Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FPACcnxAUT.exe

Overview

General Information

Sample name:FPACcnxAUT.exe
renamed because original name is a hash value
Original sample name:861a05fc452ee63e25f43c94238befcc4bfd8c4deded69e26d5081e411ea0023.exe
Analysis ID:1587949
MD5:a125f495ce77c64a377d56fc50e22289
SHA1:4a47347c0691acb1787e39df56b4065898ea9922
SHA256:861a05fc452ee63e25f43c94238befcc4bfd8c4deded69e26d5081e411ea0023
Tags:exeMassLoggeruser-adrian__luca
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • FPACcnxAUT.exe (PID: 6276 cmdline: "C:\Users\user\Desktop\FPACcnxAUT.exe" MD5: A125F495CE77C64A377D56FC50E22289)
    • powershell.exe (PID: 6540 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 1412 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • FPACcnxAUT.exe (PID: 5324 cmdline: "C:\Users\user\Desktop\FPACcnxAUT.exe" MD5: A125F495CE77C64A377D56FC50E22289)
    • FPACcnxAUT.exe (PID: 5668 cmdline: "C:\Users\user\Desktop\FPACcnxAUT.exe" MD5: A125F495CE77C64A377D56FC50E22289)
  • cleanup
{"EXfil Mode": "SMTP", "From": "rock@supamemo.sbs", "Password": "W0kz);5}7i_aesKD", "Server": "mail.supamemo.sbs", "To": "rocee@supamemo.sbs", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xee6f:$a1: get_encryptedPassword
        • 0xf197:$a2: get_encryptedUsername
        • 0xec0a:$a3: get_timePasswordChanged
        • 0xed2b:$a4: get_passwordField
        • 0xee85:$a5: set_encryptedPassword
        • 0x107d6:$a7: get_logins
        • 0x10487:$a8: GetOutlookPasswords
        • 0x10279:$a9: StartKeylogger
        • 0x10726:$a10: KeyLoggerEventArgs
        • 0x102d6:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          Click to see the 17 entries
          SourceRuleDescriptionAuthorStrings
          6.2.FPACcnxAUT.exe.400000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            6.2.FPACcnxAUT.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              6.2.FPACcnxAUT.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                6.2.FPACcnxAUT.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xf06f:$a1: get_encryptedPassword
                • 0xf397:$a2: get_encryptedUsername
                • 0xee0a:$a3: get_timePasswordChanged
                • 0xef2b:$a4: get_passwordField
                • 0xf085:$a5: set_encryptedPassword
                • 0x109d6:$a7: get_logins
                • 0x10687:$a8: GetOutlookPasswords
                • 0x10479:$a9: StartKeylogger
                • 0x10926:$a10: KeyLoggerEventArgs
                • 0x104d6:$a11: KeyLoggerEventArgsEventHandler
                6.2.FPACcnxAUT.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x13ffd:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x134fb:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x13809:$a4: \Orbitum\User Data\Default\Login Data
                • 0x14601:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 20 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FPACcnxAUT.exe", ParentImage: C:\Users\user\Desktop\FPACcnxAUT.exe, ParentProcessId: 6276, ParentProcessName: FPACcnxAUT.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe", ProcessId: 6540, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FPACcnxAUT.exe", ParentImage: C:\Users\user\Desktop\FPACcnxAUT.exe, ParentProcessId: 6276, ParentProcessName: FPACcnxAUT.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe", ProcessId: 6540, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FPACcnxAUT.exe", ParentImage: C:\Users\user\Desktop\FPACcnxAUT.exe, ParentProcessId: 6276, ParentProcessName: FPACcnxAUT.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe", ProcessId: 6540, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-10T19:42:13.368839+010028032742Potentially Bad Traffic192.168.2.549723193.122.6.16880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: FPACcnxAUT.exeAvira: detected
                Source: 0.2.FPACcnxAUT.exe.440b6a8.1.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "rock@supamemo.sbs", "Password": "W0kz);5}7i_aesKD", "Server": "mail.supamemo.sbs", "To": "rocee@supamemo.sbs", "Port": 587}
                Source: FPACcnxAUT.exeReversingLabs: Detection: 76%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: FPACcnxAUT.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: FPACcnxAUT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49725 version: TLS 1.0
                Source: FPACcnxAUT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: gJHR.pdb source: FPACcnxAUT.exe
                Source: Binary string: gJHR.pdbSHA256 source: FPACcnxAUT.exe
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 0776CBC7h0_2_0776C170
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 02699731h6_2_02699480
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 02699E5Ah6_2_02699A40
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 02699E5Ah6_2_02699A30
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 02699E5Ah6_2_02699D87
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 053547C9h6_2_05354520
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 05358830h6_2_05358588
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 053576D0h6_2_05357428
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 0535F700h6_2_0535F458
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 0535E9F8h6_2_0535E750
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 05355929h6_2_05355680
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 053583D8h6_2_05358130
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 0535E5A0h6_2_0535E180
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 0535F2A8h6_2_0535F000
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 053554D1h6_2_05355228
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 05355079h6_2_05354DD0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 05357F80h6_2_05357CD8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 05357278h6_2_05356FD0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 05354C21h6_2_05354978
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 0535FB58h6_2_0535F8B0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 05357B28h6_2_05357880
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 0535EE50h6_2_0535EBA8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 4x nop then jmp 05355E15h6_2_05355AD8
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49723 -> 193.122.6.168:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49725 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: FPACcnxAUT.exe, 00000006.00000002.3455529806.0000000002852000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: FPACcnxAUT.exe, 00000006.00000002.3455529806.00000000027E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: FPACcnxAUT.exe, 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000287C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000287C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: FPACcnxAUT.exe, 00000000.00000002.2223354368.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3455529806.00000000027E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: FPACcnxAUT.exe, 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: FPACcnxAUT.exe, 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                Source: FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725

                System Summary

                barindex
                Source: 6.2.FPACcnxAUT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 6.2.FPACcnxAUT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FPACcnxAUT.exe.440b6a8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FPACcnxAUT.exe.440b6a8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FPACcnxAUT.exe.43f4c88.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FPACcnxAUT.exe.43f4c88.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FPACcnxAUT.exe.440b6a8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FPACcnxAUT.exe.440b6a8.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FPACcnxAUT.exe.43f4c88.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FPACcnxAUT.exe.43f4c88.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: FPACcnxAUT.exe PID: 6276, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: FPACcnxAUT.exe PID: 5668, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_011D3E280_2_011D3E28
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_011DE1040_2_011DE104
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_011D6F900_2_011D6F90
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_05CB0BD40_2_05CB0BD4
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_05CB01200_2_05CB0120
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_05CB01300_2_05CB0130
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_05CB20F00_2_05CB20F0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_05CB72B20_2_05CB72B2
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CDDF00_2_072CDDF0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072C65C00_2_072C65C0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CF4180_2_072CF418
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072C7CAB0_2_072C7CAB
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072C8B280_2_072C8B28
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CE3E80_2_072CE3E8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072C77080_2_072C7708
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CE7E00_2_072CE7E0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CE7D00_2_072CE7D0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CAE080_2_072CAE08
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CAE180_2_072CAE18
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072C65210_2_072C6521
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072C654D0_2_072C654D
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CDDE30_2_072CDDE3
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CF4080_2_072CF408
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CAC010_2_072CAC01
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CAC100_2_072CAC10
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CEB900_2_072CEB90
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CE3D80_2_072CE3D8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072C9A080_2_072C9A08
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072C8A100_2_072C8A10
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072C5A600_2_072C5A60
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CB2790_2_072CB279
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072C72710_2_072C7271
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072C8ACA0_2_072C8ACA
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072C99F90_2_072C99F9
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CB0A80_2_072CB0A8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CE0A80_2_072CE0A8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CE0980_2_072CE098
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CB0990_2_072CB099
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_0776E1000_2_0776E100
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_077600400_2_07760040
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_07768DB80_2_07768DB8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_077605F00_2_077605F0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_077605E00_2_077605E0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_0776A0600_2_0776A060
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_077600070_2_07760007
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_07769A900_2_07769A90
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_077679500_2_07767950
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_07CA7A080_2_07CA7A08
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_07CA74480_2_07CA7448
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_07CA74580_2_07CA7458
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_026927B56_2_026927B5
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0269C5306_2_0269C530
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_02692DD16_2_02692DD1
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_026994806_2_02699480
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0269C5216_2_0269C521
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0269946F6_2_0269946F
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053561386_2_05356138
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535BC606_2_0535BC60
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535AF006_2_0535AF00
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053589E06_2_053589E0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053545206_2_05354520
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535450F6_2_0535450F
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053585796_2_05358579
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053585886_2_05358588
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053574286_2_05357428
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053574186_2_05357418
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535F4586_2_0535F458
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535F4486_2_0535F448
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535E7506_2_0535E750
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535E7406_2_0535E740
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535566F6_2_0535566F
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053556806_2_05355680
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053581306_2_05358130
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053561336_2_05356133
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053581206_2_05358120
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535E1806_2_0535E180
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053500066_2_05350006
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535F0006_2_0535F000
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053503306_2_05350330
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053503206_2_05350320
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053513A86_2_053513A8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053552286_2_05355228
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535521A6_2_0535521A
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_05354DD06_2_05354DD0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_05354DC06_2_05354DC0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_05350CD86_2_05350CD8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_05357CD86_2_05357CD8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_05357CC86_2_05357CC8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_05353F7A6_2_05353F7A
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535EFF06_2_0535EFF0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_05356FD06_2_05356FD0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_05356FC16_2_05356FC1
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_05356FC36_2_05356FC3
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053549786_2_05354978
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053549696_2_05354969
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053589D06_2_053589D0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053509C66_2_053509C6
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053578716_2_05357871
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535F8B06_2_0535F8B0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535F8A06_2_0535F8A0
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_053578806_2_05357880
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535EBA86_2_0535EBA8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0535EB986_2_0535EB98
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_05350AB86_2_05350AB8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_05355AD86_2_05355AD8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_05355ACA6_2_05355ACA
                Source: FPACcnxAUT.exe, 00000000.00000002.2228690552.0000000007FE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs FPACcnxAUT.exe
                Source: FPACcnxAUT.exe, 00000000.00000002.2223354368.0000000002BFC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs FPACcnxAUT.exe
                Source: FPACcnxAUT.exe, 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs FPACcnxAUT.exe
                Source: FPACcnxAUT.exe, 00000000.00000002.2217666465.0000000000D8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs FPACcnxAUT.exe
                Source: FPACcnxAUT.exe, 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs FPACcnxAUT.exe
                Source: FPACcnxAUT.exe, 00000000.00000002.2229466079.000000000B7A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs FPACcnxAUT.exe
                Source: FPACcnxAUT.exe, 00000000.00000000.2192865235.0000000000792000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegJHR.exe: vs FPACcnxAUT.exe
                Source: FPACcnxAUT.exe, 00000006.00000002.3454152218.00000000008F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs FPACcnxAUT.exe
                Source: FPACcnxAUT.exe, 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs FPACcnxAUT.exe
                Source: FPACcnxAUT.exeBinary or memory string: OriginalFilenamegJHR.exe: vs FPACcnxAUT.exe
                Source: FPACcnxAUT.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 6.2.FPACcnxAUT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 6.2.FPACcnxAUT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FPACcnxAUT.exe.440b6a8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FPACcnxAUT.exe.440b6a8.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FPACcnxAUT.exe.43f4c88.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FPACcnxAUT.exe.43f4c88.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FPACcnxAUT.exe.440b6a8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FPACcnxAUT.exe.440b6a8.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FPACcnxAUT.exe.43f4c88.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FPACcnxAUT.exe.43f4c88.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: FPACcnxAUT.exe PID: 6276, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: FPACcnxAUT.exe PID: 5668, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: FPACcnxAUT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/6@2/2
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FPACcnxAUT.exe.logJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5176:120:WilError_03
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ko1iax22.vce.ps1Jump to behavior
                Source: FPACcnxAUT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: FPACcnxAUT.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: FPACcnxAUT.exe, 00000006.00000002.3456639639.000000000380D000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3455529806.00000000028FD000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3455529806.00000000028CE000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3455529806.00000000028BE000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3455529806.00000000028DC000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3455529806.00000000028F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: FPACcnxAUT.exeReversingLabs: Detection: 76%
                Source: unknownProcess created: C:\Users\user\Desktop\FPACcnxAUT.exe "C:\Users\user\Desktop\FPACcnxAUT.exe"
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess created: C:\Users\user\Desktop\FPACcnxAUT.exe "C:\Users\user\Desktop\FPACcnxAUT.exe"
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess created: C:\Users\user\Desktop\FPACcnxAUT.exe "C:\Users\user\Desktop\FPACcnxAUT.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess created: C:\Users\user\Desktop\FPACcnxAUT.exe "C:\Users\user\Desktop\FPACcnxAUT.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess created: C:\Users\user\Desktop\FPACcnxAUT.exe "C:\Users\user\Desktop\FPACcnxAUT.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: FPACcnxAUT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: FPACcnxAUT.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: FPACcnxAUT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: gJHR.pdb source: FPACcnxAUT.exe
                Source: Binary string: gJHR.pdbSHA256 source: FPACcnxAUT.exe
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_05CB91D2 push dword ptr [edx+edx-75h]; iretd 0_2_05CB91B8
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CD5EA push esi; ret 0_2_072CD5ED
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_072CDDE0 push eax; retf 0_2_072CDDE1
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_07CA4F7A pushad ; iretd 0_2_07CA4F81
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_07CABA98 push esp; iretd 0_2_07CABAA5
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_07CA48E0 pushad ; retf 0_2_07CA48E1
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 0_2_07CA4848 push eax; retf 0_2_07CA4849
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeCode function: 6_2_0269B3A8 push eax; iretd 6_2_0269B445
                Source: FPACcnxAUT.exeStatic PE information: section name: .text entropy: 7.5113467554559366

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: FPACcnxAUT.exe PID: 6276, type: MEMORYSTR
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: 11D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: 2BC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: 2AE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: 92A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: 7410000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: A2A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: B2A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: B800000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: C800000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: 2560000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: 27E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: 2560000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 240000Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239867Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239748Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239640Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239530Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239421Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239312Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239203Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239090Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238984Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238867Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238755Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238625Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238515Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238393Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238187Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeWindow / User API: threadDelayed 969Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeWindow / User API: threadDelayed 1776Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6832Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2864Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -11068046444225724s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -240000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -239867s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -239748s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -239640s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -239530s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -239421s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -239312s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -239203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -239090s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -238984s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -238867s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -238755s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -238625s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -238515s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -238393s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2460Thread sleep time: -238187s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2640Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exe TID: 2220Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2920Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 240000Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239867Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239748Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239640Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239530Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239421Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239312Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239203Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 239090Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238984Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238867Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238755Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238625Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238515Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238393Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 238187Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: FPACcnxAUT.exe, 00000006.00000002.3454351564.0000000000B26000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll7
                Source: FPACcnxAUT.exe, 00000000.00000002.2228487280.0000000007E06000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: FPACcnxAUT.exe, 00000000.00000002.2228487280.0000000007E06000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe"
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeMemory written: C:\Users\user\Desktop\FPACcnxAUT.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess created: C:\Users\user\Desktop\FPACcnxAUT.exe "C:\Users\user\Desktop\FPACcnxAUT.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeProcess created: C:\Users\user\Desktop\FPACcnxAUT.exe "C:\Users\user\Desktop\FPACcnxAUT.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Users\user\Desktop\FPACcnxAUT.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Users\user\Desktop\FPACcnxAUT.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.2.FPACcnxAUT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.440b6a8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.43f4c88.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.440b6a8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.43f4c88.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FPACcnxAUT.exe PID: 6276, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FPACcnxAUT.exe PID: 5668, type: MEMORYSTR
                Source: Yara matchFile source: 6.2.FPACcnxAUT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.440b6a8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.43f4c88.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.440b6a8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.43f4c88.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FPACcnxAUT.exe PID: 6276, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FPACcnxAUT.exe PID: 5668, type: MEMORYSTR
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\FPACcnxAUT.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 6.2.FPACcnxAUT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.440b6a8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.43f4c88.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.440b6a8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.43f4c88.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3455529806.0000000002934000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FPACcnxAUT.exe PID: 6276, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FPACcnxAUT.exe PID: 5668, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.2.FPACcnxAUT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.440b6a8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.43f4c88.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.440b6a8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.43f4c88.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FPACcnxAUT.exe PID: 6276, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FPACcnxAUT.exe PID: 5668, type: MEMORYSTR
                Source: Yara matchFile source: 6.2.FPACcnxAUT.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.440b6a8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.43f4c88.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.440b6a8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FPACcnxAUT.exe.43f4c88.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FPACcnxAUT.exe PID: 6276, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FPACcnxAUT.exe PID: 5668, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                111
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services1
                Email Collection
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                11
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                Obfuscated Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Software Packing
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSync13
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                FPACcnxAUT.exe76%ReversingLabsByteCode-MSIL.Backdoor.njRAT
                FPACcnxAUT.exe100%AviraHEUR/AGEN.1362915
                FPACcnxAUT.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.96.1
                truefalse
                  high
                  checkip.dyndns.com
                  193.122.6.168
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://reallyfreegeoip.org/xml/8.46.123.189lFPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.comdFPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.org/qFPACcnxAUT.exe, 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgdFPACcnxAUT.exe, 00000006.00000002.3455529806.000000000287C000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/8.46.123.189dFPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://reallyfreegeoip.orgFPACcnxAUT.exe, 00000006.00000002.3455529806.000000000287C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.orgdFPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.orgFPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgFPACcnxAUT.exe, 00000006.00000002.3455529806.0000000002852000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.comFPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://checkip.dyndns.org/dFPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFPACcnxAUT.exe, 00000000.00000002.2223354368.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3455529806.00000000027E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.telegram.org/bot-/sendDocument?chat_id=FPACcnxAUT.exe, 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                    high
                                                    https://reallyfreegeoip.org/xml/FPACcnxAUT.exe, 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3455529806.000000000285E000.00000004.00000800.00020000.00000000.sdmp, FPACcnxAUT.exe, 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      193.122.6.168
                                                      checkip.dyndns.comUnited States
                                                      31898ORACLE-BMC-31898USfalse
                                                      104.21.96.1
                                                      reallyfreegeoip.orgUnited States
                                                      13335CLOUDFLARENETUSfalse
                                                      Joe Sandbox version:42.0.0 Malachite
                                                      Analysis ID:1587949
                                                      Start date and time:2025-01-10 19:41:02 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 6m 26s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:10
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:FPACcnxAUT.exe
                                                      renamed because original name is a hash value
                                                      Original Sample Name:861a05fc452ee63e25f43c94238befcc4bfd8c4deded69e26d5081e411ea0023.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@9/6@2/2
                                                      EGA Information:
                                                      • Successful, ratio: 50%
                                                      HCA Information:
                                                      • Successful, ratio: 99%
                                                      • Number of executed functions: 268
                                                      • Number of non-executed functions: 33
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                      • Excluded IPs from analysis (whitelisted): 20.190.160.14, 20.190.160.20, 40.126.32.134, 40.126.32.133, 40.126.32.136, 40.126.32.68, 40.126.32.74, 40.126.32.138, 13.107.246.45, 2.23.242.162, 20.109.210.53
                                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                      • Execution Graph export aborted for target FPACcnxAUT.exe, PID 5668 because it is empty
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size getting too big, too many NtCreateKey calls found.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                      • VT rate limit hit for: FPACcnxAUT.exe
                                                      TimeTypeDescription
                                                      13:42:09API Interceptor17x Sleep call for process: FPACcnxAUT.exe modified
                                                      13:42:12API Interceptor24x Sleep call for process: powershell.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      193.122.6.168fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      104.21.96.1zE1VxVoZ3W.exeGet hashmaliciousFormBookBrowse
                                                      • www.aonline.top/fqlg/
                                                      QUOTATION#070125-ELITE MARINE .exeGet hashmaliciousFormBookBrowse
                                                      • www.mzkd6gp5.top/3u0p/
                                                      SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                      • pelisplus.so/administrator/index.php
                                                      Recibos.exeGet hashmaliciousFormBookBrowse
                                                      • www.mffnow.info/1a34/
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      reallyfreegeoip.orgjxy62Zm6c4.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.96.1
                                                      fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.96.1
                                                      RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.16.1
                                                      YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.112.1
                                                      xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 104.21.112.1
                                                      AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.64.1
                                                      eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.64.1
                                                      MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.96.1
                                                      3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.80.1
                                                      SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.16.1
                                                      checkip.dyndns.comjxy62Zm6c4.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 158.101.44.242
                                                      fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 132.226.247.73
                                                      RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 193.122.6.168
                                                      YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 193.122.6.168
                                                      xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 132.226.8.169
                                                      AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 193.122.6.168
                                                      eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 132.226.247.73
                                                      MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 158.101.44.242
                                                      3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 132.226.8.169
                                                      SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 193.122.6.168
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      ORACLE-BMC-31898USjxy62Zm6c4.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 158.101.44.242
                                                      fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 193.122.6.168
                                                      RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 193.122.6.168
                                                      YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 193.122.6.168
                                                      AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 193.122.6.168
                                                      MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 158.101.44.242
                                                      SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 193.122.6.168
                                                      RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 158.101.44.242
                                                      zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 193.122.130.0
                                                      ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 193.122.6.168
                                                      CLOUDFLARENETUSjxy62Zm6c4.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.96.1
                                                      frosty.arm.elfGet hashmaliciousMiraiBrowse
                                                      • 104.23.145.230
                                                      Message.emlGet hashmaliciousUnknownBrowse
                                                      • 1.1.1.1
                                                      s2Jg1MAahY.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.12.205
                                                      fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.96.1
                                                      https://eu2.contabostorage.com/69e36f1a5de941bb877627f90e79fd6d:gip/document.html#phishme@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                      • 1.1.1.1
                                                      https://eu2.contabostorage.com/69e36f1a5de941bb877627f90e79fd6d:gip/document.html#phishme@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                      • 172.64.147.188
                                                      jd4t3R7hOq.exeGet hashmaliciousAzorultBrowse
                                                      • 104.21.75.48
                                                      RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.16.1
                                                      6mllsKaB2q.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • 172.67.196.114
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      54328bd36c14bd82ddaa0c04b25ed9adjxy62Zm6c4.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.96.1
                                                      fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.96.1
                                                      RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.96.1
                                                      YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.96.1
                                                      xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 104.21.96.1
                                                      AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.96.1
                                                      eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.96.1
                                                      MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.96.1
                                                      3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.96.1
                                                      SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.96.1
                                                      No context
                                                      Process:C:\Users\user\Desktop\FPACcnxAUT.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1415
                                                      Entropy (8bit):5.352427679901606
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPE4KMRaKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPHKMRatHo6hAH4
                                                      MD5:97AD91F1C1F572C945DA12233082171D
                                                      SHA1:D5E33DDAB37E32E416FC40419FB26B3C0563519D
                                                      SHA-256:3F64591E0447E6F5034BC69A8A8D4C7ED36DAC5FE1E408401AE1B98F0D915F7E
                                                      SHA-512:8FAEED342DADC17571F711DDC1BE67C79A51CA5BD56B5DA13E472ED45FC4EC6F1DC704BA92E81E97F5ECFD73F3D88F9B9CD9AE4EADDF993BFF826627215FBBCE
                                                      Malicious:true
                                                      Reputation:moderate, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Data\1b8c564fd69668e6e62d136259980d9e\System.Data.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fc
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):2232
                                                      Entropy (8bit):5.380134126512796
                                                      Encrypted:false
                                                      SSDEEP:48:+WSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMugeC/ZPUyus:+LHxvIIwLgZ2KRHWLOug8s
                                                      MD5:4E5AEFBECDD6A24C184CDD8FDAAD6B84
                                                      SHA1:0DE69FB509C5811701792B3876F5147C23E6B90B
                                                      SHA-256:F53109B6058DB6F19701209D49D943D7A95897C89F267B81684CFB8CDE73A83C
                                                      SHA-512:15CB74549A26E726FBC89CCE29B9B79BB3CE7E9DFAE02B822A7C2A29370DC16C660BFB91E9B4820F6DC1E60E9C8AE1A2BA1B408257FD43ECD5F565B8F6A0BE85
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.502075394903642
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      • DOS Executable Generic (2002/1) 0.01%
                                                      File name:FPACcnxAUT.exe
                                                      File size:713'728 bytes
                                                      MD5:a125f495ce77c64a377d56fc50e22289
                                                      SHA1:4a47347c0691acb1787e39df56b4065898ea9922
                                                      SHA256:861a05fc452ee63e25f43c94238befcc4bfd8c4deded69e26d5081e411ea0023
                                                      SHA512:1c1b573d30a794d9bfe5b07d84c739b8e515bf06671457cfd222a97ed474c02e5856bf57c31fbddcbd26785f2ac6b1dc6dbd3a3594bdf14983366474bf2e5070
                                                      SSDEEP:12288:3AMPku+l0CPP6+sHEmMExNW7HN5TLZVO+GFvGMHp5:fPd+psLPW/Pm+GwSp5
                                                      TLSH:14E4AEC0373AB701CE7CA6708926ECB813652E787040F9E66DDE27D7769D7126A08F16
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Oag..............0.................. ........@.. .......................@............@................................
                                                      Icon Hash:00928e8e8686b000
                                                      Entrypoint:0x4af7f6
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x67614FAF [Tue Dec 17 10:17:19 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xaf7a20x4f.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xb00000x608.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xad5140x54.text
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xad7fc0xad800a3d410da4efb1ed76d8c1c16df5092d0False0.7480102890850144data7.5113467554559366IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xb00000x6080x8000457c0b70545cc05b937868cfe2bd07aFalse0.3359375data3.4229377563755117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xb20000xc0x200a8b5210cb053048713fcd132c09846d0False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_VERSION0xb00900x378data0.43243243243243246
                                                      RT_MANIFEST0xb04180x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2025-01-10T19:42:13.368839+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549723193.122.6.16880TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 10, 2025 19:42:12.414597034 CET4972380192.168.2.5193.122.6.168
                                                      Jan 10, 2025 19:42:12.419583082 CET8049723193.122.6.168192.168.2.5
                                                      Jan 10, 2025 19:42:12.419668913 CET4972380192.168.2.5193.122.6.168
                                                      Jan 10, 2025 19:42:12.419900894 CET4972380192.168.2.5193.122.6.168
                                                      Jan 10, 2025 19:42:12.424889088 CET8049723193.122.6.168192.168.2.5
                                                      Jan 10, 2025 19:42:13.066999912 CET8049723193.122.6.168192.168.2.5
                                                      Jan 10, 2025 19:42:13.074471951 CET4972380192.168.2.5193.122.6.168
                                                      Jan 10, 2025 19:42:13.080481052 CET8049723193.122.6.168192.168.2.5
                                                      Jan 10, 2025 19:42:13.321738958 CET8049723193.122.6.168192.168.2.5
                                                      Jan 10, 2025 19:42:13.348870993 CET49725443192.168.2.5104.21.96.1
                                                      Jan 10, 2025 19:42:13.348923922 CET44349725104.21.96.1192.168.2.5
                                                      Jan 10, 2025 19:42:13.348984957 CET49725443192.168.2.5104.21.96.1
                                                      Jan 10, 2025 19:42:13.358258963 CET49725443192.168.2.5104.21.96.1
                                                      Jan 10, 2025 19:42:13.358284950 CET44349725104.21.96.1192.168.2.5
                                                      Jan 10, 2025 19:42:13.368839025 CET4972380192.168.2.5193.122.6.168
                                                      Jan 10, 2025 19:42:13.823967934 CET44349725104.21.96.1192.168.2.5
                                                      Jan 10, 2025 19:42:13.824045897 CET49725443192.168.2.5104.21.96.1
                                                      Jan 10, 2025 19:42:13.832190990 CET49725443192.168.2.5104.21.96.1
                                                      Jan 10, 2025 19:42:13.832211971 CET44349725104.21.96.1192.168.2.5
                                                      Jan 10, 2025 19:42:13.832606077 CET44349725104.21.96.1192.168.2.5
                                                      Jan 10, 2025 19:42:13.884463072 CET49725443192.168.2.5104.21.96.1
                                                      Jan 10, 2025 19:42:13.951688051 CET49725443192.168.2.5104.21.96.1
                                                      Jan 10, 2025 19:42:13.995333910 CET44349725104.21.96.1192.168.2.5
                                                      Jan 10, 2025 19:42:14.062015057 CET44349725104.21.96.1192.168.2.5
                                                      Jan 10, 2025 19:42:14.062087059 CET44349725104.21.96.1192.168.2.5
                                                      Jan 10, 2025 19:42:14.062151909 CET49725443192.168.2.5104.21.96.1
                                                      Jan 10, 2025 19:42:14.247715950 CET49725443192.168.2.5104.21.96.1
                                                      Jan 10, 2025 19:43:18.289076090 CET8049723193.122.6.168192.168.2.5
                                                      Jan 10, 2025 19:43:18.289158106 CET4972380192.168.2.5193.122.6.168
                                                      Jan 10, 2025 19:43:53.338069916 CET4972380192.168.2.5193.122.6.168
                                                      Jan 10, 2025 19:43:53.345043898 CET8049723193.122.6.168192.168.2.5
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 10, 2025 19:42:12.393433094 CET6502653192.168.2.51.1.1.1
                                                      Jan 10, 2025 19:42:12.400665998 CET53650261.1.1.1192.168.2.5
                                                      Jan 10, 2025 19:42:13.339987993 CET5842253192.168.2.51.1.1.1
                                                      Jan 10, 2025 19:42:13.347769022 CET53584221.1.1.1192.168.2.5
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jan 10, 2025 19:42:12.393433094 CET192.168.2.51.1.1.10x9d5fStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:42:13.339987993 CET192.168.2.51.1.1.10xe82dStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jan 10, 2025 19:42:12.400665998 CET1.1.1.1192.168.2.50x9d5fNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                      Jan 10, 2025 19:42:12.400665998 CET1.1.1.1192.168.2.50x9d5fNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:42:12.400665998 CET1.1.1.1192.168.2.50x9d5fNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:42:12.400665998 CET1.1.1.1192.168.2.50x9d5fNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:42:12.400665998 CET1.1.1.1192.168.2.50x9d5fNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:42:12.400665998 CET1.1.1.1192.168.2.50x9d5fNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:42:13.347769022 CET1.1.1.1192.168.2.50xe82dNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:42:13.347769022 CET1.1.1.1192.168.2.50xe82dNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:42:13.347769022 CET1.1.1.1192.168.2.50xe82dNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:42:13.347769022 CET1.1.1.1192.168.2.50xe82dNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:42:13.347769022 CET1.1.1.1192.168.2.50xe82dNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:42:13.347769022 CET1.1.1.1192.168.2.50xe82dNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:42:13.347769022 CET1.1.1.1192.168.2.50xe82dNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                      • reallyfreegeoip.org
                                                      • checkip.dyndns.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.549723193.122.6.168805668C:\Users\user\Desktop\FPACcnxAUT.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:42:12.419900894 CET151OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                      Host: checkip.dyndns.org
                                                      Connection: Keep-Alive
                                                      Jan 10, 2025 19:42:13.066999912 CET273INHTTP/1.1 200 OK
                                                      Date: Fri, 10 Jan 2025 18:42:12 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 104
                                                      Connection: keep-alive
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                      Jan 10, 2025 19:42:13.074471951 CET127OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                      Host: checkip.dyndns.org
                                                      Jan 10, 2025 19:42:13.321738958 CET273INHTTP/1.1 200 OK
                                                      Date: Fri, 10 Jan 2025 18:42:13 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 104
                                                      Connection: keep-alive
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.549725104.21.96.14435668C:\Users\user\Desktop\FPACcnxAUT.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-10 18:42:13 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                      Host: reallyfreegeoip.org
                                                      Connection: Keep-Alive
                                                      2025-01-10 18:42:14 UTC859INHTTP/1.1 200 OK
                                                      Date: Fri, 10 Jan 2025 18:42:14 GMT
                                                      Content-Type: text/xml
                                                      Content-Length: 362
                                                      Connection: close
                                                      Age: 1849323
                                                      Cache-Control: max-age=31536000
                                                      cf-cache-status: HIT
                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gqkIYqT7kKR61Y2w6A4bbnQuWNOyX5RFis38NkR7fExOnJ73WEuiyTkh6JFPVtfJQmmpcFa7RTgkyLv%2Bh%2BbVn1DzRqiH%2Be4IpeXJILgaaWOOKn5eTB7Rf%2Fq5HkkzqCTLkf%2BvGiBf"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8ffece458c2ede9a-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1632&min_rtt=1632&rtt_var=612&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1789215&cwnd=209&unsent_bytes=0&cid=15b90f4d01b49b5d&ts=249&x=0"
                                                      2025-01-10 18:42:14 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:13:42:08
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\Desktop\FPACcnxAUT.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\FPACcnxAUT.exe"
                                                      Imagebase:0x790000
                                                      File size:713'728 bytes
                                                      MD5 hash:A125F495CE77C64A377D56FC50E22289
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2224448810.00000000043F4000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2224448810.0000000004434000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:13:42:10
                                                      Start date:10/01/2025
                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FPACcnxAUT.exe"
                                                      Imagebase:0x970000
                                                      File size:433'152 bytes
                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:13:42:10
                                                      Start date:10/01/2025
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:13:42:10
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\Desktop\FPACcnxAUT.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Users\user\Desktop\FPACcnxAUT.exe"
                                                      Imagebase:0x310000
                                                      File size:713'728 bytes
                                                      MD5 hash:A125F495CE77C64A377D56FC50E22289
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:13:42:10
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\Desktop\FPACcnxAUT.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\FPACcnxAUT.exe"
                                                      Imagebase:0x4b0000
                                                      File size:713'728 bytes
                                                      MD5 hash:A125F495CE77C64A377D56FC50E22289
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000006.00000002.3454022274.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3455529806.0000000002934000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:false

                                                      Target ID:7
                                                      Start time:13:42:13
                                                      Start date:10/01/2025
                                                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                      Imagebase:0x7ff6ef0c0000
                                                      File size:496'640 bytes
                                                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                      Has elevated privileges:true
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:13%
                                                        Dynamic/Decrypted Code Coverage:99.2%
                                                        Signature Coverage:2.6%
                                                        Total number of Nodes:382
                                                        Total number of Limit Nodes:9
                                                        execution_graph 56609 776acd7 56610 776abcf 56609->56610 56611 776accb 56610->56611 56614 776bbc0 56610->56614 56619 776bbb0 56610->56619 56615 776bbd5 56614->56615 56624 776bc66 56615->56624 56647 776bbf0 56615->56647 56616 776bbe7 56616->56611 56620 776bbc0 56619->56620 56622 776bc66 12 API calls 56620->56622 56623 776bbf0 12 API calls 56620->56623 56621 776bbe7 56621->56611 56622->56621 56623->56621 56625 776bbf4 56624->56625 56627 776bc69 56624->56627 56626 776bc22 56625->56626 56669 776c122 56625->56669 56673 776c565 56625->56673 56677 776c4c7 56625->56677 56681 776c6d8 56625->56681 56690 776c39b 56625->56690 56695 776c8dd 56625->56695 56699 776c29d 56625->56699 56704 776bfbc 56625->56704 56710 776c2bc 56625->56710 56716 776c631 56625->56716 56720 776c472 56625->56720 56724 776c3f7 56625->56724 56728 776c976 56625->56728 56733 776c36b 56625->56733 56742 776c10a 56625->56742 56749 776c1e0 56625->56749 56753 776c100 56625->56753 56757 776c1a3 56625->56757 56764 776c682 56625->56764 56626->56616 56627->56616 56648 776bc1a 56647->56648 56649 776c976 2 API calls 56648->56649 56650 776c3f7 2 API calls 56648->56650 56651 776c472 2 API calls 56648->56651 56652 776c631 2 API calls 56648->56652 56653 776c2bc 4 API calls 56648->56653 56654 776bfbc 2 API calls 56648->56654 56655 776c29d 2 API calls 56648->56655 56656 776c8dd 2 API calls 56648->56656 56657 776c39b 2 API calls 56648->56657 56658 776c6d8 4 API calls 56648->56658 56659 776c4c7 2 API calls 56648->56659 56660 776bc22 56648->56660 56661 776c565 2 API calls 56648->56661 56662 776c122 2 API calls 56648->56662 56663 776c682 2 API calls 56648->56663 56664 776c1a3 4 API calls 56648->56664 56665 776c100 2 API calls 56648->56665 56666 776c1e0 2 API calls 56648->56666 56667 776c10a 4 API calls 56648->56667 56668 776c36b 4 API calls 56648->56668 56649->56660 56650->56660 56651->56660 56652->56660 56653->56660 56654->56660 56655->56660 56656->56660 56657->56660 56658->56660 56659->56660 56660->56616 56661->56660 56662->56660 56663->56660 56664->56660 56665->56660 56666->56660 56667->56660 56668->56660 56768 776a498 56669->56768 56772 776a490 56669->56772 56670 776c150 56670->56626 56674 776c0f6 56673->56674 56776 77699e0 56674->56776 56780 77699d9 56674->56780 56678 776c0f6 56677->56678 56679 77699e0 ResumeThread 56678->56679 56680 77699d9 ResumeThread 56678->56680 56679->56678 56680->56678 56682 776c6de 56681->56682 56683 776c98d 56682->56683 56685 776c0f6 56682->56685 56686 776a490 WriteProcessMemory 56683->56686 56687 776a498 WriteProcessMemory 56683->56687 56684 776c9ae 56688 77699e0 ResumeThread 56685->56688 56689 77699d9 ResumeThread 56685->56689 56686->56684 56687->56684 56688->56685 56689->56685 56691 776c3a1 56690->56691 56784 776a580 56691->56784 56788 776a588 56691->56788 56692 776c3c4 56696 776c0f6 56695->56696 56697 77699e0 ResumeThread 56696->56697 56698 77699d9 ResumeThread 56696->56698 56697->56696 56698->56696 56700 776c737 56699->56700 56792 7769fa0 56700->56792 56796 7769f98 56700->56796 56701 776c755 56706 776bfbf 56704->56706 56705 776cbb6 56705->56626 56706->56705 56800 776a714 56706->56800 56804 776a720 56706->56804 56808 7769ec0 56710->56808 56812 7769ec8 56710->56812 56711 776c0f6 56714 77699e0 ResumeThread 56711->56714 56715 77699d9 ResumeThread 56711->56715 56714->56711 56715->56711 56717 776c0f6 56716->56717 56717->56716 56718 77699e0 ResumeThread 56717->56718 56719 77699d9 ResumeThread 56717->56719 56718->56717 56719->56717 56721 776c0f6 56720->56721 56722 77699e0 ResumeThread 56721->56722 56723 77699d9 ResumeThread 56721->56723 56722->56721 56723->56721 56725 776c0f6 56724->56725 56726 77699e0 ResumeThread 56725->56726 56727 77699d9 ResumeThread 56725->56727 56726->56725 56727->56725 56729 776c97c 56728->56729 56731 776a490 WriteProcessMemory 56729->56731 56732 776a498 WriteProcessMemory 56729->56732 56730 776c9ae 56731->56730 56732->56730 56734 776c6df 56733->56734 56735 776c0f6 56734->56735 56736 776c98d 56734->56736 56740 77699e0 ResumeThread 56735->56740 56741 77699d9 ResumeThread 56735->56741 56738 776a490 WriteProcessMemory 56736->56738 56739 776a498 WriteProcessMemory 56736->56739 56737 776c9ae 56738->56737 56739->56737 56740->56735 56741->56735 56743 776c1a6 56742->56743 56745 7769ec0 Wow64SetThreadContext 56743->56745 56746 7769ec8 Wow64SetThreadContext 56743->56746 56744 776c0f6 56747 77699e0 ResumeThread 56744->56747 56748 77699d9 ResumeThread 56744->56748 56745->56744 56746->56744 56747->56744 56748->56744 56751 776a490 WriteProcessMemory 56749->56751 56752 776a498 WriteProcessMemory 56749->56752 56750 776c204 56750->56626 56751->56750 56752->56750 56754 776c0f6 56753->56754 56755 77699e0 ResumeThread 56754->56755 56756 77699d9 ResumeThread 56754->56756 56755->56754 56756->56754 56758 776c1a6 56757->56758 56760 7769ec0 Wow64SetThreadContext 56758->56760 56761 7769ec8 Wow64SetThreadContext 56758->56761 56759 776c0f6 56762 77699e0 ResumeThread 56759->56762 56763 77699d9 ResumeThread 56759->56763 56760->56759 56761->56759 56762->56759 56763->56759 56765 776c0f6 56764->56765 56766 77699e0 ResumeThread 56765->56766 56767 77699d9 ResumeThread 56765->56767 56766->56765 56767->56765 56769 776a4e0 WriteProcessMemory 56768->56769 56771 776a537 56769->56771 56771->56670 56773 776a4e0 WriteProcessMemory 56772->56773 56775 776a537 56773->56775 56775->56670 56777 7769a20 ResumeThread 56776->56777 56779 7769a51 56777->56779 56779->56674 56781 7769a20 ResumeThread 56780->56781 56783 7769a51 56781->56783 56783->56674 56785 776a5d3 ReadProcessMemory 56784->56785 56787 776a617 56785->56787 56787->56692 56789 776a5d3 ReadProcessMemory 56788->56789 56791 776a617 56789->56791 56791->56692 56793 7769fe0 VirtualAllocEx 56792->56793 56795 776a01d 56793->56795 56795->56701 56797 7769fe0 VirtualAllocEx 56796->56797 56799 776a01d 56797->56799 56799->56701 56801 776a7a9 CreateProcessA 56800->56801 56803 776a96b 56801->56803 56805 776a7a9 CreateProcessA 56804->56805 56807 776a96b 56805->56807 56809 7769f0d Wow64SetThreadContext 56808->56809 56811 7769f55 56809->56811 56811->56711 56813 7769f0d Wow64SetThreadContext 56812->56813 56815 7769f55 56813->56815 56815->56711 56843 7ca0888 56847 7ca08c8 56843->56847 56853 7ca08b9 56843->56853 56844 7ca08a7 56848 7ca08f6 56847->56848 56850 11d7678 2 API calls 56848->56850 56851 11d8bf7 2 API calls 56848->56851 56852 11d8c51 2 API calls 56848->56852 56849 7ca092c 56849->56844 56850->56849 56851->56849 56852->56849 56854 7ca08c8 56853->56854 56856 11d7678 2 API calls 56854->56856 56857 11d8bf7 2 API calls 56854->56857 56858 11d8c51 2 API calls 56854->56858 56855 7ca092c 56855->56844 56856->56855 56857->56855 56858->56855 56859 d7d1b4 56860 d7d1cc 56859->56860 56861 d7d226 56860->56861 56866 5cb1fa8 56860->56866 56870 5cb2cf9 56860->56870 56879 5cb1f99 56860->56879 56883 5cb0bac 56860->56883 56867 5cb1fce 56866->56867 56868 5cb0bac CallWindowProcW 56867->56868 56869 5cb1fef 56868->56869 56869->56861 56873 5cb2d35 56870->56873 56871 5cb2d69 56905 5cb0cd4 56871->56905 56873->56871 56874 5cb2d59 56873->56874 56892 5cb2f5c 56874->56892 56897 5cb2e90 56874->56897 56901 5cb2e80 56874->56901 56875 5cb2d67 56880 5cb1fa2 56879->56880 56881 5cb0bac CallWindowProcW 56880->56881 56882 5cb1fef 56881->56882 56882->56861 56884 5cb0bb7 56883->56884 56885 5cb2d69 56884->56885 56887 5cb2d59 56884->56887 56886 5cb0cd4 CallWindowProcW 56885->56886 56888 5cb2d67 56886->56888 56889 5cb2f5c CallWindowProcW 56887->56889 56890 5cb2e80 CallWindowProcW 56887->56890 56891 5cb2e90 CallWindowProcW 56887->56891 56889->56888 56890->56888 56891->56888 56893 5cb2f1a 56892->56893 56894 5cb2f6a 56892->56894 56909 5cb2f48 56893->56909 56895 5cb2f30 56895->56875 56898 5cb2ea4 56897->56898 56900 5cb2f48 CallWindowProcW 56898->56900 56899 5cb2f30 56899->56875 56900->56899 56902 5cb2ea4 56901->56902 56904 5cb2f48 CallWindowProcW 56902->56904 56903 5cb2f30 56903->56875 56904->56903 56906 5cb0cdf 56905->56906 56907 5cb444a CallWindowProcW 56906->56907 56908 5cb43f9 56906->56908 56907->56908 56908->56875 56910 5cb2f59 56909->56910 56912 5cb4380 56909->56912 56910->56895 56913 5cb0cd4 CallWindowProcW 56912->56913 56914 5cb439a 56913->56914 56914->56910 56816 72cdb18 56817 72cdb3f 56816->56817 56821 72cddf0 56817->56821 56825 72cdde3 56817->56825 56818 72cdbb6 56824 72cde17 56821->56824 56822 72ce044 56822->56818 56824->56822 56829 776cf40 56824->56829 56827 72cde17 56825->56827 56826 72ce044 56826->56818 56827->56826 56828 776cf40 PostMessageW 56827->56828 56828->56827 56830 776cef2 56829->56830 56832 776cf43 56829->56832 56830->56824 56832->56830 56833 7769718 56832->56833 56834 776d1d0 PostMessageW 56833->56834 56836 776d23c 56834->56836 56836->56832 56927 5cb9abf 56928 5cb9acb 56927->56928 56929 5cb9a99 56927->56929 56930 5cb712c 2 API calls 56928->56930 56931 5cb9adf 56930->56931 56915 11db1f8 56918 11db2e0 56915->56918 56916 11db207 56921 11db324 56918->56921 56922 11db301 56918->56922 56919 11db528 GetModuleHandleW 56920 11db555 56919->56920 56920->56916 56921->56916 56922->56919 56922->56921 56923 776ad13 56925 776bbc0 12 API calls 56923->56925 56926 776bbb0 12 API calls 56923->56926 56924 776accb 56925->56924 56926->56924 56932 11d4668 56933 11d467a 56932->56933 56934 11d4686 56933->56934 56938 11d4779 56933->56938 56943 11d3e28 56934->56943 56936 11d46a5 56939 11d479d 56938->56939 56947 11d4878 56939->56947 56951 11d4888 56939->56951 56944 11d3e33 56943->56944 56959 11d5c84 56944->56959 56946 11d7037 56946->56936 56949 11d48af 56947->56949 56948 11d498c 56948->56948 56949->56948 56955 11d44b0 56949->56955 56953 11d48af 56951->56953 56952 11d498c 56952->56952 56953->56952 56954 11d44b0 CreateActCtxA 56953->56954 56954->56952 56956 11d5918 CreateActCtxA 56955->56956 56958 11d59db 56956->56958 56958->56958 56960 11d5c8f 56959->56960 56963 11d5e5c 56960->56963 56962 11d7acd 56962->56946 56964 11d5e67 56963->56964 56967 11d7648 56964->56967 56966 11d7ba2 56966->56962 56968 11d7653 56967->56968 56969 11d7678 2 API calls 56968->56969 56970 11d7ca5 56969->56970 56970->56966 56501 5cb72c0 56502 5cb72ed 56501->56502 56521 5cb6fcc 56502->56521 56504 5cb734f 56505 5cb6fcc 2 API calls 56504->56505 56506 5cb7381 56505->56506 56507 5cb6fcc 2 API calls 56506->56507 56508 5cb73b3 56507->56508 56509 5cb6fcc 2 API calls 56508->56509 56510 5cb73e5 56509->56510 56527 5cb6fdc 56510->56527 56513 5cb6fdc 2 API calls 56514 5cb7449 56513->56514 56515 5cb6fdc 2 API calls 56514->56515 56516 5cb747b 56515->56516 56517 5cb6fdc 2 API calls 56516->56517 56518 5cb74ad 56517->56518 56519 5cb6fcc 2 API calls 56518->56519 56520 5cb74df 56519->56520 56522 5cb6fd7 56521->56522 56531 11d7678 56522->56531 56536 11d8c51 56522->56536 56541 11d8bf7 56522->56541 56523 5cb8c73 56523->56504 56528 5cb6fe7 56527->56528 56603 5cb712c 56528->56603 56530 5cb7417 56530->56513 56532 11d7683 56531->56532 56533 11d8f51 56532->56533 56546 11dd298 56532->56546 56551 11dd288 56532->56551 56533->56523 56538 11d8c5c 56536->56538 56537 11d8f51 56537->56523 56538->56537 56539 11dd298 2 API calls 56538->56539 56540 11dd288 2 API calls 56538->56540 56539->56537 56540->56537 56543 11d8bfe 56541->56543 56542 11d8f51 56542->56523 56543->56542 56544 11dd298 2 API calls 56543->56544 56545 11dd288 2 API calls 56543->56545 56544->56542 56545->56542 56547 11dd2b9 56546->56547 56548 11dd2dd 56547->56548 56556 11dd448 56547->56556 56560 11dd437 56547->56560 56548->56533 56552 11dd2b9 56551->56552 56553 11dd2dd 56552->56553 56554 11dd448 2 API calls 56552->56554 56555 11dd437 2 API calls 56552->56555 56553->56533 56554->56553 56555->56553 56558 11dd455 56556->56558 56557 11dd48f 56557->56548 56558->56557 56564 11dcfa8 56558->56564 56561 11dd455 56560->56561 56562 11dd48f 56561->56562 56563 11dcfa8 2 API calls 56561->56563 56562->56548 56563->56562 56565 11dcfad 56564->56565 56567 11ddda0 56565->56567 56568 11dd0d4 56565->56568 56567->56567 56569 11dd0da 56568->56569 56570 11d7678 2 API calls 56569->56570 56571 11dde0f 56570->56571 56575 11dfb70 56571->56575 56579 11dfb58 56571->56579 56572 11dde49 56572->56567 56576 11dfbad 56575->56576 56577 11dfba1 56575->56577 56576->56572 56577->56576 56583 5cb0eb8 56577->56583 56580 11dfbad 56579->56580 56581 11dfba1 56579->56581 56580->56572 56581->56580 56582 5cb0eb8 2 API calls 56581->56582 56582->56580 56584 5cb0ee3 56583->56584 56585 5cb0f92 56584->56585 56588 5cb1da0 56584->56588 56591 5cb1d50 56584->56591 56599 5cb0b80 56588->56599 56592 5cb1d82 56591->56592 56592->56592 56593 5cb1dde CreateWindowExW 56592->56593 56594 5cb1da6 56592->56594 56598 5cb1f14 56593->56598 56595 5cb1dd5 56594->56595 56596 5cb0b80 CreateWindowExW 56594->56596 56595->56585 56596->56595 56600 5cb1df0 CreateWindowExW 56599->56600 56602 5cb1f14 56600->56602 56604 5cb7137 56603->56604 56605 5cb9b12 56604->56605 56606 11d7678 2 API calls 56604->56606 56607 11d8bf7 2 API calls 56604->56607 56608 11d8c51 2 API calls 56604->56608 56605->56530 56606->56605 56607->56605 56608->56605 56837 72cda10 56838 72cda58 VirtualProtect 56837->56838 56839 72cda92 56838->56839 56840 72c0110 56841 72c00c7 DrawTextExW 56840->56841 56842 72c00e6 56841->56842 56971 11dd560 56972 11dd5a6 56971->56972 56976 11dd72f 56972->56976 56979 11dd740 56972->56979 56973 11dd693 56982 11dd070 56976->56982 56980 11dd070 DuplicateHandle 56979->56980 56981 11dd76e 56979->56981 56980->56981 56981->56973 56983 11dd7a8 DuplicateHandle 56982->56983 56985 11dd76e 56983->56985 56985->56973

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 400 72c8a10-72c8a16 401 72c8a68-72c8ac5 400->401 402 72c8a18-72c8a1a 400->402 405 72c8ac7-72c8ac8 401->405 406 72c8af3-72c8b01 401->406 403 72c8a4e-72c8a65 402->403 403->401 405->403 407 72c8b03-72c8b20 406->407 408 72c8acb-72c8acc 407->408 409 72c8b22-72c8b46 407->409 410 72c8b4d 408->410 411 72c8ace-72c8ad5 408->411 409->410 413 72c8b4f 410->413 414 72c8b54-72c8b92 call 72c90d0 410->414 411->407 415 72c8ad7-72c8aed 411->415 413->414 417 72c8b98 414->417 415->406 418 72c8b9f-72c8bbb 417->418 419 72c8bbd 418->419 420 72c8bc4-72c8bc5 418->420 419->417 419->420 421 72c8ded-72c8df1 419->421 422 72c8cad-72c8ccb 419->422 423 72c8bca-72c8bce 419->423 424 72c8c0b-72c8c14 419->424 425 72c8eab-72c8ed0 419->425 426 72c8c40-72c8c58 419->426 427 72c8da3-72c8db8 419->427 428 72c8dbd-72c8dc1 419->428 429 72c8e1d-72c8e29 419->429 430 72c8d1f-72c8d31 419->430 431 72c8eff-72c8f16 419->431 432 72c8cfa-72c8d1a 419->432 433 72c8f1b-72c8f22 419->433 434 72c8d5b-72c8d72 419->434 435 72c8ed5-72c8ee1 419->435 436 72c8d36-72c8d56 419->436 437 72c8c96-72c8ca8 419->437 438 72c8d77-72c8d8c 419->438 439 72c8bf7-72c8c09 419->439 440 72c8cd0-72c8cdc 419->440 441 72c8d91-72c8d9e 419->441 420->433 454 72c8e04-72c8e0b 421->454 455 72c8df3-72c8e02 421->455 422->418 444 72c8bd0-72c8bdf 423->444 445 72c8be1-72c8be8 423->445 446 72c8c16-72c8c25 424->446 447 72c8c27-72c8c2e 424->447 425->418 448 72c8c5f-72c8c75 426->448 449 72c8c5a 426->449 427->418 450 72c8dd4-72c8ddb 428->450 451 72c8dc3-72c8dd2 428->451 456 72c8e2b 429->456 457 72c8e30-72c8e46 429->457 430->418 431->418 432->418 434->418 452 72c8ee8-72c8efa 435->452 453 72c8ee3 435->453 436->418 437->418 438->418 439->418 442 72c8cde 440->442 443 72c8ce3-72c8cf5 440->443 441->418 442->443 443->418 460 72c8bef-72c8bf5 444->460 445->460 462 72c8c35-72c8c3b 446->462 447->462 472 72c8c7c-72c8c91 448->472 473 72c8c77 448->473 449->448 464 72c8de2-72c8de8 450->464 451->464 452->418 453->452 465 72c8e12-72c8e18 454->465 455->465 456->457 470 72c8e4d-72c8e63 457->470 471 72c8e48 457->471 460->418 462->418 464->418 465->418 476 72c8e6a-72c8e80 470->476 477 72c8e65 470->477 471->470 472->418 473->472 479 72c8e87-72c8ea6 476->479 480 72c8e82 476->480 477->476 479->418 480->479
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ry$ry$ry
                                                        • API String ID: 0-128149707
                                                        • Opcode ID: c9626eb940194184f59eec0ef0b4330546d6f137984c6dd3f8c6adecb1875fe1
                                                        • Instruction ID: ce8794f0da47535624a4c699af6cc11fa09172d3261fabf8652d5ef7160938bf
                                                        • Opcode Fuzzy Hash: c9626eb940194184f59eec0ef0b4330546d6f137984c6dd3f8c6adecb1875fe1
                                                        • Instruction Fuzzy Hash: 94F19CB092460ADFCB15CFA9C4844AEFBB2FF5A310F15C65AD401AB354C734AA82CF95

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 483 72c8aca-72c8acc 484 72c8b4d 483->484 485 72c8ace-72c8ad5 483->485 486 72c8b4f 484->486 487 72c8b54-72c8b92 call 72c90d0 484->487 488 72c8ad7-72c8b01 485->488 489 72c8b03-72c8b20 485->489 486->487 495 72c8b98 487->495 488->489 491 72c8acb-72c8acc 489->491 492 72c8b22-72c8b46 489->492 491->484 491->485 492->484 496 72c8b9f-72c8bbb 495->496 497 72c8bbd 496->497 498 72c8bc4-72c8bc5 496->498 497->495 497->498 499 72c8ded-72c8df1 497->499 500 72c8cad-72c8ccb 497->500 501 72c8bca-72c8bce 497->501 502 72c8c0b-72c8c14 497->502 503 72c8eab-72c8ed0 497->503 504 72c8c40-72c8c58 497->504 505 72c8da3-72c8db8 497->505 506 72c8dbd-72c8dc1 497->506 507 72c8e1d-72c8e29 497->507 508 72c8d1f-72c8d31 497->508 509 72c8eff-72c8f16 497->509 510 72c8cfa-72c8d1a 497->510 511 72c8f1b-72c8f22 497->511 512 72c8d5b-72c8d72 497->512 513 72c8ed5-72c8ee1 497->513 514 72c8d36-72c8d56 497->514 515 72c8c96-72c8ca8 497->515 516 72c8d77-72c8d8c 497->516 517 72c8bf7-72c8c09 497->517 518 72c8cd0-72c8cdc 497->518 519 72c8d91-72c8d9e 497->519 498->511 532 72c8e04-72c8e0b 499->532 533 72c8df3-72c8e02 499->533 500->496 522 72c8bd0-72c8bdf 501->522 523 72c8be1-72c8be8 501->523 524 72c8c16-72c8c25 502->524 525 72c8c27-72c8c2e 502->525 503->496 526 72c8c5f-72c8c75 504->526 527 72c8c5a 504->527 505->496 528 72c8dd4-72c8ddb 506->528 529 72c8dc3-72c8dd2 506->529 534 72c8e2b 507->534 535 72c8e30-72c8e46 507->535 508->496 509->496 510->496 512->496 530 72c8ee8-72c8efa 513->530 531 72c8ee3 513->531 514->496 515->496 516->496 517->496 520 72c8cde 518->520 521 72c8ce3-72c8cf5 518->521 519->496 520->521 521->496 538 72c8bef-72c8bf5 522->538 523->538 540 72c8c35-72c8c3b 524->540 525->540 550 72c8c7c-72c8c91 526->550 551 72c8c77 526->551 527->526 542 72c8de2-72c8de8 528->542 529->542 530->496 531->530 543 72c8e12-72c8e18 532->543 533->543 534->535 548 72c8e4d-72c8e63 535->548 549 72c8e48 535->549 538->496 540->496 542->496 543->496 554 72c8e6a-72c8e80 548->554 555 72c8e65 548->555 549->548 550->496 551->550 557 72c8e87-72c8ea6 554->557 558 72c8e82 554->558 555->554 557->496 558->557
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ry$ry$ry
                                                        • API String ID: 0-128149707
                                                        • Opcode ID: 755a1534dc0e0607ac31ea81bc55545de5463a3b771a462e3110089591a88314
                                                        • Instruction ID: 8540ab789b6ad6745aa7fe7ec9a01d593b6de5f69ee22bc25c9598e7bc3dd46f
                                                        • Opcode Fuzzy Hash: 755a1534dc0e0607ac31ea81bc55545de5463a3b771a462e3110089591a88314
                                                        • Instruction Fuzzy Hash: 8BD17EB0D2420ADFCB14CFA5C4844AEFBB6FF59310B15C55AD411AB355C734AA42CF95

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 561 72c8b28-72c8b4d 563 72c8b4f 561->563 564 72c8b54-72c8b92 call 72c90d0 561->564 563->564 566 72c8b98 564->566 567 72c8b9f-72c8bbb 566->567 568 72c8bbd 567->568 569 72c8bc4-72c8bc5 567->569 568->566 568->569 570 72c8ded-72c8df1 568->570 571 72c8cad-72c8ccb 568->571 572 72c8bca-72c8bce 568->572 573 72c8c0b-72c8c14 568->573 574 72c8eab-72c8ed0 568->574 575 72c8c40-72c8c58 568->575 576 72c8da3-72c8db8 568->576 577 72c8dbd-72c8dc1 568->577 578 72c8e1d-72c8e29 568->578 579 72c8d1f-72c8d31 568->579 580 72c8eff-72c8f16 568->580 581 72c8cfa-72c8d1a 568->581 582 72c8f1b-72c8f22 568->582 583 72c8d5b-72c8d72 568->583 584 72c8ed5-72c8ee1 568->584 585 72c8d36-72c8d56 568->585 586 72c8c96-72c8ca8 568->586 587 72c8d77-72c8d8c 568->587 588 72c8bf7-72c8c09 568->588 589 72c8cd0-72c8cdc 568->589 590 72c8d91-72c8d9e 568->590 569->582 603 72c8e04-72c8e0b 570->603 604 72c8df3-72c8e02 570->604 571->567 593 72c8bd0-72c8bdf 572->593 594 72c8be1-72c8be8 572->594 595 72c8c16-72c8c25 573->595 596 72c8c27-72c8c2e 573->596 574->567 597 72c8c5f-72c8c75 575->597 598 72c8c5a 575->598 576->567 599 72c8dd4-72c8ddb 577->599 600 72c8dc3-72c8dd2 577->600 605 72c8e2b 578->605 606 72c8e30-72c8e46 578->606 579->567 580->567 581->567 583->567 601 72c8ee8-72c8efa 584->601 602 72c8ee3 584->602 585->567 586->567 587->567 588->567 591 72c8cde 589->591 592 72c8ce3-72c8cf5 589->592 590->567 591->592 592->567 609 72c8bef-72c8bf5 593->609 594->609 611 72c8c35-72c8c3b 595->611 596->611 621 72c8c7c-72c8c91 597->621 622 72c8c77 597->622 598->597 613 72c8de2-72c8de8 599->613 600->613 601->567 602->601 614 72c8e12-72c8e18 603->614 604->614 605->606 619 72c8e4d-72c8e63 606->619 620 72c8e48 606->620 609->567 611->567 613->567 614->567 625 72c8e6a-72c8e80 619->625 626 72c8e65 619->626 620->619 621->567 622->621 628 72c8e87-72c8ea6 625->628 629 72c8e82 625->629 626->625 628->567 629->628
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ry$ry$ry
                                                        • API String ID: 0-128149707
                                                        • Opcode ID: 74e8966c65ce791ceac47cc01bade1e941cf9d45eb10d81a9709a8dc275578ed
                                                        • Instruction ID: bb737d6e8263c1db194a875e0004cd37ed95d9fc6641706db461a5722d83552f
                                                        • Opcode Fuzzy Hash: 74e8966c65ce791ceac47cc01bade1e941cf9d45eb10d81a9709a8dc275578ed
                                                        • Instruction Fuzzy Hash: DEC147B0D2420ADFCB14DFA9C4858AEFBB6FF99310B14C559D415AB354C734AA82CF94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 632 72c654d-72c6558 633 72c655a-72c65b4 632->633 634 72c65b5-72c65e3 632->634 633->634 637 72c65ea-72c6644 634->637 638 72c65e5 634->638 642 72c6647 637->642 638->637 643 72c664e-72c666a 642->643 644 72c666c 643->644 645 72c6673-72c6674 643->645 644->642 646 72c6679-72c66a1 644->646 647 72c6820-72c6890 644->647 648 72c670c-72c6736 644->648 649 72c67c3-72c67de 644->649 650 72c66a3-72c66b5 644->650 651 72c67e3-72c67fa 644->651 652 72c66dc-72c66e0 644->652 653 72c67ff-72c681b 644->653 654 72c673b-72c6771 644->654 655 72c6776-72c678b 644->655 656 72c66b7-72c66d7 644->656 657 72c6790-72c67be 644->657 645->646 645->647 646->643 673 72c6892 call 72c8918 647->673 674 72c6892 call 72c7f7b 647->674 675 72c6892 call 72c7cab 647->675 676 72c6892 call 72c8967 647->676 648->643 649->643 650->643 651->643 658 72c66e2-72c66f1 652->658 659 72c66f3-72c66fa 652->659 653->643 654->643 655->643 656->643 657->643 660 72c6701-72c6707 658->660 659->660 660->643 672 72c6898-72c68a2 673->672 674->672 675->672 676->672
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Tecq$Tecq$z^I
                                                        • API String ID: 0-1868451600
                                                        • Opcode ID: 4138ded7f9a623f583b812ccc4198843ba79f3407383845a80d019b00d377d13
                                                        • Instruction ID: 78475fabba89746f03f113d0a272cfc939b903593e5e120f11a668ceec7d6a6a
                                                        • Opcode Fuzzy Hash: 4138ded7f9a623f583b812ccc4198843ba79f3407383845a80d019b00d377d13
                                                        • Instruction Fuzzy Hash: 40B12AB5E142099FCB04CFA9C8945EDFBB2FF89310F24952AD415AB258D734A906CF64

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 677 72c6521-72c6540 678 72c659d-72c65e3 677->678 679 72c6542-72c654a 677->679 681 72c65ea-72c6644 678->681 682 72c65e5 678->682 679->678 685 72c6647 681->685 682->681 686 72c664e-72c666a 685->686 687 72c666c 686->687 688 72c6673-72c6674 686->688 687->685 689 72c6679-72c66a1 687->689 690 72c6820-72c6890 687->690 691 72c670c-72c6736 687->691 692 72c67c3-72c67de 687->692 693 72c66a3-72c66b5 687->693 694 72c67e3-72c67fa 687->694 695 72c66dc-72c66e0 687->695 696 72c67ff-72c681b 687->696 697 72c673b-72c6771 687->697 698 72c6776-72c678b 687->698 699 72c66b7-72c66d7 687->699 700 72c6790-72c67be 687->700 688->689 688->690 689->686 716 72c6892 call 72c8918 690->716 717 72c6892 call 72c7f7b 690->717 718 72c6892 call 72c7cab 690->718 719 72c6892 call 72c8967 690->719 691->686 692->686 693->686 694->686 701 72c66e2-72c66f1 695->701 702 72c66f3-72c66fa 695->702 696->686 697->686 698->686 699->686 700->686 703 72c6701-72c6707 701->703 702->703 703->686 715 72c6898-72c68a2 716->715 717->715 718->715 719->715
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Tecq$Tecq$z^I
                                                        • API String ID: 0-1868451600
                                                        • Opcode ID: 6770dd200dc45c764e07754aaae0d057b430f671a7c125a8213dd65791eeee37
                                                        • Instruction ID: ca888cf9d049bfbfbf9ba8fc71d9bc859bc85444df7b9cee9017e414bd25fb90
                                                        • Opcode Fuzzy Hash: 6770dd200dc45c764e07754aaae0d057b430f671a7c125a8213dd65791eeee37
                                                        • Instruction Fuzzy Hash: 9AA107B4E102099FCB04CFAAC9845DDFBB2FF89310F24952AD415BB258D735A906CF64

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 720 72c65c0-72c65e3 721 72c65ea-72c6644 720->721 722 72c65e5 720->722 725 72c6647 721->725 722->721 726 72c664e-72c666a 725->726 727 72c666c 726->727 728 72c6673-72c6674 726->728 727->725 729 72c6679-72c66a1 727->729 730 72c6820-72c6890 727->730 731 72c670c-72c6736 727->731 732 72c67c3-72c67de 727->732 733 72c66a3-72c66b5 727->733 734 72c67e3-72c67fa 727->734 735 72c66dc-72c66e0 727->735 736 72c67ff-72c681b 727->736 737 72c673b-72c6771 727->737 738 72c6776-72c678b 727->738 739 72c66b7-72c66d7 727->739 740 72c6790-72c67be 727->740 728->729 728->730 729->726 756 72c6892 call 72c8918 730->756 757 72c6892 call 72c7f7b 730->757 758 72c6892 call 72c7cab 730->758 759 72c6892 call 72c8967 730->759 731->726 732->726 733->726 734->726 741 72c66e2-72c66f1 735->741 742 72c66f3-72c66fa 735->742 736->726 737->726 738->726 739->726 740->726 743 72c6701-72c6707 741->743 742->743 743->726 755 72c6898-72c68a2 756->755 757->755 758->755 759->755
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Tecq$Tecq$z^I
                                                        • API String ID: 0-1868451600
                                                        • Opcode ID: b9274846362c22f257db4a97e7e832a914120d7bbee7641a350f983178b9e701
                                                        • Instruction ID: c141ed83ef22ad92960c78e25eb6a4985018eec6719816448b6671bae6c7ea8a
                                                        • Opcode Fuzzy Hash: b9274846362c22f257db4a97e7e832a914120d7bbee7641a350f983178b9e701
                                                        • Instruction Fuzzy Hash: 8391D5B4E202198FCB04CFAAC9845AEFBB2FF89310F24952AD415BB258D7749905CF64

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 834 72cf408-72cf43d 835 72cf43f 834->835 836 72cf444-72cf475 834->836 835->836 837 72cf476 836->837 838 72cf47d-72cf499 837->838 839 72cf49b 838->839 840 72cf4a2-72cf4a3 838->840 839->837 841 72cf70f-72cf718 839->841 842 72cf4a8-72cf4ea 839->842 843 72cf5ac-72cf5b0 839->843 844 72cf4ec-72cf4ff 839->844 845 72cf68e-72cf6a6 839->845 846 72cf64f-72cf662 839->846 847 72cf6ab-72cf6bd 839->847 848 72cf504-72cf52b 839->848 849 72cf547-72cf54a 839->849 850 72cf6c2-72cf6d4 839->850 851 72cf623-72cf64a 839->851 852 72cf5e3-72cf5f6 839->852 853 72cf578-72cf58f 839->853 854 72cf6d9-72cf6f0 839->854 855 72cf5fb-72cf610 839->855 856 72cf594-72cf5a7 839->856 857 72cf615-72cf61e 839->857 858 72cf6f5-72cf70a 839->858 859 72cf530-72cf542 839->859 840->841 840->842 842->838 862 72cf5b2-72cf5c1 843->862 863 72cf5c3-72cf5ca 843->863 844->838 845->838 860 72cf664-72cf673 846->860 861 72cf675-72cf67c 846->861 847->838 848->838 871 72cf54d call 72c6a3c 849->871 872 72cf54d call 72cf858 849->872 850->838 851->838 852->838 853->838 854->838 855->838 856->838 857->838 858->838 859->838 865 72cf683-72cf689 860->865 861->865 866 72cf5d1-72cf5de 862->866 863->866 865->838 866->838 867 72cf553-72cf573 867->838 871->867 872->867
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: TuA$UC;"
                                                        • API String ID: 0-2071649361
                                                        • Opcode ID: e0d20f86342f1a9c02d26f4dfe9e45d238237d3a4a52dde1d18aa08e66ae5a13
                                                        • Instruction ID: f754aeb488da098a58d32abd0e05ea527db3f0e94b262c6bc75dc16cd030b959
                                                        • Opcode Fuzzy Hash: e0d20f86342f1a9c02d26f4dfe9e45d238237d3a4a52dde1d18aa08e66ae5a13
                                                        • Instruction Fuzzy Hash: E09118B1D25209EFCB08CFA5E58199EFBF2EF89350F20952AE515AB264D7309941CF50

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 873 72cf418-72cf43d 874 72cf43f 873->874 875 72cf444-72cf475 873->875 874->875 876 72cf476 875->876 877 72cf47d-72cf499 876->877 878 72cf49b 877->878 879 72cf4a2-72cf4a3 877->879 878->876 880 72cf70f-72cf718 878->880 881 72cf4a8-72cf4ea 878->881 882 72cf5ac-72cf5b0 878->882 883 72cf4ec-72cf4ff 878->883 884 72cf68e-72cf6a6 878->884 885 72cf64f-72cf662 878->885 886 72cf6ab-72cf6bd 878->886 887 72cf504-72cf52b 878->887 888 72cf547-72cf54a 878->888 889 72cf6c2-72cf6d4 878->889 890 72cf623-72cf64a 878->890 891 72cf5e3-72cf5f6 878->891 892 72cf578-72cf58f 878->892 893 72cf6d9-72cf6f0 878->893 894 72cf5fb-72cf610 878->894 895 72cf594-72cf5a7 878->895 896 72cf615-72cf61e 878->896 897 72cf6f5-72cf70a 878->897 898 72cf530-72cf542 878->898 879->880 879->881 881->877 901 72cf5b2-72cf5c1 882->901 902 72cf5c3-72cf5ca 882->902 883->877 884->877 899 72cf664-72cf673 885->899 900 72cf675-72cf67c 885->900 886->877 887->877 910 72cf54d call 72c6a3c 888->910 911 72cf54d call 72cf858 888->911 889->877 890->877 891->877 892->877 893->877 894->877 895->877 896->877 897->877 898->877 904 72cf683-72cf689 899->904 900->904 905 72cf5d1-72cf5de 901->905 902->905 904->877 905->877 906 72cf553-72cf573 906->877 910->906 911->906
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: TuA$UC;"
                                                        • API String ID: 0-2071649361
                                                        • Opcode ID: 49d85d4598c30f2d5a3c8e8069a30b74390248701a120599791867e9969f835c
                                                        • Instruction ID: e554c92815c8b829b62d7da1b8e801326f750d629b41dac1c40b952751d6d4d3
                                                        • Opcode Fuzzy Hash: 49d85d4598c30f2d5a3c8e8069a30b74390248701a120599791867e9969f835c
                                                        • Instruction Fuzzy Hash: 379127B1D24209EFCB08CFE6E58199EFBF2EF89350F10952AE515AB264D7709942CF50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: W``/
                                                        • API String ID: 0-4049958361
                                                        • Opcode ID: 19087b148d20d699f3aba944ce2dd4801d8ee3ad6bc6da5be504b239381d103e
                                                        • Instruction ID: 4c7650f1bc6de577a431da7d78ee5bd154594af593aa3b45a0c8949c60248598
                                                        • Opcode Fuzzy Hash: 19087b148d20d699f3aba944ce2dd4801d8ee3ad6bc6da5be504b239381d103e
                                                        • Instruction Fuzzy Hash: 2AE11DB4E101198FCB14DFA9C5849AEFBF2FF89304F24815AE914AB35AD731A941CF61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2227372809.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5cb0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d09adc97bc7e0a684cdc58633e007477b0c8bd655768bcca91e2f4d937f41eb4
                                                        • Instruction ID: f4f70a107ca05d137af3e0de66e4a6fdb29a47bb15bbaf6bc61f6376ca31aecc
                                                        • Opcode Fuzzy Hash: d09adc97bc7e0a684cdc58633e007477b0c8bd655768bcca91e2f4d937f41eb4
                                                        • Instruction Fuzzy Hash: 63F2E734A11219CFDB24DF24C998AD9B7B1FF8A300F1145E9E809AB365DB71AE85CF41
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2219371160.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_11d0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: `Yel
                                                        • API String ID: 0-629247921
                                                        • Opcode ID: cc555bf96b9034d6612df193e49670183a75eb4a4d3145b61e587c851671eea2
                                                        • Instruction ID: 83fe3af9c777c0b30016510731ff92dfd845b2089c825c879006116a9b1997ba
                                                        • Opcode Fuzzy Hash: cc555bf96b9034d6612df193e49670183a75eb4a4d3145b61e587c851671eea2
                                                        • Instruction Fuzzy Hash: DA91B3B4E01219CFCB58DFA9C984A9EBBB2FF88304F5085A9D419AB365DB349D41CF50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2219371160.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_11d0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: `Yel
                                                        • API String ID: 0-629247921
                                                        • Opcode ID: 480c4ad16b9e53e6ae46124949c8ddd9a0cf7f961554117e51b4aa60d7108241
                                                        • Instruction ID: 67691b0c54206777bbdbd6870d6650854643ce5246d1a8ba5a60d6d2e97fa93e
                                                        • Opcode Fuzzy Hash: 480c4ad16b9e53e6ae46124949c8ddd9a0cf7f961554117e51b4aa60d7108241
                                                        • Instruction Fuzzy Hash: E291C5B4E00219CFCB58DFA9D984A9EBBB2FF88304F508569D419AB365DB349D41CF50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: iUfo
                                                        • API String ID: 0-3820436262
                                                        • Opcode ID: 96b7c889af82e22137c7f24c07dabd971a05014f347ce20d2f3655ec0758ae91
                                                        • Instruction ID: 085c2f4c5bc11545003096379b89af09df5665c8f77ca7f779254d515eea6f95
                                                        • Opcode Fuzzy Hash: 96b7c889af82e22137c7f24c07dabd971a05014f347ce20d2f3655ec0758ae91
                                                        • Instruction Fuzzy Hash: C97124B4E21219DFCB18CFA9D5456ADFBB2FF89300F10956AE405E7354E7349A41CB50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 5=6
                                                        • API String ID: 0-2897083178
                                                        • Opcode ID: 913984fae7abceaeeaba7cf00337ff5ee8ee6c6131277ae728ea729b43dc1aa0
                                                        • Instruction ID: 63b7e6a2bbdd12e7d6d6029a475c41f4095f8d32e3ee19b5f7a2b9aae1d2e73b
                                                        • Opcode Fuzzy Hash: 913984fae7abceaeeaba7cf00337ff5ee8ee6c6131277ae728ea729b43dc1aa0
                                                        • Instruction Fuzzy Hash: 507168B4E2524A9FCB08CFE5D9455AEFFF2FF99200F10992AD01AE7214DB749A018F50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 5=6
                                                        • API String ID: 0-2897083178
                                                        • Opcode ID: f51cee4c9677cf2e96593f9e62ca8c04545be491b4fd7c757e58569df450420b
                                                        • Instruction ID: 2220e5a9de379dfcb9e37f3f222a80e69b39a0a107d3fd48a282ec18e2408be9
                                                        • Opcode Fuzzy Hash: f51cee4c9677cf2e96593f9e62ca8c04545be491b4fd7c757e58569df450420b
                                                        • Instruction Fuzzy Hash: A96147B4E2524A9FCB08CFE5D9455AEFBF2FF99200F10952AD01AE7214DB749A018F94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: iUfo
                                                        • API String ID: 0-3820436262
                                                        • Opcode ID: fee676c18ff087b6c6db5c99fa95a86f29d6aac5df84176c355aa5f77b82797b
                                                        • Instruction ID: f82c40b77ea0db2dee776ce4653f7cb55088b8cc4e827b8b11e8a50af3930e51
                                                        • Opcode Fuzzy Hash: fee676c18ff087b6c6db5c99fa95a86f29d6aac5df84176c355aa5f77b82797b
                                                        • Instruction Fuzzy Hash: 4F51F3B4E21219DFCB14CFA9D5456EEFBB2FB89300F10912AE406BB254EB745A41CF54
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: db1b59868b5e91dcd2ec56deee61865f216c65312b947947ef939d52550cb01b
                                                        • Instruction ID: fb76900bab8d1fc7deae8ac1252fd5938903e4694ccef9add794dfd58b570056
                                                        • Opcode Fuzzy Hash: db1b59868b5e91dcd2ec56deee61865f216c65312b947947ef939d52550cb01b
                                                        • Instruction Fuzzy Hash: BF32DCB4B012058FDB18DB79C458BAEBBF6BF89340F2444A9E9059B394DB74ED01CB61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7260d188b0608cacfda389c16ee4830218d7560afcb99a08c5ab6ea6e58b73db
                                                        • Instruction ID: b07189f95722561a4605e7f61414823f9ef66fbb98f5530acab9ea8d148a6f4b
                                                        • Opcode Fuzzy Hash: 7260d188b0608cacfda389c16ee4830218d7560afcb99a08c5ab6ea6e58b73db
                                                        • Instruction Fuzzy Hash: D442B274A0021A8FCB64CF68C984BA9FBB2BF48314F15C1E9D459AB751DB31AE85CF50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a02de057e1dddca1c0427d6ba2bcfaa3ab62deb7b9d40bbe7864574196335ffa
                                                        • Instruction ID: e3e308f0118800ce965a18ade63330f5f59bde57e7460439167456c109b1e5fe
                                                        • Opcode Fuzzy Hash: a02de057e1dddca1c0427d6ba2bcfaa3ab62deb7b9d40bbe7864574196335ffa
                                                        • Instruction Fuzzy Hash: 96B17BB1D15209DFCB18CFA6C94469EFBB2FF89340F20D46AD415AB265D7345A02CF50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 058d5ecd46731279129af82a941907ce0aff22f8c58112e94d280f711c4a96c5
                                                        • Instruction ID: fddc905e6576a0e5cb1ceb77654f7f522bc49f93a8be49bc6a9a217bde72f903
                                                        • Opcode Fuzzy Hash: 058d5ecd46731279129af82a941907ce0aff22f8c58112e94d280f711c4a96c5
                                                        • Instruction Fuzzy Hash: 11B1F8B1E15209DFCB18DFA6D584A9EFBB2FF89340F20D42AD415A7258DB349A06CF50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2227372809.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5cb0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 09dd9965c485882d7a39cd29e14c84f55424ae070dcb9f6577105d83b3a01865
                                                        • Instruction ID: e4e2c185335cab44d0f38aa0763e1000aa30b95708b39007a954c53e2d8e2cd1
                                                        • Opcode Fuzzy Hash: 09dd9965c485882d7a39cd29e14c84f55424ae070dcb9f6577105d83b3a01865
                                                        • Instruction Fuzzy Hash: DDA1A535E0031ADFDB04DFA4D8949EEFBBAFF89310F148A15E415AB2A4DB70A945CB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2227372809.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5cb0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8a12927eb3c71212a67d99d2376daa11cfea21fd6eefec44a4af456bfbddd5e2
                                                        • Instruction ID: f14351c8c603d7c20a2fc54460cc733b8afc1dc61a0b6721b9ec4db8f2bcd494
                                                        • Opcode Fuzzy Hash: 8a12927eb3c71212a67d99d2376daa11cfea21fd6eefec44a4af456bfbddd5e2
                                                        • Instruction Fuzzy Hash: 4291B335E1030ADFCB05DFA0D8949DEFBBAFF89310F148615E416AB2A4DB70A985CB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ebac86001a3f3167e42491b5486f3a965a6d87867d3421320375f382b7546087
                                                        • Instruction ID: 0780133d540b2acd0799bedcec7a106376fb165b66852f60a023b8f7dc6e01a8
                                                        • Opcode Fuzzy Hash: ebac86001a3f3167e42491b5486f3a965a6d87867d3421320375f382b7546087
                                                        • Instruction Fuzzy Hash: FB3108B1E016588FDB18CFAAD8446DEBFB3AFC9310F14C16AD409AA264DB351A46CF50

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 294 7caad88-7caad9f 296 7caae02-7caae10 294->296 297 7caada1-7caadb0 294->297 300 7caae12-7caae1d call 7ca9d8c 296->300 301 7caae23-7caae25 296->301 297->296 302 7caadb2-7caadbe call 7ca9e38 297->302 300->301 308 7caaee2-7caaf5a 300->308 398 7caae27 call 7caad88 301->398 399 7caae27 call 7caad61 301->399 309 7caadd2-7caadee 302->309 310 7caadc0-7caadcc call 7ca9e48 302->310 307 7caae2d-7caae3c 315 7caae3e-7caae4f call 7ca9e58 307->315 316 7caae54-7caae57 307->316 338 7caaf5c-7caaf62 308->338 339 7caaf63-7caaf6d 308->339 322 7caae9d-7caaedb 309->322 323 7caadf4-7caadf8 309->323 310->309 318 7caae58-7caae96 310->318 315->316 318->322 322->308 323->296 342 7cab1a9-7cab1d5 339->342 343 7caaf73-7caaf8c call 7ca9e7c * 2 339->343 350 7cab1dc-7cab22d 342->350 343->350 351 7caaf92-7caafb4 343->351 358 7caafb6-7caafc4 call 7ca9e58 351->358 359 7caafc5-7caafd4 351->359 365 7caaff9-7cab01a 359->365 366 7caafd6-7caaff3 359->366 372 7cab06a-7cab092 365->372 373 7cab01c-7cab02d 365->373 366->365 396 7cab095 call 7cab460 372->396 397 7cab095 call 7cab470 372->397 376 7cab02f-7cab047 call 7ca9e8c 373->376 377 7cab05c-7cab060 373->377 384 7cab049-7cab04a 376->384 385 7cab04c-7cab05a 376->385 377->372 381 7cab098-7cab0bd 387 7cab0bf-7cab0d4 381->387 388 7cab103 381->388 384->385 385->376 385->377 387->388 391 7cab0d6-7cab0f9 387->391 388->342 391->388 395 7cab0fb 391->395 395->388 396->381 397->381 398->307 399->307
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Hgq$Hgq$Hgq$Hgq$Hgq
                                                        • API String ID: 0-2022333140
                                                        • Opcode ID: c2ec5003dafa56ab23493bac4835b90cbdcb378bc1af111ddf90c738b2b3e1a3
                                                        • Instruction ID: f637087ae34bf48e18cdd6287c36e5456d23db5fde551799758b435ec354351e
                                                        • Opcode Fuzzy Hash: c2ec5003dafa56ab23493bac4835b90cbdcb378bc1af111ddf90c738b2b3e1a3
                                                        • Instruction Fuzzy Hash: BDB17D757002068FCB19EF78D4A49AEB7F2AF89315B2444A9D906EB390DF35DD01CB61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1004 776a714-776a7b5 1006 776a7b7-776a7c1 1004->1006 1007 776a7ee-776a80e 1004->1007 1006->1007 1008 776a7c3-776a7c5 1006->1008 1014 776a847-776a876 1007->1014 1015 776a810-776a81a 1007->1015 1009 776a7c7-776a7d1 1008->1009 1010 776a7e8-776a7eb 1008->1010 1012 776a7d5-776a7e4 1009->1012 1013 776a7d3 1009->1013 1010->1007 1012->1012 1016 776a7e6 1012->1016 1013->1012 1021 776a8af-776a969 CreateProcessA 1014->1021 1022 776a878-776a882 1014->1022 1015->1014 1017 776a81c-776a81e 1015->1017 1016->1010 1019 776a820-776a82a 1017->1019 1020 776a841-776a844 1017->1020 1023 776a82e-776a83d 1019->1023 1024 776a82c 1019->1024 1020->1014 1035 776a972-776a9f8 1021->1035 1036 776a96b-776a971 1021->1036 1022->1021 1026 776a884-776a886 1022->1026 1023->1023 1025 776a83f 1023->1025 1024->1023 1025->1020 1027 776a888-776a892 1026->1027 1028 776a8a9-776a8ac 1026->1028 1030 776a896-776a8a5 1027->1030 1031 776a894 1027->1031 1028->1021 1030->1030 1033 776a8a7 1030->1033 1031->1030 1033->1028 1046 776a9fa-776a9fe 1035->1046 1047 776aa08-776aa0c 1035->1047 1036->1035 1046->1047 1048 776aa00 1046->1048 1049 776aa0e-776aa12 1047->1049 1050 776aa1c-776aa20 1047->1050 1048->1047 1049->1050 1051 776aa14 1049->1051 1052 776aa22-776aa26 1050->1052 1053 776aa30-776aa34 1050->1053 1051->1050 1052->1053 1056 776aa28 1052->1056 1054 776aa46-776aa4d 1053->1054 1055 776aa36-776aa3c 1053->1055 1057 776aa64 1054->1057 1058 776aa4f-776aa5e 1054->1058 1055->1054 1056->1053 1060 776aa65 1057->1060 1058->1057 1060->1060
                                                        APIs
                                                        • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0776A956
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: b5b6775cbb2bd4ab67de342b32a336c38ca1f4311141b8d9d6411a4484e8bc36
                                                        • Instruction ID: 6f30ec8218affa4157317c22e77242515beb367247d20d499e7bc6e1d1c38de2
                                                        • Opcode Fuzzy Hash: b5b6775cbb2bd4ab67de342b32a336c38ca1f4311141b8d9d6411a4484e8bc36
                                                        • Instruction Fuzzy Hash: 7DA17BB1D0021ACFDB21CF68C8447EDBBB2BF48314F1585AAD808B7244DB749985CF92
                                                        APIs
                                                        • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0776A956
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: bd7bf165316305621e03e426bc4b3db91ab5713f443776fbc8d79e4bc9ebbe56
                                                        • Instruction ID: cba852834db02cccdaffff6b8ea23f62c3195bc91226de585b06771525395c01
                                                        • Opcode Fuzzy Hash: bd7bf165316305621e03e426bc4b3db91ab5713f443776fbc8d79e4bc9ebbe56
                                                        • Instruction Fuzzy Hash: C3918CB1D0021ACFDB21CF68C844BEDBBB2BF48310F1585AAD808B7244DB749985CF92
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 011DB546
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2219371160.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_11d0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: b67c3cf41d13d8e0269667e2ef5c8d8cafcf9738d6f9f814afc2a1016cd7cee6
                                                        • Instruction ID: c7f8689a43e4a82834948ec955745aa49bc6af9c499e6809af3df14f15493282
                                                        • Opcode Fuzzy Hash: b67c3cf41d13d8e0269667e2ef5c8d8cafcf9738d6f9f814afc2a1016cd7cee6
                                                        • Instruction Fuzzy Hash: D38167B0A04B058FD729DF2AD15075ABBF1FF89310F01892ED48AD7A50DB34E949CB95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2227372809.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5cb0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3b5e2ac4185d99f2b8645006bd7099766d14ae6390c4d255a6ccbe9d2d20caf7
                                                        • Instruction ID: 1dd32d3c3d5d049ad272362b4ffbd27c266c2bf8b72f34ec2895c4898c3ced61
                                                        • Opcode Fuzzy Hash: 3b5e2ac4185d99f2b8645006bd7099766d14ae6390c4d255a6ccbe9d2d20caf7
                                                        • Instruction Fuzzy Hash: 6D6114B2C043499FDF02CFA9C894ACDBFB1BF49310F15856AE418AB261D3759946CF51
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05CB1F02
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2227372809.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5cb0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: 3b38b5650f31ff65a940bafc0c658b6dc8c58c7318f189803792ac891171ffbb
                                                        • Instruction ID: abe084f57bf1332c9b1db46bdaf2193caef8cdda31d0cf185c8c50422773b41a
                                                        • Opcode Fuzzy Hash: 3b38b5650f31ff65a940bafc0c658b6dc8c58c7318f189803792ac891171ffbb
                                                        • Instruction Fuzzy Hash: 7651C0B1D10349DFDB14CF9AC894ADEBBB6FF48310F24852AE819AB210D7B19945CF90
                                                        APIs
                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 05CB4471
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2227372809.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5cb0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: CallProcWindow
                                                        • String ID:
                                                        • API String ID: 2714655100-0
                                                        • Opcode ID: 382c8e8d8ec23f2c669a3ea8a264b866a1ae6e6020b045e93bf78c8fcece97f9
                                                        • Instruction ID: bf9a29608886c9523216d89eb8f958c394a1385a1bc02288cf78b5d6ac73908b
                                                        • Opcode Fuzzy Hash: 382c8e8d8ec23f2c669a3ea8a264b866a1ae6e6020b045e93bf78c8fcece97f9
                                                        • Instruction Fuzzy Hash: DF414AB49002058FDB14CF99C488AAABBF6FF88314F24C858E509AB321D774A841CFA1
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 011D59C9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2219371160.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_11d0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 61bcde73e2f3de5a093383f9aa09d56145215520d5584ee8ec9504f5aa58c740
                                                        • Instruction ID: 397b37111008fafeb9ef9df79b3f597f519d30524aaebc3c362fa4c5eb69bd42
                                                        • Opcode Fuzzy Hash: 61bcde73e2f3de5a093383f9aa09d56145215520d5584ee8ec9504f5aa58c740
                                                        • Instruction Fuzzy Hash: 6C41E3B0C0072DCBDB28DFA9C884BDEBBB6BF49304F60805AD408AB255DB756945CF91
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 011D59C9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2219371160.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_11d0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 92672dfc230ff396880825792a3087ce690bb89fe512e999fcb0c123f19a7ff9
                                                        • Instruction ID: 1a591831ac06b0169fa6450a94ecc290daa9e212f1a1579940fc241ff982554b
                                                        • Opcode Fuzzy Hash: 92672dfc230ff396880825792a3087ce690bb89fe512e999fcb0c123f19a7ff9
                                                        • Instruction Fuzzy Hash: 1C41E4B0C0072DCBDB24CFA9C9847CEBBB2BF49304F24805AD408AB255DB75694ACF51
                                                        APIs
                                                        • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 0776A528
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: 0fb3f9c8a3061f1882ad0d5ea7962551cc706b44a50a55c57dd9a1507e942c62
                                                        • Instruction ID: be42b1835c78efc797d1f26c503cf80f42af9208a4db2230d5c052e9bf59ea2b
                                                        • Opcode Fuzzy Hash: 0fb3f9c8a3061f1882ad0d5ea7962551cc706b44a50a55c57dd9a1507e942c62
                                                        • Instruction Fuzzy Hash: 9F2148B1D0034A9FCB10DFA9C885BDEBBF1FF88310F11882AE919A7241D7749945CBA1
                                                        APIs
                                                        • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 0776A528
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: e7121b4ea9ac7b6dd69bb233d5deedbc54c7a4e5d309ed897fbf0aef6137efea
                                                        • Instruction ID: 967a422a0e5f3bb230fc5bcd9706bc3bc51f03c89b85825f5d51f29515a94ecf
                                                        • Opcode Fuzzy Hash: e7121b4ea9ac7b6dd69bb233d5deedbc54c7a4e5d309ed897fbf0aef6137efea
                                                        • Instruction Fuzzy Hash: F12127B1D003499FCB10DFA9C885BDEBBF5FF88310F108829E919A7241D7789944CBA1
                                                        APIs
                                                        • DrawTextExW.USER32(?,?,?,?,?,?), ref: 072C00D7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: DrawText
                                                        • String ID:
                                                        • API String ID: 2175133113-0
                                                        • Opcode ID: 060d5f30bf9e2b620f6c902653b4a84f147bb9ca0430194cfdc70c612254ea52
                                                        • Instruction ID: bf2c3e367d92fd790c283823debafc8ea5c5d5a55c005dc7cc1f52621dc3dccf
                                                        • Opcode Fuzzy Hash: 060d5f30bf9e2b620f6c902653b4a84f147bb9ca0430194cfdc70c612254ea52
                                                        • Instruction Fuzzy Hash: 2E21C0B5D1024A9FDB10CF9AD884A9EFBF4FB58320F15842EE819A7210D375A944CFA0
                                                        APIs
                                                        • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 0776A608
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: 06f0036e9750b6839ba4953ac5790f7b4a10dd02436b39170a2ff6ca39deb79f
                                                        • Instruction ID: 555a6f421da28c78474bd5ceaefcd34b9fe42effc07a1300700f7391225b7b55
                                                        • Opcode Fuzzy Hash: 06f0036e9750b6839ba4953ac5790f7b4a10dd02436b39170a2ff6ca39deb79f
                                                        • Instruction Fuzzy Hash: 0A2125B1D002499FCB10DFA9C885AEEBFF5FF88314F10882AE919A7240C7349945CBA1
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 0776D22D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: 2d0485134635c689fe42bd829b2648863e66e59b734a685da41ad94d514e9830
                                                        • Instruction ID: 882ab079da2e2e91b8b481cf07eb0526b1a553dbbd38fab90d8ccc08854df727
                                                        • Opcode Fuzzy Hash: 2d0485134635c689fe42bd829b2648863e66e59b734a685da41ad94d514e9830
                                                        • Instruction Fuzzy Hash: 7521ACB2F102298FDF21DFA5D5597EEBBF2AB48340F108859C841B7244CB75A944CBA0
                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07769F46
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: 423c1680b3d60b43ad8ce82092554e1b94567a6c345bef7631aaf12f983b3a50
                                                        • Instruction ID: 3b1df4038f1f9792addeeb5f45f78dfe920e4e587a8ae07559b71d40a6d2cd3c
                                                        • Opcode Fuzzy Hash: 423c1680b3d60b43ad8ce82092554e1b94567a6c345bef7631aaf12f983b3a50
                                                        • Instruction Fuzzy Hash: 962128B1D002098FDB10DFAAC4857EEBBF4EF88314F14842DD559A7241C778A949CFA1
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,011DD76E,?,?,?,?,?), ref: 011DD82F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2219371160.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_11d0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 63e87ab86fb872049e691d59a01094a031a8a333b876c465f5e6ad748c78bb7a
                                                        • Instruction ID: a356a21e4c978564005dba0459d1e5f00d581a7b105b840762408ec41eb6ea02
                                                        • Opcode Fuzzy Hash: 63e87ab86fb872049e691d59a01094a031a8a333b876c465f5e6ad748c78bb7a
                                                        • Instruction Fuzzy Hash: 912114B5D00208AFDB10CF9AD484ADEBFF8FB48310F10841AE918A7350D374A944CFA1
                                                        APIs
                                                        • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 0776A608
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: 0ed2f04c9934f79e6149e7642e5ee1b58266a0db3d709e451b701a69ae88d549
                                                        • Instruction ID: 4a7b89379bc0a9c8cf815ebb07072de1cb968cb4409f38cda8a86152ff94c727
                                                        • Opcode Fuzzy Hash: 0ed2f04c9934f79e6149e7642e5ee1b58266a0db3d709e451b701a69ae88d549
                                                        • Instruction Fuzzy Hash: 6E2139B1D003499FCB10DFAAC845AEEFBF5FF48310F108429E919A7240C7349945DBA1
                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07769F46
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: 812d26941661203fae20f00535c59b37a62e30ef8ac3cf8ce139a93fcab4d8f1
                                                        • Instruction ID: 4401f01b21007d21db817d28eeb48d3031bf0ed74db6ba59e267b71ab0f636c8
                                                        • Opcode Fuzzy Hash: 812d26941661203fae20f00535c59b37a62e30ef8ac3cf8ce139a93fcab4d8f1
                                                        • Instruction Fuzzy Hash: D82137B1D002098FDB10DFAAC4857EEBBF4AF88314F10842DD519A7240C778A945CFA1
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,011DD76E,?,?,?,?,?), ref: 011DD82F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2219371160.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_11d0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 42d4a08d9a3f2f3c95b049bee4c01a979e6f2df51300043c5f20f2941cc9e8d0
                                                        • Instruction ID: 34e28ebe46926a65e861c0dcfa3e5f74f74280ff920a92c6cf06e9835cb5f41f
                                                        • Opcode Fuzzy Hash: 42d4a08d9a3f2f3c95b049bee4c01a979e6f2df51300043c5f20f2941cc9e8d0
                                                        • Instruction Fuzzy Hash: B821EEB5D002099FDB10CFAAD985ADEBBF8FB48310F15845AE918A7350C378A944CF61
                                                        APIs
                                                        • VirtualProtect.KERNEL32(?,?,?,?), ref: 072CDA83
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: caa2a54e6188493059e3811ecf09b0f8ee14925cf3aa14463dc2fe70711be2eb
                                                        • Instruction ID: 320a1f5d70cb73f74656d910cba945700d716ca1964683080599a081883cbb22
                                                        • Opcode Fuzzy Hash: caa2a54e6188493059e3811ecf09b0f8ee14925cf3aa14463dc2fe70711be2eb
                                                        • Instruction Fuzzy Hash: 2421F4B5D002499FCB10DF9AC884BDEBBF4FB58310F148429E858A7350D374A544CFA5
                                                        APIs
                                                        • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 0776A00E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 3eabb9dc038c28b30b6f65904ac3b4f4ed1e0d4f10c887adb9bb799625fcc111
                                                        • Instruction ID: 2efa3da3a352ae292a1a21601a665a0282e753952aac885cec18ae92591ae603
                                                        • Opcode Fuzzy Hash: 3eabb9dc038c28b30b6f65904ac3b4f4ed1e0d4f10c887adb9bb799625fcc111
                                                        • Instruction Fuzzy Hash: A32167B1D002499FCB20DFAAC445AEFBFF5EF88314F208819E459A7210C7369905CF90
                                                        APIs
                                                        • VirtualProtect.KERNEL32(?,?,?,?), ref: 072CDA83
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 9293e9189932bb4a94caaaf26572cf3c77e645e13fb959e1691436902717725a
                                                        • Instruction ID: 0642f4956c307135405e1f24fdb28953655ffca2809e6d211498f664842b8b9c
                                                        • Opcode Fuzzy Hash: 9293e9189932bb4a94caaaf26572cf3c77e645e13fb959e1691436902717725a
                                                        • Instruction Fuzzy Hash: 1721D3B5D002499FCB10DF9AC884ADEFBF8FB48320F148429E958A7350D378A944CFA5
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: 0f757df5ba70692ea53af368dd8fc9d8a2390029cdde0c112e6cb9d921abcdb6
                                                        • Instruction ID: 3b4610c04ce9990186e55a93d3bc1448f2fc5f2eb443510ef03def001f5d4cb7
                                                        • Opcode Fuzzy Hash: 0f757df5ba70692ea53af368dd8fc9d8a2390029cdde0c112e6cb9d921abcdb6
                                                        • Instruction Fuzzy Hash: 161149B1D002498FCB20DFAAC4496EEFFF5EF89314F248419C559A7240C775A945CF91
                                                        APIs
                                                        • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 0776A00E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 6bd416afccee75c0cbf78faf87addf82c3728c82ea07b89fe618fb05ff13cd83
                                                        • Instruction ID: 0deaa0b7881abb9eb7831e23b6e125b247c2addfd34138ed3a983c5d73d553a6
                                                        • Opcode Fuzzy Hash: 6bd416afccee75c0cbf78faf87addf82c3728c82ea07b89fe618fb05ff13cd83
                                                        • Instruction Fuzzy Hash: 5B1137B2D002499FCB10DFAAC845ADFBFF5EF88324F108819E519A7250C775A954DFA1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: 5f93112129fcd87190fb6fe83d35311e55cf6377105696f0e02c1f02ff6ef4d0
                                                        • Instruction ID: 3ab45beda424221ef56d2877d97d59d9f69a59110256bb05b3e2d6f29dce2021
                                                        • Opcode Fuzzy Hash: 5f93112129fcd87190fb6fe83d35311e55cf6377105696f0e02c1f02ff6ef4d0
                                                        • Instruction Fuzzy Hash: 4B1125B1D002498BCB20DFAAC4497DEFBF8AB88324F208819D559A7240CB75A944CFA5
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 0776D22D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: a0234010ac71b5cfeca50e4112346f7465ad70490594bcdc6a0bd6b83d8b17d3
                                                        • Instruction ID: e4871969c9276b1db8236892c55fe3b29f9ff70f149ebcf3695b3755e5cda34b
                                                        • Opcode Fuzzy Hash: a0234010ac71b5cfeca50e4112346f7465ad70490594bcdc6a0bd6b83d8b17d3
                                                        • Instruction Fuzzy Hash: 0B11F2B59103499FCB20DF9AD488BDEBBF8EB58320F108859E919A7200D375A944CFA1
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 0776D22D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: f25bed122602865c51e51241503b1ba463236df2c18c725f76e000977f46c687
                                                        • Instruction ID: e086d88757c96e3df91f16850e92ca1e655b5b87560189c692880ac86aa1b9fb
                                                        • Opcode Fuzzy Hash: f25bed122602865c51e51241503b1ba463236df2c18c725f76e000977f46c687
                                                        • Instruction Fuzzy Hash: F411F5B59002499FCB20DFAAD489BDEBFF4EB58310F148459E854A7200C375A948CFA1
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 011DB546
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2219371160.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_11d0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 97726950c7bfe04625613e7d2efaef9670199274a7c0713ea79b034c4c972b04
                                                        • Instruction ID: 31ee91682de6dde273a2cd20b8fb4a35766e77e6b019d1332befe0e23f15ebd8
                                                        • Opcode Fuzzy Hash: 97726950c7bfe04625613e7d2efaef9670199274a7c0713ea79b034c4c972b04
                                                        • Instruction Fuzzy Hash: 0C1110B5C002498FDB14DF9AD444ADEFBF8EF89310F11845AD519B7200C379A545CFA5
                                                        APIs
                                                        • DrawTextExW.USER32(?,?,?,?,?,?), ref: 072C00D7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID: DrawText
                                                        • String ID:
                                                        • API String ID: 2175133113-0
                                                        • Opcode ID: 26ae716ed7438786441a4df1b356d9b155d3b77f665da1991f840775dcb4652b
                                                        • Instruction ID: caa6e6aed3dd19fe33c69fb649038f3775e8cc20e725a33b5dde0b7028ea4c35
                                                        • Opcode Fuzzy Hash: 26ae716ed7438786441a4df1b356d9b155d3b77f665da1991f840775dcb4652b
                                                        • Instruction Fuzzy Hash: 38F0CDB2915388CFD7218BA9D8083C9BFF1EB66310F2A845BC195E3252C374444ACB62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @
                                                        • API String ID: 0-2766056989
                                                        • Opcode ID: fcb8a608d878068477485b627ceedd99da0141f219cd1b932191ec5c919c7949
                                                        • Instruction ID: ff392e7fefa22ec9b2eca0140ca6661e13568db09e1ec6eaac083e10bedaf818
                                                        • Opcode Fuzzy Hash: fcb8a608d878068477485b627ceedd99da0141f219cd1b932191ec5c919c7949
                                                        • Instruction Fuzzy Hash: 9091B2B0F0031ADFCB14DFA9C484AADBBB1EF49319F14846DE806AB355CB749945CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Tecq
                                                        • API String ID: 0-1122318316
                                                        • Opcode ID: 42cfd9b11c957280287f5f91ccf1b8c0900cc28e94495d8ca44303291e85fe5e
                                                        • Instruction ID: 293f0a4ec084dd6e35c53d338cff382fbc78725d68a493f06aeb639d3c24119a
                                                        • Opcode Fuzzy Hash: 42cfd9b11c957280287f5f91ccf1b8c0900cc28e94495d8ca44303291e85fe5e
                                                        • Instruction Fuzzy Hash: 4351C171B002169FCB00DFB9D8949AEBBF6EFC4325B148969E419DB390EF309D0587A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3916222277
                                                        • Opcode ID: 6b3a8bea6d691a417291f9d5c3ed53128fcecb164afcb20d34647c8add522f61
                                                        • Instruction ID: 582b6ef6b00b5d64450b510548c2b45d50f0297a76dc78070eeb76c2c01fbc4d
                                                        • Opcode Fuzzy Hash: 6b3a8bea6d691a417291f9d5c3ed53128fcecb164afcb20d34647c8add522f61
                                                        • Instruction Fuzzy Hash: CD511AB1A0020ADFDB14DF69D884A9EBBF1FF88315F14C229E819A7250D774EA51CF90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @
                                                        • API String ID: 0-2766056989
                                                        • Opcode ID: 665f35a082a606dbfb65cbb047f697aa4b0d7ee379e77d97fd76c5567c022df5
                                                        • Instruction ID: 27a5bc6de51c97a362d8591c483bfb94308f2f5ef47ad2b963e3ec65d6defffc
                                                        • Opcode Fuzzy Hash: 665f35a082a606dbfb65cbb047f697aa4b0d7ee379e77d97fd76c5567c022df5
                                                        • Instruction Fuzzy Hash: DF1106F0B00307EFDF15ABA894842BDBBB2EF84205F004479C90A9B245CBB18955D762
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Tecq
                                                        • API String ID: 0-1122318316
                                                        • Opcode ID: 5536ef1ed59e62f9194fe92f736ee677bc3cf92ebb579ea5cf44dfc4f7ae58b9
                                                        • Instruction ID: 43fc242f17b28b73d3e35907c1d271a0d2a5824dfeb20d7ddbba54e57c666c29
                                                        • Opcode Fuzzy Hash: 5536ef1ed59e62f9194fe92f736ee677bc3cf92ebb579ea5cf44dfc4f7ae58b9
                                                        • Instruction Fuzzy Hash: CB114F71F0020A9BDF14EBB999405EFB7F6AFD8315B144069C505E7284EB318E01CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'cq
                                                        • API String ID: 0-182294849
                                                        • Opcode ID: 098b2ad148042dede932ce4c66b5eb9fec6600aca2e0d3ce4573c83e79572b4b
                                                        • Instruction ID: e33e1b6926eebb5fa087e0ffe23c376e686ceeefb85170f47904d0e1269b6bdb
                                                        • Opcode Fuzzy Hash: 098b2ad148042dede932ce4c66b5eb9fec6600aca2e0d3ce4573c83e79572b4b
                                                        • Instruction Fuzzy Hash: C6018F70910209EFCB04EFF8E94668C7FB1FB44208FA044A9E80993355EB355E48CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'cq
                                                        • API String ID: 0-182294849
                                                        • Opcode ID: 4f69905a13b945e7ee029315800f2a80ba418bc0af1c69306263d2fb9dc39e95
                                                        • Instruction ID: 335244b2d219577b6a0f9c408715cd296f5f7df3f8039e36c3bd09acded075f9
                                                        • Opcode Fuzzy Hash: 4f69905a13b945e7ee029315800f2a80ba418bc0af1c69306263d2fb9dc39e95
                                                        • Instruction Fuzzy Hash: 7FF08C70A10209EFCB44EFF8E64655C7FB1FB48209B6045A9E805A3355EF301E48CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ca0fa6a6daca3e6d19e1f2457a22a5c99de6537e0b44100b2560775f397f5f27
                                                        • Instruction ID: 4de6bafc12a2742e688087be0e4006c10f899c823e8ce65877bca9439f5fc447
                                                        • Opcode Fuzzy Hash: ca0fa6a6daca3e6d19e1f2457a22a5c99de6537e0b44100b2560775f397f5f27
                                                        • Instruction Fuzzy Hash: EF627FF0D14BC3DAD7789BBC88C839DBBA1AB4130DF14492ED0BACB241DB7496819B45
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aa9678794f3bb221a162a301c0d47af268cf4afcb33a10edcad1613e2d7bf228
                                                        • Instruction ID: 41f05a72179d7404c0b2be1b25796075f3e499836f96e719581da101b0806f2e
                                                        • Opcode Fuzzy Hash: aa9678794f3bb221a162a301c0d47af268cf4afcb33a10edcad1613e2d7bf228
                                                        • Instruction Fuzzy Hash: 448113B47106028FCB18EF28D598A697BF6FF89709B1541A9E502CB371DB71ED01CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ea3574d064ce63e925ca5aea46002bb14d6ed8b36bb1b4937150121f29cc25bb
                                                        • Instruction ID: b1e094cf4a12f755f4d0b1b4345334afd7b1b84dce4876f258128a3cf775d51f
                                                        • Opcode Fuzzy Hash: ea3574d064ce63e925ca5aea46002bb14d6ed8b36bb1b4937150121f29cc25bb
                                                        • Instruction Fuzzy Hash: B881D675A10209DFCB14DFA4D8889EDBBB1FF89305F108569E502AB364EB71D945CF90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d6078a3ee5ab90d85a2b526dfbed28f27cdba553d178925dcb0cee9120bd13cf
                                                        • Instruction ID: 3a986f1732149d884745f9ed24f80a6003810b45b81832260a5a4d55196c84a4
                                                        • Opcode Fuzzy Hash: d6078a3ee5ab90d85a2b526dfbed28f27cdba553d178925dcb0cee9120bd13cf
                                                        • Instruction Fuzzy Hash: 6E818071B00206DFCB14DFA8C484AAEBBF2FF89315F1584B9D04AAB655DB31AD41CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e00e129a728a44826417ddfb9bef30e451fb3642a73b78e0c56239027727e525
                                                        • Instruction ID: a87022f47010bb67d0a85eae4d5e4c7a6a18f62c8fae906fba440b92377ad978
                                                        • Opcode Fuzzy Hash: e00e129a728a44826417ddfb9bef30e451fb3642a73b78e0c56239027727e525
                                                        • Instruction Fuzzy Hash: 4A718C74E1021ACFDB14DFB9C8986ADBBB1FF88305F108529E906E7250EB349A45CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 10c22ff05e5f91fb3b51bbee1fcc5bf39151d6565536812bda7aaf92ac1aa93a
                                                        • Instruction ID: c27073811fad3ab2e119daebf4381a0ad8ba2b95a213bff154583dd53195a7cd
                                                        • Opcode Fuzzy Hash: 10c22ff05e5f91fb3b51bbee1fcc5bf39151d6565536812bda7aaf92ac1aa93a
                                                        • Instruction Fuzzy Hash: ED71AF74A01219EFCB14DFA9D884D9EBBB6BF88719F114498F901AB361DB31ED81CB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 620fd05613bf01b9ddec5d46bda312c946dab25e12226ad1ffaa8868c91c82b8
                                                        • Instruction ID: aba918d3186986bf536c6c1d7cbe2ce8626dbfa79e6d764d038bc6cac53f23cc
                                                        • Opcode Fuzzy Hash: 620fd05613bf01b9ddec5d46bda312c946dab25e12226ad1ffaa8868c91c82b8
                                                        • Instruction Fuzzy Hash: 7C51BFB070020AAFCB14DF69C484BA9B7F6EF89309F144069E50ACB3A0DB75ED41CB51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 06924997fa70a0e395f200d95bfe76baa1648899c414414466615416b5bc4ee8
                                                        • Instruction ID: b51276be5a506b50eff7ecc9e2261703bf1abc5158698524a8e1d19388a5f818
                                                        • Opcode Fuzzy Hash: 06924997fa70a0e395f200d95bfe76baa1648899c414414466615416b5bc4ee8
                                                        • Instruction Fuzzy Hash: 7D41BDB0B0020AEFCB14DF69C484BA9B7F6AF89309F184069E409DB7A0DB75ED41CB51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5784689346902a4825d9bb787363438fb282ad853d28c4013a81b45ab105c590
                                                        • Instruction ID: 210d26fbb6b38dd3fdb1ff2cac76b1750813e259d97ba2038b28358c1c228662
                                                        • Opcode Fuzzy Hash: 5784689346902a4825d9bb787363438fb282ad853d28c4013a81b45ab105c590
                                                        • Instruction Fuzzy Hash: 81417970B1416A9FDB14DB6AC884EADBBF6BF89709F1440A9E501EB3A1DB71D900CB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fd5c57befb4be91a28ba68d2d2f907b7d5af14cab87bab08e3589ccd8d036e4b
                                                        • Instruction ID: 167d1dc2b02aad8775c6e7ecd3bfe38597ebea6049d48cb63774025184dc087c
                                                        • Opcode Fuzzy Hash: fd5c57befb4be91a28ba68d2d2f907b7d5af14cab87bab08e3589ccd8d036e4b
                                                        • Instruction Fuzzy Hash: A3418F35E0021A8BDF14DE69D4846EEB7F1FF88315F04852AE405E3280DB38DA85CB60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 29b6b0d525e2f057efef19b3ec8613a24ce2f2047d3942055e4a6e739ccb48c7
                                                        • Instruction ID: b7cb38de7b850f6cc44890023a5d0a39716165e1765b49874d96d423bd492995
                                                        • Opcode Fuzzy Hash: 29b6b0d525e2f057efef19b3ec8613a24ce2f2047d3942055e4a6e739ccb48c7
                                                        • Instruction Fuzzy Hash: 16412C74A0022A9FDB04DBA8C884FDDB7B1BF88719F114054EA05BB3A1D734ED01CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8476a808e38fa05392ca542697ee537adc3dd422e8a1247c65e3ace75c137d37
                                                        • Instruction ID: b4a15252cfd1978c8431434883a1341cf04e237c910a039393cdda527805bddd
                                                        • Opcode Fuzzy Hash: 8476a808e38fa05392ca542697ee537adc3dd422e8a1247c65e3ace75c137d37
                                                        • Instruction Fuzzy Hash: 07416271D2060ADFCB14EFA8D944ADDBBB1FF49305F10C129E54577250EB30AA98CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 82e9a7344d8e9fc3623e8fb8505f15a9ac8115f68bef9e7a73950c839d6c4bba
                                                        • Instruction ID: 23bf3bdc847e70ad1abb97c9760077176d2f5200a266b90f0ecf912432801098
                                                        • Opcode Fuzzy Hash: 82e9a7344d8e9fc3623e8fb8505f15a9ac8115f68bef9e7a73950c839d6c4bba
                                                        • Instruction Fuzzy Hash: 90415BB1A10B069FD730CF38D48675AB7F1FB45296F144E29E1AAC7610E770E584CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cbd18f26253a4885177356833123a88404ce4f693a208a104763fd683f72e4dc
                                                        • Instruction ID: c8c67d03ae81970cd7763a682e16d372201b4139a0cd5f4c1fa168fcc63dbf62
                                                        • Opcode Fuzzy Hash: cbd18f26253a4885177356833123a88404ce4f693a208a104763fd683f72e4dc
                                                        • Instruction Fuzzy Hash: B431CFB57046029FCB05DF28C8949AD7BF6EF8A60571A41AAE502CB371DB30DD05CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a83988134f866ae39cffbfae319985e5138f3e92c703b7b7ed0a232fd49ddeca
                                                        • Instruction ID: 89e85eba47edfd5dee4a7f1b3ebbaad707f086314726376c101fcc01d187ab04
                                                        • Opcode Fuzzy Hash: a83988134f866ae39cffbfae319985e5138f3e92c703b7b7ed0a232fd49ddeca
                                                        • Instruction Fuzzy Hash: 0E316076E0421A9BDF14CE69D4817EEB7F1FF88311F15852AE804E3290DB38DA85CB60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a607283155c80c4708d81860e459a7b830a2df60896d6d6464df23f674010fe8
                                                        • Instruction ID: 41b319700d4a1fafc01e0cafd0b13d23550a714e9b4082e5cdb4f5e1c92ca05f
                                                        • Opcode Fuzzy Hash: a607283155c80c4708d81860e459a7b830a2df60896d6d6464df23f674010fe8
                                                        • Instruction Fuzzy Hash: F03104F1300603DBCB199F29C8851AA7F71EFA2309F24886CE4538B749C736D956C7A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d9f849e9ba555b2f11d858c67f4b1553d84399dd4b4aa370d015aaffcfc12949
                                                        • Instruction ID: 0d9efec7a2f59958d219c8943d2417ea0b3b626b2ea1952756ecd35b48ef0bf5
                                                        • Opcode Fuzzy Hash: d9f849e9ba555b2f11d858c67f4b1553d84399dd4b4aa370d015aaffcfc12949
                                                        • Instruction Fuzzy Hash: 3F3104F1704202DBCB19DF29C88509A7F71EF92209B24886DE0538B64AD735C95AC7A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 450e27efb4ab8cc084d52e6668ecc9220ab24417f5c462e95d8851ab4d47f137
                                                        • Instruction ID: 7cbd364176290804d5db6c3ecc0ba2278f03c948bbaf0afeb91f2105bb100617
                                                        • Opcode Fuzzy Hash: 450e27efb4ab8cc084d52e6668ecc9220ab24417f5c462e95d8851ab4d47f137
                                                        • Instruction Fuzzy Hash: 7C3126B13043438FC7269B34D4A456A7BB7AFC621A70848AEC882CB292EF31DC05C711
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 332c8eda63ca3613219945736513431086c35c81a9855bfca715e42bbc74f4d2
                                                        • Instruction ID: d5ea6f48991cea003bb95c6321fac397f1796de84d00017a14815f65940adbd9
                                                        • Opcode Fuzzy Hash: 332c8eda63ca3613219945736513431086c35c81a9855bfca715e42bbc74f4d2
                                                        • Instruction Fuzzy Hash: 8D21F4B5B102129FCB19DB3CD44495D37E9AF8862A71140AAE909CB370EF70DE01CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 45a94417229b1706276777c4322961ac822e259d076f0507a7ae2fced27f97cf
                                                        • Instruction ID: cf8e57578b3067c2cad9069a19f8e6ebba4de1d6a74e2bed29fb771ef24af11f
                                                        • Opcode Fuzzy Hash: 45a94417229b1706276777c4322961ac822e259d076f0507a7ae2fced27f97cf
                                                        • Instruction Fuzzy Hash: 9B31F379A2021ADFCB04DFA9E884DADB7F5FF88705F1581A9E915AB361C730E900CB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9db5edf1a16cae0496488ba223cb25fedfb191ca7b3b38e0d57687256bf1ac95
                                                        • Instruction ID: 546421957845a6148775160b874a7b4d4c6ee5a210a564b2e59c5cca58f33fc1
                                                        • Opcode Fuzzy Hash: 9db5edf1a16cae0496488ba223cb25fedfb191ca7b3b38e0d57687256bf1ac95
                                                        • Instruction Fuzzy Hash: F6216AB7B006125FDB28CB64C9D257E77E6EFC4319B188469D146D3390D638FA80CB61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5c7c3c3f9bfbe8ec7558a00b9b5e1c99096d46208a5e5b732a6d896322aa0cf5
                                                        • Instruction ID: 2e133f553aa6caf802f99b159580453ae5c375a63c465d6958b059dc6402afa6
                                                        • Opcode Fuzzy Hash: 5c7c3c3f9bfbe8ec7558a00b9b5e1c99096d46208a5e5b732a6d896322aa0cf5
                                                        • Instruction Fuzzy Hash: 8221D6F1D1551ADACB027FBCE89A0BFBF35EF41316F100999E5C1A2094EB3148A88BD5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 57817677b02e64b16f1bd25ec1a669c36c5262e9af50973ddbbe6b3f28af17ae
                                                        • Instruction ID: 5bd159ea7a0bd43ba1c2c18b8bd1187426b5a87b76c5fe0a7fe9786f64188473
                                                        • Opcode Fuzzy Hash: 57817677b02e64b16f1bd25ec1a669c36c5262e9af50973ddbbe6b3f28af17ae
                                                        • Instruction Fuzzy Hash: 082126B7700A125FEB28CB65C8C257E77EAEBC425DB288429D507D3754C634FA80CB61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ce6333ad26d27a14dde7dcf414c891d3ae0132dc5147925224e855ef26215155
                                                        • Instruction ID: 23c9bb10fbeb3a926ede9d2b6418e57f349d6ed2e64c221801487d323107669c
                                                        • Opcode Fuzzy Hash: ce6333ad26d27a14dde7dcf414c891d3ae0132dc5147925224e855ef26215155
                                                        • Instruction Fuzzy Hash: FB21F6B0710B06AFD734CF38D486716B7F5FB45296F040E29E1AACB600E771E9988B91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2217509348.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_d6d000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 106089065c27fa16679135bfc333b75c1f3cb52e3ba8a09a8189e9a81d1c1a13
                                                        • Instruction ID: 875e140a85e61752dda2464fbb3f1ea5b884cbabacf1c62a7442e845dd150bf8
                                                        • Opcode Fuzzy Hash: 106089065c27fa16679135bfc333b75c1f3cb52e3ba8a09a8189e9a81d1c1a13
                                                        • Instruction Fuzzy Hash: 4D2125B1A04244DFDB05DF54E9C0F26BF66FB98314F388569E94A0B256C336D816CAB2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3369caac5468ceb170fd55820617b989956fd437ca33e33ff17a776b38c03c11
                                                        • Instruction ID: 4afe1fa49e2437116381fc23f1405389a77ec497590259dd47dab4622d878284
                                                        • Opcode Fuzzy Hash: 3369caac5468ceb170fd55820617b989956fd437ca33e33ff17a776b38c03c11
                                                        • Instruction Fuzzy Hash: 8221B3F1D0560ADBCB027FA8E95A0BEFF35FF41316F110999D5C1B2494EB3148A98BA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 29575b8e38843fc923227d9bfd2d4fa8d66788bfb98db374cc80eaed87f7ce74
                                                        • Instruction ID: 41b5c103386db37153c76b3e621f05476dfc335223b635862b7fafeb0893a1c8
                                                        • Opcode Fuzzy Hash: 29575b8e38843fc923227d9bfd2d4fa8d66788bfb98db374cc80eaed87f7ce74
                                                        • Instruction Fuzzy Hash: A521F372701606DFCB249B19E444A2ABBE2FFC8326B10846EE509C7340DB35ED458BA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b2ff543ce2142e1ea83a08669f9ee4652b957cf9b4c61008ad4fdb01ae8f8d2b
                                                        • Instruction ID: e56a4ee1c9999acb86922244b27833929ddeaeec4c92f073c532a1742b814950
                                                        • Opcode Fuzzy Hash: b2ff543ce2142e1ea83a08669f9ee4652b957cf9b4c61008ad4fdb01ae8f8d2b
                                                        • Instruction Fuzzy Hash: 5C215EB5700222AFCB24DE19D5C0A6A73A6FBC8729B10442EE54687750D771ED418B50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9bba87eb05d79b19972d331a276325d89a60ba7c32eec48f9eb09f23eed17b38
                                                        • Instruction ID: 9419103cb4f6277fec8a71bc3de5cd1d03bc28eabe53992483d6efcc8ae4db05
                                                        • Opcode Fuzzy Hash: 9bba87eb05d79b19972d331a276325d89a60ba7c32eec48f9eb09f23eed17b38
                                                        • Instruction Fuzzy Hash: D9214FB03112129FCB58DB2DC894A6977E5FFC9619B60846DE506CB3A1DB71EC42CB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e689ec09498586123dabf30fbba2458f2852865a09e3c5df0e0b5336291bea95
                                                        • Instruction ID: 814e63831f0ea50b12cd4bc3799e1cea4a3acc21efbf042cec23b355472755d0
                                                        • Opcode Fuzzy Hash: e689ec09498586123dabf30fbba2458f2852865a09e3c5df0e0b5336291bea95
                                                        • Instruction Fuzzy Hash: 56210072E0020ADBCB249F64D0183EEBBB2FF88316F14C129E40677244CF359948CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2217641354.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_d7d000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c10f1248eff65df278d96d84722fc2685482c0c19518adebc46b8e4b3639c9d6
                                                        • Instruction ID: 03590b3a8ca2c2f06996387db90e6d38fab72df986efb5aa060eda74bdcbb7f7
                                                        • Opcode Fuzzy Hash: c10f1248eff65df278d96d84722fc2685482c0c19518adebc46b8e4b3639c9d6
                                                        • Instruction Fuzzy Hash: 4521CFB1604200AFDB05DF14D580B26BBB6FF84314F28C5A9E84E4B242D336D806CA75
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2217641354.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_d7d000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: abc0945a5d4bff6ded53320a2cc6a476c52843a9b366b0354b3ae16a9436aa0b
                                                        • Instruction ID: dd76ff9f4f0db37bdbb8cbe5caaec895291b4d966244795622f3c7f4858be7fd
                                                        • Opcode Fuzzy Hash: abc0945a5d4bff6ded53320a2cc6a476c52843a9b366b0354b3ae16a9436aa0b
                                                        • Instruction Fuzzy Hash: A721F2B1504204DFDB04DF54D9C4B26BBB6EF84318F28C56DE84D4B296D336E846CA72
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bcbe26fd32a66dca8b831c2919272fac7b71cb454c9575d90c0c8b55dcbc6a98
                                                        • Instruction ID: 5c2114291bbaae66778cfc550b00caa3c502a867f90f1de71d050c3121ebcc50
                                                        • Opcode Fuzzy Hash: bcbe26fd32a66dca8b831c2919272fac7b71cb454c9575d90c0c8b55dcbc6a98
                                                        • Instruction Fuzzy Hash: E921FF75E0021A9FCF05DFA9D8409EDFBB5FF8C311B148266E958A7200D771A995CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8fea7e3e433ae9705fc231471d16510c0349ab4bb324a5647e89e104af869973
                                                        • Instruction ID: 20176ce80a3c5865578dd48674affd21a58db3fe4c02d120b3a078594d5d3df6
                                                        • Opcode Fuzzy Hash: 8fea7e3e433ae9705fc231471d16510c0349ab4bb324a5647e89e104af869973
                                                        • Instruction Fuzzy Hash: 512180B03012129FCB18DB28C494A2A73E5FF85619B5484AEE806CB3B1DB71DC46CB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1892eec027c9227e8f4be89e0e97f47b9ff34ff4f7859ae8fd92f0278e6155b0
                                                        • Instruction ID: feb6c474e625812c0d39df4b7f8b8267e22715075f6cfb82afe2deb9fa2b6c46
                                                        • Opcode Fuzzy Hash: 1892eec027c9227e8f4be89e0e97f47b9ff34ff4f7859ae8fd92f0278e6155b0
                                                        • Instruction Fuzzy Hash: 252183F1D1150ADBCB017FA9E48A0BEFF35FF41316F000959E582B2094EB3148A88BD5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3c3e1df7f6a1be3330d52afe240aa2fa01b89041338bd556985d537be3a5bff1
                                                        • Instruction ID: 7619fec784b0b38c3dd6094c27f6b674d179fe59330f3058b36132c60b54af3e
                                                        • Opcode Fuzzy Hash: 3c3e1df7f6a1be3330d52afe240aa2fa01b89041338bd556985d537be3a5bff1
                                                        • Instruction Fuzzy Hash: EA213B75E0021A9FDB05DFA8C8409DDFBB5FF48310F14826AE914B7240E731A995CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 17a893ca94e37ede44f24c12dbb2192026cd2f66aad7ff63a8602bd876f8cb2c
                                                        • Instruction ID: 545aae03dd8589c753285ccd8def4a5fbf8034bdc9bd4499780cbe42c377d923
                                                        • Opcode Fuzzy Hash: 17a893ca94e37ede44f24c12dbb2192026cd2f66aad7ff63a8602bd876f8cb2c
                                                        • Instruction Fuzzy Hash: C33100B0C00319AFDB20DF9AD889BCEBFF4EB08315F64841AE404BB240C7B55945CB95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fc65922b243416be104c867937fbfe027f67fe57b0e67de2e7364a0c0282b7de
                                                        • Instruction ID: 194f56331a3fd20958815398194b9a2a78be69e7219b7e264ef1827884ec20b1
                                                        • Opcode Fuzzy Hash: fc65922b243416be104c867937fbfe027f67fe57b0e67de2e7364a0c0282b7de
                                                        • Instruction Fuzzy Hash: 46215971A10219DFCB08EB68C895AEDB7B2FF88305F654468E401AB360CB769D01CB60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 86aa5d96154b6cbdb18280ac79ce8559a67d6cf38005e3f56919add26af08046
                                                        • Instruction ID: d6288c5127c34b3ca83700968e8c960933e6fe5e03798c0edff9e25a556c9c0c
                                                        • Opcode Fuzzy Hash: 86aa5d96154b6cbdb18280ac79ce8559a67d6cf38005e3f56919add26af08046
                                                        • Instruction Fuzzy Hash: 3811BE753006108FC710AB28D888A6E7BE9FF89215B1549AEE446CB360DF309D01CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fdc4de783f07db88db997b84277d03421abc730303b0d0a1963c631c2e7f9a8c
                                                        • Instruction ID: be99d0ceb8f258d49f1be3315f1bef36095cba0d48b51bf3e14b8b921d0b83c4
                                                        • Opcode Fuzzy Hash: fdc4de783f07db88db997b84277d03421abc730303b0d0a1963c631c2e7f9a8c
                                                        • Instruction Fuzzy Hash: FC31E0B0D10319AFDB20DF9AD988B9EBFF4EB08319F648459E804BB240C7B55945CB95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1675c1095ca8b79c15759c31836481b7e5788fbf59071109ba1dee9493ffe2d9
                                                        • Instruction ID: c229a7f9602982abf1cc1481e219c37d74687df877762397f54050c7596b350e
                                                        • Opcode Fuzzy Hash: 1675c1095ca8b79c15759c31836481b7e5788fbf59071109ba1dee9493ffe2d9
                                                        • Instruction Fuzzy Hash: 0E21C972E1021A9FCB44DFADC8449AFFBF9FF98200B11855AE518E7210E770A956CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 48bc1173d2124ea56a8f7d4c74420349cadf3196e59def614782294f0483aff7
                                                        • Instruction ID: 973ada9bf6471c60cb06c2dbc82ed547cb86c1c0561a982c725fb70960443a1c
                                                        • Opcode Fuzzy Hash: 48bc1173d2124ea56a8f7d4c74420349cadf3196e59def614782294f0483aff7
                                                        • Instruction Fuzzy Hash: 3721EFB8E0021ADFCB01DFA8D994AEEBBF1EB48215F10816AD818A7751D7346945CFA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0a8bf919ed5a9392073833d00c40820016c84e0c125f42fab01617365abe550c
                                                        • Instruction ID: 8840bdde487a005ceeba046cd04e491bd32680d7510e8b0e1deee09496598825
                                                        • Opcode Fuzzy Hash: 0a8bf919ed5a9392073833d00c40820016c84e0c125f42fab01617365abe550c
                                                        • Instruction Fuzzy Hash: 06214AB5700622AFCB24CF15C5D4E6AB3B6BFC8629B05842EE54687B60D731ED41CB10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3a83932b0dcb079c0f8eb6229e5afd78eba21311224f9a5639fb1fec70b0607a
                                                        • Instruction ID: ee26f7a09b0195a1333e146b30ca9fd931b81f3063c69bdf69c1429845051c71
                                                        • Opcode Fuzzy Hash: 3a83932b0dcb079c0f8eb6229e5afd78eba21311224f9a5639fb1fec70b0607a
                                                        • Instruction Fuzzy Hash: 1F211875A10219DFCB08EF68C898AEDB7B2FF8C315F154468E402AB3A0DB759D01CB61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1134ab90cd491d9c4555ec71515b5ea549c5eb060f8a013711f5ea8da6029a56
                                                        • Instruction ID: 8810dd6124bb0bde3a544420c9454a5d7c44046ec7e158249d996f086ce4b012
                                                        • Opcode Fuzzy Hash: 1134ab90cd491d9c4555ec71515b5ea549c5eb060f8a013711f5ea8da6029a56
                                                        • Instruction Fuzzy Hash: 57119E757106149FC714EB3CD888A6EBBEAEF89215B14456EF406CB360EF31AD01DBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2f292338d3454bbe6fa45ea3dc7c82274f321bc5c680b52b13e39c59f62288a0
                                                        • Instruction ID: 0e1810f8212689c0c245a9e8beccb03c8a17e79529a557e71dca688bc46b378b
                                                        • Opcode Fuzzy Hash: 2f292338d3454bbe6fa45ea3dc7c82274f321bc5c680b52b13e39c59f62288a0
                                                        • Instruction Fuzzy Hash: CA1129B6F002066B8B10DE79DC456BFBBFAEBC4255B548528E418E7340EF709E0587A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d6b2a5b0125ddd7b5939d7f97717949917f151ada91a8a673bf7af950526e0de
                                                        • Instruction ID: de78c385015da8cbbbe8b842fb107d07d76d566d0ef4d23922092373e03e7321
                                                        • Opcode Fuzzy Hash: d6b2a5b0125ddd7b5939d7f97717949917f151ada91a8a673bf7af950526e0de
                                                        • Instruction Fuzzy Hash: DD21BDB4E0021ADFCB01DFA9D984AEEBBF1EB48315F10812AE819B7350D7346945CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ffe85ed6bb0d7aa809ab8cfe9584a421bbadbf99a9c6daa3923cbc04b693578b
                                                        • Instruction ID: 3177340328077f1d3a3242fd39447a76996fd625467a94b6efcf65929956a67c
                                                        • Opcode Fuzzy Hash: ffe85ed6bb0d7aa809ab8cfe9584a421bbadbf99a9c6daa3923cbc04b693578b
                                                        • Instruction Fuzzy Hash: AA114C7630434A6FCB115BA898847BB3FB69B85215F1C846BF509CB182CA79C846D3A2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 45bf09d11428453b65dfdd006aec7eab3988b9e0722d469162544ed03a9128df
                                                        • Instruction ID: 3ec3d83fbefb455ef320761de692d8d023c5164f002909a16fcdeaba3687899d
                                                        • Opcode Fuzzy Hash: 45bf09d11428453b65dfdd006aec7eab3988b9e0722d469162544ed03a9128df
                                                        • Instruction Fuzzy Hash: B521CC71E1020A9F8B04DFADC8448EFFBF9FF98210B10855AE518E7215E770A956CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8e91aa81ebd0083b953b8e4e23bf18736a6a9655bd6341b84caf526613893a2e
                                                        • Instruction ID: a437e9947be6f3c7d9110e052ca3cd6d33786643e881b22936ec6bdc5322b471
                                                        • Opcode Fuzzy Hash: 8e91aa81ebd0083b953b8e4e23bf18736a6a9655bd6341b84caf526613893a2e
                                                        • Instruction Fuzzy Hash: E021EA75E0021A8F8B45CFADC8448AEBFF1FF88210B10816AE918E7315E7349901CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c48f3fb2a0061e2183ca7b93c5b84b829c2ce9e7985bc1506bd60b5f891cbac2
                                                        • Instruction ID: 33320ae248fcc70526ce5793ffe018d69f902608c64e7c1b2544febeba9f24f7
                                                        • Opcode Fuzzy Hash: c48f3fb2a0061e2183ca7b93c5b84b829c2ce9e7985bc1506bd60b5f891cbac2
                                                        • Instruction Fuzzy Hash: 801107B5E0021A9FCB01EFA8D9416EEBBF1EB48315F208469E508B7750D7756E05CFA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2217509348.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_d6d000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                        • Instruction ID: ce9eeb2ee38fa83154cb118a45f18340720f5884d1c26cea88f538eb0e6bba30
                                                        • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                        • Instruction Fuzzy Hash: A011E976904280CFCB15CF14E5C4B16BF72FB94314F28C5A9D9494B656C336D456CBA2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1a0189b7ecd4ff496c4a8a3e1fa6ff5db4f398c0c38c3eea0d9b70a591b36e03
                                                        • Instruction ID: b6d2d915ef561be73ce50e4d7dccaadc87906dba403d658ee268098465f3a0a3
                                                        • Opcode Fuzzy Hash: 1a0189b7ecd4ff496c4a8a3e1fa6ff5db4f398c0c38c3eea0d9b70a591b36e03
                                                        • Instruction Fuzzy Hash: B401CEB1A042145FC749EB78981422F7EE6EFC9300F1584BED549CB384EE348A4283A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a81245d60dfe5c7b11ca6b06b32f487ffb43766a20b54e40cb35017cf9c4aa7e
                                                        • Instruction ID: c3f71a981b92ed73f545554d1cf40dc72b9ea8e3f474fe58db8a12c76f06a620
                                                        • Opcode Fuzzy Hash: a81245d60dfe5c7b11ca6b06b32f487ffb43766a20b54e40cb35017cf9c4aa7e
                                                        • Instruction Fuzzy Hash: 071151B190020ADFDB14CF69C44479DBBF1FF98725F14C529E425EB2A0D7714A45CB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 813c7de8baec0f79eba7bc496cb5b73cc58d7c23676376691fdbaefcfed9efe5
                                                        • Instruction ID: 397a26dc2037a9e458b9a7fa4c83572d18c8c8d9b5d90a189e958779ad8d19c2
                                                        • Opcode Fuzzy Hash: 813c7de8baec0f79eba7bc496cb5b73cc58d7c23676376691fdbaefcfed9efe5
                                                        • Instruction Fuzzy Hash: 5E119EB1A0071AAFDB15CF69D880AAEBBF5FF88611F044429ED18C7310DB30DA10CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8ada459e0a02e92f6b8fe28c9a6955e77df1669767971b72adc4bcedb50fbe32
                                                        • Instruction ID: 987ded0abd36f047131009bc927618d4f8cfded83b95e82266ae60db93192856
                                                        • Opcode Fuzzy Hash: 8ada459e0a02e92f6b8fe28c9a6955e77df1669767971b72adc4bcedb50fbe32
                                                        • Instruction Fuzzy Hash: 901126303003225BFB04A62CD41579A7AD6DB8430DF20C81DE1898FBC2CEFAA84A47E0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2217641354.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_d7d000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                        • Instruction ID: 21d97748bf67a447bcaff85b93680b33593eee76a75e139592c82ced4216bf1c
                                                        • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                        • Instruction Fuzzy Hash: 09118B76504284DFDB06CF14D5C4B15BBB2FF84318F28C6A9D8494B656C33AE85ACB62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2217641354.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_d7d000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                        • Instruction ID: 23bc741e6f7bb45b5e0ad6cf6b92152a8694e2db3ea8ed9c1ba76afb02e326ff
                                                        • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                        • Instruction Fuzzy Hash: 38118B75504280DFDB06CF14D5C4B15BBB2FF84318F28C6A9D84D4B656C33AD85ACBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9dff06e66702c9603107d201f4ffc7abb5ea8200980674812a863c0f166e2f83
                                                        • Instruction ID: 8a0df01690752e7de8e8cc78e3fa81e6b24fc1f707bddcd59e2d58ce12b487fe
                                                        • Opcode Fuzzy Hash: 9dff06e66702c9603107d201f4ffc7abb5ea8200980674812a863c0f166e2f83
                                                        • Instruction Fuzzy Hash: 31014071B041635FC7254779CCA875ABFD5AF41305B15407AF445CB2A1D661CD0187E0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d494274778852a781be3b25708f2eefa245bb561fa4576c6c301b1fc2918c977
                                                        • Instruction ID: 8d49af6ac7108bf9549ba9650bdf2593432292fb0fdd0bcbc0cdf48bab4c4772
                                                        • Opcode Fuzzy Hash: d494274778852a781be3b25708f2eefa245bb561fa4576c6c301b1fc2918c977
                                                        • Instruction Fuzzy Hash: 33119BB5E0011A9F8B44DFADC9449AEFBF5FF8C310B10816AE919E7315E7309911CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0e00deaab6c9b977fa509348cdfa8642927fc182bb2c69650ed5159562ca44ed
                                                        • Instruction ID: 25e70a0d856c2b1467f892c6782acc3421c9e557c13d49140884f414e7f3e335
                                                        • Opcode Fuzzy Hash: 0e00deaab6c9b977fa509348cdfa8642927fc182bb2c69650ed5159562ca44ed
                                                        • Instruction Fuzzy Hash: 67116971A0E391AFCB038B709868098BF70EF4221532A80DBC094DB1A3C6398816CB61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d33a3a02bce15194f6a9929f999c627be31b9626153a3b804242f102da13d410
                                                        • Instruction ID: 09758838f61b9bad4fcb9aa2873c1b67bf198ea63e3c3eae30225d0030a3ef56
                                                        • Opcode Fuzzy Hash: d33a3a02bce15194f6a9929f999c627be31b9626153a3b804242f102da13d410
                                                        • Instruction Fuzzy Hash: 0F11D4B4E0021A9BCB05EFA8D944AEEBBF1EB48315F108469E908A7340D7756E45CFA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a2df71469de1e38a093588ea70556b881663dabbc44b784c0d0ca9f6b803ed37
                                                        • Instruction ID: 0520840babb9478e844072338ebfb7cbd8f867b52a6bf5e72edb8da76c653003
                                                        • Opcode Fuzzy Hash: a2df71469de1e38a093588ea70556b881663dabbc44b784c0d0ca9f6b803ed37
                                                        • Instruction Fuzzy Hash: 821130B1A0061A9FDB15DF69D884AAEB7F9FF88611F044429ED15D7310D730DA10CB61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7f97b4a1a4a8175e002530b799939f936ae9607d42ef5fe93110604c41081e59
                                                        • Instruction ID: acb49f723d1b68451dfecefe52ed3279c3ffc193eddcdc88ace2dc2a0d02dca7
                                                        • Opcode Fuzzy Hash: 7f97b4a1a4a8175e002530b799939f936ae9607d42ef5fe93110604c41081e59
                                                        • Instruction Fuzzy Hash: DD01A7B670010AAFDF115A58D4447BE3B659B8530AF28C026F50B8A291CA76C653D796
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6eefcaa1d1401bfed3c538c81f441c3376d2fff14566da07bbf3e72d95f57a7f
                                                        • Instruction ID: 669f811b9f044fa5c774d94123bb0fd3f3e0743c3fe87aa7bc76e14c5d97159f
                                                        • Opcode Fuzzy Hash: 6eefcaa1d1401bfed3c538c81f441c3376d2fff14566da07bbf3e72d95f57a7f
                                                        • Instruction Fuzzy Hash: 3401DBB13006226BCB19A67DC8A0A2B7BD6DFC161AB68C43DE80687341DF35DD0687A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 76e5d4cc7f1ee8a3f2787cbba2992ff1a86abd9206cc4dca4a864fc6a7d88399
                                                        • Instruction ID: 80c1941e803494f53950bdc389ae3c42aaadc399b040f20e48b1f92919189aa3
                                                        • Opcode Fuzzy Hash: 76e5d4cc7f1ee8a3f2787cbba2992ff1a86abd9206cc4dca4a864fc6a7d88399
                                                        • Instruction Fuzzy Hash: 2301F5303003225BEB04A62CD41479A76C6AB8430DF20891EE1898F7C2CFFA684587E1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 148c88e7cb07b1fffe3dba0d8c5cdf41360de15f36a6ce1889da8fe71824ec06
                                                        • Instruction ID: a6fd9cb5e1ec2e9e814a68153bc296d5e7edbf9a8ad125c6eec511d841290787
                                                        • Opcode Fuzzy Hash: 148c88e7cb07b1fffe3dba0d8c5cdf41360de15f36a6ce1889da8fe71824ec06
                                                        • Instruction Fuzzy Hash: FAF0A4B2B001196FD710DA9ADC95EABBBF9FB9C365F54806AF508D7340DA319D0487E0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 82a3dd00d9066b87d6dbbfa7a64bfb4f0e6f5cf227d16a7975b339db2586ae85
                                                        • Instruction ID: 61e09458eda3c1ae8b167e91fd3eff4dcfa6a2280a6c05674940944a52b02c25
                                                        • Opcode Fuzzy Hash: 82a3dd00d9066b87d6dbbfa7a64bfb4f0e6f5cf227d16a7975b339db2586ae85
                                                        • Instruction Fuzzy Hash: 0901F271320202AFC728DA2CD441A16B3EAEFC5226F74C479E40587774DBB5EE06CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c82b12cec7176f6fb85ca33e4728751f00d681c82fbe52760dc89fa66a274122
                                                        • Instruction ID: d22d312bf85ce98a3e7b7beba6b6c251fd9c112506c8b05003b25a9462190b30
                                                        • Opcode Fuzzy Hash: c82b12cec7176f6fb85ca33e4728751f00d681c82fbe52760dc89fa66a274122
                                                        • Instruction Fuzzy Hash: EC01F9B03006176FCB18A67DC86092BBBD7EFC5216764C42DD80A8B294DF35DD42C7A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2217509348.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_d6d000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d884ea7ceafcfa1a31c710a45c25959565f54127ef8f5e7d08335af0e411fb57
                                                        • Instruction ID: 510410765eaf025d1f6ccd85801ce376221c956d3b8d7a51f2f9c0b04fec195f
                                                        • Opcode Fuzzy Hash: d884ea7ceafcfa1a31c710a45c25959565f54127ef8f5e7d08335af0e411fb57
                                                        • Instruction Fuzzy Hash: 9C01A271A093449BE7108F19EDC4B66BF99EF51364F2CC42AED4A0A286C3789C44CA72
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7604a39c807b7fc89b04af6a58bb819b8ed7f5a8872e081866077304969e12c8
                                                        • Instruction ID: fc62e4e92b8e4c7076fbf30e7f32380c747a688af989cce1699f5d2711dc5b23
                                                        • Opcode Fuzzy Hash: 7604a39c807b7fc89b04af6a58bb819b8ed7f5a8872e081866077304969e12c8
                                                        • Instruction Fuzzy Hash: D6F0C2F03201179BC618AE3AD4D4E3E37F99FC5A1A304006DA40AC7270DE20DC42C291
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4fc6d7a1c6b43d4fa91fc2858bedf52d60e66a3216f9ade671d9fc7b7c8f9bc0
                                                        • Instruction ID: 3c71a3ec51e9d135c83a5b2e98f4fc9a9d3fbc09c2851db81faea9d9a2b94a5c
                                                        • Opcode Fuzzy Hash: 4fc6d7a1c6b43d4fa91fc2858bedf52d60e66a3216f9ade671d9fc7b7c8f9bc0
                                                        • Instruction Fuzzy Hash: 2401A2713002129FC725DB59D8A4E2AB7E6EFC5219F64C479E40A87361CB75ED02CBA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5796bcaaa8389e83c999148028cd1606087652f23c12a63b0cdc3d2c9d62b3fa
                                                        • Instruction ID: 7052b0a8501ccd70b94551b984a7789be0fc695888d9b989e492c5aaa73483ab
                                                        • Opcode Fuzzy Hash: 5796bcaaa8389e83c999148028cd1606087652f23c12a63b0cdc3d2c9d62b3fa
                                                        • Instruction Fuzzy Hash: A0017C70A1819AAFDB14DA69D880AEEBFF6AF49305F184066F401EB361C735D9018B50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 22647a9adf743997fde1acc688fdbc764524fef1382d1722f8daabcf88ff6de1
                                                        • Instruction ID: 63aac2a9648dbf39d15da548894b4b7c935887a6e01363979c19edb306a3e1b4
                                                        • Opcode Fuzzy Hash: 22647a9adf743997fde1acc688fdbc764524fef1382d1722f8daabcf88ff6de1
                                                        • Instruction Fuzzy Hash: EE012131920B098BC7027F3CEC144A8BF74FF96221B01832AE984A7750EB30C6A0C791
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e4baf3bf0386a8ed8bf6b4509c6fd6cc522724f3032f63de6bef83c5256abc63
                                                        • Instruction ID: e7d3853931f66a6301412174355a265a403f6356f028ffae6ac805f7c16f4f80
                                                        • Opcode Fuzzy Hash: e4baf3bf0386a8ed8bf6b4509c6fd6cc522724f3032f63de6bef83c5256abc63
                                                        • Instruction Fuzzy Hash: A801A4703143029FC725DB69D8A4D1AB7E6EFC9226B64C479E809C7365CB71ED02CBA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7290b421b3b60e97eacb7d19fbb3b6c8f9106c5cc301a578fb560d8d3fcb210c
                                                        • Instruction ID: 5d5048bb2cbba5725cad59015c80fd28297dcb1abaf1a4df61cc7cff695ba626
                                                        • Opcode Fuzzy Hash: 7290b421b3b60e97eacb7d19fbb3b6c8f9106c5cc301a578fb560d8d3fcb210c
                                                        • Instruction Fuzzy Hash: A90181703102029FC728DB2DD440D26B3E6EFC5226B64C469E509C7365DBB1EE02CBA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8d2b390609dad88415e9231c82bc3f2b84f3168b537f8836290a1c34ef42a0df
                                                        • Instruction ID: a7f7209d52ab0284190c9d53d53187294de5a29108422bfb7259d8475a1aa252
                                                        • Opcode Fuzzy Hash: 8d2b390609dad88415e9231c82bc3f2b84f3168b537f8836290a1c34ef42a0df
                                                        • Instruction Fuzzy Hash: C4F0C2B13552139FCB18AE35D4A4E6D37B95FC5A1A30500AEE145CB3B1DA24DC82C752
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: be46e7296571de6586c8b5b6eea7c06e1c6f07e9d00e040aa1a3040d445cb7be
                                                        • Instruction ID: bcf4cff2eef878df6f1d6047cbacbb28afa6c527336773b02b5278b5b00466a1
                                                        • Opcode Fuzzy Hash: be46e7296571de6586c8b5b6eea7c06e1c6f07e9d00e040aa1a3040d445cb7be
                                                        • Instruction Fuzzy Hash: B9F0AF32A146558FCB11EF6DE8848DEBFB4EF8A21071042ABE5449B321D7305A09CBA2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 687342a0ea47e8960a5efef76340442131d4f5d9bcdeada30991cac22a230247
                                                        • Instruction ID: 2954495630e519027d9d0254fcf114f56dee376d460f7350dfe07f6fa86bef76
                                                        • Opcode Fuzzy Hash: 687342a0ea47e8960a5efef76340442131d4f5d9bcdeada30991cac22a230247
                                                        • Instruction Fuzzy Hash: 81F0B4B5A41215FFCB149B65E0844ADBBB5EF8576A72580EDE419DB210CB31CD21CF84
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c8ee7072973dbd3cbae06b6524aeb488adfb1cc512645128f6d8b80f9f6a965b
                                                        • Instruction ID: 35cf70539362aa2fe76bca44e565bd6466dcd70f3b009a7fc9f91a24e8708509
                                                        • Opcode Fuzzy Hash: c8ee7072973dbd3cbae06b6524aeb488adfb1cc512645128f6d8b80f9f6a965b
                                                        • Instruction Fuzzy Hash: BDF0C271B042185FC708AB79E85866E7BA6EBC1315F14886DE44687340CE749C41CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fffc813dd4230671950bece8fd752533626226a81e7a329c3f0fe8dcf39da1b9
                                                        • Instruction ID: 9ee979175f73349f0d9b65d7ad1d1e0895fee85cbef10fbcb9ac8da3cce35871
                                                        • Opcode Fuzzy Hash: fffc813dd4230671950bece8fd752533626226a81e7a329c3f0fe8dcf39da1b9
                                                        • Instruction Fuzzy Hash: ADF0D4B23145561FC314451DDC546793FA6DFD968774C44FAE001CBB62D954CC038351
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6749ec8540525fb4fa686d90b276889578b67e42b47d8cfdfeadc1fd4db4fb55
                                                        • Instruction ID: 93665a56ef22363a630c82d8d6657dc8dd8d005683fbebc3165b01036eb0c3d2
                                                        • Opcode Fuzzy Hash: 6749ec8540525fb4fa686d90b276889578b67e42b47d8cfdfeadc1fd4db4fb55
                                                        • Instruction Fuzzy Hash: 11F0277231021567EF14966CE8437A53BDAE74434EF24893AF009CFB40EAA1DC8343D0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2217509348.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_d6d000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2531ce6dbae96ad6b5c89862831022dc26c48a3f751f1b92a0a74593af11426b
                                                        • Instruction ID: 105e954ac1099ffeeee7c0a3ee8bb18ed9c350d6a715a0b97412bbd3a921429e
                                                        • Opcode Fuzzy Hash: 2531ce6dbae96ad6b5c89862831022dc26c48a3f751f1b92a0a74593af11426b
                                                        • Instruction Fuzzy Hash: 65F0C271505344AFE7108B0AEC84B62FF98EF51724F18C45AED090F286C3789C48CA71
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d09398c6e32eef056f05abdcb68fe628849fb47f22608181cc8b53d042f955c9
                                                        • Instruction ID: 0a2d1cab5600fd5700a8e9bbeaaf1a116b1ecf4676e8d175bf19fda56d64805e
                                                        • Opcode Fuzzy Hash: d09398c6e32eef056f05abdcb68fe628849fb47f22608181cc8b53d042f955c9
                                                        • Instruction Fuzzy Hash: 1BF090763113069FDB26ABA4D88489A3FB9EB8A35476184A5F508CB225DA31DD01CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cacfbd3e3f252d033b3eb3dff5cd7020d071d0dbf7596e0f274796d214c0bfbe
                                                        • Instruction ID: 36632ac0f8781bc80057ba5c236d53d1d9d269ecebee907f61e9323278888d8d
                                                        • Opcode Fuzzy Hash: cacfbd3e3f252d033b3eb3dff5cd7020d071d0dbf7596e0f274796d214c0bfbe
                                                        • Instruction Fuzzy Hash: 74F01D7695050A9FDB90DFBCC8457BDBBE0EB04305F1489B5E418D3241EA39DA059B81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3c8d327eafc98f4f093132896c271429a2dfcd0bfeee4cb79525c32f2a1def47
                                                        • Instruction ID: 4f6376b8492d10dbac27847b0f054d951207e9bb78b4856fd6d8199f3eaa2cf1
                                                        • Opcode Fuzzy Hash: 3c8d327eafc98f4f093132896c271429a2dfcd0bfeee4cb79525c32f2a1def47
                                                        • Instruction Fuzzy Hash: 98F09631920B0597CB11BF3DDC1449DBB78EF96325F01832AE98567654EB31D6A0C791
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d2c8bfa563ba74526a500cf9850cae3c1812f8c48a75075c2d91f0eb58ba2f55
                                                        • Instruction ID: 6a25a8ae471939787e2f9d002b20b3881470c11e97334482bd4939b1ead6d73b
                                                        • Opcode Fuzzy Hash: d2c8bfa563ba74526a500cf9850cae3c1812f8c48a75075c2d91f0eb58ba2f55
                                                        • Instruction Fuzzy Hash: A501FBB080021EEFDF14DF6AC4483EEBBF1BF59366F148625E824AA290D7754A40CF91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 52ab402a0ce41bee7b29f0a153fa07b6744a52f7e1807bcbfe5e82bcc2e2a7d9
                                                        • Instruction ID: d14d16afec0a3a57a957d17e34068a0a654de4c348ec92fcf33362e1d8d4c870
                                                        • Opcode Fuzzy Hash: 52ab402a0ce41bee7b29f0a153fa07b6744a52f7e1807bcbfe5e82bcc2e2a7d9
                                                        • Instruction Fuzzy Hash: 3EF08271B002189FCB18AB79E84C66E7BA6EFC4355F14882DE44687340CF759C41CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 57d0f4a7a560d74fb0be60cbae9f0971497e5f90e54a2fbeee00fcd6bab8bc2c
                                                        • Instruction ID: 08938409b2f5849dadd5644bf4ffe826f81b8d4b576302de3395fe457056a39f
                                                        • Opcode Fuzzy Hash: 57d0f4a7a560d74fb0be60cbae9f0971497e5f90e54a2fbeee00fcd6bab8bc2c
                                                        • Instruction Fuzzy Hash: 17E03972B041286F93049A6EEC94D6BBBEDEBCC660311807AF508C7350DA319C0086A0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: af5d64c5752a3f2e757f0a1e7dc4cb096948baefaa7d313cb838466e84a44f8c
                                                        • Instruction ID: 9468ebcbd61ec5e512aaf33d1c7ab74d33e15b54536738155431e996de4ea622
                                                        • Opcode Fuzzy Hash: af5d64c5752a3f2e757f0a1e7dc4cb096948baefaa7d313cb838466e84a44f8c
                                                        • Instruction Fuzzy Hash: C9F03A7691021A8FDB90DFA8CC867BDBBF1EB04305F5485B9E418D3751EA39D6069B80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2c5b870f8f13b1d9c9f78b164e4bd0792ded67d4d278ea2bf7f61c917490df05
                                                        • Instruction ID: 71960a5bb386f697edf11b2c50381cebca2224491de8aceca8790358f2a4ea72
                                                        • Opcode Fuzzy Hash: 2c5b870f8f13b1d9c9f78b164e4bd0792ded67d4d278ea2bf7f61c917490df05
                                                        • Instruction Fuzzy Hash: 33E0DF763609150BC718951DD846BAD779BEBD8A66F6880B5E109C7B62CD61CC420391
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 357320ca7971f38cc0b335b083947fcc2b9c44cde76ce2fc806e5965f9d8e0db
                                                        • Instruction ID: 89479bc69c7ed17a7cf0e65c6b38bb63dcf1a52ebfe60e919cf0c80d1ec2622b
                                                        • Opcode Fuzzy Hash: 357320ca7971f38cc0b335b083947fcc2b9c44cde76ce2fc806e5965f9d8e0db
                                                        • Instruction Fuzzy Hash: 5FF0F8B16147469FAF28CF28D48299577E5FB053987304969E41ACF302E7B2ED438B94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0b4307b1c404a196b5b78aeb9d3be725486e64b31c52abe648004167ffcd9fb0
                                                        • Instruction ID: cd21108810cfb76e6de932621d94a2c0b6d5af223fd65e4211c9607133992cab
                                                        • Opcode Fuzzy Hash: 0b4307b1c404a196b5b78aeb9d3be725486e64b31c52abe648004167ffcd9fb0
                                                        • Instruction Fuzzy Hash: 5CF06DB0660043DFDB54CB6CE8863A833B0EB4035BF441065E005A72A4CBB4CB85CB21
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bad1d9ca27ac009227fdb6aa27208cdabf5dfc20ceca44d7dafdafd14187a5ef
                                                        • Instruction ID: e813b6fd3a7a7c7422cba5a8c69f044e3934b6573552dc4be6fa8fb40f3865a9
                                                        • Opcode Fuzzy Hash: bad1d9ca27ac009227fdb6aa27208cdabf5dfc20ceca44d7dafdafd14187a5ef
                                                        • Instruction Fuzzy Hash: E7F0A076310206DFDB25AFA8D484CAA3FAAEF893583508425F5088B224DF71EC01CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1795134c72ad01e8d2e205cc3f3b082c8a63ec02e8d433a99c1979de4bf4b323
                                                        • Instruction ID: c55111ebe17d8eb6d9938c4a2ae19c3a40fbb6a6d9d095bed35b0febc9abeb4d
                                                        • Opcode Fuzzy Hash: 1795134c72ad01e8d2e205cc3f3b082c8a63ec02e8d433a99c1979de4bf4b323
                                                        • Instruction Fuzzy Hash: 7CE026B23412602BC306137C18546AF3FA78FC2655B0980AFE546D7382DEA48C0583E1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5efe43935535c8dea3e4accd05ccc1ed751a71025d871a07cd58f01bbb500a29
                                                        • Instruction ID: cb24b90416bfab1aef8d211c3348e0c99eae659930019302046ac2751b3a8e69
                                                        • Opcode Fuzzy Hash: 5efe43935535c8dea3e4accd05ccc1ed751a71025d871a07cd58f01bbb500a29
                                                        • Instruction Fuzzy Hash: 68F0E5B13053834FD72257749D2079A3FA1AF46205F0509FED14ACB6D6DA28DC018392
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f32546e3655d51655d652af1ddcff162b88092509d279e1ff0da62fbf071b1d4
                                                        • Instruction ID: 8e6d56b0652bceec9b68152fb02ae2070d0f7e1f5ea6feac0e0ea3e90d7099b1
                                                        • Opcode Fuzzy Hash: f32546e3655d51655d652af1ddcff162b88092509d279e1ff0da62fbf071b1d4
                                                        • Instruction Fuzzy Hash: FDE01273A50525D78710DF9CF5814B9B7E9E744AAA3188457E50CCB616E733D862C7C0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dbd1d432e0e3a09e8f0a58ad139ee2cc2000589409ae59a058a99f25d0e56a58
                                                        • Instruction ID: e47599a3f1e25bfadfcb02d69786b843baf5178e3206e2887f24625b173c9d7a
                                                        • Opcode Fuzzy Hash: dbd1d432e0e3a09e8f0a58ad139ee2cc2000589409ae59a058a99f25d0e56a58
                                                        • Instruction Fuzzy Hash: 79F0A0322001446FCB06CA98D940B9A7FEA9B88311F18481AF949C7151CA789511DB54
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 30f4632a9e13fb9556ce02ebbaa3322cb900a5c88152ff4ae76c5934c4e64264
                                                        • Instruction ID: c004446d709282896b50ce0b9134da795ced2e829fdb57466d7dbd8a6b2f8595
                                                        • Opcode Fuzzy Hash: 30f4632a9e13fb9556ce02ebbaa3322cb900a5c88152ff4ae76c5934c4e64264
                                                        • Instruction Fuzzy Hash: 82E0EDB7B001199B8F05CEA4D8525EE7B76FB88211F048425EA19D3310D7758926EB61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: df870ff340ab468a6606bcb2a79806acb20de92df50d486a1d8d34c35171e513
                                                        • Instruction ID: 16ecedcbb8a07075a406660db73569aba3eab03c581f8ec03f17f67b13954444
                                                        • Opcode Fuzzy Hash: df870ff340ab468a6606bcb2a79806acb20de92df50d486a1d8d34c35171e513
                                                        • Instruction Fuzzy Hash: E2E092322001496BCB06DA49E800E9E7FEEDBC8310F08881AF949C7251CAB5992197A4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ffd3451c44dc8f48a54addca508d14a922f1fbff2a7de9a3e12ea6002b04ab7c
                                                        • Instruction ID: db23c3f5a1c124b138680f9a6249086b030a96c49879d117db42cfc21ad7b591
                                                        • Opcode Fuzzy Hash: ffd3451c44dc8f48a54addca508d14a922f1fbff2a7de9a3e12ea6002b04ab7c
                                                        • Instruction Fuzzy Hash: 80E0C2763505160BC728A60DE80497E339BEFCCA26B1880BAE105C7766DE61CC424795
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8d42d35f1abe60bce039ea72bef25893c8f77097a5c75b3124631f6f8ff6cade
                                                        • Instruction ID: 5bfb66817de3258d61fa85f78fee8dae7385a68bac72c0087274e2a3061a4f3e
                                                        • Opcode Fuzzy Hash: 8d42d35f1abe60bce039ea72bef25893c8f77097a5c75b3124631f6f8ff6cade
                                                        • Instruction Fuzzy Hash: 5AF0EDB181421AEFCB41EF74D98848D7FF0EF16315B01C5ABE449CA041EB348659DF92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 401320864536e30359cea86156ece7b1c17a3ad5227b44c1c2e997fb0f01f98c
                                                        • Instruction ID: 4853c7ed3cdac4b1c1391f6bdda58128278d8f73d846c57c5a83bbb0b6807d93
                                                        • Opcode Fuzzy Hash: 401320864536e30359cea86156ece7b1c17a3ad5227b44c1c2e997fb0f01f98c
                                                        • Instruction Fuzzy Hash: D6E0C2B121932AAFE7060A71684C3FB3FA5ABC53D6B0B40ABE041CA191CF258E01C7D0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0ad49325a1b112d7f61673ba902357474ffcc977f7f4c344029524a711d2345b
                                                        • Instruction ID: 86dfd01108668733436942d9d99a00cd8369b766ab06fab73c9b5c16698ef71e
                                                        • Opcode Fuzzy Hash: 0ad49325a1b112d7f61673ba902357474ffcc977f7f4c344029524a711d2345b
                                                        • Instruction Fuzzy Hash: E2E0D83100828EAFCB02CF64DD4589D7FB1EF82221B0486C5F950DA2E3C7364666E751
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 20cc8f8b2f9736855c2683ebe2fde46be7e83af804f569274bd5018a0fd24788
                                                        • Instruction ID: 354099e2b7d2e4b7fbbae9ff62b29db48621d773d5201378c1c27710c67441a2
                                                        • Opcode Fuzzy Hash: 20cc8f8b2f9736855c2683ebe2fde46be7e83af804f569274bd5018a0fd24788
                                                        • Instruction Fuzzy Hash: 04D05EB234013413C61863BE1854AAF7A9FC7C5AA6B44846EEA06D7385DDA18C0143E1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 86737983b80ed1dd4236a97372ba5c54282a933bed8926c8aaf4af7beb30ed36
                                                        • Instruction ID: 1bacb87a71064a56d91a848e7f459a33c21aff8d84409d4d8617a6f748f23331
                                                        • Opcode Fuzzy Hash: 86737983b80ed1dd4236a97372ba5c54282a933bed8926c8aaf4af7beb30ed36
                                                        • Instruction Fuzzy Hash: 9FE086B13012079BDB24A778DD50B9B7BDAEF4525AF10097CE50AC7684DA30E84147D1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6e3ac9f75546d6622d6ec555431d3eaa5a04ae047e2bbf0bd812103e8b6fa030
                                                        • Instruction ID: 4b104e04561625e57f9966cb613602c16520d45856a5f8964472301e02439b34
                                                        • Opcode Fuzzy Hash: 6e3ac9f75546d6622d6ec555431d3eaa5a04ae047e2bbf0bd812103e8b6fa030
                                                        • Instruction Fuzzy Hash: 28E04F3604525CAFCB028F94DD40CEA3F75EF5A350719808AEA858B122C2328929EBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2011f882f2f874690ab6a4178bd42ee19fd87c9dbb92ff9ef307eeb241a9427b
                                                        • Instruction ID: 0a1585748e7b70a19be97d8bd89329d2379c0e9a48e53cb34de994e2da33700d
                                                        • Opcode Fuzzy Hash: 2011f882f2f874690ab6a4178bd42ee19fd87c9dbb92ff9ef307eeb241a9427b
                                                        • Instruction Fuzzy Hash: 5DE0C2E638A9660FD70B3A6868305FD2B214B5101670800AAC05A8B292CD0C0E0AA3CB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c61b2a456400e0aaed2cf88bdbabf017414bffd897715ef47417376fd4ebdf94
                                                        • Instruction ID: 82f4c8a7484d3d337508640e949d631da84f15d896465c322cc08ae4b5bcc3f2
                                                        • Opcode Fuzzy Hash: c61b2a456400e0aaed2cf88bdbabf017414bffd897715ef47417376fd4ebdf94
                                                        • Instruction Fuzzy Hash: 48F0E5749043469FC701DF68C444D997FF0AF06320F1082EAE8649B3B2D3384946CB85
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9abb280b0bf61e412a4852dc73fa7ce10962eaa35d3cb48b6adb36d7ac4c33fb
                                                        • Instruction ID: 15937cbc385094fd06584ee451a5c5cfcfaa1c4a3caee5aaf4793ef713fe6428
                                                        • Opcode Fuzzy Hash: 9abb280b0bf61e412a4852dc73fa7ce10962eaa35d3cb48b6adb36d7ac4c33fb
                                                        • Instruction Fuzzy Hash: D8E0C2757441118FCB069B64D6548983F71AF4A26130280D7E144CB332CB30CC22D741
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e8d1cc7c650a8bd02f63e8537362d69790c8f767bd789aadd3a0ab754fac187b
                                                        • Instruction ID: 9089db4c12870565ad21b49fbaedcd46cdeb6850f4b51ae8f2a41baeeabebf1e
                                                        • Opcode Fuzzy Hash: e8d1cc7c650a8bd02f63e8537362d69790c8f767bd789aadd3a0ab754fac187b
                                                        • Instruction Fuzzy Hash: EAF06D35D5828DAFCB06CBE0C8968DEBF74EF42205B1442DAD86696292DA311A07DF90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4380fad77aed429c21d359367ded32ae34955b2a9ecc917eb869e7937b1ec752
                                                        • Instruction ID: 01dc42a6b78210270692f3a5fd11a5cb496e2f0222b529c93ea0573ee0547fbc
                                                        • Opcode Fuzzy Hash: 4380fad77aed429c21d359367ded32ae34955b2a9ecc917eb869e7937b1ec752
                                                        • Instruction Fuzzy Hash: 3DE0DF7230C2024BC3169628E88145BA7A29FD5200718496BE8598B691EBA05C4A4382
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: af21ced1eee2078848a34e4586e580b444620dfa7532e205b8551722b9c9ccaf
                                                        • Instruction ID: 18c655653262ecea880fe5cd5ca677acba890178cfc4da65a37f14d070d3d7a9
                                                        • Opcode Fuzzy Hash: af21ced1eee2078848a34e4586e580b444620dfa7532e205b8551722b9c9ccaf
                                                        • Instruction Fuzzy Hash: CEE01A71650057DFCB44DFA8E8897E877B0FB4425BF4400A5E005EB2A1DB34DA85CB10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 448da8897c730299dacd2ae3f1f317d59a3d5b20d7ac65dd0c323d61873c9716
                                                        • Instruction ID: e60f82113f3c8c709dd2e6d51c242fa709caf5e1d8dc90fdf842876a5bbc42df
                                                        • Opcode Fuzzy Hash: 448da8897c730299dacd2ae3f1f317d59a3d5b20d7ac65dd0c323d61873c9716
                                                        • Instruction Fuzzy Hash: F4E0E5B4E00208EFCB40EFA9D444A9DBBF0EF48300F0081AAE81497320D7309A50DF95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8259c8b18baf36d42aafea4f5fa951b73a5a3485b0a6a92c2e0fb572c1f44820
                                                        • Instruction ID: c5526f2299a392a110d2a5188d99baf1ac4c9a64713bdbf549cc5bcca166efe2
                                                        • Opcode Fuzzy Hash: 8259c8b18baf36d42aafea4f5fa951b73a5a3485b0a6a92c2e0fb572c1f44820
                                                        • Instruction Fuzzy Hash: E2E0EB7A7001140BEB0D8B08E021BCA7BE38FC8301F1580BFC00CCB7C0C6B888024349
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 451a72227c0ac4bc937556e853e528b01b3e68ad56173a1d23f48525f3f46b60
                                                        • Instruction ID: e607622c8151c9b8ead325f470d859460b541b254a856122ee9f58d1eac55dd9
                                                        • Opcode Fuzzy Hash: 451a72227c0ac4bc937556e853e528b01b3e68ad56173a1d23f48525f3f46b60
                                                        • Instruction Fuzzy Hash: BEE07575D1020CEFCB40DFE4D5459DDBFB9EB48205F1081A6D809A2200EA305B559B90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 121407799a8bd16bab8d43fac9ed7e1814213d5ad4ab73d431e4d0731c9e69db
                                                        • Instruction ID: c62484d15bfb7226e3e15700f1574b272bc8a892fae364f4b4a607bcf7255634
                                                        • Opcode Fuzzy Hash: 121407799a8bd16bab8d43fac9ed7e1814213d5ad4ab73d431e4d0731c9e69db
                                                        • Instruction Fuzzy Hash: 10E0C232114A448FD302AB7CE9549D0BF30EF2630470512E7E045CFA26E725D445CB10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6e0bcd107b3724c1facbd7728c56625f20bc16c4ab0bd71efd6615237c7cddc5
                                                        • Instruction ID: dc008dea9ebfb19c05c8e2c2d4727b1dfb6d3ef39d6dab927f87bdb2a683c76a
                                                        • Opcode Fuzzy Hash: 6e0bcd107b3724c1facbd7728c56625f20bc16c4ab0bd71efd6615237c7cddc5
                                                        • Instruction Fuzzy Hash: CDE026B3D142D18FD3215B98E6C0B807F24AB0031AF4A4093E4994B191C375DC84CB41
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0fce0abadb360e5d47f39ee5ccbc45dba70dab3068d74a0551de355f798aeedf
                                                        • Instruction ID: 916d95dd3975086959ffc0e2b6ed15f1021eafc0f66b5648543221a52b21eba8
                                                        • Opcode Fuzzy Hash: 0fce0abadb360e5d47f39ee5ccbc45dba70dab3068d74a0551de355f798aeedf
                                                        • Instruction Fuzzy Hash: 6BE0E23180010CBFCB00DFA8D9499ADBFB5EB44201F5085A5FC08E2291E7369BA4ABA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: da3e26fe5cc5db8291af177d66a07acdfd76629f3f1311cdba8473fc61c1f8c4
                                                        • Instruction ID: a91d356519f67147467a8c80bd1a0e35ae8c75d77d87df0408495489bef9aa41
                                                        • Opcode Fuzzy Hash: da3e26fe5cc5db8291af177d66a07acdfd76629f3f1311cdba8473fc61c1f8c4
                                                        • Instruction Fuzzy Hash: 54D05E357442280BD70D664C94107DA76CE8FC9650F04807FE50D8B780DAA1AC0003E9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 341065ef77af2c22e160f74bedc819c1dfeface519fe976c6ca2b956cfeb1315
                                                        • Instruction ID: 87147ad4c3583546ecd695d222f687de8dfb50be7bcb1e81035416338f30d96a
                                                        • Opcode Fuzzy Hash: 341065ef77af2c22e160f74bedc819c1dfeface519fe976c6ca2b956cfeb1315
                                                        • Instruction Fuzzy Hash: 88E0EC7181061DEECB40EF75D9484997BE8EB15255F00C52AE8099A110E630D294DF80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 30826a9d922d47cb8c4421ef23da30cd8cd9648c223d5691ac27f9a6b8d24b73
                                                        • Instruction ID: f3b264d2c4848963f2b616a0e73310a055936d4031225d8bfa512d2e7259cec3
                                                        • Opcode Fuzzy Hash: 30826a9d922d47cb8c4421ef23da30cd8cd9648c223d5691ac27f9a6b8d24b73
                                                        • Instruction Fuzzy Hash: 68C012E278583B63591D365D58255BD23494B908AAA08006DD10E47781CE885E1623CB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 84ed705337377da15d0b74122642bc07b56a8f333de06d0d7c293491f9a010d8
                                                        • Instruction ID: 3044eeffa3ee1520558f55ff1c73c00cbffcb2da103710726ae8b6af5213865a
                                                        • Opcode Fuzzy Hash: 84ed705337377da15d0b74122642bc07b56a8f333de06d0d7c293491f9a010d8
                                                        • Instruction Fuzzy Hash: 47D05E342842589FC7029F24D945CD57FB2EF0A320B168197F888CB2B3C335C956CB41
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bb10d4da80ff796a6b3432d14a4fc0b42a97b07b335df7874b957a98d0914cab
                                                        • Instruction ID: 67274669784a12eabba642400aa87ec1f01dcb2f0bae3050540a69bab5f15ba8
                                                        • Opcode Fuzzy Hash: bb10d4da80ff796a6b3432d14a4fc0b42a97b07b335df7874b957a98d0914cab
                                                        • Instruction Fuzzy Hash: 8AD0C933140209B7DB426AA0CC03B8E7F5AEB24699F689064F6040D566E273D667F784
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f6e035a9457f46a7dd59361124a5522212ae8902ab39395e29a335d5197ed448
                                                        • Instruction ID: 2ef7a7c26281e0e014687ccd210ae6f257f00822236f22ed9f2c3c945b6a651f
                                                        • Opcode Fuzzy Hash: f6e035a9457f46a7dd59361124a5522212ae8902ab39395e29a335d5197ed448
                                                        • Instruction Fuzzy Hash: 69D0A7F121012D6BC7041966940D7AF3B4D97C06D6F004029E50185140CF244900C3D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8048d6846f6f75dcf03632493fad91607754d44ec40b097b4367c8d500ea6127
                                                        • Instruction ID: b918ed7f41ff7e21ace4564366d3a8adc80b10de1365bd7af216060aa58a5a93
                                                        • Opcode Fuzzy Hash: 8048d6846f6f75dcf03632493fad91607754d44ec40b097b4367c8d500ea6127
                                                        • Instruction Fuzzy Hash: 3DD0C972780524AF8A08AA58D414CA977A9EB996613014066F905CB331CA61DC5197D5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 620b728266de6f87ce70bcd0d168438458fb99b7f891d17d4193873cc7cff70c
                                                        • Instruction ID: 7a865360ae9f214aa5adfea640a8b0ebc9936f21083ee65fcdd72b86efc6121c
                                                        • Opcode Fuzzy Hash: 620b728266de6f87ce70bcd0d168438458fb99b7f891d17d4193873cc7cff70c
                                                        • Instruction Fuzzy Hash: 62D092B548A3828FC7422BB49884485BF30FE7B208B2B1687C1808A152E62804AAC712
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: abe2328b0640024d4dd714ce98b7e9165f7361c0a220ac795eb73208af00cfaa
                                                        • Instruction ID: 2e85e3c14c686ef0e4dcc4536a9e85c624f3038767c0597810fd965a103162dc
                                                        • Opcode Fuzzy Hash: abe2328b0640024d4dd714ce98b7e9165f7361c0a220ac795eb73208af00cfaa
                                                        • Instruction Fuzzy Hash: 5CD022B7381108FFDB419B90C802F523712AB24320F049609F54E5E3E0C233CD62EB40
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 65993b2e01a4ff10232535e9c0da7d019cb4115e2c448be4f30596a06d1d29e4
                                                        • Instruction ID: 0f7e8864960c083514d7df67c6635813ffad63831cc535bf1812dbb19a6460e2
                                                        • Opcode Fuzzy Hash: 65993b2e01a4ff10232535e9c0da7d019cb4115e2c448be4f30596a06d1d29e4
                                                        • Instruction Fuzzy Hash: 32D0C931520A048FC300EB6CD945864B7B4EF49608B450295E1059B621EB61F8548A41
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 33b9d32af853de23a7cbf692a97b1c58a20b9f4d33436c73d5d17b02451c0895
                                                        • Instruction ID: a2d72b4f7410d1219c9858ac29a9f540b62bdd5c2e252aa35f8d3a56eb7a2994
                                                        • Opcode Fuzzy Hash: 33b9d32af853de23a7cbf692a97b1c58a20b9f4d33436c73d5d17b02451c0895
                                                        • Instruction Fuzzy Hash: 12C080774001047AD302F650C911BC57771E740740F74EC515504C6135FD23C82C7B83
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b94463e7a71ad4074205d72da2938aa25c0f17c34c22f2cf75d1d839fa1c46b9
                                                        • Instruction ID: 7312fd1f5c80a57b2b85ee212144bc8d739510860d5177ac8ecb6cab6ad483bc
                                                        • Opcode Fuzzy Hash: b94463e7a71ad4074205d72da2938aa25c0f17c34c22f2cf75d1d839fa1c46b9
                                                        • Instruction Fuzzy Hash: 46C01276240208BFDA81AA94C800D5677A9AB18614F509000BA080A201C273E8A2EBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b1e6d62088c144e1f6a5372ba0449fbc54db353eb85470a8c5d8bd33161fcd09
                                                        • Instruction ID: fd4b1bc3d49abc27f5e79a72d75f090300802dc89f2fff64dac5760a54360fe1
                                                        • Opcode Fuzzy Hash: b1e6d62088c144e1f6a5372ba0449fbc54db353eb85470a8c5d8bd33161fcd09
                                                        • Instruction Fuzzy Hash: 9DB09232B88538634D09329D74154AEB79D8A8A9AA304406BED0A833819EA52D1142DA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f9ec71c902f1d008d41949e973b1ea7faf983a2ca7ac54df9480d479c9678237
                                                        • Instruction ID: 91abdbaf312f442fbd5c607f9ad1251ec5f64fbd851b9544a901916416a1f619
                                                        • Opcode Fuzzy Hash: f9ec71c902f1d008d41949e973b1ea7faf983a2ca7ac54df9480d479c9678237
                                                        • Instruction Fuzzy Hash: 0EC00272144108BBCB026A81D801E5ABF6AAB55694F148055F7480D161E673D962AB95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1d6f2623337c38ef8749255ff78b3cbedb78fba73e040c9434c39499d8169e63
                                                        • Instruction ID: 61412fa5721fa0801f19765b42d0f6ac58f054d2697597a3f249e516f761f0d5
                                                        • Opcode Fuzzy Hash: 1d6f2623337c38ef8749255ff78b3cbedb78fba73e040c9434c39499d8169e63
                                                        • Instruction Fuzzy Hash: 87C00235140108AFC740DF55D445D95BBA9EB59660B1180A1F9484B722C632E9119A90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a568942de54997600bed1b525e43c9a913e2dc71b024529ae1c7a598c9e89d5f
                                                        • Instruction ID: 363ed8ea9aca9c97d852b6e59ac616aaac64718e8cd755b803bdca8320bfb3e8
                                                        • Opcode Fuzzy Hash: a568942de54997600bed1b525e43c9a913e2dc71b024529ae1c7a598c9e89d5f
                                                        • Instruction Fuzzy Hash: 97C08C7A010002AA8200AB0484808AA7BE0FB82308B84CC02B244410208621C428A702
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 952237eacfbec273e8aeac9eddfe5e7686cd1fb236ca5390638548db078d19d8
                                                        • Instruction ID: d69fee32934f749aa87c42c685ac12786412cf0254ff49272c2d5929a1e23f8e
                                                        • Opcode Fuzzy Hash: 952237eacfbec273e8aeac9eddfe5e7686cd1fb236ca5390638548db078d19d8
                                                        • Instruction Fuzzy Hash: 33B0927AB8A424878E09A698B25546E77669B8966A304486FED1AC3380CE381911868A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dfef0ffb067423761f2583046055b079f7af9d57b4749f1402f48271f38b5903
                                                        • Instruction ID: 6d70e9bdd73e1eddd7572b4858a9fa704e76cd9dec3e2ef4c7fa585eb0bac663
                                                        • Opcode Fuzzy Hash: dfef0ffb067423761f2583046055b079f7af9d57b4749f1402f48271f38b5903
                                                        • Instruction Fuzzy Hash: 8DB0112BC2800003EEA08AB0EA0B3002A32E30020BF8C8820E30ACBA00CC208002E202
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: {#L
                                                        • API String ID: 0-1361971085
                                                        • Opcode ID: 8a54143e3c3983181aeeffd0f2eb786b198a6000df0fef368ff93c418d9c059f
                                                        • Instruction ID: cae8d0be66cea83fc2842941e19f8e56b08202d5ca174864fa2f11d09be7a5d7
                                                        • Opcode Fuzzy Hash: 8a54143e3c3983181aeeffd0f2eb786b198a6000df0fef368ff93c418d9c059f
                                                        • Instruction Fuzzy Hash: 4BD1E6B0E15219DBCB18CFAAD58499EFBF2BF89340F14D52AD419AB228D7349902CF54
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: {#L
                                                        • API String ID: 0-1361971085
                                                        • Opcode ID: b025614cacedb715dc70ccb87a0f03b7abe11307f3acebd993111d44b4c5e5db
                                                        • Instruction ID: 6ce116488137e1cccdeb2888bcabed77ad2e59b90aef9dc5e5f902eb29ac7417
                                                        • Opcode Fuzzy Hash: b025614cacedb715dc70ccb87a0f03b7abe11307f3acebd993111d44b4c5e5db
                                                        • Instruction Fuzzy Hash: 91D1E7B0E15219DFCB18CFAAD98499DFBF2BF89340F14D52AD419AB228D7349902CF54
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 98R
                                                        • API String ID: 0-576591972
                                                        • Opcode ID: d05025a477d387c1be0072dd2253ded5a5775f7aa6c388606a1e938dfa045d67
                                                        • Instruction ID: 377dc155d9d15f97b7f86a7694243b41607fd0179b2f6532ce42d0bccc3f32f4
                                                        • Opcode Fuzzy Hash: d05025a477d387c1be0072dd2253ded5a5775f7aa6c388606a1e938dfa045d67
                                                        • Instruction Fuzzy Hash: 627139B4E2120ADFCB04CFA9D5819AEFBB1FF99310F108569D415AB314D378AA41CF94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: -2m
                                                        • API String ID: 0-2686427999
                                                        • Opcode ID: 08c2fffcc3110fd91df15f6efbedc0448e84dea35ceb52301f24349f5e739bfa
                                                        • Instruction ID: 136e2c4fb073f65062ee8acaec1d9bde8bd0b26f239994334a4c91bcb8ae2f68
                                                        • Opcode Fuzzy Hash: 08c2fffcc3110fd91df15f6efbedc0448e84dea35ceb52301f24349f5e739bfa
                                                        • Instruction Fuzzy Hash: 2A5109B0D246198FDB08CFAAC9406AEFBF2EF89300F24D16AD419A7354D73459418FA5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: w7e^
                                                        • API String ID: 0-1657886525
                                                        • Opcode ID: eb8fa58a83e01600e5b288b8e13004aa49f1435ff0deac79275946a27206a411
                                                        • Instruction ID: 3c81101c04403ff5931e996c30cf78d3ed13c86866f245db1240dee7cb901b51
                                                        • Opcode Fuzzy Hash: eb8fa58a83e01600e5b288b8e13004aa49f1435ff0deac79275946a27206a411
                                                        • Instruction Fuzzy Hash: 2D4148B0D25659DFCF04CFA6C9405EEFBB1FB99200F14962AC419B7254D7784642CF58
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0ni
                                                        • API String ID: 0-1488673370
                                                        • Opcode ID: 487931d8cd4a5cf66d9a1c0c5af8ca354b03a3477c13611728dbaeb8e8177e45
                                                        • Instruction ID: ae8765e1bde3a85475b2ae4274d38e2613b97d7087a301902989d22f2252b310
                                                        • Opcode Fuzzy Hash: 487931d8cd4a5cf66d9a1c0c5af8ca354b03a3477c13611728dbaeb8e8177e45
                                                        • Instruction Fuzzy Hash: 925159B1E106188BDB68DF6BDD4579AFBF7AFC9300F14C1BA950CA6214EB340A858F51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: w7e^
                                                        • API String ID: 0-1657886525
                                                        • Opcode ID: 9d2d9604eb94d8d624bd451169121edc4ee29d070103ea34bf670afaec52c6b5
                                                        • Instruction ID: b821d2ae8447b8fd76ca6db499e0e742ffa4e6f585ee2309508b10529192ecf2
                                                        • Opcode Fuzzy Hash: 9d2d9604eb94d8d624bd451169121edc4ee29d070103ea34bf670afaec52c6b5
                                                        • Instruction Fuzzy Hash: D34147B4D2565ACFCF04CFA6C9406EEFBB2BB99300F149A6AC015B7264D7784642CF58
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2227372809.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5cb0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a6d38a7dda71d031abb217062d8e52a4326aa7a5b9023cf173af8bcec3338d26
                                                        • Instruction ID: 2c4000fd7bd5eeb696ffdee3f38321c1225eca521c517e2c9927192f85474cab
                                                        • Opcode Fuzzy Hash: a6d38a7dda71d031abb217062d8e52a4326aa7a5b9023cf173af8bcec3338d26
                                                        • Instruction Fuzzy Hash: A31296F0CC17458BD332CF69EA4C9893BB1BB45398FD04A09D2616B2E5DBB4156ACF84
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1eca8fd86b0c4324dbeee2c778a4f30753788db96180bb68a2eb47024ccea7ed
                                                        • Instruction ID: 7f77554a7c6f24b24c6d2f9713c6105f5ddc77b1526010658b65ae1500ae9ae8
                                                        • Opcode Fuzzy Hash: 1eca8fd86b0c4324dbeee2c778a4f30753788db96180bb68a2eb47024ccea7ed
                                                        • Instruction Fuzzy Hash: 49E1EAB4E101198FCB14DF99C5849AEFBB2BF89344F24C16AE814B7359D731A941CF61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b0435afd71010c9ae378fa5e2723f97d16cee75c57acb8fe56b101e3e3b8f254
                                                        • Instruction ID: 2c9338fd52440ca5de8d0cfd482babd27dc4506c81943554d4ff8f242cae898a
                                                        • Opcode Fuzzy Hash: b0435afd71010c9ae378fa5e2723f97d16cee75c57acb8fe56b101e3e3b8f254
                                                        • Instruction Fuzzy Hash: B7E1ECB4E102198FCB14DFA9C5849AEFBF2FF89304F24816AD914A7359D731A941CF61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9b6322bf9329e5fb3d3c5fa48ec64320201ecb5aad82a5591c73712392cad9a4
                                                        • Instruction ID: 0e8428d275722da8a0c86193e6d874b1cd0b9044ca95f6e7cd20d6795813872e
                                                        • Opcode Fuzzy Hash: 9b6322bf9329e5fb3d3c5fa48ec64320201ecb5aad82a5591c73712392cad9a4
                                                        • Instruction Fuzzy Hash: 9EE1FCB4E102198FCB14DF99C5849AEFBF2FF89344F24815AD818AB359D730A941CFA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d429bce371052979657e7e38e9f720790b5940c532f56e66fca4cde52fd18560
                                                        • Instruction ID: 9d66db97e874ebb90ef7a6036626fa0e2f5e9a2fc05cdd7e8429080c9270404f
                                                        • Opcode Fuzzy Hash: d429bce371052979657e7e38e9f720790b5940c532f56e66fca4cde52fd18560
                                                        • Instruction Fuzzy Hash: 04D1FB31D2075A8ACB10EFA4D990A99B771FF99300F60DB9AE41937614EF706AC5CF90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d7cb87cc3d246bd9bf3febf6429f468c24969c092ddcd12354ba409302fee87b
                                                        • Instruction ID: 9b70335a97edd2a4b33005941b50b1c5e7ed2a4305752ba81a0ad715242eb7d7
                                                        • Opcode Fuzzy Hash: d7cb87cc3d246bd9bf3febf6429f468c24969c092ddcd12354ba409302fee87b
                                                        • Instruction Fuzzy Hash: BDD1FB31D2075A8ACB10EFA4D990A99B771FF99300F20DB9AE41937614EF706AC5CF90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2219371160.00000000011D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_11d0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e756f471d394d52891c557e5654befa958eb785eb29dd0e7169f06b168893d50
                                                        • Instruction ID: 1f728fb5970323b97e3fc7352232761904bbe83da13280d23128ea453b5538e0
                                                        • Opcode Fuzzy Hash: e756f471d394d52891c557e5654befa958eb785eb29dd0e7169f06b168893d50
                                                        • Instruction Fuzzy Hash: A1A17032E002169FCF09DFB4C8845DEBBB2FF85305B15456AE906AF265DB31E916CB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2227372809.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5cb0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1fe692656513febbef926eeee1fee0b645df63baaf87e6b1859601169d20fc7a
                                                        • Instruction ID: ae38a8801861f174d9c22bc0ed19d4a35e6dea6505e928c42448d1f20e7269c2
                                                        • Opcode Fuzzy Hash: 1fe692656513febbef926eeee1fee0b645df63baaf87e6b1859601169d20fc7a
                                                        • Instruction Fuzzy Hash: 4FC129F0CC17058BD732CF29EA4C5893BB1BF85394F904A09D2616B2E5DBB411AACF84
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8662735ba3f8f14cdbeb0c5b46f8f968ad6e542bdaddc926f07c0e5c3a2c51aa
                                                        • Instruction ID: 0d7fde3b6d436850d7a55c928c04a2768e3522d9ed2875008d876bb74aa30781
                                                        • Opcode Fuzzy Hash: 8662735ba3f8f14cdbeb0c5b46f8f968ad6e542bdaddc926f07c0e5c3a2c51aa
                                                        • Instruction Fuzzy Hash: 4F81F4B4A2521ACFCB04CFA9C58499EFBF1FF89310F14956AD459AB320D334AA41CF51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1b1d69447d4aadbb9b6e11753d5257bc81e25d6f008bb9bb4aee437781440ef8
                                                        • Instruction ID: 660c44b909df5d5b639b9856a6d817a9f1be067d5ee259271cf8e8cd03330bf7
                                                        • Opcode Fuzzy Hash: 1b1d69447d4aadbb9b6e11753d5257bc81e25d6f008bb9bb4aee437781440ef8
                                                        • Instruction Fuzzy Hash: C791D2B4A2521ACFCB04CF99C58499EFBF1FF89310F249559D459BB220D374AA41CF51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4ac18a55565098872c9970ce585bfa13882216838a02a2b41a3da0c59513ce84
                                                        • Instruction ID: a2bc1be71017d8e3013358b8cdcdc95f16103373038a792b67b17fd8426ca5ab
                                                        • Opcode Fuzzy Hash: 4ac18a55565098872c9970ce585bfa13882216838a02a2b41a3da0c59513ce84
                                                        • Instruction Fuzzy Hash: 67812CB4E202598FCB14DF69C5809AEFBB6BF89304F24C2AAD419A7355D7309A41CF61
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1c6282fad94ad16b0c730dee6aa4a33da64ea69f05cea165374532365bf73a8b
                                                        • Instruction ID: 5bc3548d2c29ff66151fe6e3bef05f0c843800c1f14b2a3a5c864dbf0d1c3dfb
                                                        • Opcode Fuzzy Hash: 1c6282fad94ad16b0c730dee6aa4a33da64ea69f05cea165374532365bf73a8b
                                                        • Instruction Fuzzy Hash: CF7105B4E2560DCFCB04CFA9C5805DEFBF2FF99210F24952AD416B7224D3749A418BA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0419e1b3a393361a3cc3b7ec8dd4155e379407b562d23eb741852fbef7182284
                                                        • Instruction ID: 703179a0ad9e76c26b441eba6585b15fbe0a9318eb194c32686bd2e0dc2ac559
                                                        • Opcode Fuzzy Hash: 0419e1b3a393361a3cc3b7ec8dd4155e379407b562d23eb741852fbef7182284
                                                        • Instruction Fuzzy Hash: 5F7115B4E256098FCB04CFA9C5805DEFBF2FF99210F24D52AD416F7264D3749A428BA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 97cb94401efe3281d47a7116b5a75823aa200708713f78e8602d2b3c5213b662
                                                        • Instruction ID: d591990a7fbe379cf65967ef067e9cd840419e24bbe3547b89009f06d975539e
                                                        • Opcode Fuzzy Hash: 97cb94401efe3281d47a7116b5a75823aa200708713f78e8602d2b3c5213b662
                                                        • Instruction Fuzzy Hash: F7415CB0E2560ADFDB04CFA5C5426AEFBB2EF9A300F20D56AC114B7264D3748B418B95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a092d510d9a6e08893b2b1d431865f795955a67c0b2828ef1598ff36e06fac04
                                                        • Instruction ID: b2f8517c6db40aa3167689d09f01e488f74f0ef2b272eff35ef051a9d79bc7ea
                                                        • Opcode Fuzzy Hash: a092d510d9a6e08893b2b1d431865f795955a67c0b2828ef1598ff36e06fac04
                                                        • Instruction Fuzzy Hash: 0D414AB0E2520ACFDB04CFAAC5825AEFFF2EF98300F24D16AC515A7214D7709A418F95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 50f25d1bdf8ee436092008da98ee2eab052137e6fc9e304604686e3ec4c2a146
                                                        • Instruction ID: 36eb7076e83594a1efc2a8e5b9cf27c30df1d6064a7539c882a038c229be9187
                                                        • Opcode Fuzzy Hash: 50f25d1bdf8ee436092008da98ee2eab052137e6fc9e304604686e3ec4c2a146
                                                        • Instruction Fuzzy Hash: C44128F0E2520ACBDB44CFAAC5825AEFBF2EF98300F20D56AC415B7214D7719A418B95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9ade809fb383b30bcc1764652f5a3149187e8a4b3e4e50907af0709c90db5eb2
                                                        • Instruction ID: 667a1a53b324499a11fc75f75e44f1077c39a1c5c70c467dd652ad2db6421c3e
                                                        • Opcode Fuzzy Hash: 9ade809fb383b30bcc1764652f5a3149187e8a4b3e4e50907af0709c90db5eb2
                                                        • Instruction Fuzzy Hash: 24415CB0E2560ADFDB04CFA6D5426AEFBF1EF99300F20D56AC004B7264E3748B018B95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 005575da0ba04fe129529981c47bffd50a069a194fe2173acc4ac7466141d27b
                                                        • Instruction ID: f3ce6bedc2948552e0b5e925217c2f7fef5c27e0036de827e3966cc3e68b0732
                                                        • Opcode Fuzzy Hash: 005575da0ba04fe129529981c47bffd50a069a194fe2173acc4ac7466141d27b
                                                        • Instruction Fuzzy Hash: 7041F0B0E2520A9FCB08CFAAD4806EEFBF2AF99300F14C56AC415B7254D7349A41CF94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f9c087d6c3c9b2b38d1cce192929b1640e2a7959661c82baef94b45f955bdd39
                                                        • Instruction ID: b4da4aaeccdb7ded90cc049ffd53465bd2f177372962dd3fb81e7145f541329a
                                                        • Opcode Fuzzy Hash: f9c087d6c3c9b2b38d1cce192929b1640e2a7959661c82baef94b45f955bdd39
                                                        • Instruction Fuzzy Hash: EB41D0B0E2520EDBCB48CFAAD4815AEFBF2AF99300F14C56AC419B7214D7759A418F94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228046897.00000000072C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_72c0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dcce4f0bae449510d6923cc495505b356bebcf616fa035d5e64df667b8f75649
                                                        • Instruction ID: 697e7649703b5498ce2cd1c4f2a7d977639b2ab7214f47fce2e0b29e45280d06
                                                        • Opcode Fuzzy Hash: dcce4f0bae449510d6923cc495505b356bebcf616fa035d5e64df667b8f75649
                                                        • Instruction Fuzzy Hash: 40212C71E156188BEB18CF6BD80469EFFF3AFC9200F18C1BAC518A6254EB3005558F51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228148103.0000000007760000.00000040.00000800.00020000.00000000.sdmp, Offset: 07760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7760000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6c12a6de319535c809c573264b1740bdfa1f2e336644f15a5e805b5f935b7d78
                                                        • Instruction ID: 201c8ae4dce226962c949996ea171b4de946c84b7e90b8173f5f2ff323b16898
                                                        • Opcode Fuzzy Hash: 6c12a6de319535c809c573264b1740bdfa1f2e336644f15a5e805b5f935b7d78
                                                        • Instruction Fuzzy Hash: 0BE09AB9918108CBC7119F54E8485F8BBBCFB4F251F002195D84EA3216DB3469958A14
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'cq$4'cq$4'cq$4'cq$4'cq$4'cq
                                                        • API String ID: 0-1457021231
                                                        • Opcode ID: 18767cc8e681189773c10025dd0a621564b0904f3e39b47b58c22cac10121a99
                                                        • Instruction ID: 2948aab96c273e0fbd0c30865c8f0c7880657f8dc55fcd257a1d729f21dfbcb6
                                                        • Opcode Fuzzy Hash: 18767cc8e681189773c10025dd0a621564b0904f3e39b47b58c22cac10121a99
                                                        • Instruction Fuzzy Hash: 71413570D812068FC716EF64F66176E7BB2FF84351BD0496AD0059B3A5EB346914CF90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2228277454.0000000007CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07CA0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ca0000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'cq$4'cq$4'cq$4'cq$4'cq$4'cq
                                                        • API String ID: 0-1457021231
                                                        • Opcode ID: 14b49c7100893f843edfd2fa8e5743893d7528be80868164c6b7ce1963b26f35
                                                        • Instruction ID: d4cf1301a862e3ca91745aad8ef60805a535f2b90d6e8dc01bfd11749cc3c6f8
                                                        • Opcode Fuzzy Hash: 14b49c7100893f843edfd2fa8e5743893d7528be80868164c6b7ce1963b26f35
                                                        • Instruction Fuzzy Hash: 41412470D811068FC716EF64FA617AE7BB2FF84350BD04969D1059B3A5EB346914CF90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (ocq$(ocq$(ocq$(ocq$(ocq$(ocq$(ocq$,gq$,gq
                                                        • API String ID: 0-1821904394
                                                        • Opcode ID: 928e6469dea3f560207738a3d5c88c5ba2ca013d2c5c7cb17d1c4dd99155c40c
                                                        • Instruction ID: b0252b01b3b6e6f69e463085ca0f995f1276e4f31ce2ae90a45bfe6fd602a547
                                                        • Opcode Fuzzy Hash: 928e6469dea3f560207738a3d5c88c5ba2ca013d2c5c7cb17d1c4dd99155c40c
                                                        • Instruction Fuzzy Hash: A5824E74A00209DFCB14CF68C984EAEBBF2BF48324F15A555E906EB661D774ED41CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (ocq$(ocq$(ocq$(ocq$,gq$,gq$Hgq
                                                        • API String ID: 0-4185558839
                                                        • Opcode ID: 7775c566bfd105dcf6c44013cc64077ffeeaef59e531b5038e57034d42ea528f
                                                        • Instruction ID: 8ae66d14709005375881e2afa6d76eb4fa6210a15b5c270a85a65cd7e4fe63ca
                                                        • Opcode Fuzzy Hash: 7775c566bfd105dcf6c44013cc64077ffeeaef59e531b5038e57034d42ea528f
                                                        • Instruction Fuzzy Hash: B1726F70A002599FCB15DF69C854EAEBBB6BF88310F149469E816EB3A1DB70DD41CF90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: N
                                                        • API String ID: 0-1130791706
                                                        • Opcode ID: fcf032cd1c935e08fffdb0ca1205aac91300d5c71cf44a5c20aea9e332e2bd6f
                                                        • Instruction ID: 50d5ca7d80e2caf20478c2b211b0a79eca525d7715dccf63958127e19d406112
                                                        • Opcode Fuzzy Hash: fcf032cd1c935e08fffdb0ca1205aac91300d5c71cf44a5c20aea9e332e2bd6f
                                                        • Instruction Fuzzy Hash: 3173D531D1075A8EDB11EF68C854A99FBB1FF99300F51D69AE44877221EB70AAC4CF81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Xgq$Xgq
                                                        • API String ID: 0-2113765878
                                                        • Opcode ID: 5e3a45788b5cbc2ba651945eccd3adf88438714e748319eccc11857198d96e26
                                                        • Instruction ID: 301c0e55367438d76b1a5a81b90e7643cc8f2547b2d2ac350003bdf5beb6c4fb
                                                        • Opcode Fuzzy Hash: 5e3a45788b5cbc2ba651945eccd3adf88438714e748319eccc11857198d96e26
                                                        • Instruction Fuzzy Hash: 742256722052829FDB1BCF24CBF6642FFFCEE5721472590CAD8848F196CA619687CB05
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Xgq$$cq
                                                        • API String ID: 0-2122769152
                                                        • Opcode ID: a27a021bdac795b08cc3412d525844b1a95a771ba35ded472e0539edee9dda1e
                                                        • Instruction ID: 9e2f7b8cba53dd4c98718d6a609e6d275fab4f88374f142b9c10317040076602
                                                        • Opcode Fuzzy Hash: a27a021bdac795b08cc3412d525844b1a95a771ba35ded472e0539edee9dda1e
                                                        • Instruction Fuzzy Hash: 0E917D75F002589BDF18EF78885827EBBA7BFC8710B15886ED506E7395DE348812CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PHcq$PHcq
                                                        • API String ID: 0-4229179212
                                                        • Opcode ID: 1fd7198a80b0bbc36638fabd7388d296abc6316182c973ae6a048bd220668d28
                                                        • Instruction ID: 67b6c2db0073f3c88be30f92391a9ed5b45dcfe1d3cd2f926cabc4e82e77e032
                                                        • Opcode Fuzzy Hash: 1fd7198a80b0bbc36638fabd7388d296abc6316182c973ae6a048bd220668d28
                                                        • Instruction Fuzzy Hash: 9B81D374E00218CFDB18DFA9C954B9DBBF2BF89300F60906AD809AB354DB745946CF50
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 25f6513a924ad20d0e441327a6437f2eb7639aa5ba0f3debeddc369a77039656
                                                        • Instruction ID: 9157dc77e39a84fccc7e08ff34329d6dbc1a20df56018f5605ef03558929ee9f
                                                        • Opcode Fuzzy Hash: 25f6513a924ad20d0e441327a6437f2eb7639aa5ba0f3debeddc369a77039656
                                                        • Instruction Fuzzy Hash: 45826E74E012289FDB65DF69C898B9DBBB2BF89300F1081E9E80DA7255DB355E81CF41
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bb4abb2b1fa104735af07ae26ff978180bdb2ba1d904ff555491a67f2a22e2e8
                                                        • Instruction ID: 1707aed1c9b4d3281d7dc53d9c06382448f0e3e2eadc5f943d4cd0d6a02d3bc8
                                                        • Opcode Fuzzy Hash: bb4abb2b1fa104735af07ae26ff978180bdb2ba1d904ff555491a67f2a22e2e8
                                                        • Instruction Fuzzy Hash: 7DC1A378E01218CFDB14DFA5D994B9DBBB6BF88300F2085A9E809AB355DB355E85CF10
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e2d25eea3a2d08b6192759b407a9b9ad49ca5563564423ecfb0d87cfa8e0e69c
                                                        • Instruction ID: e10e75d53bdf1e97c08e8eabef3db00979ac4cef84e9babb40f8cac3729f2e14
                                                        • Opcode Fuzzy Hash: e2d25eea3a2d08b6192759b407a9b9ad49ca5563564423ecfb0d87cfa8e0e69c
                                                        • Instruction Fuzzy Hash: BAA10371D116198EDB14EFA9C8847DDFBB5EF89300F10C6AAE458A7260EB709AC5CF41
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d6c1bc5760a2b012baf0018bbf70d83eb4982d2e99727e1658bdd3613373af0e
                                                        • Instruction ID: ce7d4acf72702a7690c4bdb92d7eff19aead7171c8f75102002f977d4a8f29ae
                                                        • Opcode Fuzzy Hash: d6c1bc5760a2b012baf0018bbf70d83eb4982d2e99727e1658bdd3613373af0e
                                                        • Instruction Fuzzy Hash: BEA10270D00208CFDB14DFA9C998B9DBBB5FF89304F20926AE409AB3A1DB745984CF55
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ddc650757e46b1ce68d9f9f8af9ee04971ddae1d7edf4686bcffbba6012fb500
                                                        • Instruction ID: 53619fb731a9ccb27dff8aa8a4387fadc4c980299826a12dcbb681c6ed56a56a
                                                        • Opcode Fuzzy Hash: ddc650757e46b1ce68d9f9f8af9ee04971ddae1d7edf4686bcffbba6012fb500
                                                        • Instruction Fuzzy Hash: 72A10370D00208CFDB14DFA9C998B9DBBB5FF88304F20926AE409AB3A5DB745985CF55
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f3264fd3ce421d1d1ab60153367e1d3f37934bedc5860d6071b21a50154feb7e
                                                        • Instruction ID: 3157f617ed7ec544715fd24fd38a4fb4ef276ecca957a3a0c0dd3108da73e33b
                                                        • Opcode Fuzzy Hash: f3264fd3ce421d1d1ab60153367e1d3f37934bedc5860d6071b21a50154feb7e
                                                        • Instruction Fuzzy Hash: 58911070D01208CFEB14DFA8C998B9DBBB5FF49310F209269E409AB3A1DB749985CF55
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 14230ee115c05876a7a0bcba8974f88926592db761f2d869ea4d58f6b2d624d6
                                                        • Instruction ID: 36305e6d4dfa223c9bd9e16344f534591ec8d81d66278988b849a379699b7bba
                                                        • Opcode Fuzzy Hash: 14230ee115c05876a7a0bcba8974f88926592db761f2d869ea4d58f6b2d624d6
                                                        • Instruction Fuzzy Hash: 5681AF74E412289FDB65DF29D954BEDBBB2BB89300F1080EAE809A7254DB315E81CF40
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5eef33104b1e6d3d08354471890c8601987147e2841bc1fbb4720ba216c4d909
                                                        • Instruction ID: 2b126873813a6d7b0ffaf8231849a15fc6a785e863380ada00407663b3569b96
                                                        • Opcode Fuzzy Hash: 5eef33104b1e6d3d08354471890c8601987147e2841bc1fbb4720ba216c4d909
                                                        • Instruction Fuzzy Hash: D141F574D01208CBEB18DFAAD95469DFBF6BF89300F24C02AD815AB368DB345945CF50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 8hq$Hgq$Hgq$Hgq$TJhq
                                                        • API String ID: 0-3326065064
                                                        • Opcode ID: 045b929deaa851474b91d29d435411770cfcb0a1fa851ad138940064b96bb279
                                                        • Instruction ID: 4d9e9dab9131f459debd6f6bf8fe930725e0643197a59d51fa6e00830bc1b2fe
                                                        • Opcode Fuzzy Hash: 045b929deaa851474b91d29d435411770cfcb0a1fa851ad138940064b96bb279
                                                        • Instruction Fuzzy Hash: 1BD1C371B042048FCB15DF68D590AAE7BB6EF89324F29446AE505DB3A1CF35DC42CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0oFp$LjFp$LjFp$PHcq$PHcq
                                                        • API String ID: 0-3391486992
                                                        • Opcode ID: 8cc0ce187441e9f669e9205cd835c26d51bb291d1ce8be270730e55a9602a191
                                                        • Instruction ID: 309aef6c28ae671db24ab9eb708e299485b44698c2a23fd6336e88b1b89e27fc
                                                        • Opcode Fuzzy Hash: 8cc0ce187441e9f669e9205cd835c26d51bb291d1ce8be270730e55a9602a191
                                                        • Instruction Fuzzy Hash: 80519474E00248DFDF48DFA9D984A9DBBF2BF89310F10846AE815AB364DB359946CF50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $Hgq$Hgq$Hgq
                                                        • API String ID: 0-1863853498
                                                        • Opcode ID: ae90ccb452118824166f9bc266146de49d2fee3e92f84bfd028b74a1beea8381
                                                        • Instruction ID: e471598c867b3c09f8b2629f6222d39ff57940620976af7ea7b96456b5453c0d
                                                        • Opcode Fuzzy Hash: ae90ccb452118824166f9bc266146de49d2fee3e92f84bfd028b74a1beea8381
                                                        • Instruction Fuzzy Hash: 4FB1E3307042448FCF16AF78A86926E7BAAEF85368F14852AF525CB3D1DF348D41CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Xgq$Xgq$Xgq$Xgq
                                                        • API String ID: 0-1951159037
                                                        • Opcode ID: 3bd59f0bc44a88b8c686dc954a23c256ef80dd915bd8a56bdc7153d991cfadf0
                                                        • Instruction ID: 2cf8df6618e8b9371d425781b0de5926f2e7417a918882482dae7fca80bc25dc
                                                        • Opcode Fuzzy Hash: 3bd59f0bc44a88b8c686dc954a23c256ef80dd915bd8a56bdc7153d991cfadf0
                                                        • Instruction Fuzzy Hash: 76A16970A0521B8FCF15CF6CCAA17AEBBFABF96204F2044D6D8449B255DF305A868F51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $Hgq$Hgq$Hgq
                                                        • API String ID: 0-1863853498
                                                        • Opcode ID: 00f576683a76e6843c066bba17a9a1f44b49c5ec88aa6a46d9d5f9a9f639ed97
                                                        • Instruction ID: bc0d19614918f48adc21f5893fc32b2e361e2a8f1368d0cc8ef3345554fb2468
                                                        • Opcode Fuzzy Hash: 00f576683a76e6843c066bba17a9a1f44b49c5ec88aa6a46d9d5f9a9f639ed97
                                                        • Instruction Fuzzy Hash: 0381D030B042488FCF15AF78A86922E7BBAAFC9358F14452AE516DB3D1DF348C41CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $cq$$cq
                                                        • API String ID: 0-2695052418
                                                        • Opcode ID: 7cf06436fa956e4d0e2f749b624552620a3e7e528dc9065a9a800582358fa415
                                                        • Instruction ID: 7898c878469733dc326b8351b93436ffce19bac37a8974e51561ac70e047c8c3
                                                        • Opcode Fuzzy Hash: 7cf06436fa956e4d0e2f749b624552620a3e7e528dc9065a9a800582358fa415
                                                        • Instruction Fuzzy Hash: 9B623E74A00218CFDB55DBA4C864BAEBBB7FF88300F1080A9D50A6B391DB359E95DF51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Hgq$Hgq
                                                        • API String ID: 0-3391890871
                                                        • Opcode ID: f9982caa94d3b9f5c2f2b08e0eecb821f2e93279a70d597b9e15ea87d539fcec
                                                        • Instruction ID: 7b8a4a0075c682ccef0c159cd415ffa7a986ef3e3adbd2d805323dcb32321ac8
                                                        • Opcode Fuzzy Hash: f9982caa94d3b9f5c2f2b08e0eecb821f2e93279a70d597b9e15ea87d539fcec
                                                        • Instruction Fuzzy Hash: 35C1CE347042558FDB1A9F78C854A6E7BB7BF88322F048669E906CB391DB74CC42DB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ,gq$,gq
                                                        • API String ID: 0-2533611571
                                                        • Opcode ID: 1aa6225ab90d4c95cd9d218906aae1bad6a868ec1405e94d4cc62ab3e4897ffd
                                                        • Instruction ID: 5bc2da0b0ce8ce8c36eb55a72aa29939a25a632220a32a39c3437e634b6934f8
                                                        • Opcode Fuzzy Hash: 1aa6225ab90d4c95cd9d218906aae1bad6a868ec1405e94d4cc62ab3e4897ffd
                                                        • Instruction Fuzzy Hash: 2681A034B04105CFCB14DF69C894D6AB7F6FF89226B159269D806EB3A0DB31EC41DB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (&cq$(gq
                                                        • API String ID: 0-4012885273
                                                        • Opcode ID: e398a75d6839d316a5c44562562d27030ddcd3a5f54ec16dbc08572290528509
                                                        • Instruction ID: 57aaef36b2216dca155b1195450c6d38a874afd85601d6a6bcd402752a26d9d3
                                                        • Opcode Fuzzy Hash: e398a75d6839d316a5c44562562d27030ddcd3a5f54ec16dbc08572290528509
                                                        • Instruction Fuzzy Hash: 7A718F31F042599BDB15DFA9C851AAEBBB6AFC8310F548529E806A7380DF709D05CBA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 8hq$TJhq
                                                        • API String ID: 0-2475493515
                                                        • Opcode ID: 92faac75a473f1ed1ed62b182affab5191e536fbc574f3e8f25dd84ca9f36a29
                                                        • Instruction ID: a07ce107f40e074ac3a7ec9a50e2bc97263a20071e7e6a1cc850c52e07e79d2b
                                                        • Opcode Fuzzy Hash: 92faac75a473f1ed1ed62b182affab5191e536fbc574f3e8f25dd84ca9f36a29
                                                        • Instruction Fuzzy Hash: 43311675B101098FCB05DFA8D490E9DBBB6EF89324F295494E505AB3A5CB71EC81CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 8hq$TJhq
                                                        • API String ID: 0-2475493515
                                                        • Opcode ID: 2f75f3ae445693a0792c2ad661d05611109a0a5e2795fe4b4ede7ea1c948b928
                                                        • Instruction ID: 1d207a8ae502e16fc35514a256656867bf573a584f43f1af80f38572fd6eac61
                                                        • Opcode Fuzzy Hash: 2f75f3ae445693a0792c2ad661d05611109a0a5e2795fe4b4ede7ea1c948b928
                                                        • Instruction Fuzzy Hash: 55314871B101098FCB05DFA8D490E9DBBB6EF89324F255854E501AF3A5CB71EC81CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Xgq$Xgq
                                                        • API String ID: 0-2113765878
                                                        • Opcode ID: 9b815bad80d13a171afb4eefffc3d7537a5476955958c465beda49c637dc80dd
                                                        • Instruction ID: fbad6cb54e16cf4982445428b21e2c9f319867383ec4c2f33dcdb374f1abbb8a
                                                        • Opcode Fuzzy Hash: 9b815bad80d13a171afb4eefffc3d7537a5476955958c465beda49c637dc80dd
                                                        • Instruction Fuzzy Hash: 13219370704219ABDF294A698DA027BB7AEBFC6610F15402BDD058B3D1DF618C4AC6A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LRcq
                                                        • API String ID: 0-4134321033
                                                        • Opcode ID: 8a6f7b88206e3198e50344ea266620d5ad53a3b28bf1aba7a5f322c324ce262b
                                                        • Instruction ID: 63b71b5f9a196940cdf7e2e845f225019668036c10821f6e870849bc780288be
                                                        • Opcode Fuzzy Hash: 8a6f7b88206e3198e50344ea266620d5ad53a3b28bf1aba7a5f322c324ce262b
                                                        • Instruction Fuzzy Hash: 7BA1AB74A0020ACFCB05EFB8E994A9D7BB6FF4D304B209919E415AB359DB746945CF80
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LRcq
                                                        • API String ID: 0-4134321033
                                                        • Opcode ID: 9154e19fc1ab740321850e866888814c792cc9464d1c5bce882293316c4f71b3
                                                        • Instruction ID: cc4804737541e9919d9cea8d62f89e47af46321fb7b8b79909b720aeef82cc8d
                                                        • Opcode Fuzzy Hash: 9154e19fc1ab740321850e866888814c792cc9464d1c5bce882293316c4f71b3
                                                        • Instruction Fuzzy Hash: 9CA19B74A0020ACFCF05EFB8E994A9DBBB6FF4C304B209919E515AB359DB746945CF80
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Hgq
                                                        • API String ID: 0-2103768809
                                                        • Opcode ID: 7138a3a2ef8425df443d888eddcd148303a62d38dbe75ad6848dc8877037559c
                                                        • Instruction ID: 4c29af6d3c99147ee84a42f3dc63e81a0e0ed7516ad0b08fd15a0b8da306f332
                                                        • Opcode Fuzzy Hash: 7138a3a2ef8425df443d888eddcd148303a62d38dbe75ad6848dc8877037559c
                                                        • Instruction Fuzzy Hash: 4841B235B042489FCB05EFB8A8556AE7FBAEF89301F144479E505DB391DE349D02CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'cq
                                                        • API String ID: 0-182294849
                                                        • Opcode ID: a1f90546304f78a417f2a5f77d10a048a1266defd683a4784c32bbefc81127d5
                                                        • Instruction ID: 1cd89f88455c2b70c3acc8f4424f751ffd53fd835e746a543a6076cf2d6780b6
                                                        • Opcode Fuzzy Hash: a1f90546304f78a417f2a5f77d10a048a1266defd683a4784c32bbefc81127d5
                                                        • Instruction Fuzzy Hash: 95413A747042199FCB15DF68C848EAA7BB6BB48324F1010A9E916CB3A0D771DD40CBA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Hgq
                                                        • API String ID: 0-2103768809
                                                        • Opcode ID: 4559834ce47bc2a63d6725504240d96327ddbdf30670a7282d936eec625ff810
                                                        • Instruction ID: 2d5964c56b5a14de9f598bd2c499093b79b333d2b76fc108205644fac4ad1e71
                                                        • Opcode Fuzzy Hash: 4559834ce47bc2a63d6725504240d96327ddbdf30670a7282d936eec625ff810
                                                        • Instruction Fuzzy Hash: 4931BD307042489FCB05EF78D854A6EBFBAFF89340F218069E5058B3A1CE319D46CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'cq
                                                        • API String ID: 0-182294849
                                                        • Opcode ID: 295c4c7a990e2f445fa11ceaa15ba06da49b13d4f574fb41b1afc9b7c4627d03
                                                        • Instruction ID: 84ca9660d64bed325ce3022a6bb58b4e7c9b36cec40e3c7638289d2c411e4c22
                                                        • Opcode Fuzzy Hash: 295c4c7a990e2f445fa11ceaa15ba06da49b13d4f574fb41b1afc9b7c4627d03
                                                        • Instruction Fuzzy Hash: 0F21717170839E8BDB14DE669880E7B7BEBBB85224B05A476EC12C7744DAB5CC40C7A0
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0d43290774ce342f7c4f2120e02afb305927425ad84da10eff945ce6f15a15f8
                                                        • Instruction ID: bd971159db264a41fc145ccb1bf743e5fad1b6c12ae79632ad107377597dc583
                                                        • Opcode Fuzzy Hash: 0d43290774ce342f7c4f2120e02afb305927425ad84da10eff945ce6f15a15f8
                                                        • Instruction Fuzzy Hash: B1F12B75A00115DFCB04DF69C888DADBBF6BF88320B1A94A9E905EB361DB70ED41CB54
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 012b4f18b6200f19d8fb800f88a9c60a752e34f7d9b57df7b8a73d87361d4386
                                                        • Instruction ID: bc9029fbe830f5e8619a14d68974b92bb5284e315078ab0b960005efdedb0c14
                                                        • Opcode Fuzzy Hash: 012b4f18b6200f19d8fb800f88a9c60a752e34f7d9b57df7b8a73d87361d4386
                                                        • Instruction Fuzzy Hash: 9A61B376B006059FCB14DB7DD894AAEBBB9EBCC324F14852BE519D7350DB32D8018B90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6ad5406b6b543f3a301d9fe0de7b47580d83c8d40957423d86e2f75fa056bd43
                                                        • Instruction ID: 51d504722bceaf9cdde91c55aea113e00cbd6468cf84d6d767ecf0fd4dc4f8bb
                                                        • Opcode Fuzzy Hash: 6ad5406b6b543f3a301d9fe0de7b47580d83c8d40957423d86e2f75fa056bd43
                                                        • Instruction Fuzzy Hash: CC517F357182599FCB14DF39C884E2A7BEAFF4866870564BAE916DB261EB70DC00CB50
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 534e9c2ebe27838939e26af3c7c39104ebd17629ef0ad94dead08276e9270ee9
                                                        • Instruction ID: 60f51d752c5c52cd10e5f650149337c1aacd54d7ec6451cc5294c61101fe2636
                                                        • Opcode Fuzzy Hash: 534e9c2ebe27838939e26af3c7c39104ebd17629ef0ad94dead08276e9270ee9
                                                        • Instruction Fuzzy Hash: C4418571E002099BDB14DFA5C991FDEBBF5BF88710F649129E806B7350DB70A946CB90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0a53eeebacf98f2285ca9d7a5bd14a0fa17fbc202bfe71ee421d8b2da2ba5ef6
                                                        • Instruction ID: d90748d08c4ff9bacae89543d294b06ae228ff3bd2972691eeacf4c5b23cf4b5
                                                        • Opcode Fuzzy Hash: 0a53eeebacf98f2285ca9d7a5bd14a0fa17fbc202bfe71ee421d8b2da2ba5ef6
                                                        • Instruction Fuzzy Hash: 1941A2B4E012089FCF08DFAAD884A9DBBB6BF8D300F249569E405BB364DB349841CF14
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 802cf81665fbdec24961c2a1e849b5b533fa6774b82a6a87bec953b88b687bab
                                                        • Instruction ID: b24c4537ff2524940e930756851aad85cc806f0199c32eca114b7dbffb9c5041
                                                        • Opcode Fuzzy Hash: 802cf81665fbdec24961c2a1e849b5b533fa6774b82a6a87bec953b88b687bab
                                                        • Instruction Fuzzy Hash: CA31BC7003A68A8FC7022B21A5BE17AFFB8FB8F323F056D41F14A8C511AF3404848B61
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d80181edf66ae058409f4e5c4b8eab5237b4f135741230727f4eb7848ec079ca
                                                        • Instruction ID: eeaba5f61596ed94a20f313f6bdbfa865040de132427cb3bbbc5093af75ee58a
                                                        • Opcode Fuzzy Hash: d80181edf66ae058409f4e5c4b8eab5237b4f135741230727f4eb7848ec079ca
                                                        • Instruction Fuzzy Hash: 6831907130414ADFCF059FA4D854AAF3BABFB88311F008424FD168B295CB79C961DBA1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c401f655e98e3640d324b0ca593cd99eaa5e5fd8e0bbe23d5dfa6f826d31a08c
                                                        • Instruction ID: d82ddf4c0bf9fa15cfe51581daae8a5df9052c00acbcb329bb31050d683c32c3
                                                        • Opcode Fuzzy Hash: c401f655e98e3640d324b0ca593cd99eaa5e5fd8e0bbe23d5dfa6f826d31a08c
                                                        • Instruction Fuzzy Hash: 262146353003084BCB266739D898E3E7A9BBFC522CB147039DD02CB380EE65CC829791
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f4f1208cb26f7bb8dd47e7d773e276640a82060eb9d205eed71b545dd882ea71
                                                        • Instruction ID: 7cdfc097b3dc9e60c5b6a5d4b714f690dbc6534d35d8579f8918d973eaff5b74
                                                        • Opcode Fuzzy Hash: f4f1208cb26f7bb8dd47e7d773e276640a82060eb9d205eed71b545dd882ea71
                                                        • Instruction Fuzzy Hash: E421C2353043094BDB156629D499E3E7A9BBFC562DF24A039DD06CB394EAA9CC83D381
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3f0829aabcd0a20d035bd67131230e6de572db071016f1cd414e94623ca48d94
                                                        • Instruction ID: 32796fcb57a7b3acf3c252b0cca307200d96ae9ab7f4dbc129564405bca43ba1
                                                        • Opcode Fuzzy Hash: 3f0829aabcd0a20d035bd67131230e6de572db071016f1cd414e94623ca48d94
                                                        • Instruction Fuzzy Hash: 70314F70B046058FCB04CF68C884EAEBBB7FF89321B158599E915DB3A1DB349D41CB94
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f59a39829562079936c9f6f46399cde8bf0cde1c6b6d6263a37217f4972d3c55
                                                        • Instruction ID: 441083e703bf5642ef3a65a70d49c4543ae23564c0a9cbe00b03440539d4977c
                                                        • Opcode Fuzzy Hash: f59a39829562079936c9f6f46399cde8bf0cde1c6b6d6263a37217f4972d3c55
                                                        • Instruction Fuzzy Hash: 24219035A002069FCF55DB24D540AAE77B9EB8E260B20C459D91D9B398EF30EA06CB91
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3454900592.0000000000C1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C1D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_c1d000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 30a54a5b184c82a244526f3c38da5c42bb0682e22742434ad08ecedfb6da57aa
                                                        • Instruction ID: 9d467f49fcd08e88863c2e59905ba0ca96b7f333318843475fe617d598edffbb
                                                        • Opcode Fuzzy Hash: 30a54a5b184c82a244526f3c38da5c42bb0682e22742434ad08ecedfb6da57aa
                                                        • Instruction Fuzzy Hash: 492134B1504200EFCB10DF14D9C0B26BBA5FB89314F34C66DD80A0B282C33AD887EA62
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3454900592.0000000000C1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C1D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_c1d000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0de5507796c26956d421ba1fcd7f82475a1f6b5c928535531cff3f5bac6b1b59
                                                        • Instruction ID: 4576de669edef48ba90f33c69a994641287df99a61cae2213d8aee413d6de9be
                                                        • Opcode Fuzzy Hash: 0de5507796c26956d421ba1fcd7f82475a1f6b5c928535531cff3f5bac6b1b59
                                                        • Instruction Fuzzy Hash: 96214B7150D3C09FCB038B24D990715BF71AB47214F29C5EBD8898F2A7C23A985ADB62
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cc9b3421bc825522a5e9509e8b99af7e0437dd270a9ec68690b846e842d36eed
                                                        • Instruction ID: 5db8685f1bd0350123a2951a330eb9ac051d75e63833c9e6a95cc9049a18fa2d
                                                        • Opcode Fuzzy Hash: cc9b3421bc825522a5e9509e8b99af7e0437dd270a9ec68690b846e842d36eed
                                                        • Instruction Fuzzy Hash: 6D217F70E042489FDB09EFB8C4047AEBBBAEF85308F10C4A9E8145B394DB749A45DF41
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ce006dd11635a740f15cae471228f497fc156b9fd7d41c6bb7a1a4aa7da9f664
                                                        • Instruction ID: 304c2fdd83d223020efc79c72666333f6d59052385fea9af71a67692071c9c64
                                                        • Opcode Fuzzy Hash: ce006dd11635a740f15cae471228f497fc156b9fd7d41c6bb7a1a4aa7da9f664
                                                        • Instruction Fuzzy Hash: E01126363082955FCF0A6F78982056E7FB7EFC6210710446AE946C72C2CE354D05D3A2
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c96332d4ec9432cdd5dbdc2b5ee4c9daffca1c973bd54e1876dd7a8b693d2f60
                                                        • Instruction ID: 0b9d327329ed67f568ad9146b3efbda4190eebbf2fb85995643fe54bf89751e3
                                                        • Opcode Fuzzy Hash: c96332d4ec9432cdd5dbdc2b5ee4c9daffca1c973bd54e1876dd7a8b693d2f60
                                                        • Instruction Fuzzy Hash: 06219071A002089FCB24CF54C814FAAFBF6FB44324F44856AE95B9B251D7B5D954CFA0
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 63c2399a65aa4080406d154a7ae7a68be6b50a552217d30a51b136b425c63a95
                                                        • Instruction ID: a72ffaa6220454f36c52a7b230b4965ca4064cbc53246e25d8e869546d61a809
                                                        • Opcode Fuzzy Hash: 63c2399a65aa4080406d154a7ae7a68be6b50a552217d30a51b136b425c63a95
                                                        • Instruction Fuzzy Hash: 89211670C0520A8FCF05EFA8C9445EDBFB4EF0A300F1455AAD409BB261EB314A95CFA1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 17246faf86fd5fa500a614c65fe64dc92c075b49e9296f4b4a502554f6940e5e
                                                        • Instruction ID: 44cd53200d27fa499737062f7bd5bf8558f28ab7276fb5b81ac1c644156ecef8
                                                        • Opcode Fuzzy Hash: 17246faf86fd5fa500a614c65fe64dc92c075b49e9296f4b4a502554f6940e5e
                                                        • Instruction Fuzzy Hash: E5114F757002048FCB14DB69E988E56B7EAEF89725B118469E1498B3A8CF71EC00CB50
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 223c819e4caa7d18c51a57b44ae45beeecfbf5eea85628f6059acd4454758be6
                                                        • Instruction ID: ca5b94681e42284375a77de3efea400c77e4eb578c3402a384b775e330f004a4
                                                        • Opcode Fuzzy Hash: 223c819e4caa7d18c51a57b44ae45beeecfbf5eea85628f6059acd4454758be6
                                                        • Instruction Fuzzy Hash: BD2156B280020ADFDB10CF99C845BDEBFF4EB48320F158429E958A7210C335A990DFA5
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6909a69c124a7adea1d4d9f266b5b22d64d140a78a10e35ac4470079110ef7af
                                                        • Instruction ID: b7b8af238d931fb5fabf5cf5685a9c6cfe8f6d3e70ca33775d689973680aa7a1
                                                        • Opcode Fuzzy Hash: 6909a69c124a7adea1d4d9f266b5b22d64d140a78a10e35ac4470079110ef7af
                                                        • Instruction Fuzzy Hash: 461167B2C00249DFCB10CF99C905BEEBFF5EB48320F158429E918A7210C335A950DFA1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c53c90bb6d1252a34fa8d6fe6d4dad129adafa6f8938299b46707f1a4d9caf2b
                                                        • Instruction ID: 918dba489d9d24d82316b6cb959877353973002c84ac9cb1998e87a54cfa1286
                                                        • Opcode Fuzzy Hash: c53c90bb6d1252a34fa8d6fe6d4dad129adafa6f8938299b46707f1a4d9caf2b
                                                        • Instruction Fuzzy Hash: CB112174F041488FDB00EFE8D851FAEBBB5AB48311F40A056E909E7359E63099418F51
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 593013b11622dcd7ed2f4b082fc2ed72c5377757986cf7492643c3b7d07d432b
                                                        • Instruction ID: 8317ae9091123070495ae69330e39d7ac1c25d98d5792d41a5be0b1cd405a24d
                                                        • Opcode Fuzzy Hash: 593013b11622dcd7ed2f4b082fc2ed72c5377757986cf7492643c3b7d07d432b
                                                        • Instruction Fuzzy Hash: 0401FC32F003414FDF259BB98A4463E77EBAFC8224314453AC905C73A8EE30C8428B90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e48f872ee5f7bcae50207db6677246e4538fc1d9f020ad79f391dd2a4277724f
                                                        • Instruction ID: 85f0b2a62f8cb50bab08499b3efb852519ad95480cb58b6e34180f385a52a445
                                                        • Opcode Fuzzy Hash: e48f872ee5f7bcae50207db6677246e4538fc1d9f020ad79f391dd2a4277724f
                                                        • Instruction Fuzzy Hash: FA016D32F002554BDB24ABBA8A5463E76EFAFC8665710453AD905C7368FE70D8418B91
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bb012b7b46ff9a72f803ae565af1c1c35d37441c389ab569d504ae04f7885533
                                                        • Instruction ID: 79d0414e0128c767184c32acc690a823a49f7c99c077cac88d7d4ddd964457a4
                                                        • Opcode Fuzzy Hash: bb012b7b46ff9a72f803ae565af1c1c35d37441c389ab569d504ae04f7885533
                                                        • Instruction Fuzzy Hash: 6B01D6327041196BCF059F559800EAF3BABEBC9761F148069FA16D7380DA75CD11A7A4
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8e2b8450d0fc544b31bbbc5c87f22c6110d4e02fc1def88b2de7bb2de95332ee
                                                        • Instruction ID: 02f34d18b28ae8d106be4406da83e9630502f10c23071459ce54be1d69a96c5c
                                                        • Opcode Fuzzy Hash: 8e2b8450d0fc544b31bbbc5c87f22c6110d4e02fc1def88b2de7bb2de95332ee
                                                        • Instruction Fuzzy Hash: 25012975A1021A9FCF149FA9E8695AEBFB9EB88350F004429F91AD7341DF308D10CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a4b9864a1293c0727aee6b1e587648f8dcb264a54e35ca368f039c6d74b8ae30
                                                        • Instruction ID: 68d4798de4940df36b8f147035b7ace7ab8704024953f299df38d96ba0a15740
                                                        • Opcode Fuzzy Hash: a4b9864a1293c0727aee6b1e587648f8dcb264a54e35ca368f039c6d74b8ae30
                                                        • Instruction Fuzzy Hash: 9E01F472B041096BCB01CE559C00FDF3BABEBD8751F048025FA16D7240DA75C912ABA0
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ff3d9945f9a163258a3f8db6e535c1b2394f726d42a548efd8c3b6f4f36fa9a3
                                                        • Instruction ID: bad202cfe57dd049316e670f4d6da46da698803b62a3d3b0be1bac34a3548378
                                                        • Opcode Fuzzy Hash: ff3d9945f9a163258a3f8db6e535c1b2394f726d42a548efd8c3b6f4f36fa9a3
                                                        • Instruction Fuzzy Hash: 32011A71A1421AAFCF14DFA8A8589EEBFB9FB88350F01512AF919D7250DB308D11DB91
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e970caffc0f53c9dac2e80f13cb0346825ff2e2c5f782617d8562e3c2438fb31
                                                        • Instruction ID: b532abb2d6312edd66404fe744ad59358c058952bc1baa3c2ab22354dded33c8
                                                        • Opcode Fuzzy Hash: e970caffc0f53c9dac2e80f13cb0346825ff2e2c5f782617d8562e3c2438fb31
                                                        • Instruction Fuzzy Hash: C9012C75700210CFDB14DB69E998B16B7E9FF89729F118469E1498B3A8CF70EC44CB10
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c296e57573dbcf1e62484a82908c0789d9f9f08019f8d01999bd21ab38d0f63a
                                                        • Instruction ID: 1a95b85424375b3310b364035c80d6f0aa3bd975adceca2d02da9a0cf96769c6
                                                        • Opcode Fuzzy Hash: c296e57573dbcf1e62484a82908c0789d9f9f08019f8d01999bd21ab38d0f63a
                                                        • Instruction Fuzzy Hash: A8F0FC367042149BCF456AB8A81926D3FEAEFC9315F144C66F50ACB381DF35CC829781
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8368fade40b703907e96f2997d9196aff4acffbd9184683a26b72d05a4be81ee
                                                        • Instruction ID: 57122bd30cbbfc9f272ef774a14718c21dafb461c954aebedc910a1a658a2e3e
                                                        • Opcode Fuzzy Hash: 8368fade40b703907e96f2997d9196aff4acffbd9184683a26b72d05a4be81ee
                                                        • Instruction Fuzzy Hash: BEF02032B002108BCF19966AF41096EB7AEEFC9631B00007BE008DB390CF32CC028B94
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 937a8bd4fbf77c7e2b1fae182fe0f5b53fa8632b38ad312adc04285a21182d14
                                                        • Instruction ID: 3a93cf5e1268b59aab2d9ee055a1560735e04d9d3d323428b32bbe2f6cbec4e7
                                                        • Opcode Fuzzy Hash: 937a8bd4fbf77c7e2b1fae182fe0f5b53fa8632b38ad312adc04285a21182d14
                                                        • Instruction Fuzzy Hash: CEF090B6A002049ECB51DFB9A48099FBBF5BB8C350B14452AE605D3200EB7069128B90
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8f625fffd5813451c81feca83e2216ba3f1f8746b16ad336d987d2ee4f720d8e
                                                        • Instruction ID: c28f1d1ac292c95460f53b47e47d01ac3c4c2b418750a65dd28aee23fe86043e
                                                        • Opcode Fuzzy Hash: 8f625fffd5813451c81feca83e2216ba3f1f8746b16ad336d987d2ee4f720d8e
                                                        • Instruction Fuzzy Hash: 42F09274465B42CFD3022B60ACAC3EE7B76FB4B317B44AC41E01A85172DB6404868B55
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2659ae29631a304659ce71bc87aa5550273b8303b2b2243b21d53780e89cb455
                                                        • Instruction ID: cb447b2a6a60218b6560adbf9f4fa5d9cc9ee1441fd38a88528b468110b4d521
                                                        • Opcode Fuzzy Hash: 2659ae29631a304659ce71bc87aa5550273b8303b2b2243b21d53780e89cb455
                                                        • Instruction Fuzzy Hash: A1F089719001089F8B50DFADD84099FBBF9FB98250B10453AD505D3200DB705911CBE1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 443cdfa98b8087b7bcb922c0948fe50d5dc3e5b8375bca851809de14c26c9e87
                                                        • Instruction ID: 6df420d22f62f29137663e8c75ef405086b2d3aa2ed63501c5fc5dd14fb90274
                                                        • Opcode Fuzzy Hash: 443cdfa98b8087b7bcb922c0948fe50d5dc3e5b8375bca851809de14c26c9e87
                                                        • Instruction Fuzzy Hash: 59E00974462B06CFD7156B64ADAC3BE7A6AFB8B327B80AD01B40E81131DF704494CA95
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b0ec929d9452f3e6fe817ff82001969d4eb0cd48b63b934ead231af184fca7ab
                                                        • Instruction ID: 7d7ebaf114c9b2e934d1461ffa6d36eb066b9bc5513b5bd638f5f3ea84683c9a
                                                        • Opcode Fuzzy Hash: b0ec929d9452f3e6fe817ff82001969d4eb0cd48b63b934ead231af184fca7ab
                                                        • Instruction Fuzzy Hash: D5E0DF39D5122A8ACB02ABB49D110EEBB34AD821A17588663C4247B064EB30265E96A0
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0374b94d44ebdc3eab2488360f1d35c5c290f51014420de8fdf714c020d5cb40
                                                        • Instruction ID: db8cfe9a5269b80211ebb607dba456c0403f579192cc5d7d749a334f38f8a52d
                                                        • Opcode Fuzzy Hash: 0374b94d44ebdc3eab2488360f1d35c5c290f51014420de8fdf714c020d5cb40
                                                        • Instruction Fuzzy Hash: F6D01231D2022B968B00A6A5DC044DEB739EE96261B544626D52437154EB70265986E1
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0cb5f0ef6503c030897ec4babe59ea179e8af2490835ea480cdbcfac9f788089
                                                        • Instruction ID: 6b3d6670b237501dfa8c113dbbdfb886f1e1e7625496be3c3a4d28c066696690
                                                        • Opcode Fuzzy Hash: 0cb5f0ef6503c030897ec4babe59ea179e8af2490835ea480cdbcfac9f788089
                                                        • Instruction Fuzzy Hash: 63D05B745043060EC301AB74EC06D573A1FA7B8300F209950F12509199DE7C545546A5
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 538888c7ea854bdec720412de19d137926d2ec328f4cee2ea15c73681826e712
                                                        • Instruction ID: c1464e22b9b72f8a77a1aa210f142a8b21aeb64c1f0c53ff64f4c62a9ddf4c9b
                                                        • Opcode Fuzzy Hash: 538888c7ea854bdec720412de19d137926d2ec328f4cee2ea15c73681826e712
                                                        • Instruction Fuzzy Hash: 07D0673AB400199FCF04DF9CE8508DDF776FB98221B048566FA25A3261C6319925DBA0
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bc47f075ab3c530afac3d06ed78cc9e9f214b713b31ec6dc18299c1b285cccf1
                                                        • Instruction ID: ca39ba31ada7b9b2b7b20d276fd162787bdf3059f8463ba74cc35fdbe229b8be
                                                        • Opcode Fuzzy Hash: bc47f075ab3c530afac3d06ed78cc9e9f214b713b31ec6dc18299c1b285cccf1
                                                        • Instruction Fuzzy Hash: 84C0127020430A4AC605F765E84551A372FABD4200760C910B6260A29DDE7C19964691
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d6c8f7d7fbf58a334d98f24992acfcd80fd17a324c871c9b908040c2ecda9704
                                                        • Instruction ID: d7b1b05649de06bce96deed0b4a880e4b9320cd5e3f8709a728bed4b953411fb
                                                        • Opcode Fuzzy Hash: d6c8f7d7fbf58a334d98f24992acfcd80fd17a324c871c9b908040c2ecda9704
                                                        • Instruction Fuzzy Hash: DDC09BF5C0D2C15FEF07C71055E6059FFB4E95331972518CFC04185453D5149285C705
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: p$p$p$p$p$p
                                                        • API String ID: 0-222779563
                                                        • Opcode ID: 2a1791384d8c02243c400058afb6dfc2aa35db3ee18eadfb5730255dc3f32577
                                                        • Instruction ID: 471f7bf4f19a6e166e05c815d6ad2a0d79c34be535c2b221a24809d3bdd92adc
                                                        • Opcode Fuzzy Hash: 2a1791384d8c02243c400058afb6dfc2aa35db3ee18eadfb5730255dc3f32577
                                                        • Instruction Fuzzy Hash: 6241A4E2C0D3C16FDB17573459683AE7F688B67588F2A01D7CC84CB2A7E9091D1E8366
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3457707684.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_5350000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (ocq$(ocq$(ocq$(ocq
                                                        • API String ID: 0-2003149739
                                                        • Opcode ID: f62df986ee384226e8943a3d989627f862c3d662c521f3cf3c382b732cc1e1fc
                                                        • Instruction ID: f68d790d530384a6278c863c48879e3d07f0b541b474936785b410b2e2bf21fd
                                                        • Opcode Fuzzy Hash: f62df986ee384226e8943a3d989627f862c3d662c521f3cf3c382b732cc1e1fc
                                                        • Instruction Fuzzy Hash: F5C13930A002099FCB14CF69C994EAEFBF6BF88324F159559E91AAB261D774ED40CF50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000006.00000002.3455288563.0000000002690000.00000040.00000800.00020000.00000000.sdmp, Offset: 02690000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_6_2_2690000_FPACcnxAUT.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Xgq$Xgq$Xgq$Xgq
                                                        • API String ID: 0-1951159037
                                                        • Opcode ID: 0f26ba1ada857c9b183780b0c9c548ee1b8ccd6043811dcc6595452ed895eece
                                                        • Instruction ID: 5165e5e3c9ba4b6dd16aad707836a780190572d8666edac9ad4b0742e08a547f
                                                        • Opcode Fuzzy Hash: 0f26ba1ada857c9b183780b0c9c548ee1b8ccd6043811dcc6595452ed895eece
                                                        • Instruction Fuzzy Hash: 29313570E0421B4BDF649F68855137FBBBAAB86310F3444E5C849A7394EF318D85DB92