47c33f9ecbfc8e97b585a5d7210915187a4ca24bdf66b4cd8d186b08ef
                                  • Instruction ID: c131cdd5c98e3236975758e1ad886748b1888ef403061f61757862de4925050b
                                  • Opcode Fuzzy Hash: a4bfec47c33f9ecbfc8e97b585a5d7210915187a4ca24bdf66b4cd8d186b08ef
                                  • Instruction Fuzzy Hash: EAF05E70E092449FCB59CF68C4912DDBFB0EF4A204F1481EAC898D7312D7314A42CB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96b0e467a91f13dedb3715b5b2277d89d3e1b884942fcaffe51372a82ebfea01
                                  • Instruction ID: 0e5c74ce4041d6a8b100072157d0caaeb55caa958879c90ded8c7bd7b8e9b103
                                  • Opcode Fuzzy Hash: 96b0e467a91f13dedb3715b5b2277d89d3e1b884942fcaffe51372a82ebfea01
                                  • Instruction Fuzzy Hash: 7DE092B4449248AFC704CFA8D4906F8BFB5EF47208F1441DAC88557762D6329D57DB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dd5f1d83fa2a37d84ecab544e77accf924c371e10ed54def8dd9bf420f44063b
                                  • Instruction ID: d397b7baa63a66053c0de14764f3cfdb763f826c131f9ff2ecfca37a52fd6cb1
                                  • Opcode Fuzzy Hash: dd5f1d83fa2a37d84ecab544e77accf924c371e10ed54def8dd9bf420f44063b
                                  • Instruction Fuzzy Hash: 66E026B6541218EFDB14EFF4CC467CE37F4EB0A300F5009A4D40493191EE724A40E785
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e2fbb32ebd732d940ac5f0284cb277daec71efa76d63dcf13dcf7d83985a15b8
                                  • Instruction ID: 6ec5346dc350c54ff90cc59418173cf74f3d94d749da57a531c6efb71d4fbe17
                                  • Opcode Fuzzy Hash: e2fbb32ebd732d940ac5f0284cb277daec71efa76d63dcf13dcf7d83985a15b8
                                  • Instruction Fuzzy Hash: D2E09239601208ABD744DBA0D99676F77B9DB45310F104499F80497281D9326F008790
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c574288d6935e3b4aa91a75f61d26eaabc20c893e0fa0cf6e8bf4ce9efed2b11
                                  • Instruction ID: 66458226b27f43660a1c2c626faa6eff6f9bcd7309ae84bf69f08507a9781608
                                  • Opcode Fuzzy Hash: c574288d6935e3b4aa91a75f61d26eaabc20c893e0fa0cf6e8bf4ce9efed2b11
                                  • Instruction Fuzzy Hash: A1E09274919218EFDB50EFB8C88279CFBF5EB05205F2484ADD848D3381D7729A82CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3cbf6018265cbd908b27606054b680988bb7c33c2bdd7876afc30faa0aeedeea
                                  • Instruction ID: f175196ab8f03f444b9b64ab1510ac5bea1ed1bba555b51b2002194d7746110a
                                  • Opcode Fuzzy Hash: 3cbf6018265cbd908b27606054b680988bb7c33c2bdd7876afc30faa0aeedeea
                                  • Instruction Fuzzy Hash: B7F08C75D04208AFCB44EFA9D4483DCBBF1EB46301F1081A9980593344EB385A84CB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aee70f8b451b781f5f5d86555654436bb09eded4cd252cad9704c3036c6c8799
                                  • Instruction ID: 9549e8eda3952376330ff7d2a90cc93e68848a2981eefc3db33b4bcdb51fef77
                                  • Opcode Fuzzy Hash: aee70f8b451b781f5f5d86555654436bb09eded4cd252cad9704c3036c6c8799
                                  • Instruction Fuzzy Hash: B7F06574D492449FCB44CFA4D5915ECBFB0EB46300F1581EED89857352D6315A43DB81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eac3aa37ca44d968b3d0f0f79979ec777842d3f4dd2685da220fa476955d0e48
                                  • Instruction ID: dcbb1275b0b8e6db3aa6d6bef2300077254bd6b41668abb5ff1eba11bc113d19
                                  • Opcode Fuzzy Hash: eac3aa37ca44d968b3d0f0f79979ec777842d3f4dd2685da220fa476955d0e48
                                  • Instruction Fuzzy Hash: C3F0A971A09244AFCB85CBA4C9585D8BF75EF87200F2081AED84057352D2321A4ADB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2ca9f8b1c7f3b75282a38603d11c34363d51bf387041f64558d557129c163e9c
                                  • Instruction ID: 0f5b1fefac79862f1c2135478ba04b9e1e40608fa0165764d7b9eb3a33543763
                                  • Opcode Fuzzy Hash: 2ca9f8b1c7f3b75282a38603d11c34363d51bf387041f64558d557129c163e9c
                                  • Instruction Fuzzy Hash: 09F0A0709092849FCB05CBA8D4A16EDBFB0EF8A205F1481EEC8D497352C2314A46DB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cc3d50d9860410deab197af8cfc26832fbad6b742a2d22a38abf5c62ae2291d2
                                  • Instruction ID: ee17d73674bbe2d4403b8eeee7073d4721aab7bce8aa95d9bbbdaea2f92c1e40
                                  • Opcode Fuzzy Hash: cc3d50d9860410deab197af8cfc26832fbad6b742a2d22a38abf5c62ae2291d2
                                  • Instruction Fuzzy Hash: DAE092F2509248AFCB01DBB088096CA7BF5EB06301B0110E6D049E7161EA320A84D765
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b5c008ff66a8acb9cb2a1b30b4c5dab2b7499e25c844af418314202c5a20036b
                                  • Instruction ID: 985df3cb145d9664827c59a3d8fc330d06cde971fcc7cb2dfa1bf549546ceef2
                                  • Opcode Fuzzy Hash: b5c008ff66a8acb9cb2a1b30b4c5dab2b7499e25c844af418314202c5a20036b
                                  • Instruction Fuzzy Hash: EBF0DA74908248AFCB45DFA8E850B9DBBB1EB49310F10C29AD85893251E6355A55DB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b09c3dc99378215282dee75c8a41a7170890259a2565baa6ef47ff0261f5669b
                                  • Instruction ID: 8f28254172bdeb769199ce3c0f516979b49e936a201680cce77895b3ce3ce6c6
                                  • Opcode Fuzzy Hash: b09c3dc99378215282dee75c8a41a7170890259a2565baa6ef47ff0261f5669b
                                  • Instruction Fuzzy Hash: 03E09274409208EBCB14CFA4D882BADBFB5EB45300F14D1ADD88523351C6329E51DB84
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ae47229dbb8b06b67f10c004f767d029f80e0885eb5cae66dfe9995167145e77
                                  • Instruction ID: a2fbdc454d4a2890db0969a6925427899bb636fadc9fb728d64bb8545c67f80c
                                  • Opcode Fuzzy Hash: ae47229dbb8b06b67f10c004f767d029f80e0885eb5cae66dfe9995167145e77
                                  • Instruction Fuzzy Hash: 9DF0E2B8E14218EFDB54DF98E485B99BBF2FB09304F204099E008A3349DB3599949F41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 422d38b8b928b9fa7e2942aa5161b6030a9c4df50fa87596197e7bee140130c0
                                  • Instruction ID: 54a2c282ee424831dabd363852d136ba680b8a3f57d45556d1a9f2fdee6efc37
                                  • Opcode Fuzzy Hash: 422d38b8b928b9fa7e2942aa5161b6030a9c4df50fa87596197e7bee140130c0
                                  • Instruction Fuzzy Hash: E2F01574D05208AFCB84DFA8D8417ADB7F5EB89300F10C0AAC80893350EA359A42DF41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0051d1b64c38f71191e547f38eb39dba85643d4ba1819beecf65304192b4df1e
                                  • Instruction ID: 07c72ba48942c42572ab6aad410909f4281629cbb32ee9f78b2608075349edad
                                  • Opcode Fuzzy Hash: 0051d1b64c38f71191e547f38eb39dba85643d4ba1819beecf65304192b4df1e
                                  • Instruction Fuzzy Hash: 70F03978D0A208EFDB04CFA8D8406E8BBB5EB85200F1081AAD80893350E7355E42DB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d74844970c44dd18cba15cc88c286808d8c4d5de560dec580c588bee396b5969
                                  • Instruction ID: ba4385f536e4ffbb0cf37162485a1ec9785d1f263248ac2e7332b01286ca83a3
                                  • Opcode Fuzzy Hash: d74844970c44dd18cba15cc88c286808d8c4d5de560dec580c588bee396b5969
                                  • Instruction Fuzzy Hash: 31E0D83010D284AFC716C76CD8916F9BF78EF43214B1814CDCCC557252D6325913C781
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cb7b838299e3113df0e81e47cbeaa3d9648ba72aaae0d38df610d422eaaf83fe
                                  • Instruction ID: 78b0532e4b16c7c9ecefa75375b164b56edb944dc292a2d3eaab6d5913fcc969
                                  • Opcode Fuzzy Hash: cb7b838299e3113df0e81e47cbeaa3d9648ba72aaae0d38df610d422eaaf83fe
                                  • Instruction Fuzzy Hash: D2E048313003055BC7109A1AEC84C4BFB9EDFC4364714D53AE10A8B225DEB0ED45C790
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cc01c6f6d1a610fdb4f97134dd0c7098c50f46875de2c5e6c4faffd643b0450c
                                  • Instruction ID: a33db7e089a699ab54d5dea8001e122181d15d079defd146e131ad5198f81938
                                  • Opcode Fuzzy Hash: cc01c6f6d1a610fdb4f97134dd0c7098c50f46875de2c5e6c4faffd643b0450c
                                  • Instruction Fuzzy Hash: 43F06D78D09208EFCB44CFA8D4827ECBBB0FB89204F1081ADC81897351D7365A43CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 262eeedef548f7d07dd3644778718c4eb3c8f718f7c35951cf6d930336d0dd05
                                  • Instruction ID: b0fe46d89a8047ceedae8bc80e51f47afeab201a9bc5e1aac19d0a204e6d132a
                                  • Opcode Fuzzy Hash: 262eeedef548f7d07dd3644778718c4eb3c8f718f7c35951cf6d930336d0dd05
                                  • Instruction Fuzzy Hash: 53E06574805208EFCB04DFA4E4416A8B7B5FF45300F1091ADD80457210D7325E46DB51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8045be2130216ae769c36c30bfdb53b3dc306c534187bdd95f7e0c59751e2168
                                  • Instruction ID: 0964b992831174aca15d43f2189a726614815ffe33dae4c5b42ce8bdb094ebe0
                                  • Opcode Fuzzy Hash: 8045be2130216ae769c36c30bfdb53b3dc306c534187bdd95f7e0c59751e2168
                                  • Instruction Fuzzy Hash: 9BF0A574D05208FFCB84DFA9D841A9CFBB5FB49300F10C1AAD818A3351D6359A51DF44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b87506dc60ab0e1881b533cbb51aed4e2822172c1c8e9c69a63fe41e0f73fcef
                                  • Instruction ID: f037bad4686cfc15c72d11ae3fae5995abf765c3ae0bb918a4d704813a06d6c9
                                  • Opcode Fuzzy Hash: b87506dc60ab0e1881b533cbb51aed4e2822172c1c8e9c69a63fe41e0f73fcef
                                  • Instruction Fuzzy Hash: 9FF0A578D09208AFDB54DFA8D9416A8BBB5EB45204F1481AED80897251D7716A46CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 93c041510551e2eaa8735f6017e0704ab7397db742814b0ace16a7df9da759e2
                                  • Instruction ID: bd70d4b2e7f2f38d660bf5a521222507f9e485ab1fb204ba0851715df3a8b023
                                  • Opcode Fuzzy Hash: 93c041510551e2eaa8735f6017e0704ab7397db742814b0ace16a7df9da759e2
                                  • Instruction Fuzzy Hash: 41F0A574D09208EFCB94DFA8D880AACBBB5FB49310F10C1AAD819A3750D7719A51EF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 26b1977017d0698dfc9ecf6bedb7083f48094408654c1800a25e855d65333505
                                  • Instruction ID: 9a77129df449aff6582af0b600a64af29824b66416831edb4f34c19d1806b18f
                                  • Opcode Fuzzy Hash: 26b1977017d0698dfc9ecf6bedb7083f48094408654c1800a25e855d65333505
                                  • Instruction Fuzzy Hash: ABE02238809308EFCB04DFA4E800AE8BBB1EB42300F1492A9D80023362C7715E42DB54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7a48fed121ff8e8e2b163ab97fdad482002970eea077e9da56b13159c204242f
                                  • Instruction ID: 78065a63e8ac8f90c6dd0297a83959a367739fb301610e8ca77726ab3b51f4e9
                                  • Opcode Fuzzy Hash: 7a48fed121ff8e8e2b163ab97fdad482002970eea077e9da56b13159c204242f
                                  • Instruction Fuzzy Hash: D7F03978E05208AFDB44EFA9D0586EDBBF5EB4A300F1080A9D84493384EA385E85CF80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 73059c07daba6b542a2df4f6dfb5279f47dc04d88f12eadeef773ac38b184550
                                  • Instruction ID: b8771967a6c68aaef73d131d10e3df6617d62907dfeb36269f125674c74fb3c9
                                  • Opcode Fuzzy Hash: 73059c07daba6b542a2df4f6dfb5279f47dc04d88f12eadeef773ac38b184550
                                  • Instruction Fuzzy Hash: 0EF0A574D09208EFCB84DFA8D840A9DBBF5EB89310F20C1AAD818A3350D6319A91DF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7ff4db46975556f883401780b6f99abe018d1f74ae6a97ff24e00c5fe68fa5bc
                                  • Instruction ID: 372916b5cb1b74fad8bf01ff7935eb651fab1847db1b0e41c56b2f73696a11e8
                                  • Opcode Fuzzy Hash: 7ff4db46975556f883401780b6f99abe018d1f74ae6a97ff24e00c5fe68fa5bc
                                  • Instruction Fuzzy Hash: 67F06274D15108CFDB18EFA9D955B99BBF2BB99300F2481AAE509A7358DB709E42CF00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ffc7790ff543debf0e3c27996c8b8c5f3614a4a10f9a7f60b7b55e9bee2e48d7
                                  • Instruction ID: 2ca4a81bcae00c369bfb57dc077783c642ae81c9e0a3aec98736313ad6ccf7bc
                                  • Opcode Fuzzy Hash: ffc7790ff543debf0e3c27996c8b8c5f3614a4a10f9a7f60b7b55e9bee2e48d7
                                  • Instruction Fuzzy Hash: E2E0E574E09208EFCB84DFA8D4826ACFBF5FB89200F10C1A9C818A7351D6359A42CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1132d2be932520b0b182b6f0dfa6f790906b324426da8db5ec6f1a89db2fc167
                                  • Instruction ID: a50d926fe7869635f244ce0a508d597389e9833dea46960d4472b54adee1e6e5
                                  • Opcode Fuzzy Hash: 1132d2be932520b0b182b6f0dfa6f790906b324426da8db5ec6f1a89db2fc167
                                  • Instruction Fuzzy Hash: 0FE0DF30A40308EFC700DBA4DAA27AE77F9EB49300F105499E80CDB341D932AE01D792
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2c8f1117593ad8501b9d099958082f500ed4f23e42780fb4f8abd8fb3924f735
                                  • Instruction ID: d079556b33208c2587618348cdcc58a4fb296963072fc5a52821c9bab45d7970
                                  • Opcode Fuzzy Hash: 2c8f1117593ad8501b9d099958082f500ed4f23e42780fb4f8abd8fb3924f735
                                  • Instruction Fuzzy Hash: 55E0CD31B0030467D710A5654803B6533DAAF45615FA04466F60B9F6D0F9B1DC01CB51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: df6e290625873485e65f3dc66aeaaa49d01e59b261358de894c736e7c01c68bd
                                  • Instruction ID: 971e0e0f077afaba090de22d979b4890316eb24833089b62ee00f035e88ab302
                                  • Opcode Fuzzy Hash: df6e290625873485e65f3dc66aeaaa49d01e59b261358de894c736e7c01c68bd
                                  • Instruction Fuzzy Hash: 23E09AB6946208ABEB10EBB4D8007CE73E8EF0A204F1005A9C001A3121EF729A589782
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 05ed231e988cfc806bbc2688496b258820ee0b3f5b87d75a9cecda78f6493bdd
                                  • Instruction ID: 085882323f5b7226cce48c6ec76abd4734d84e3cde28bae847b375fc3c1459c4
                                  • Opcode Fuzzy Hash: 05ed231e988cfc806bbc2688496b258820ee0b3f5b87d75a9cecda78f6493bdd
                                  • Instruction Fuzzy Hash: 9EE0C974D05208EFCB54DFA9D440A9CBBF5FB49310F10C1A9D809A3351D7719A51EF44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 05ed231e988cfc806bbc2688496b258820ee0b3f5b87d75a9cecda78f6493bdd
                                  • Instruction ID: 27e555ee34314b2b1591972a0c30b211ae8564992ee3f0d5c7e26c35af63afb7
                                  • Opcode Fuzzy Hash: 05ed231e988cfc806bbc2688496b258820ee0b3f5b87d75a9cecda78f6493bdd
                                  • Instruction Fuzzy Hash: B3E0C974D05208EFCB98DFA9D440A9CBBF5EB49300F10C1A9D818A3350D7759A51DF45
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 05ed231e988cfc806bbc2688496b258820ee0b3f5b87d75a9cecda78f6493bdd
                                  • Instruction ID: 11f9cd3f232c4a254616a72bb1abd37a638f1cd4d3c0b929f5ebb44a6b1f4a3e
                                  • Opcode Fuzzy Hash: 05ed231e988cfc806bbc2688496b258820ee0b3f5b87d75a9cecda78f6493bdd
                                  • Instruction Fuzzy Hash: 56E0A574D05208EFCB94DFA8D441A9CBBF5EB49304F10C1A9D818A3350D7719A51DF81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b56e498e16459142b3d915ae8a1827c15f2e09aef62d6bedb5087a03d52e71c8
                                  • Instruction ID: b9b664653008b84bde2e4bbe35bf010f3aef4fd8208be7d1bb4dffd0c72e99e1
                                  • Opcode Fuzzy Hash: b56e498e16459142b3d915ae8a1827c15f2e09aef62d6bedb5087a03d52e71c8
                                  • Instruction Fuzzy Hash: CBD02E3120A2A00BEB2142AC64E03EB3FADCF46131B0401ABE6C9CB643CA0688178344
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2b19b989332a80079d2884611f30020326ee8895acf8e7d3efc37ef5ac1886c9
                                  • Instruction ID: c1f380f4026249e267fd1bb7c5ebf9dbf6a3c7b3ac5ed366b9baaeae0811ac9a
                                  • Opcode Fuzzy Hash: 2b19b989332a80079d2884611f30020326ee8895acf8e7d3efc37ef5ac1886c9
                                  • Instruction Fuzzy Hash: 55E0C974D05208EFCB44EFA9D940AADBBF5FB49310F14C1AAD809A3350D6719A51DF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 534449a07c171d82b4b33a8a5e128c925f3d8a57356164feffeef1e20a9b8055
                                  • Instruction ID: e5b1a8f5bc8f6457626803c7bcc79a17a47484356d6fa6cd3354db0f120f6ccd
                                  • Opcode Fuzzy Hash: 534449a07c171d82b4b33a8a5e128c925f3d8a57356164feffeef1e20a9b8055
                                  • Instruction Fuzzy Hash: FAF03A74B04218CFD755EF64DD99B9ABBF2EB4A300F1044D9A10DA3788CB345E808F51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2b19b989332a80079d2884611f30020326ee8895acf8e7d3efc37ef5ac1886c9
                                  • Instruction ID: 0926217b9efda1885269d184c8b274d7430cc184e2dbbfa420b0204471830bf0
                                  • Opcode Fuzzy Hash: 2b19b989332a80079d2884611f30020326ee8895acf8e7d3efc37ef5ac1886c9
                                  • Instruction Fuzzy Hash: 02E0C974E05208EFCB84EFA8D941AADBBF5FB49300F10C1AAD818A3351D7319A51DF80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2b19b989332a80079d2884611f30020326ee8895acf8e7d3efc37ef5ac1886c9
                                  • Instruction ID: 919cb175bbf9dc0a3fe626bb4b947f299ce8d152ffa9d9aff6bbeab94dd74743
                                  • Opcode Fuzzy Hash: 2b19b989332a80079d2884611f30020326ee8895acf8e7d3efc37ef5ac1886c9
                                  • Instruction Fuzzy Hash: F4E0A574D05208AFCB94EFA8D840AADBBB5AB49201F1081AAD809A3350D6319A51DF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e74faa0472db04e57ff061658e7a1451de8b8302c35fcb66eb7fc051f55113a7
                                  • Instruction ID: d808657fd8547ca8d162cb873198b89b9a1343fe308d52f8a5ce08b2a9d60bdd
                                  • Opcode Fuzzy Hash: e74faa0472db04e57ff061658e7a1451de8b8302c35fcb66eb7fc051f55113a7
                                  • Instruction Fuzzy Hash: 21E0E574E09208EFCB84DFA8D8426ACFBF9FB89200F1081A9C818A3351D6359A41CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e74faa0472db04e57ff061658e7a1451de8b8302c35fcb66eb7fc051f55113a7
                                  • Instruction ID: a53f3dd6708e8f74d882f4a2a49a670d67cea62d88d57bd65bd7e268f41663d3
                                  • Opcode Fuzzy Hash: e74faa0472db04e57ff061658e7a1451de8b8302c35fcb66eb7fc051f55113a7
                                  • Instruction Fuzzy Hash: ECE0E574E09208EFCB84DFACD4816ACBBF5EB89200F10C1A9C809A7350E6719A42CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c77cf010795b3cf651f89ab567e75c375796b957ce0bba23617e64a2cad16f6a
                                  • Instruction ID: e59905cf41cc74a83c0a173ef6adb3b76c5dc72d10ecb09502d96b23b88df3df
                                  • Opcode Fuzzy Hash: c77cf010795b3cf651f89ab567e75c375796b957ce0bba23617e64a2cad16f6a
                                  • Instruction Fuzzy Hash: 95E01A79909208EBDF14DF94D841DEDBB76FB49300F10C199EC0427361C7729A62EB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 51b0bb8f80f9af6aa5b514de3b4a6de8051637070c06eabac253fd9ff9a3dec5
                                  • Instruction ID: 44b9dd3fbaddbd873645c47583b945b4919c9f92d118fbfd61643ba9c6e804b5
                                  • Opcode Fuzzy Hash: 51b0bb8f80f9af6aa5b514de3b4a6de8051637070c06eabac253fd9ff9a3dec5
                                  • Instruction Fuzzy Hash: 80E0ED74D05208EFCB94DFA8D44069CB7F5FB49300F1081A9C81893350D7755E41CF41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c77cf010795b3cf651f89ab567e75c375796b957ce0bba23617e64a2cad16f6a
                                  • Instruction ID: e40b492ffbd9607dd24daeeb24e68ea2c9dc1662c9a2f0ec492b471a2d391285
                                  • Opcode Fuzzy Hash: c77cf010795b3cf651f89ab567e75c375796b957ce0bba23617e64a2cad16f6a
                                  • Instruction Fuzzy Hash: 3CE0E539909208EBCB08DF94D8409ADBB76FB49311F10819DEC0527260D7729A62EB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 51b0bb8f80f9af6aa5b514de3b4a6de8051637070c06eabac253fd9ff9a3dec5
                                  • Instruction ID: f97783b3f88ad2a9f5f2aedf5c7c5053398917646970143ca1a57ba04d783eb2
                                  • Opcode Fuzzy Hash: 51b0bb8f80f9af6aa5b514de3b4a6de8051637070c06eabac253fd9ff9a3dec5
                                  • Instruction Fuzzy Hash: 27E0C278E09208AFCB94DFA8D5406ACBBF5AB89200F10C1A9C818A3351D7719A41DB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 51b0bb8f80f9af6aa5b514de3b4a6de8051637070c06eabac253fd9ff9a3dec5
                                  • Instruction ID: 2a52d105aa4106be77c303e6f27249402df368469bb3ad5684e51ca2d9120899
                                  • Opcode Fuzzy Hash: 51b0bb8f80f9af6aa5b514de3b4a6de8051637070c06eabac253fd9ff9a3dec5
                                  • Instruction Fuzzy Hash: 5DE0ED74D06208EFCB94DFA8D8446ADB7F5EB49304F14C5A9C80893350D7715A41CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 79ebd3623c0acd9eb951f3aa1d4032ce6c03ce71649ccaee1bdef55e5939a0d2
                                  • Instruction ID: 468cb5196a18752f898a7fa3efd3c40af105ca8760e05a75ab19997657e2a6d4
                                  • Opcode Fuzzy Hash: 79ebd3623c0acd9eb951f3aa1d4032ce6c03ce71649ccaee1bdef55e5939a0d2
                                  • Instruction Fuzzy Hash: 35E0E578D09208EFDB94EFA9D440AACBBF5EB89200F10C0AAD819A3351D7765A85DF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b32394f58eb785f30aaa350952b34d8a2dac95465f67832fa4da95b7718dd1e8
                                  • Instruction ID: 92acc6288711fa8e8fb58512f4fc957e7ac6fbc08f07238bc81852f6389a5f87
                                  • Opcode Fuzzy Hash: b32394f58eb785f30aaa350952b34d8a2dac95465f67832fa4da95b7718dd1e8
                                  • Instruction Fuzzy Hash: 77E07D74E05208EFCB54DFA8D54569DBBF5EB49204F10C1EAD81893351D7355E42DF41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3bf74c68a943c56e5eb792d1c43f3d81fcc4ca307ddec88b92c9f6745c1817f5
                                  • Instruction ID: dd0af4d670459ccc2e22d3fada1c2cc49f5fa7e5ffe2a799975b9edb0895a8d6
                                  • Opcode Fuzzy Hash: 3bf74c68a943c56e5eb792d1c43f3d81fcc4ca307ddec88b92c9f6745c1817f5
                                  • Instruction Fuzzy Hash: 51E0E574E09208EFCB84EFA9D4446ACBBF5EB89210F20C1AAD848A3350D7719A42DF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3bf74c68a943c56e5eb792d1c43f3d81fcc4ca307ddec88b92c9f6745c1817f5
                                  • Instruction ID: 0e4cac4b3f9177bf945003774d0bc2b3628829ff2aee992fdfdafbbc35b4705a
                                  • Opcode Fuzzy Hash: 3bf74c68a943c56e5eb792d1c43f3d81fcc4ca307ddec88b92c9f6745c1817f5
                                  • Instruction Fuzzy Hash: 51E0E574E09208EFCB84EFA8D4406ACBBF5FB89300F2081AAC818A3350D7319A46DF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 74f00a1622a2acd27f4d4be82fe1384c2719c4b4325e74f284527c2e52ece315
                                  • Instruction ID: 815474fe330aa69329243e60ccb32dff6aab531ef818996b0a1feb2a85efbee2
                                  • Opcode Fuzzy Hash: 74f00a1622a2acd27f4d4be82fe1384c2719c4b4325e74f284527c2e52ece315
                                  • Instruction Fuzzy Hash: AEF0A578A142188FEB24CF24D884F9AB7F2BF45310F514285E815A7394C7709E82CE02
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bab29a32e47fd87e50e6396b28ce0fc59f0a1a4b3a888992b81dff248e7cbf27
                                  • Instruction ID: cca8eb2055ca7a8c5d89d22f310b430b96972b01143db678aba06037c4c48358
                                  • Opcode Fuzzy Hash: bab29a32e47fd87e50e6396b28ce0fc59f0a1a4b3a888992b81dff248e7cbf27
                                  • Instruction Fuzzy Hash: C4E08675D49248FFCB04DFA8D8409ADBBBDAB46301F20819DDC8457351D631AA43DB94
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b608c3cfdf3ba82c7a4176e457f8c50b40e665d67c1bcf41561e2528e1bf3d9a
                                  • Instruction ID: 8339544420af70395eb41a9760f3f5800de1b9176f5e81f0e9b71b835449359e
                                  • Opcode Fuzzy Hash: b608c3cfdf3ba82c7a4176e457f8c50b40e665d67c1bcf41561e2528e1bf3d9a
                                  • Instruction Fuzzy Hash: F4E0C2B654520CABEF10FBF4D80578F77E8EB4A200F1004E9D005A3111EE329E509791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9d9bab6f5e9b9d148fe72c7b3e04170c5399c46dfb696de17983f5747004a4ee
                                  • Instruction ID: eea4f53e450e1dcca8d798489279ea82a90cd3b6d69f55f43b6bc221200662c9
                                  • Opcode Fuzzy Hash: 9d9bab6f5e9b9d148fe72c7b3e04170c5399c46dfb696de17983f5747004a4ee
                                  • Instruction Fuzzy Hash: 56E0BF74905208EFCB94EFA8D54569CFBF5AB49205F2041A9D80993351E7719A45CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9cdfe571424a67af9ab2f4d27bf2cf27ad409ea26f5de18dce77e96a7e00c645
                                  • Instruction ID: 293fc0678a6b04e0f3bce4050784f2b70922b5006d57888556c24df0f265911a
                                  • Opcode Fuzzy Hash: 9cdfe571424a67af9ab2f4d27bf2cf27ad409ea26f5de18dce77e96a7e00c645
                                  • Instruction Fuzzy Hash: D4E01A78D09208EFCB44DF98D4456ACB7B5EB89204F1081A9C80857350D6325A42CB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b57dac67deec8603394e7552238ce14ead9873d2b313c2c79b1c93a0400a5faf
                                  • Instruction ID: 82ff66b4c1e3d2e86d06c974c25fdb14363c95ce26b0d296761b7e72b36a1f7b
                                  • Opcode Fuzzy Hash: b57dac67deec8603394e7552238ce14ead9873d2b313c2c79b1c93a0400a5faf
                                  • Instruction Fuzzy Hash: 02E01A74D09208EFCB44DF98D4406ACB7B6EB89200F10C1A9C80853351D7716A42CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aa0fb26a4cc73a2c8329761bc27b41d8ef898e2db4247b437a50d28fb37554aa
                                  • Instruction ID: 1e63e2312c9018a07e680d03e18092746becb6a5f1daf6edd0e52c4ba94ea065
                                  • Opcode Fuzzy Hash: aa0fb26a4cc73a2c8329761bc27b41d8ef898e2db4247b437a50d28fb37554aa
                                  • Instruction Fuzzy Hash: ACE08678909208EFCB44DF94D9409ACBB75FB45300F208599DC0423350C7715E52DB84
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aa0fb26a4cc73a2c8329761bc27b41d8ef898e2db4247b437a50d28fb37554aa
                                  • Instruction ID: bcb45c623657a80b69172a61b7d5f499b5296ba7b11fb17627bfc5545828390a
                                  • Opcode Fuzzy Hash: aa0fb26a4cc73a2c8329761bc27b41d8ef898e2db4247b437a50d28fb37554aa
                                  • Instruction Fuzzy Hash: 44E08674909208EBCF04DF94D840DACBB76FB45300F14D299DC0423362C7715E51DB84
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 04cf2f110567b1bd1a8bb7a31465e3a98e0741eea6c6999443f4b49c3ab78034
                                  • Instruction ID: ec109dfa85fa0cf9b7d3ef7c6cff9602dcaea1b2f93c8c8a6e3b6078c145c937
                                  • Opcode Fuzzy Hash: 04cf2f110567b1bd1a8bb7a31465e3a98e0741eea6c6999443f4b49c3ab78034
                                  • Instruction Fuzzy Hash: D0E039B8950219CBE718EF54E688BDAB7B2EB1A300F105224E50993308CB745E54CF45
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aa0fb26a4cc73a2c8329761bc27b41d8ef898e2db4247b437a50d28fb37554aa
                                  • Instruction ID: 2b0c92107f437aff6d5149ffd71d8f103b7fb618958d2724835f7fe61ad77d0f
                                  • Opcode Fuzzy Hash: aa0fb26a4cc73a2c8329761bc27b41d8ef898e2db4247b437a50d28fb37554aa
                                  • Instruction Fuzzy Hash: 84E04F74909208EBCB08DF94D9819ACBB75AB45300F1091A9D80523354C7725A91DB84
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 53f43316cd9c1bd9a5849fe8b16fb58abdefbdd44aa3ffa1752da003c1aefa11
                                  • Instruction ID: 6bb581095056fc9d249aa5a7c773fa4871bad03110b7f99e0926070cb03c7012
                                  • Opcode Fuzzy Hash: 53f43316cd9c1bd9a5849fe8b16fb58abdefbdd44aa3ffa1752da003c1aefa11
                                  • Instruction Fuzzy Hash: 55E04F74D09208EFCB54DFA9D8446ECFBB4FB8A300F1081EAC85853391D6316A42DB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 53f43316cd9c1bd9a5849fe8b16fb58abdefbdd44aa3ffa1752da003c1aefa11
                                  • Instruction ID: 97e467ca04313d40e40301c23f4db6d5b81682f7eace710099acfdf0f1e23279
                                  • Opcode Fuzzy Hash: 53f43316cd9c1bd9a5849fe8b16fb58abdefbdd44aa3ffa1752da003c1aefa11
                                  • Instruction Fuzzy Hash: 92E04F74D09208EFCB44DFA9D8546ECFBB4EB8A300F1081EAC85853351D7316A42DB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 53f43316cd9c1bd9a5849fe8b16fb58abdefbdd44aa3ffa1752da003c1aefa11
                                  • Instruction ID: 9db25a21314a18e6b5cd17ef3a01cb50878e0e4c1f67c300711ef341d02f897f
                                  • Opcode Fuzzy Hash: 53f43316cd9c1bd9a5849fe8b16fb58abdefbdd44aa3ffa1752da003c1aefa11
                                  • Instruction Fuzzy Hash: D2E04F74E09208EFCB44DFA9D4446ACFBB4EB8A301F1081EDD85853351D631AA42DB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1d42daa218da826a301ff0f648bf56172c072cb735bfddb2a4d804182098a781
                                  • Instruction ID: 8ef9acbbe44477274081646fdc36c2bbcbae78a7646ad233fba7d31009714920
                                  • Opcode Fuzzy Hash: 1d42daa218da826a301ff0f648bf56172c072cb735bfddb2a4d804182098a781
                                  • Instruction Fuzzy Hash: 98D05E31314A328BDB64D53DE9AA7E737E68BC8700F549926A00AC7304EE70EC028A85
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e3f6aaebfdefeacb8192cc1701f9678b3ba609ff480c762fd85f6b1b35f67afb
                                  • Instruction ID: 38590e1cbee9da3908de3c184a75569d2757481aa2460b90f8468119a6bc89f2
                                  • Opcode Fuzzy Hash: e3f6aaebfdefeacb8192cc1701f9678b3ba609ff480c762fd85f6b1b35f67afb
                                  • Instruction Fuzzy Hash: 55E04F74D09208EFCB44DFA8D4406ACFBB5EB89205F1081EAC81853351D7315A42DF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8bc7b2b355a21c20d8be2e307e3e4b311538639f018a80899fd874b4f18d8e0e
                                  • Instruction ID: d143c8a2c2bfbc3f0e8af6bc46620e2c51e9fc364610aee4fb52cd9b0f73cbf4
                                  • Opcode Fuzzy Hash: 8bc7b2b355a21c20d8be2e307e3e4b311538639f018a80899fd874b4f18d8e0e
                                  • Instruction Fuzzy Hash: 84F05F74E012288FCBA4DF68D894AD9BBF1EB48310F1150EAD91DA7754EB34AEC58F14
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 56d5edcb2eaa375ac670b34ff8a747ee9fe93e64b65c287b4aed3ce8edd3a76b
                                  • Instruction ID: e67444ac63bee93b30d5ba5befe7ef5cffd1814d53852bb6dd345cbaadb07ca9
                                  • Opcode Fuzzy Hash: 56d5edcb2eaa375ac670b34ff8a747ee9fe93e64b65c287b4aed3ce8edd3a76b
                                  • Instruction Fuzzy Hash: 8CE04F74D09208EFCB44EFA8D4406FCFBB5EB89200F1085EEC81953391D7315A42DB44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 93a733feb1b3bdcb80a4f171e46727474c59e58321fd9d6179062112f72f0986
                                  • Instruction ID: 4e38705aeb0984bf87c5caac4bc80698802b18daf6b8468aa7f295d826bb86a8
                                  • Opcode Fuzzy Hash: 93a733feb1b3bdcb80a4f171e46727474c59e58321fd9d6179062112f72f0986
                                  • Instruction Fuzzy Hash: BAE01A74D05208EFCB44DF98D4806ACB7F5EB89300F2081E9CC1853350D7319E81DB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c5016c813611b9d87facfca50b7738df7834a9c1a95b7efebfcf38f0d4501544
                                  • Instruction ID: 2711ecd89accbab58f97ef5d6fad7fbc5d7e894eeeb75e7b80bfebcd2e72e58f
                                  • Opcode Fuzzy Hash: c5016c813611b9d87facfca50b7738df7834a9c1a95b7efebfcf38f0d4501544
                                  • Instruction Fuzzy Hash: 8EE0C2B550520CAFCB04EBF49804B8E73F8EB0B200F1005A9C00593151EE320A40E791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a49dd8dd773cbd7ab20d231ed4b639f95fb3d3e75dcab01040bf4b512c6cd318
                                  • Instruction ID: ead69b55782efd65ff757d1d8bc5e60f4a42a3eade9f3aac0a9aa633a4f54192
                                  • Opcode Fuzzy Hash: a49dd8dd773cbd7ab20d231ed4b639f95fb3d3e75dcab01040bf4b512c6cd318
                                  • Instruction Fuzzy Hash: A8E0C2B650520CABDB00EBF4940468E73E8EB4A200F1004E9C005A3110EE325E409791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c66974c150e136a81774eb56192bb40a4840ac060859506487582e148a793b8b
                                  • Instruction ID: a7e7f8c06823ee4d963e270b763dfab1023d61a706ea2e347a7ef02875342af0
                                  • Opcode Fuzzy Hash: c66974c150e136a81774eb56192bb40a4840ac060859506487582e148a793b8b
                                  • Instruction Fuzzy Hash: A0E0C2B194A208EFEB00EBF4D4046CE73E8EF0B200F1004A5C004A3120EF324A409792
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f90c1ff508b9a17abc9d57ad6a6d439d448892bcc6de777c87fa0f2072da671b
                                  • Instruction ID: 0804b1df3bc6e4af950ad70a87635fb67cf331dc80d911c508a220e18b816878
                                  • Opcode Fuzzy Hash: f90c1ff508b9a17abc9d57ad6a6d439d448892bcc6de777c87fa0f2072da671b
                                  • Instruction Fuzzy Hash: FFE0C238909208EBCB08DFE8D840ABCBBB5FB86310F20859DC80823350C7715E52CB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 12d2d0878718d525421623aa999b6e6380e0eab62e568bf5a9cea6c6e46addc2
                                  • Instruction ID: fcf6d6d3217e862343182442f8641d7088e0c31f0b0700d56ef21ae90187af89
                                  • Opcode Fuzzy Hash: 12d2d0878718d525421623aa999b6e6380e0eab62e568bf5a9cea6c6e46addc2
                                  • Instruction Fuzzy Hash: B1F0ACB0904219DFDB50DF14C988BA9F7B5FF49300F1042E4D85D9A255CB719E459F81
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f90c1ff508b9a17abc9d57ad6a6d439d448892bcc6de777c87fa0f2072da671b
                                  • Instruction ID: 1419b49414ec2228302be624308fd975a987806962222e1f8316ef929376b0ed
                                  • Opcode Fuzzy Hash: f90c1ff508b9a17abc9d57ad6a6d439d448892bcc6de777c87fa0f2072da671b
                                  • Instruction Fuzzy Hash: 61E0C234909208EBCB08DFA8E8409ACBBB9FB87301F2091ACC80823350CB715E42DB80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 686b36f0289524240d46a3d76b8ae193cc2b47392a7d530297fdb5c42814323b
                                  • Instruction ID: 2dfaaccd1f904dc12e9492c434ab55512188c7bdcf1defa90782b0e8caecd90b
                                  • Opcode Fuzzy Hash: 686b36f0289524240d46a3d76b8ae193cc2b47392a7d530297fdb5c42814323b
                                  • Instruction Fuzzy Hash: 16E0E675D1520CEFCB44EFB8D94569C7BF8A705201F1011A9C844D3250E7706E84DB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb88d90e9e3924a366e99f75b26927faa86157405fdc778efaa0b2d01cac93d1
                                  • Instruction ID: d29cccd9802775275417ab92b9eeca5d91a84745756c819bb875739a66768b08
                                  • Opcode Fuzzy Hash: bb88d90e9e3924a366e99f75b26927faa86157405fdc778efaa0b2d01cac93d1
                                  • Instruction Fuzzy Hash: A9E01274909208EBCB04DFA8D941AADBBB9EB86305F2091DDC80827361DB315E87DB95
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 94d7be039df1e5ef31e0aa814270a2e87a1ed6bd7a63cfb4ed4dd858774f3610
                                  • Instruction ID: 5caac82d3f984f02e6c120a264fda842e9879f9cc93bcd72f7c7146e324f315c
                                  • Opcode Fuzzy Hash: 94d7be039df1e5ef31e0aa814270a2e87a1ed6bd7a63cfb4ed4dd858774f3610
                                  • Instruction Fuzzy Hash: FCE0C271545208EFDB00EFF494046DE73F8EB0A200F1000E5C005A7110EE325A409791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 56ed92780fed2fd9ecb103109fb62908fbfab37e26e408705b43522c52457c1c
                                  • Instruction ID: a65173558933f758163ba70c814cc189073e667a0c34aef73240a22b0a1d8f51
                                  • Opcode Fuzzy Hash: 56ed92780fed2fd9ecb103109fb62908fbfab37e26e408705b43522c52457c1c
                                  • Instruction Fuzzy Hash: F6E0CD34909108DBCB04DF98D5416BCB779FB46304F1081DDCC0423350C7315D52CB41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7814486e81eabd11bfb3450b4bbf5207f0ee0aaca0998d0bd813ed8a6f934074
                                  • Instruction ID: 219f075865df1904421d6d1a84b0836a8eec58f64eb929dd064121697776e04d
                                  • Opcode Fuzzy Hash: 7814486e81eabd11bfb3450b4bbf5207f0ee0aaca0998d0bd813ed8a6f934074
                                  • Instruction Fuzzy Hash: 62E012B550520CEFCB01EFF4D909ADE77F9EB4A301F1015A9D50997160EF324A80DBA5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c03232ed9150f81973a0b34da900a7a3ef8f66c6a039808ed93633e4a8e02308
                                  • Instruction ID: fd847ae04771449e31f4c07f3ba0f1092a4e488b333671f3e1f22aae5204c426
                                  • Opcode Fuzzy Hash: c03232ed9150f81973a0b34da900a7a3ef8f66c6a039808ed93633e4a8e02308
                                  • Instruction Fuzzy Hash: 7BE0EC78224604DF8348BB69D598A7533FAF7483107709AD4F00BC7369EB60ECD1AA90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 02b7a9c34a35e91864343c43d927c4481926c0eb9be82141a1fe452649c61574
                                  • Instruction ID: 08fe9e61d84cfedda0a13d2cf26d9eed32142813ec546af5d5158bd4b6885671
                                  • Opcode Fuzzy Hash: 02b7a9c34a35e91864343c43d927c4481926c0eb9be82141a1fe452649c61574
                                  • Instruction Fuzzy Hash: FAE01274A41308EBDB80DFB4D99576F77BEEB89304F505599F8089B241D9316F009B91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 19417ce9f449164dac6310346f87635bc5ba466bcbb44a58f8ccc2a008cea747
                                  • Instruction ID: 365b1b182568178c1eecf56560f8dc366b6ccd6fb4c21bd02324f2b724dfd18e
                                  • Opcode Fuzzy Hash: 19417ce9f449164dac6310346f87635bc5ba466bcbb44a58f8ccc2a008cea747
                                  • Instruction Fuzzy Hash: 3AD05B1160D1644BCB013B68B8101DE9FE3DFC7755B5441B7E0429A257CB144D995B75
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c646641610e0a685c58f75ca3c8b8c154cd33eac8229dd24f69d07165916f2bd
                                  • Instruction ID: c91b0d39a6ce0eef63c1c8a2ed09621697a8a76fe0a38224d52e9e45035a3e88
                                  • Opcode Fuzzy Hash: c646641610e0a685c58f75ca3c8b8c154cd33eac8229dd24f69d07165916f2bd
                                  • Instruction Fuzzy Hash: 7DE01270A11308EFCB40EFA4D9516AD77F9EB89304F505199A40DD7741D9316F01DB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5448c8be3af91e692871e84b1af634d4e02d4854865b2647febad1aee72eb753
                                  • Instruction ID: 3f9e2dc440c53cbdfbd83013f5d0446c9e104863733f48564368113ffc5c6c23
                                  • Opcode Fuzzy Hash: 5448c8be3af91e692871e84b1af634d4e02d4854865b2647febad1aee72eb753
                                  • Instruction Fuzzy Hash: 63D0A774609108EFCB44CB9CD841AA9B3BCFB47204F1451DDDC1857351DB329D42C780
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 22e0748769b9c462eca0ed1f0fd5dcee8dd2bc07d30db73d2d7c760b3597b476
                                  • Instruction ID: c1fae5d24105b441a2bc024e6653fa7b8b1fd2ddde363b4fdb2ccc65982ef44b
                                  • Opcode Fuzzy Hash: 22e0748769b9c462eca0ed1f0fd5dcee8dd2bc07d30db73d2d7c760b3597b476
                                  • Instruction Fuzzy Hash: 77D0A774509108EFCB44DB9CD840AA9B3FCEB46304F6054DCC80853351DBB29D81D7C0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b22fb473cff6739d55c866b2938b1c3218cb6f4eb7dea9c4dca8bdbc4cfd6985
                                  • Instruction ID: 99775f9fa7ba57cbcc0af1ce7882ba506546036cc508f712421c0a2d4f21a87b
                                  • Opcode Fuzzy Hash: b22fb473cff6739d55c866b2938b1c3218cb6f4eb7dea9c4dca8bdbc4cfd6985
                                  • Instruction Fuzzy Hash: 69E01A749053289BC758EF60D4A97A9BBB2EB4A310F5051A9A049A7384DF705EC4CF84
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c760c2f3b23ddf1e377caf7a05ee245a6929d450c65effdb77c4993ebcfcfbc7
                                  • Instruction ID: fbf9ebcc1ab828cfd4412a79f244fb0ce488cdc7a07df6fd463e6406c48cd9e8
                                  • Opcode Fuzzy Hash: c760c2f3b23ddf1e377caf7a05ee245a6929d450c65effdb77c4993ebcfcfbc7
                                  • Instruction Fuzzy Hash: 2AE01AB4A012148BC799EF54D8993DDBBB6EB4A300F501099E24A67354CF702EC0CF04
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c9f89df7eb9976bb6d68f2f11a0cfe0ce1d6b66987851a4df00fe55511962861
                                  • Instruction ID: 57107ae0446980524df5882e30ee087645fb2328e0e2166eadeb1d9bca6a1f86
                                  • Opcode Fuzzy Hash: c9f89df7eb9976bb6d68f2f11a0cfe0ce1d6b66987851a4df00fe55511962861
                                  • Instruction Fuzzy Hash: 1FE04F74A4112ACFDB68EF10D6457AEBBF2EB4A300F2000A8A509A3745DB745E81CF64
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bbe3137f053c31eb6814f14254500771cf76b154cbceee6f4d802b06b4836634
                                  • Instruction ID: 7dd0b45c3ae8837b598ea6b30735607b0a152d8d37cd1a613c9ca3f79a16efe5
                                  • Opcode Fuzzy Hash: bbe3137f053c31eb6814f14254500771cf76b154cbceee6f4d802b06b4836634
                                  • Instruction Fuzzy Hash: 9BE01A7494011ACFD764EF20D8947ADBBB2FB49301F1040AAE50AE3745DF305E818F50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fd53a76576dc2ea06730dace12e25f767db036d6f36ebecb9dd3f065be94f307
                                  • Instruction ID: e0ea7039c7b004d2489ec3a2f8cb603c1aafde8fa7a2cc3250793244fd2986c1
                                  • Opcode Fuzzy Hash: fd53a76576dc2ea06730dace12e25f767db036d6f36ebecb9dd3f065be94f307
                                  • Instruction Fuzzy Hash: D9E09A78E012188FD754EF64E59679ABBB2EF8A301F1044A9A60967344CF746E80CF56
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2b2b0ac9026eb8ae74781adabd04c6574cdb87afb0040fb42038fcbe45dd3a1a
                                  • Instruction ID: 8e589d480b1b0e5dd2cb9c2e99d6ff328f6b792ff39b5cb44ea7738bd5211617
                                  • Opcode Fuzzy Hash: 2b2b0ac9026eb8ae74781adabd04c6574cdb87afb0040fb42038fcbe45dd3a1a
                                  • Instruction Fuzzy Hash: 60E01A74A00128DFEB58EF24E455B9EBBB6EB46300F208599A50AA3344CF305E828F60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9ce9674a0ace70c7c4d402f4c75e6726901cb62622c68f9ed4ff5c59017010e6
                                  • Instruction ID: 6eb28dc3a432c983e9e3799fb5bb14db56c14d58bbc2d7175d1007b4f8c4760c
                                  • Opcode Fuzzy Hash: 9ce9674a0ace70c7c4d402f4c75e6726901cb62622c68f9ed4ff5c59017010e6
                                  • Instruction Fuzzy Hash: 69E01A34A002589BD754EF50D84579DBBB2FB89341F0045A9E50AA7394CB705E84CF20
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9054ce175956909f46b2c5a6757f2a33056d929cc4182a9c5cd0396d2e9aef0c
                                  • Instruction ID: 0291eba21f852051f8c2b1797658767e035b70dbf752765440e2e8077ae9bb74
                                  • Opcode Fuzzy Hash: 9054ce175956909f46b2c5a6757f2a33056d929cc4182a9c5cd0396d2e9aef0c
                                  • Instruction Fuzzy Hash: 7FE09A78A002188BD7A5EF54E89579EBBB7FB89300F1040AAA10A63354CF356EC9CF55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a1d5041f2862633501958980a24fcc1f499dda08d3fbba1591522556ef7af176
                                  • Instruction ID: 45d5bea7ef752bcac3094365ea8b262f347ea5055e385315d934dc53aff41c98
                                  • Opcode Fuzzy Hash: a1d5041f2862633501958980a24fcc1f499dda08d3fbba1591522556ef7af176
                                  • Instruction Fuzzy Hash: ABE01A38910314CBC75AEF20D8A97DABBB2FB4E300F401099A04967384CB701EC0CF04
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b3fb6637deb4cbafb0a935708f5340024577a3d3c3d7ed6f9df45f26b98eaa73
                                  • Instruction ID: 0ec22d7e6c8e6cc44a8e51e2e9eaa884a8c0544ed8634f1604c1c4f8ffcb829b
                                  • Opcode Fuzzy Hash: b3fb6637deb4cbafb0a935708f5340024577a3d3c3d7ed6f9df45f26b98eaa73
                                  • Instruction Fuzzy Hash: F3E0EE74A12228DFCB228F21D850BE9B6B1BB02308F0021D9D98862380C3341A81CF8A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d2963aa83c8d0abdba09f72d71dec32bc9b2624b759e2c8511fbf89a13a61efa
                                  • Instruction ID: d0d3956981b8e2151b1d6f37234b48e2085aca07cf5eca362bd3be84c55d8096
                                  • Opcode Fuzzy Hash: d2963aa83c8d0abdba09f72d71dec32bc9b2624b759e2c8511fbf89a13a61efa
                                  • Instruction Fuzzy Hash: 57E0B638E002298BCB60EF98E8407DDBBB2FB89315F1040E6D50CA3308CB305E918FA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1b9a72b24b740201bdfee326339f54449b460df26656f52a9445e2c41bbde9e9
                                  • Instruction ID: 19949c63b5dcc10156907fca59d277890c30ace97dca22068484eb546c267d54
                                  • Opcode Fuzzy Hash: 1b9a72b24b740201bdfee326339f54449b460df26656f52a9445e2c41bbde9e9
                                  • Instruction Fuzzy Hash: 72D05E7104A7848FD356A7F8A9197A47FB0AF47305F4820C6C0885A0B3CE654484CB27
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 05533c05828ff42e8c6d035c16706f00009a88879aad513b3389e223d140ef47
                                  • Instruction ID: ab6b155d3db06e7ab3c2914c1e6395dc24d9433e80f273ec8d8a2d238761ca1d
                                  • Opcode Fuzzy Hash: 05533c05828ff42e8c6d035c16706f00009a88879aad513b3389e223d140ef47
                                  • Instruction Fuzzy Hash: 5EE092B8E05228CBDB64DF64D984B9DBBF2FB4A300F0042A99509A3748DB305E80CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 25fca4d48414d5f0a08ce3159b6669eb313a160dc347616ef8bfbd569de0c22e
                                  • Instruction ID: c9d9eebe464066c12ed6e83c0c18a4f5bac31e4236ed7332a19e0407a257f9d2
                                  • Opcode Fuzzy Hash: 25fca4d48414d5f0a08ce3159b6669eb313a160dc347616ef8bfbd569de0c22e
                                  • Instruction Fuzzy Hash: 94D0A770C1D3048FC745FFB898464487FB8E70320075216D3C804CB662EA388A52DFD2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 91d8910d6fa9eb9a97e03fc67c1e37c67d490dfc2fe012d8772c9cf48d3a4694
                                  • Instruction ID: 286c64eca866c8a2f71e8b7f69e43e598621587788d3c050c5f2c09cce9a8455
                                  • Opcode Fuzzy Hash: 91d8910d6fa9eb9a97e03fc67c1e37c67d490dfc2fe012d8772c9cf48d3a4694
                                  • Instruction Fuzzy Hash: 81D012B54446448FC3425F60E98A1807FF9EE52A043021286D11D8A073EB245B068F60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 26049dc1f2bff96ced2a713327f3d3dca5a86091ef40ad5eaba502282047a221
                                  • Instruction ID: 3c1a0c3bf839c6eebe16747ec6ec620f932d7c8e7c405d304c2e234300f45726
                                  • Opcode Fuzzy Hash: 26049dc1f2bff96ced2a713327f3d3dca5a86091ef40ad5eaba502282047a221
                                  • Instruction Fuzzy Hash: 3CE02D78A002188FDB64CF14D994F9AB7B1FF09300F4141D5E809A7361C730AE41CE52
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 304eacf39cd43870bcdd3463d68b89ef8b2c90097f38e68c89c64cc1560bf961
                                  • Instruction ID: 8d5fc0e282f2699f08924f06326837f6fff3110b6f81f18222b20cec123b2fb2
                                  • Opcode Fuzzy Hash: 304eacf39cd43870bcdd3463d68b89ef8b2c90097f38e68c89c64cc1560bf961
                                  • Instruction Fuzzy Hash: 62D0C9B140A6519FD30A9B20DDA18617FACAA8224031625C2D081CF1B3E7649B409B21
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c24051de2d9e47d517c2a2aff8c06e827928e0ecfda948a88eec3e9d01f7f7b3
                                  • Instruction ID: 9eadde15c64b20322cea6e8937935fb396e7802908b237c5c12c3a861518f113
                                  • Opcode Fuzzy Hash: c24051de2d9e47d517c2a2aff8c06e827928e0ecfda948a88eec3e9d01f7f7b3
                                  • Instruction Fuzzy Hash: 42D0C935E0021CCBCF10DBA4E8406DCB7B0FB84221F100269D508A7241C7301912CF80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c37449037a703034fe28c52f8e40fe68b2f5b7e3644ef4be15b5e25d80420722
                                  • Instruction ID: 0b1116f064a355a49d7d24cddb0ed9446d8d080713b3f9afe432bf44cf4b03f2
                                  • Opcode Fuzzy Hash: c37449037a703034fe28c52f8e40fe68b2f5b7e3644ef4be15b5e25d80420722
                                  • Instruction Fuzzy Hash: 86D0C9B200D2C04FC392CFB8A9948577FB09F1722431A08E7E0948F163D2229915D712
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ffb69e13f8be38ae6a860d24d0116939a9c7933e89eb1d56d3e9d7c29032abdf
                                  • Instruction ID: 775dd93ddeec4d5c02283d229ce25b23e42a6163cae942bfb126a4855b8ce879
                                  • Opcode Fuzzy Hash: ffb69e13f8be38ae6a860d24d0116939a9c7933e89eb1d56d3e9d7c29032abdf
                                  • Instruction Fuzzy Hash: 8DC08C71001B088FC72433E8A90DBA872D96B86302F842140D00C204225F6000C4C27B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c084713f40222ef185a1a572889dc65ef5520ef996f6029ac4c28c4625c209e0
                                  • Instruction ID: 5318c44276133901615435e13b5c27d00ec4cd72725230951fd82b4b3bc0da88
                                  • Opcode Fuzzy Hash: c084713f40222ef185a1a572889dc65ef5520ef996f6029ac4c28c4625c209e0
                                  • Instruction Fuzzy Hash: AFD0127097D248DAC704FBA0A0E01FE7AF1AE087807B059D9D00356100EBF008C0FB71
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ebc9aef3da2438d687f9b5513b306acca2a56cc4ba9231cc5d68608abe95c129
                                  • Instruction ID: c4786cec50d3c8c668d373c87ca8c35e20e22197f20921bf7254dd9d0cc58cb0
                                  • Opcode Fuzzy Hash: ebc9aef3da2438d687f9b5513b306acca2a56cc4ba9231cc5d68608abe95c129
                                  • Instruction Fuzzy Hash: 36C0123AF001098B8F40EBC8F4408CDB775FF84321B008022E610A7208C3302822CF80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 59bad5d86483e69c5e2455b2609c30c2812df69472250253f583e6d4d5c7f510
                                  • Instruction ID: 48e3f23f67c5fc3803898ba13dcf8d535585eb90b9632d5dbc63ef3ef98469cb
                                  • Opcode Fuzzy Hash: 59bad5d86483e69c5e2455b2609c30c2812df69472250253f583e6d4d5c7f510
                                  • Instruction Fuzzy Hash: 80D092B4E2122C8BDB22DF51E890B9DB7B5BB15604F4022DAD808B3240D7705F80CF44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 584091fa9c74a77cf556dd350d37ed2fcb76bd53ca13d4d2de7476b895bfc57a
                                  • Instruction ID: 62e60cb374a49b64f9f615bbe0a82d220e1f8a0847d1bd5c30787363e90ec8e9
                                  • Opcode Fuzzy Hash: 584091fa9c74a77cf556dd350d37ed2fcb76bd53ca13d4d2de7476b895bfc57a
                                  • Instruction Fuzzy Hash: 5BD0A7F8A4021A9FCB10CF11CD44BAAB771AF02301F00A1E5808953344D7B15E82CF41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 725f3a47676dc142c599a2f9405dee351a8d543aa5611245de69a93ba7df960a
                                  • Instruction ID: 547a39f2babbd466942827fa106896d7800425bad85be8c7eb7deb364d30c581
                                  • Opcode Fuzzy Hash: 725f3a47676dc142c599a2f9405dee351a8d543aa5611245de69a93ba7df960a
                                  • Instruction Fuzzy Hash: 24C08C32408260DFDB048B6ADCEA4E537F1BE0A39030999E0EC02AB154DE3039B1E721
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fb884d1feefcdee13ff162b935dd50524b9361470e955314bc289fe7c58e22a9
                                  • Instruction ID: e41a80bb362ff601ebabb2d9b2f2823a32a3673c7249194b5726986ef06f7388
                                  • Opcode Fuzzy Hash: fb884d1feefcdee13ff162b935dd50524b9361470e955314bc289fe7c58e22a9
                                  • Instruction Fuzzy Hash: E1C08CB4A41208A7D304AF54E08ABAAFA73E7C6304F10902871020BB88CF344C84CB54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 78eedce3775cb2c6f36f33d6d5fa34c3c01f9207bf5fcedf6aae63e67dc9e6bd
                                  • Instruction ID: c25e6e068ac34e4287dce66eae8b382bfd0e5f0ad69ecb9d8ed71dc398e75404
                                  • Opcode Fuzzy Hash: 78eedce3775cb2c6f36f33d6d5fa34c3c01f9207bf5fcedf6aae63e67dc9e6bd
                                  • Instruction Fuzzy Hash: 85C09B755547419BDF1056718D5B7D13B305F50707F552145A148589C1E7D64051C74A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 54392b64f4421def6b5472cb7fb070e89cbc413df63446116ba4b0f038c65595
                                  • Instruction ID: e740a7d785010013feaad14f7a2f6fb3f0f0ccdb7a5e58c37b3a6b6a7f9fc2a5
                                  • Opcode Fuzzy Hash: 54392b64f4421def6b5472cb7fb070e89cbc413df63446116ba4b0f038c65595
                                  • Instruction Fuzzy Hash: 2CC08C74A042049BC304AF90E08532ABA73D746300F10002A610283B88CF380C818F62
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                  • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                  • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                  • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 359c1ab57a2c5142a5bf1ce75abf06ca4d71fd13d655d5ef0c7ac910a0b1793b
                                  • Instruction ID: 4f4fb92ee7411b7f3bb315b4c2de65b84c450dcbca9ac047b2c9d1772be113ef
                                  • Opcode Fuzzy Hash: 359c1ab57a2c5142a5bf1ce75abf06ca4d71fd13d655d5ef0c7ac910a0b1793b
                                  • Instruction Fuzzy Hash: 45A0112E02083282E220A33088833CF33C0E300388FE88C00A00A88282C28BA20B8800
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 87106f426b58764fa2bb61fa853c7bf0ad9ce8ef8833b3465ed0cf7d78a3bab8
                                  • Instruction ID: 707cb7993fc3b0d31a8c517aec11e3e77bde0f415244d9bf91c7bb214b9ef692
                                  • Opcode Fuzzy Hash: 87106f426b58764fa2bb61fa853c7bf0ad9ce8ef8833b3465ed0cf7d78a3bab8
                                  • Instruction Fuzzy Hash: 58B09232000208EB87019B98E804C65BB6ABB58700B488025A609065218B33A822DA94
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 363382e4862dc54eda72723b9ed2a9ace2289150217cf9974c945ef58e8e80ca
                                  • Instruction ID: a0e3c406bd1177cc42dfee69e3ec27afa1412b73c54f2ea977e4d5dcdeff2302
                                  • Opcode Fuzzy Hash: 363382e4862dc54eda72723b9ed2a9ace2289150217cf9974c945ef58e8e80ca
                                  • Instruction Fuzzy Hash: A8B01235404210DFC701C610CD9BA2A7BE5D790F00B00E42DB044C5014CB314810D502
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6f0522766f7b94cd5bba7e0abfce8a813f7bec6050dc49613ea451fc7ef43cf3
                                  • Instruction ID: 5d2380b3511d2797ff54d7d766c590028cd4e5038a2ac29b0a2fc9cfb14fbebf
                                  • Opcode Fuzzy Hash: 6f0522766f7b94cd5bba7e0abfce8a813f7bec6050dc49613ea451fc7ef43cf3
                                  • Instruction Fuzzy Hash: 5CA0247004010CCFC34037D0FC0D04577DDD5005013401315F00D400334F3054404540
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $K$U
                                  • API String ID: 0-3197486732
                                  • Opcode ID: 5bd67b0bf831915359cd2c9907a286bb324cf7fa29cac9e37e40e3f578012cfb
                                  • Instruction ID: 79a4096ecbc26b457acb738bfdb0afcc3ddbeae6b7df9a86cd024bb9386e644c
                                  • Opcode Fuzzy Hash: 5bd67b0bf831915359cd2c9907a286bb324cf7fa29cac9e37e40e3f578012cfb
                                  • Instruction Fuzzy Hash: D5416CB1E05A189FEB18CF6B8C4169AFBF3AFC9301F14C1B9C54CAA255DB7059868F41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,$,$.
                                  • API String ID: 0-4046085788
                                  • Opcode ID: a4cb92b3c27811a6f63f805150eaa072ec3eaad760905a8cd66d3f40dae0c680
                                  • Instruction ID: de119a6a6cc70e6eec191f172d14dbc7daecf7c96af7f8155493c0883716a245
                                  • Opcode Fuzzy Hash: a4cb92b3c27811a6f63f805150eaa072ec3eaad760905a8cd66d3f40dae0c680
                                  • Instruction Fuzzy Hash: 9531F774E05218CFEB58CF6AC9487EEBBF2BB89304F14C0AAC418A7254DB704A81CF50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: pqI
                                  • API String ID: 0-1078129942
                                  • Opcode ID: a0a25d4b7bac267afe3efe9ff547144a83ea246c8aa524cce105e2963d1de330
                                  • Instruction ID: 197227fa7f97c8eeee6dc1738abad72a8e1bfee6ffe505fdc02246bfe97efc87
                                  • Opcode Fuzzy Hash: a0a25d4b7bac267afe3efe9ff547144a83ea246c8aa524cce105e2963d1de330
                                  • Instruction Fuzzy Hash: 6141B4B8E0550ACFEB64CFA9C4816EEB7F2BB48300F558825D426E7304E3B4DA468F40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: pqI
                                  • API String ID: 0-1078129942
                                  • Opcode ID: 2f2f4ba9023c0900dfa0768c6950130ff70a048a8eeb5c0625b5a3122d1ea4d7
                                  • Instruction ID: e911749c0a695e8746a4788e20354bce851791c44be9a7c2a4a2a4105f577d08
                                  • Opcode Fuzzy Hash: 2f2f4ba9023c0900dfa0768c6950130ff70a048a8eeb5c0625b5a3122d1ea4d7
                                  • Instruction Fuzzy Hash: 2941B2B8E0550ADFEB64CFA9C4812EEB7F2BB48300F558965D426E7305E3B4DA068F50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ,
                                  • API String ID: 0-3772416878
                                  • Opcode ID: a6eda755a574940337bf84940264080694295d9da71619b18d1d69c6cfb71ba5
                                  • Instruction ID: 1997a34399994ea196626f552c70592339f09d35d22e6fb42244b47669af86d7
                                  • Opcode Fuzzy Hash: a6eda755a574940337bf84940264080694295d9da71619b18d1d69c6cfb71ba5
                                  • Instruction Fuzzy Hash: 0F413A74E04219CFEB58DFAAD8447EEBBF2BB89304F10C0AAD409A7254DB744985CF50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 5
                                  • API String ID: 0-2226203566
                                  • Opcode ID: eb5eddd477480863319986c6c9c3922fb1f6c82540e73116bdeb91198cb3cc00
                                  • Instruction ID: ee7ccea309170197da4bad070668f69ec8152a230d92416290ebce41269a2a98
                                  • Opcode Fuzzy Hash: eb5eddd477480863319986c6c9c3922fb1f6c82540e73116bdeb91198cb3cc00
                                  • Instruction Fuzzy Hash: 0821A7B1D056589BEB28CF5BCC546DEBBF7AFC9301F05C17AC809AA224EB714545CE00
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .
                                  • API String ID: 0-248832578
                                  • Opcode ID: 3d413d8eac2a9b8acb8b627ec48eef945557acb5bb799a4966f5c86eb9e58d30
                                  • Instruction ID: c1bf0db31cbc86b3d0b28b29607018d8b2eb40a54e96f795a9d504164cf25042
                                  • Opcode Fuzzy Hash: 3d413d8eac2a9b8acb8b627ec48eef945557acb5bb799a4966f5c86eb9e58d30
                                  • Instruction Fuzzy Hash: 5D111CB1D056198BEB18CF6BC9446DAFBF3AFC9300F14C0AAC408A6265EB700A428F50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358429237.0000000002470000.00000040.00000800.00020000.00000000.sdmp, Offset: 02470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_2470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0188089f18a5236ac8bcab0ee7f05d0af4f52acd723a3ff5ac574b23eaef5238
                                  • Instruction ID: bb527db8547d5cb3ac7c50a08c1323da238f224da22708c5a0d743d88f372301
                                  • Opcode Fuzzy Hash: 0188089f18a5236ac8bcab0ee7f05d0af4f52acd723a3ff5ac574b23eaef5238
                                  • Instruction Fuzzy Hash: 2B326870A046158FDB48DFA9C4947AEFBF6FF88304F24852AE56AD7351DB30A941CB84
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 53e0ca3741527e7c222a9cc62f1d0b4c6bad4f7845486720b9eca12703fb9692
                                  • Instruction ID: 8f30583b342ce891ada896c1ceb176fa2598580e28648fc42ce144b8ec630508
                                  • Opcode Fuzzy Hash: 53e0ca3741527e7c222a9cc62f1d0b4c6bad4f7845486720b9eca12703fb9692
                                  • Instruction Fuzzy Hash: 68918A894BA5B42BF36B02782DD35CB7318F6650453F1E636DCCE5D0C38A08688765B2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d170a1fa8528ea03379f8e9d62104402e0cccceaecef7d72b9a34a7323287ed
                                  • Instruction ID: af457cf3819bd353790be5c067d84e46fea5ab324b0921553f8f00df24263ba2
                                  • Opcode Fuzzy Hash: 7d170a1fa8528ea03379f8e9d62104402e0cccceaecef7d72b9a34a7323287ed
                                  • Instruction Fuzzy Hash: 3612B971E006188FDB14CFAAC980ADDFBF2BF89304F24C569D459AB219D734A946CF94
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6757e8200503d97004b1cd516d500b4baa9f2efc5a918980dde8e5e4ad3a8209
                                  • Instruction ID: 8ebfed13426d002aeff3cf96f225367c5f79ea70562c513d7eb5f878a00693d3
                                  • Opcode Fuzzy Hash: 6757e8200503d97004b1cd516d500b4baa9f2efc5a918980dde8e5e4ad3a8209
                                  • Instruction Fuzzy Hash: B6B10874E05218CFDB14DFA9D885BADBBF6BF89300F2090AAD459A7355EB709985CF00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 36e4edffd14c02ae240551016e4623682c994a2ded74a3e934edd279a4f06bbd
                                  • Instruction ID: fc1165703904537538f579672e512f4d87dc322faf09ed3e0f4a4370f365cd0c
                                  • Opcode Fuzzy Hash: 36e4edffd14c02ae240551016e4623682c994a2ded74a3e934edd279a4f06bbd
                                  • Instruction Fuzzy Hash: 0EB10974E05218CFDB24DFA9D885B9DBBF2BF89300F2091AAD459A7355EB709985CF00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 060ab5896989e69a30055dcac9cd873119e53b109343bfc070b9273fb51e9d7b
                                  • Instruction ID: 6427744aa6bb0ccce60db196070d109094f865250bc66ec6b1f96a9442b5b4de
                                  • Opcode Fuzzy Hash: 060ab5896989e69a30055dcac9cd873119e53b109343bfc070b9273fb51e9d7b
                                  • Instruction Fuzzy Hash: DC91F4B0D05209CBEB04DFA9D5447EDBBF1FB49301F6090AAD829B7240D7748A86CF64
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 60d694dcdc7a4d795dbfe13c4268181b14e60c7dff5db2edb9a4ae0eb801ea11
                                  • Instruction ID: 18b3f9677ad05f876ce88fd293a03289aa86769c582ef839d84acb450d7e9aad
                                  • Opcode Fuzzy Hash: 60d694dcdc7a4d795dbfe13c4268181b14e60c7dff5db2edb9a4ae0eb801ea11
                                  • Instruction Fuzzy Hash: 1F812574E05258CFDB24EFA9C944BEDBBBABF49304F1090AAC409AB251DB745996CF01
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 92164d3545bde349745831b8caa1adc2c8a0a44e34ee8d498b74854bc59087ff
                                  • Instruction ID: 0482362a46c8c41ce571af356370ee03852ca943e7601f728bee25800a60e5e6
                                  • Opcode Fuzzy Hash: 92164d3545bde349745831b8caa1adc2c8a0a44e34ee8d498b74854bc59087ff
                                  • Instruction Fuzzy Hash: 789190B4E01609CFDB08CF99D484AEEBBF2BF98314F148169D809A7355D774E986CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2e522f3bb1a71910432a6a84f9f78782a3ff7114395170d450e78fd78383f851
                                  • Instruction ID: 3a2c5c2343bb174306671bd2d8eee19afc4cdf48023a5fc6a34b94ad70c21bdb
                                  • Opcode Fuzzy Hash: 2e522f3bb1a71910432a6a84f9f78782a3ff7114395170d450e78fd78383f851
                                  • Instruction Fuzzy Hash: D37101B4E05208DFEB18DFA9D544AEDBBF2BF49300F10906AD508B7248D7B59A46CF54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e708417d689bf1979869c41c314527e4c26ed02a9ab74c6ad49576a52b79f174
                                  • Instruction ID: a09f41860b760bd083eb96129b29f30deb2007997d0c7e7c17cccd14f7038f2f
                                  • Opcode Fuzzy Hash: e708417d689bf1979869c41c314527e4c26ed02a9ab74c6ad49576a52b79f174
                                  • Instruction Fuzzy Hash: AA71EEB8E05208DFEB18DFA9D544AEDBBF2BF49300F20906AD504B7258D7B59A42CF54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7c1d85943f88adcd33c34ddb3ae1c88b5e9e2b09b7732716d048303aba5f7ef9
                                  • Instruction ID: a2312e4fcd6d0e66e43ce9632bb967d6f59ca498573b3beb881806223b2b4706
                                  • Opcode Fuzzy Hash: 7c1d85943f88adcd33c34ddb3ae1c88b5e9e2b09b7732716d048303aba5f7ef9
                                  • Instruction Fuzzy Hash: 6D7139B4E002098FEB48EFAAE95069EBBF3BF89300F14D129D1049B369EB345955CF55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 910426813d981991f329cb763ea6d6ef2d8e8f43eeb9b3bb4322528e623ceae4
                                  • Instruction ID: c426fc81d09b25a281f06a44796ebba243039da3e8063b598d728b8fc7c6c545
                                  • Opcode Fuzzy Hash: 910426813d981991f329cb763ea6d6ef2d8e8f43eeb9b3bb4322528e623ceae4
                                  • Instruction Fuzzy Hash: 78713BB4E002098FEB48EFBAE94068EBBF3BB89300F14D129D1049B369EB355955CF55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 30309a517476aeaff7ecbb2ab41aabadeecd6e7862417fdc00756fd891cde737
                                  • Instruction ID: 9a96a3382e9868e1c131874703f744344acdf75adc96af37ca7524f73c61d55e
                                  • Opcode Fuzzy Hash: 30309a517476aeaff7ecbb2ab41aabadeecd6e7862417fdc00756fd891cde737
                                  • Instruction Fuzzy Hash: 74613A74E04628CFEB64DF69C944BEEBBF6BB89300F2080AAD509A7355DB704984CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ba36c4f3ecc70d53444212d253de020afdcaa007d10ab067c2cf77fabfd7d754
                                  • Instruction ID: e2bab947ad5ebe34cfa4846dab218b78dc24226944e49bedc8217cebcc90bbd3
                                  • Opcode Fuzzy Hash: ba36c4f3ecc70d53444212d253de020afdcaa007d10ab067c2cf77fabfd7d754
                                  • Instruction Fuzzy Hash: 66611774E04628CFEB64DF69C944BEEBBF6AB89300F20C0AAD519A7745DB704984CF50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 19827f1d13f3af33cbb069d09058d518240a99ce56f08d111045c5b0bc1b1966
                                  • Instruction ID: d5d7e6f822de1d9f0c4d6b3f65f24075c89fee57c8b33a54d888def7bfa32365
                                  • Opcode Fuzzy Hash: 19827f1d13f3af33cbb069d09058d518240a99ce56f08d111045c5b0bc1b1966
                                  • Instruction Fuzzy Hash: DF6192B0D05628CBEB64CF2ACD887D9BBF6BB89305F5081E9C41DA6254DB740AC58F10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2dcd9e055a8779b0275e8a86ca4e02a0ee65c989ecb4bb3006a6b53defc9aa2b
                                  • Instruction ID: 9a42c624027b4b11ef6a92ee8bfc79a5f929d4faca1bc78efa4b7bc8551d6d8d
                                  • Opcode Fuzzy Hash: 2dcd9e055a8779b0275e8a86ca4e02a0ee65c989ecb4bb3006a6b53defc9aa2b
                                  • Instruction Fuzzy Hash: 5F416AB5E016198BEB08CFABD94059EFBF3BFC8300F15C06AD558AB264EB3059468F54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8434a6b8dafeab11534c54148e70da621e3baa5361cb66fd27a92a328d9fae83
                                  • Instruction ID: fd2c60c651f75f2ffb26d9c5c53d67b3131ed3366d22848605b8b6fc06c3e831
                                  • Opcode Fuzzy Hash: 8434a6b8dafeab11534c54148e70da621e3baa5361cb66fd27a92a328d9fae83
                                  • Instruction Fuzzy Hash: 6F615BB4E112289FDBA0CF69D884B9DBBF1BB48314F1485A9E45CE7211D730AA96CF00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384626861.00000000051A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51a0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16e48b01b56752a2a279d92c76ea424f1954e5e72e68f2543e5a4eff7254cbd7
                                  • Instruction ID: 16b8239a2733e78b129dcddeab309233b34ca6405c2811b42a14114733780b04
                                  • Opcode Fuzzy Hash: 16e48b01b56752a2a279d92c76ea424f1954e5e72e68f2543e5a4eff7254cbd7
                                  • Instruction Fuzzy Hash: FF516DB1D056548BEB69CF6B8D542CAFAF3AFC9300F14C1FAD54CA6264DB740AC68E10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384626861.00000000051A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51a0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2dbaba421eba8d75abd0c708f2080b316d942394c1812059ef1b1ed9ab40197c
                                  • Instruction ID: 4f7904604ec31c01836aa983e2075862a62950ca5a82a28e60742f017bf6b3a6
                                  • Opcode Fuzzy Hash: 2dbaba421eba8d75abd0c708f2080b316d942394c1812059ef1b1ed9ab40197c
                                  • Instruction Fuzzy Hash: EE41ECB9D007489FDB15CFA9E985BAEBBF1FF09300F20902AE415AB650D7749885CF85
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384626861.00000000051A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51a0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9ec3fa75e3591ed9c2a11949fb57bd74ae0381cbd45a06ac69e792697e39a1a9
                                  • Instruction ID: 1ab7c406ed1c11c3364342e536cb715c203d23ea7a564f55fbb5fa17bfe34385
                                  • Opcode Fuzzy Hash: 9ec3fa75e3591ed9c2a11949fb57bd74ae0381cbd45a06ac69e792697e39a1a9
                                  • Instruction Fuzzy Hash: C1512FB5D016588BEB6CCF6B8D446DAFAF7AFC8340F14C1FA954CA6254EB740AC58E10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0994f6751ea64f9fbd67c19f1d348b7bf786d650ee6908eedeaa17c9ba75b2df
                                  • Instruction ID: 775e853bc4a2573b2581848d67a004f45a15e2cf5a1dc40002c70aec9e9294b0
                                  • Opcode Fuzzy Hash: 0994f6751ea64f9fbd67c19f1d348b7bf786d650ee6908eedeaa17c9ba75b2df
                                  • Instruction Fuzzy Hash: 16319EB1E146188BDB5DCF6BDC4069AF6FBAFC9300F14D0AA984CB6254DB701B818F41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7c5a423ce6acf67647c97a9e82565a9626af07f57e294bf70c5da45c6e653d83
                                  • Instruction ID: cc09094fbef60caef8ece51a45276db0b95ac6cf9853e3299856cde8b19e6de1
                                  • Opcode Fuzzy Hash: 7c5a423ce6acf67647c97a9e82565a9626af07f57e294bf70c5da45c6e653d83
                                  • Instruction Fuzzy Hash: 4F31B4B1E156548BE71DCF6B9C40299FAF7AFC9200F04D1FAD448B6254D7700B418F41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 64eeb2b4ea470da8357e8a1b80648a6842bb185ca988dc3482e219cf5c955af3
                                  • Instruction ID: b0d44843dc721e9794181bbc80a284e915854b575e2b6694db9eb9d644375443
                                  • Opcode Fuzzy Hash: 64eeb2b4ea470da8357e8a1b80648a6842bb185ca988dc3482e219cf5c955af3
                                  • Instruction Fuzzy Hash: A52120B5C042189FDB14CFA9D884AEEFBF4BB49310F14802AE804B7200C7756945CFA4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 849ec02768786c8bc72f9a7750366afaff11e4e57a918dc5395d3e66ed08c75f
                                  • Instruction ID: 89012f4b7ee07fb2f9f8676b6b9a0917507f77ab4c6a7e84757feb6076d7a6c4
                                  • Opcode Fuzzy Hash: 849ec02768786c8bc72f9a7750366afaff11e4e57a918dc5395d3e66ed08c75f
                                  • Instruction Fuzzy Hash: E221C671D056598BEB68CF6B99447DABAF7ABC8300F04C4BAD51DA6254EB740A858E00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6e388383b766d6f1f448109b5a15f54bfe6e6d5a5866676e0adfccd342b3585c
                                  • Instruction ID: 4d046195a37704c73e2cc21a9dd88441c5a64cf4c0ec609c2d9745ee52629cbd
                                  • Opcode Fuzzy Hash: 6e388383b766d6f1f448109b5a15f54bfe6e6d5a5866676e0adfccd342b3585c
                                  • Instruction Fuzzy Hash: 8921EDB5C142189FDB14CFA9D884AEEFBF4FB49310F14902AE809B7250C775A905CFA4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1384705533.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_51b0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 36087509d56842a2f428a1980a2d51732fb34b7dcfe1dbb0c4b89511c5e29bd7
                                  • Instruction ID: 5af67a9eec749ba5c45089726c09aad48e828216fe106d5f5c7c0a96771204b6
                                  • Opcode Fuzzy Hash: 36087509d56842a2f428a1980a2d51732fb34b7dcfe1dbb0c4b89511c5e29bd7
                                  • Instruction Fuzzy Hash: 1B218A71D15A589BEB18CF6BCC456DEBBF3AFC9301F05C17AC819AA264DB700986CE40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1358036758.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_b10000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b0fe6d5d7269644315453bc3fd2b0bdaa03cfab8c63a35eade06d88dafbe402
                                  • Instruction ID: 6794d5ff950f46d564525473f232c808f7b8e45d540b5da1f295b06956c14b06
                                  • Opcode Fuzzy Hash: 7b0fe6d5d7269644315453bc3fd2b0bdaa03cfab8c63a35eade06d88dafbe402
                                  • Instruction Fuzzy Hash: 5C3188B1D05A188BEB68CF6BC95478EFBF7BFC8304F54C1A9C40866264DB750A858F41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1386060852.0000000005470000.00000040.00000800.00020000.00000000.sdmp, Offset: 05470000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5470000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a1ad00f7d4cd98ca48015d13a4c2b627a00f02378d1aad644c31c1e37b0735a3
                                  • Instruction ID: d40df53dc4a12f2bf51057398797f3d8706e428ab143c6dcbff16d08baea3ae7
                                  • Opcode Fuzzy Hash: a1ad00f7d4cd98ca48015d13a4c2b627a00f02378d1aad644c31c1e37b0735a3
                                  • Instruction Fuzzy Hash: 2A21C771D056598BEB68CF2BD9487DABAF7AFC4300F04C4BAD41DA6254EB740A859F00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385911948.0000000005320000.00000040.00000800.00020000.00000000.sdmp, Offset: 05320000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5320000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 42db819945f1330d8a9482d455d7f404b6805e617aacc7946c59755ce038c463
                                  • Instruction ID: d3f5e6f504dba76f27c92153b83e91d80b065b9b3d01942133a33bcf943543e3
                                  • Opcode Fuzzy Hash: 42db819945f1330d8a9482d455d7f404b6805e617aacc7946c59755ce038c463
                                  • Instruction Fuzzy Hash: B311CE3D05DAC1BECB1BABB0B46A2E77FF4DE0B300B6820D9E0C19A113DD61050AE791
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1385954742.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5330000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2afa55179b6cb6e83eb40256d954369d8709d114fb5924d1e62dd1d04a03f326
                                  • Instruction ID: 2c0e826be779584ccf31661f0bafbe8b38a5ff0941648e72f8ee5b59c4427cbe
                                  • Opcode Fuzzy Hash: 2afa55179b6cb6e83eb40256d954369d8709d114fb5924d1e62dd1d04a03f326
                                  • Instruction Fuzzy Hash: 8611F07A43D1909BC34ADB74E9C7A823FB9EB4A754F498D84E080CF216CE24B045CB95
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 5$8$X$^
                                  • API String ID: 0-1520384984
                                  • Opcode ID: c8381266d46dfd74e49cde88b38c98e6a5612bae9497cd30ddd19b80c6a27552
                                  • Instruction ID: 556e7db081a209af8c4e42334e34b5ef273c5941f38add45e0d2582afe380d74
                                  • Opcode Fuzzy Hash: c8381266d46dfd74e49cde88b38c98e6a5612bae9497cd30ddd19b80c6a27552
                                  • Instruction Fuzzy Hash: F851F574900268DFDB65EF69D884BDDB7B2FB4A305F108199D848A7345CB34AE85CF80
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1377220171.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4fb0000_Fqtwswg.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0$5$O$f
                                  • API String ID: 0-3244088741
                                  • Opcode ID: d92825b15effcdc74ce46c9d7d1a72c0a925bddee0ce82d7e4a8ac0376af4b27
                                  • Instruction ID: 6ee5edfa39645520ba037abb4084a2707218b0fd5adbec40db1a4f416d373cac
                                  • Opcode Fuzzy Hash: d92825b15effcdc74ce46c9d7d1a72c0a925bddee0ce82d7e4a8ac0376af4b27
                                  • Instruction Fuzzy Hash: B201C0B0D10268DFDB61DF65D884BCCB7F1FB0A304F1085D9D948A2240D7346A86CF85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: f
                                  • API String ID: 0-3580130387
                                  • Opcode ID: 85005df088af3cc965102c799858c4894eef31a5bcad340c6393edf589f8caee
                                  • Instruction ID: 1a7a0863083b9667ece5d6301842f03f446b84244a95acad8538768edd87119f
                                  • Opcode Fuzzy Hash: 85005df088af3cc965102c799858c4894eef31a5bcad340c6393edf589f8caee
                                  • Instruction Fuzzy Hash: 07215C70D44108EFDB04EFA9E099369BBF2FB84315F62C0AAD40997254DB748A89DF40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: f
                                  • API String ID: 0-3580130387
                                  • Opcode ID: 046960e93aa590036b75f62161ef6495cf509d59b208f0abc1de62b9e65f4ec2
                                  • Instruction ID: fb89a5243f346fa8d30027a2d3762b2bbd2e6937b2174565af20f86997885917
                                  • Opcode Fuzzy Hash: 046960e93aa590036b75f62161ef6495cf509d59b208f0abc1de62b9e65f4ec2
                                  • Instruction Fuzzy Hash: 06113A70D44108EFDB04EFA9D4D93697AF3FB84315F6280AAD40997254DB744A89DF41
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 249d243648f496646b6aad74e2aa13d181949a0e345928f632835d60e00024eb
                                  • Instruction ID: c269d5a002e800e1a1cda1180c14308cab7bfed66a6ddfcb19c16a74f3eee7be
                                  • Opcode Fuzzy Hash: 249d243648f496646b6aad74e2aa13d181949a0e345928f632835d60e00024eb
                                  • Instruction Fuzzy Hash: F9B1C034A402409FD716EF29D4A4A99BBF6FF89710F1581A9E805EB3A5DB30EC05CF90
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c5a650c13e512133a2e2f5be4e4cb395649f9920f775dc3d2327ba7bedd23600
                                  • Instruction ID: f501fdc8d836a39ec9b112793e037b9541add3fc052d65b5b6a44726828afe27
                                  • Opcode Fuzzy Hash: c5a650c13e512133a2e2f5be4e4cb395649f9920f775dc3d2327ba7bedd23600
                                  • Instruction Fuzzy Hash: 39617C74A40640CFC715EF29D5A4A99BBF6BF88320B158169E816EB3B5DB30EC45CF90
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7ef2f857eb7679f5c7dfd41179abf576cbcd150a00e455f5ad030af86e0139ee
                                  • Instruction ID: 6ca5906a195c6496dbaad855686580af9a120851a829c0ab5f69ca844a91aee5
                                  • Opcode Fuzzy Hash: 7ef2f857eb7679f5c7dfd41179abf576cbcd150a00e455f5ad030af86e0139ee
                                  • Instruction Fuzzy Hash: 2C416D36B40104EFDB14EB69D8C8B6A77F2EB88311F158465D40A9B3A4DB71DD86CF50
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 363c7f6f54c898fd1f3d9ec0902d641069af7d26ecb3d33a2b78bc99d9766827
                                  • Instruction ID: 40acef0dd6ce07cf38cc00f97d03ed579221133cffdcf8721de61bdf94154292
                                  • Opcode Fuzzy Hash: 363c7f6f54c898fd1f3d9ec0902d641069af7d26ecb3d33a2b78bc99d9766827
                                  • Instruction Fuzzy Hash: 5741D336B44140EFDB14EF28D8D8B697BF2EB89301F2580A6D01A9B2A5D771DC86CF10
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4439ea4b33e6057f5a1b69f3f5996cae29125867755116af8873a78aabc8e6cd
                                  • Instruction ID: ec21659ff54565a1b41264704be45b8137f0295a25dc7f133cfcb50756123458
                                  • Opcode Fuzzy Hash: 4439ea4b33e6057f5a1b69f3f5996cae29125867755116af8873a78aabc8e6cd
                                  • Instruction Fuzzy Hash: 5E11EBB2D40208EFCB44EFA9E5C879DBBF2EB44310F1084AAD418A3214E7705A86CF40
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 794a0cf1351692fd621fe2152f06884da592695c3268b9e4f6c436bfa4e4e637
                                  • Instruction ID: 8a45f49b9bb2dd6dc93ce88edd985474a0e6a30ca9475d5dd6081d9bdd57776c
                                  • Opcode Fuzzy Hash: 794a0cf1351692fd621fe2152f06884da592695c3268b9e4f6c436bfa4e4e637
                                  • Instruction Fuzzy Hash: 4EF04938A401898BEB09AB68E9849ADB7B2EB44310F018125FD35A72A5DB30D845DF11
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 756b972e8edf4c5576884fb2fcae89b03bb78c41c47eba001a845b315af103d5
                                  • Instruction ID: 6815c536fe03615112eb971b77a7133fb9907559a8e2197114da2b67b89df4fd
                                  • Opcode Fuzzy Hash: 756b972e8edf4c5576884fb2fcae89b03bb78c41c47eba001a845b315af103d5
                                  • Instruction Fuzzy Hash: 27F0E5343092549FC306DB38E868D993FF6FF8E210352019AE44AC7B66CA209C45CF61
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: afff9becb94774f488fbc0ffdac439f6dea6db0553409700a8a706123164077a
                                  • Instruction ID: 60917905e700eb6de9057215b63d1c7cc7d48de90c40442be6e44bf412c1b3d1
                                  • Opcode Fuzzy Hash: afff9becb94774f488fbc0ffdac439f6dea6db0553409700a8a706123164077a
                                  • Instruction Fuzzy Hash: CED0C9357046189FCB00ABB9F81C89937E9AF8D66134104A5F90AC7330EF359C41BB90
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c3114f61555b8ef05c4cc64a0eb64397dbccb44757f860061bd9c25683805a9
                                  • Instruction ID: f8d90520a8ee11690b10bdab65542b6e7723b4bfc1ca3dd83ad1d6f5b07cbfa2
                                  • Opcode Fuzzy Hash: 3c3114f61555b8ef05c4cc64a0eb64397dbccb44757f860061bd9c25683805a9
                                  • Instruction Fuzzy Hash: 59E0121010DBC45FDB07533428B8254BFB1BF4320974A44DBC0D88B5E3D655546CEB12
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 036ed0b67d8e12a794aee5f5fc522e941ad6cb04467c5faae280b91763fc6b33
                                  • Instruction ID: 2fa7ecad69b8c0b0d8ed1fba42f6dde3f4f75dfa51671d290533296ec5bdf080
                                  • Opcode Fuzzy Hash: 036ed0b67d8e12a794aee5f5fc522e941ad6cb04467c5faae280b91763fc6b33
                                  • Instruction Fuzzy Hash: 89C01234A001489FDB052790F4584ACBAB2FB59300F00C015F82572274DA211845AB10
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3bfa06db8637ecc1fc2221d8194723487cc09e2bf37097412e630ed5814e4799
                                  • Instruction ID: 606410528a7c2f040ba77196f1dfbd875abe923f9ca677d2c00b0e4473da2a66
                                  • Opcode Fuzzy Hash: 3bfa06db8637ecc1fc2221d8194723487cc09e2bf37097412e630ed5814e4799
                                  • Instruction Fuzzy Hash: 2FA02230082B0C8AC20232B0200002A338E8A802083C000B8CA0C08A20AA33E0A08C88
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.2587094085.0000000002180000.00000040.00000800.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_2180000_InstallUtil.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 33c116c0fc2a42458fb32a992309a40df7ccea412f500be9fd6b5723016d86e3
                                  • Instruction ID: 0572ca9a5c0cc015cc892b34b770b4cf1dc29eeb62994e9ffeadff11897029cc
                                  • Opcode Fuzzy Hash: 33c116c0fc2a42458fb32a992309a40df7ccea412f500be9fd6b5723016d86e3
                                  • Instruction Fuzzy Hash: B990023108460C8B45502795B90D955779C95585167800051E94D415115B55B4546995