Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
invnoIL438805.exe

Overview

General Information

Sample name:invnoIL438805.exe
Analysis ID:1589902
MD5:253aa736dcd90caa801ba4aad9f0b7ce
SHA1:2545298c281e583269f7b24d2c20b9f176056fda
SHA256:3b593da5f678af89946aebb762ab465c627a4dea6942b1a134a22536fb9ec7b6
Tags:AgentTeslaexePaymentuser-cocaman
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Drops VBS files to the startup folder
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • invnoIL438805.exe (PID: 4832 cmdline: "C:\Users\user\Desktop\invnoIL438805.exe" MD5: 253AA736DCD90CAA801BA4AAD9F0B7CE)
    • InstallUtil.exe (PID: 6560 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • wscript.exe (PID: 7312 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • MemberType.exe (PID: 7376 cmdline: "C:\Users\user\AppData\Roaming\MemberType.exe" MD5: 253AA736DCD90CAA801BA4AAD9F0B7CE)
      • InstallUtil.exe (PID: 7460 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "web@iaa-airferight.com", "Password": "webmaster"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.1352638764.0000000002A8C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.1274366166.00000000057D0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          00000000.00000002.1266988411.0000000003E77000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 26 entries
            SourceRuleDescriptionAuthorStrings
            0.2.invnoIL438805.exe.57d0000.6.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.invnoIL438805.exe.57d0000.6.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                11.2.MemberType.exe.3a7bd40.3.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  11.2.MemberType.exe.3a7bd40.3.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    11.2.MemberType.exe.3a7bd40.3.raw.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                    • 0x334ef:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                    • 0x33561:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                    • 0x335eb:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                    • 0x3367d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                    • 0x336e7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                    • 0x33759:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                    • 0x337ef:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                    • 0x3387f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                    Click to see the 15 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbs" , ProcessId: 7312, ProcessName: wscript.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.175.148.58, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, Initiated: true, ProcessId: 6560, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49701
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbs" , ProcessId: 7312, ProcessName: wscript.exe

                    Data Obfuscation

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\invnoIL438805.exe, ProcessId: 4832, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbs
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: invnoIL438805.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen
                    Source: 11.2.MemberType.exe.3a7bd40.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "web@iaa-airferight.com", "Password": "webmaster"}
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeReversingLabs: Detection: 60%
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeVirustotal: Detection: 70%Perma Link
                    Source: invnoIL438805.exeReversingLabs: Detection: 60%
                    Source: invnoIL438805.exeVirustotal: Detection: 70%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeJoe Sandbox ML: detected
                    Source: invnoIL438805.exeJoe Sandbox ML: detected
                    Source: invnoIL438805.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.7:49700 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.7:49708 version: TLS 1.2
                    Source: invnoIL438805.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: invnoIL438805.exe, 00000000.00000002.1276016138.0000000005910000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003C38000.00000004.00000800.00020000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.0000000003928000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: invnoIL438805.exe, 00000000.00000002.1276016138.0000000005910000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003C38000.00000004.00000800.00020000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.0000000003928000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdbSHA256}Lq source: invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_0567D7E0
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 4x nop then jmp 056A5A11h0_2_056A56E8
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 4x nop then jmp 056A5A11h0_2_056A56D8
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 4x nop then jmp 056A5A11h0_2_056A5852
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 4x nop then jmp 056BF7E8h0_2_056BF5E0
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 4x nop then jmp 056BF7E8h0_2_056BF5F0
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 4x nop then jmp 056BF252h0_2_056BEEA1
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 4x nop then jmp 056BF252h0_2_056BEEB0
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 4x nop then jmp 059075B0h0_2_059074F0
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 4x nop then jmp 059075B0h0_2_059074F8
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 4x nop then mov eax, dword ptr [ebp-20h]0_2_0590CBB0
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 4x nop then jmp 04EF5A11h11_2_04EF56E8
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 4x nop then jmp 04EF5A11h11_2_04EF56D8
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 4x nop then jmp 04EF5A11h11_2_04EF5852
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h11_2_0537D7E0
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 4x nop then jmp 0538F7F0h11_2_0538F5F8
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 4x nop then jmp 0538F7F0h11_2_0538F5F6
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 4x nop then jmp 0538F25Ah11_2_0538EEB8
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 4x nop then jmp 0538F25Ah11_2_0538EEA9
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 4x nop then jmp 056C5638h11_2_056C5579
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 4x nop then jmp 056C5638h11_2_056C5580
                    Source: Joe Sandbox ViewIP Address: 46.175.148.58 46.175.148.58
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.7:49701 -> 46.175.148.58:25
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.iaa-airferight.com
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                    Source: MemberType.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                    Source: InstallUtil.exe, 00000002.00000002.1352638764.0000000002A8C000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2502881597.0000000002C7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.iaa-airferight.com
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
                    Source: invnoIL438805.exe, 00000000.00000002.1250319039.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1352638764.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1351422998.00000000028A1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2502881597.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: invnoIL438805.exe, MemberType.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
                    Source: invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E77000.00000004.00000800.00020000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1349069950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E77000.00000004.00000800.00020000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1352638764.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1349069950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2502881597.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: InstallUtil.exe, 00000002.00000002.1352638764.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2502881597.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: InstallUtil.exe, 00000002.00000002.1352638764.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2502881597.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                    Source: invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                    Source: invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                    Source: invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: invnoIL438805.exe, 00000000.00000002.1250319039.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1351422998.00000000028A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.7:49700 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.7:49708 version: TLS 1.2

                    System Summary

                    barindex
                    Source: 11.2.MemberType.exe.3a7bd40.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 2.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 11.2.MemberType.exe.3a7bd40.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.invnoIL438805.exe.3e77840.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.invnoIL438805.exe.3e77840.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 11.2.MemberType.exe.3a18620.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05908DB0 NtProtectVirtualMemory,0_2_05908DB0
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0590CA80 NtResumeThread,0_2_0590CA80
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05908DA8 NtProtectVirtualMemory,0_2_05908DA8
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0590CA78 NtResumeThread,0_2_0590CA78
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_056CB090 NtResumeThread,11_2_056CB090
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_056C7240 NtProtectVirtualMemory,11_2_056C7240
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_056CB088 NtResumeThread,11_2_056CB088
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_056C7238 NtProtectVirtualMemory,11_2_056C7238
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_011788680_2_01178868
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0117FA780_2_0117FA78
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_011788580_2_01178858
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_01174F980_2_01174F98
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_01174FA80_2_01174FA8
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_011746100_2_01174610
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_011746200_2_01174620
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05562AE80_2_05562AE8
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_055C1F500_2_055C1F50
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_055C1F1D0_2_055C1F1D
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_055C9F2A0_2_055C9F2A
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_055C00400_2_055C0040
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_055C98700_2_055C9870
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_055C98600_2_055C9860
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_055C00060_2_055C0006
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05644D200_2_05644D20
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0564C7280_2_0564C728
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056463680_2_05646368
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056433F00_2_056433F0
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05644D100_2_05644D10
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056435D10_2_056435D1
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05642F780_2_05642F78
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05642F880_2_05642F88
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056436930_2_05643693
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056419820_2_05641982
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056419900_2_05641990
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056433E20_2_056433E2
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05640A680_2_05640A68
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05640A780_2_05640A78
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056700400_2_05670040
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056700220_2_05670022
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056A16A80_2_056A16A8
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056A16980_2_056A1698
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056A3AE80_2_056A3AE8
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056A3AD90_2_056A3AD9
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056BB8B80_2_056BB8B8
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_058974280_2_05897428
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_058914230_2_05891423
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_058999C80_2_058999C8
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0589DA400_2_0589DA40
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_058974180_2_05897418
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0589A6E10_2_0589A6E1
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0589A6F00_2_0589A6F0
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_058900070_2_05890007
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0589F03A0_2_0589F03A
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0589DD670_2_0589DD67
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_059055580_2_05905558
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_059055480_2_05905548
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05907ED00_2_05907ED0
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05907EC10_2_05907EC1
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05A500070_2_05A50007
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05A500400_2_05A50040
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05A6EBA80_2_05A6EBA8
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05A6E6E00_2_05A6E6E0
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05562AE30_2_05562AE3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E2E4802_2_00E2E480
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E2A9472_2_00E2A947
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E24A902_2_00E24A90
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E2DCB82_2_00E2DCB8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E23E782_2_00E23E78
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E241C02_2_00E241C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_06477D682_2_06477D68
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_064765E02_2_064765E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_064755882_2_06475588
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_0647B20F2_2_0647B20F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_064730402_2_06473040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_064776882_2_06477688
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_06475CD32_2_06475CD3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_064702D32_2_064702D3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_064723492_2_06472349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_0647E3882_2_0647E388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_064700062_2_06470006
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_026CFA7811_2_026CFA78
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_026C886811_2_026C8868
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_026C885C11_2_026C885C
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_026C462011_2_026C4620
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_026C461711_2_026C4617
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_026C4FA811_2_026C4FA8
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EA1F5011_2_04EA1F50
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EA9F2A11_2_04EA9F2A
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EA1F1D11_2_04EA1F1D
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EA986011_2_04EA9860
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EA987011_2_04EA9870
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EA004011_2_04EA0040
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EA002111_2_04EA0021
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB4D2011_2_04EB4D20
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EBC72811_2_04EBC728
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB33F011_2_04EB33F0
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB35D111_2_04EB35D1
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB4D1F11_2_04EB4D1F
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB369311_2_04EB3693
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB2F8811_2_04EB2F88
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB2F7811_2_04EB2F78
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB198211_2_04EB1982
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB199011_2_04EB1990
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB0A6811_2_04EB0A68
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB0A7811_2_04EB0A78
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB33E111_2_04EB33E1
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EB636811_2_04EB6368
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EF16A811_2_04EF16A8
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EF358811_2_04EF3588
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EF169811_2_04EF1698
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EF3AE811_2_04EF3AE8
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EF3AD911_2_04EF3AD9
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_0537001611_2_05370016
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_0537004011_2_05370040
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_0538B67811_2_0538B678
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053A742811_2_053A7428
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053A142311_2_053A1423
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053A99C811_2_053A99C8
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053ADA4011_2_053ADA40
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053A741811_2_053A7418
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053AA6F011_2_053AA6F0
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053AA6E111_2_053AA6E1
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053AF03A11_2_053AF03A
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053A001411_2_053A0014
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053A000611_2_053A0006
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053ADD6711_2_053ADD67
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_056C39E811_2_056C39E8
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_056C39DA11_2_056C39DA
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_056C636011_2_056C6360
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_056C832011_2_056C8320
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_056C62E911_2_056C62E9
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_0575004011_2_05750040
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_0575001911_2_05750019
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_0576EBA811_2_0576EBA8
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_0576E6E011_2_0576E6E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0112E6A112_2_0112E6A1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0112A94F12_2_0112A94F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_01124A9812_2_01124A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0112DCC012_2_0112DCC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_01123E8012_2_01123E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_011241C812_2_011241C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0112D9A812_2_0112D9A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0664A57C12_2_0664A57C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0664A25C12_2_0664A25C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0664D69012_2_0664D690
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0664B88012_2_0664B880
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_066565E012_2_066565E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0665558812_2_06655588
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0665B20F12_2_0665B20F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0665304012_2_06653040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06657D6812_2_06657D68
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0665768812_2_06657688
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0665234912_2_06652349
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0665E38812_2_0665E388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0665004012_2_06650040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06655CD312_2_06655CD3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0665000612_2_06650006
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0665016612_2_06650166
                    Source: invnoIL438805.exeStatic PE information: invalid certificate
                    Source: invnoIL438805.exe, 00000000.00000000.1238725598.000000000080C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameZiwqfkukie.exeB vs invnoIL438805.exe
                    Source: invnoIL438805.exe, 00000000.00000002.1276016138.0000000005910000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs invnoIL438805.exe
                    Source: invnoIL438805.exe, 00000000.00000002.1270130856.0000000005310000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameApqaxnpq.dll" vs invnoIL438805.exe
                    Source: invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec5ea4fda-43b2-4fc0-8a8b-07958574f042.exe4 vs invnoIL438805.exe
                    Source: invnoIL438805.exe, 00000000.00000002.1250319039.0000000002B61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs invnoIL438805.exe
                    Source: invnoIL438805.exe, 00000000.00000002.1266988411.0000000003C38000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs invnoIL438805.exe
                    Source: invnoIL438805.exe, 00000000.00000002.1266988411.0000000003C38000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameZiwqfkukie.exeB vs invnoIL438805.exe
                    Source: invnoIL438805.exe, 00000000.00000002.1249438342.0000000000E5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs invnoIL438805.exe
                    Source: invnoIL438805.exe, 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs invnoIL438805.exe
                    Source: invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs invnoIL438805.exe
                    Source: invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs invnoIL438805.exe
                    Source: invnoIL438805.exe, 00000000.00000002.1250319039.0000000002CDC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec5ea4fda-43b2-4fc0-8a8b-07958574f042.exe4 vs invnoIL438805.exe
                    Source: invnoIL438805.exeBinary or memory string: OriginalFilenameZiwqfkukie.exeB vs invnoIL438805.exe
                    Source: invnoIL438805.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 11.2.MemberType.exe.3a7bd40.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 2.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 11.2.MemberType.exe.3a7bd40.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.invnoIL438805.exe.3e77840.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.invnoIL438805.exe.3e77840.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 11.2.MemberType.exe.3a18620.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: invnoIL438805.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: MemberType.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@8/3@2/2
                    Source: C:\Users\user\Desktop\invnoIL438805.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbs"
                    Source: invnoIL438805.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: invnoIL438805.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: invnoIL438805.exeReversingLabs: Detection: 60%
                    Source: invnoIL438805.exeVirustotal: Detection: 70%
                    Source: C:\Users\user\Desktop\invnoIL438805.exeFile read: C:\Users\user\Desktop\invnoIL438805.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\invnoIL438805.exe "C:\Users\user\Desktop\invnoIL438805.exe"
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbs"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\MemberType.exe "C:\Users\user\AppData\Roaming\MemberType.exe"
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\MemberType.exe "C:\Users\user\AppData\Roaming\MemberType.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: invnoIL438805.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: invnoIL438805.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: invnoIL438805.exeStatic file information: File size 1387392 > 1048576
                    Source: invnoIL438805.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x118c00
                    Source: invnoIL438805.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: invnoIL438805.exe, 00000000.00000002.1276016138.0000000005910000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003C38000.00000004.00000800.00020000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.0000000003928000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: invnoIL438805.exe, 00000000.00000002.1276016138.0000000005910000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003C38000.00000004.00000800.00020000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.0000000003928000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdbSHA256}Lq source: invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: 0.2.invnoIL438805.exe.57d0000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.invnoIL438805.exe.57d0000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1274366166.00000000057D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1351422998.00000000028A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1250319039.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: invnoIL438805.exe PID: 4832, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MemberType.exe PID: 7376, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0556544F push eax; ret 0_2_05565B19
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05565470 push eax; ret 0_2_05565B19
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0564D336 push ebp; retf 0_2_0564D34D
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0564E3DF push 10418B05h; ret 0_2_0564E3F3
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0564E240 push 14418B05h; ret 0_2_0564E253
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0564E2F0 push 0C418B05h; ret 0_2_0564E303
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056AFEE8 push 00000005h; retf 0_2_056AFEB4
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056AFE98 push 00000005h; retf 0_2_056AFEB4
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056ABA88 push 00000005h; retf 0_2_056ABAE4
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056B8DFF push 4658A105h; ret 0_2_056B8E13
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056B8F52 push 04418B05h; ret 0_2_056B8F83
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056B8F92 push 08418B05h; ret 0_2_056B8FC3
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056B90E8 push 04418B05h; ret 0_2_056B92C3
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_056B93D0 push 4678A105h; ret 0_2_056B93E3
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_058973CA push esp; ret 0_2_058973D1
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_058903CF push edi; iretd 0_2_058903D0
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0589F9E9 push 04418B05h; ret 0_2_0589FAB3
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0589FB01 push 10418B05h; ret 0_2_0589FB13
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0589FAA0 push 04418B05h; ret 0_2_0589FAB3
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_0589FAC0 push 14418B05h; ret 0_2_0589FAD3
                    Source: C:\Users\user\Desktop\invnoIL438805.exeCode function: 0_2_05A52C0D pushfd ; retf 0_2_05A52C0E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E20C6D push edi; retf 2_2_00E20C7A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E20C45 push ebx; retf 2_2_00E20C52
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E20C53 push ebx; retf 2_2_00E20C52
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_04EBD336 push ebp; retf 11_2_04EBD34D
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053A73D0 push esp; ret 11_2_053A73D1
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_053A03CF push edi; iretd 11_2_053A03D0
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeCode function: 11_2_056CA608 push eax; retf 11_2_056CA609
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_01120C45 push ebx; retf 12_2_01120C52
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_01120C6D push edi; retf 12_2_01120C7A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06643A40 push FC0673DAh; retf 12_2_06643A4D
                    Source: invnoIL438805.exeStatic PE information: section name: .text entropy: 7.981722339551131
                    Source: MemberType.exe.0.drStatic PE information: section name: .text entropy: 7.981722339551131
                    Source: C:\Users\user\Desktop\invnoIL438805.exeFile created: C:\Users\user\AppData\Roaming\MemberType.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\invnoIL438805.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbsJump to dropped file
                    Source: C:\Users\user\Desktop\invnoIL438805.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbsJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbsJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (31).png
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: invnoIL438805.exe PID: 4832, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MemberType.exe PID: 7376, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: invnoIL438805.exe, 00000000.00000002.1250319039.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1351422998.00000000028A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\invnoIL438805.exeMemory allocated: 1170000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeMemory allocated: 2B60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeMemory allocated: 29B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: E20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2A10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 4A10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeMemory allocated: 2680000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeMemory allocated: 27E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 1120000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2C00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 4C00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 6683Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 3136Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 2180Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 7671Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep count: 33 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7236Thread sleep count: 6683 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7236Thread sleep count: 3136 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -99891s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -99781s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -99672s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -99563s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -99438s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -99133s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -99007s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -98891s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -98766s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -98641s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -98531s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -98422s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -98312s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -98203s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -98094s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -97983s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -97875s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -97766s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -97641s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -97516s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -97406s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -97297s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -97188s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -97063s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -96938s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -96828s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -96661s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -96391s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -96266s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -96156s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -96047s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -95938s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -95813s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -95688s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -95563s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -95453s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -95344s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -95219s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -95109s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -95000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -94890s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -94779s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -94662s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -94528s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -94422s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -94288s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -94170s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -94061s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -93787s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -93656s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -93458s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7232Thread sleep time: -93328s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep count: 37 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -34126476536362649s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7564Thread sleep count: 2180 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -99875s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7564Thread sleep count: 7671 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -99766s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -99655s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -99547s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -99436s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -99327s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -99217s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -99109s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -98999s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -98890s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -98781s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -98672s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -98562s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -98453s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -98344s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -98234s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -98125s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -98016s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -97905s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -97797s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -97663s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -97516s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -97402s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -97281s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -97172s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -97063s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -96953s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -96844s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -96734s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -96625s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -96515s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -96406s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -96297s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -96188s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -96063s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -95947s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -95828s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -95719s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -95609s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -95500s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -95391s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -95278s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -95156s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -95029s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -94764s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -94656s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -94547s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -94437s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -94328s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7560Thread sleep time: -94217s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeLast function: Thread delayed
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeLast function: Thread delayed
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99563Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99438Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99133Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99007Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98641Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98531Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98312Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98203Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98094Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97983Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97641Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97516Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97406Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97297Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96828Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96661Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96391Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96266Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96156Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96047Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95688Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95563Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95219Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94779Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94662Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94528Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94288Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94170Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94061Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 93787Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 93656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 93458Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 93328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99655Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99436Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99327Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99217Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98999Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98016Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97905Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97797Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97663Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97516Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97402Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97172Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96625Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96515Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96406Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96297Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95947Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95828Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95719Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95391Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95278Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95156Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95029Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94764Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94217Jump to behavior
                    Source: MemberType.exe, 0000000B.00000002.1351422998.00000000028A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                    Source: MemberType.exe, 0000000B.00000002.1351422998.00000000028A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                    Source: InstallUtil.exe, 00000002.00000002.1360028011.00000000053F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: InstallUtil.exe, 0000000C.00000002.2510112509.0000000005FD3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllcc
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\invnoIL438805.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43C000Jump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43E000Jump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 8F2008Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43C000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43E000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: BB6008Jump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\MemberType.exe "C:\Users\user\AppData\Roaming\MemberType.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeQueries volume information: C:\Users\user\Desktop\invnoIL438805.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeQueries volume information: C:\Users\user\AppData\Roaming\MemberType.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\MemberType.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\invnoIL438805.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 11.2.MemberType.exe.3a7bd40.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.MemberType.exe.3a7bd40.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.invnoIL438805.exe.3e77840.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.invnoIL438805.exe.3e77840.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.MemberType.exe.3a18620.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.1352638764.0000000002A8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1266988411.0000000003E77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2502881597.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1352638764.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2502881597.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1349069950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: invnoIL438805.exe PID: 4832, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MemberType.exe PID: 7376, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7460, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 11.2.MemberType.exe.3a7bd40.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.MemberType.exe.3a7bd40.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.invnoIL438805.exe.3e77840.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.invnoIL438805.exe.3e77840.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.MemberType.exe.3a18620.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1266988411.0000000003E77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1352638764.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2502881597.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1349069950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: invnoIL438805.exe PID: 4832, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MemberType.exe PID: 7376, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7460, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 11.2.MemberType.exe.3a7bd40.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.MemberType.exe.3a7bd40.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.invnoIL438805.exe.3e77840.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.invnoIL438805.exe.3e77840.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 11.2.MemberType.exe.3a18620.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.1352638764.0000000002A8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1266988411.0000000003E77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2502881597.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1352638764.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.2502881597.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1349069950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: invnoIL438805.exe PID: 4832, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6560, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MemberType.exe PID: 7376, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7460, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information111
                    Scripting
                    Valid Accounts121
                    Windows Management Instrumentation
                    111
                    Scripting
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    211
                    Process Injection
                    3
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt2
                    Registry Run Keys / Startup Folder
                    2
                    Registry Run Keys / Startup Folder
                    2
                    Software Packing
                    Security Account Manager311
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    DLL Side-Loading
                    NTDS1
                    Process Discovery
                    Distributed Component Object ModelInput Capture23
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                    Masquerading
                    LSA Secrets141
                    Virtualization/Sandbox Evasion
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts141
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items211
                    Process Injection
                    DCSync1
                    System Network Configuration Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589902 Sample: invnoIL438805.exe Startdate: 13/01/2025 Architecture: WINDOWS Score: 100 33 mail.iaa-airferight.com 2->33 35 api.ipify.org 2->35 37 Found malware configuration 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 Antivirus / Scanner detection for submitted sample 2->41 43 9 other signatures 2->43 8 wscript.exe 1 2->8         started        11 invnoIL438805.exe 5 2->11         started        signatures3 process4 file5 53 Windows Scripting host queries suspicious COM object (likely to drop second stage) 8->53 14 MemberType.exe 2 8->14         started        23 C:\Users\user\AppData\...\MemberType.exe, PE32 11->23 dropped 25 C:\Users\user\AppData\...\MemberType.vbs, ASCII 11->25 dropped 27 C:\Users\...\MemberType.exe:Zone.Identifier, ASCII 11->27 dropped 55 Drops VBS files to the startup folder 11->55 57 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->57 59 Writes to foreign memory regions 11->59 61 Injects a PE file into a foreign processes 11->61 17 InstallUtil.exe 15 2 11->17         started        signatures6 process7 dnsIp8 63 Antivirus detection for dropped file 14->63 65 Multi AV Scanner detection for dropped file 14->65 67 Machine Learning detection for dropped file 14->67 75 2 other signatures 14->75 20 InstallUtil.exe 2 14->20         started        29 api.ipify.org 172.67.74.152, 443, 49700, 49708 CLOUDFLARENETUS United States 17->29 31 mail.iaa-airferight.com 46.175.148.58, 25 ASLAGIDKOM-NETUA Ukraine 17->31 69 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->69 71 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 17->71 73 Tries to steal Mail credentials (via file / registry access) 17->73 signatures9 process10 signatures11 45 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 20->45 47 Tries to steal Mail credentials (via file / registry access) 20->47 49 Tries to harvest and steal ftp login credentials 20->49 51 Tries to harvest and steal browser information (history, passwords, etc) 20->51

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    invnoIL438805.exe61%ReversingLabsWin32.Ransomware.CryptoJoker
                    invnoIL438805.exe71%VirustotalBrowse
                    invnoIL438805.exe100%AviraTR/Dropper.MSIL.Gen
                    invnoIL438805.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\MemberType.exe100%AviraTR/Dropper.MSIL.Gen
                    C:\Users\user\AppData\Roaming\MemberType.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\MemberType.exe61%ReversingLabsWin32.Ransomware.CryptoJoker
                    C:\Users\user\AppData\Roaming\MemberType.exe71%VirustotalBrowse
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.iaa-airferight.com
                    46.175.148.58
                    truefalse
                      high
                      api.ipify.org
                      172.67.74.152
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://github.com/mgravell/protobuf-netinvnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://api.ipify.orginvnoIL438805.exe, 00000000.00000002.1266988411.0000000003E77000.00000004.00000800.00020000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1352638764.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1349069950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2502881597.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://github.com/mgravell/protobuf-netiinvnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://stackoverflow.com/q/14436606/23354invnoIL438805.exe, 00000000.00000002.1250319039.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1351422998.00000000028A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://account.dyn.com/invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E77000.00000004.00000800.00020000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1349069950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://github.com/mgravell/protobuf-netJinvnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.ipify.org/tInstallUtil.exe, 00000002.00000002.1352638764.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2502881597.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameinvnoIL438805.exe, 00000000.00000002.1250319039.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1352638764.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, MemberType.exe, 0000000B.00000002.1351422998.00000000028A1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2502881597.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://stackoverflow.com/q/11564914/23354;invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://stackoverflow.com/q/2152978/23354invnoIL438805.exe, 00000000.00000002.1274844222.0000000005840000.00000004.08000000.00040000.00000000.sdmp, invnoIL438805.exe, 00000000.00000002.1266988411.0000000003E21000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://mail.iaa-airferight.comInstallUtil.exe, 00000002.00000002.1352638764.0000000002A8C000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2502881597.0000000002C7C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                46.175.148.58
                                                mail.iaa-airferight.comUkraine
                                                56394ASLAGIDKOM-NETUAfalse
                                                172.67.74.152
                                                api.ipify.orgUnited States
                                                13335CLOUDFLARENETUSfalse
                                                Joe Sandbox version:42.0.0 Malachite
                                                Analysis ID:1589902
                                                Start date and time:2025-01-13 10:08:10 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 7m 17s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:17
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:invnoIL438805.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.expl.evad.winEXE@8/3@2/2
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 95%
                                                • Number of executed functions: 461
                                                • Number of non-executed functions: 56
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 13.107.253.45, 20.12.23.50
                                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                TimeTypeDescription
                                                04:09:07API Interceptor241x Sleep call for process: InstallUtil.exe modified
                                                10:09:04AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbs
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                46.175.148.58jKqPSehspS.exeGet hashmaliciousAgentTeslaBrowse
                                                  A6AHI7Uk18.exeGet hashmaliciousAgentTeslaBrowse
                                                    MyzWeEOlqb.exeGet hashmaliciousAgentTeslaBrowse
                                                      5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
                                                        xJZHVgxQul.exeGet hashmaliciousAgentTeslaBrowse
                                                          jG8N6WDJOx.exeGet hashmaliciousAgentTeslaBrowse
                                                            HGhGAjCVw5.exeGet hashmaliciousAgentTeslaBrowse
                                                              0PPJsQE4wD.exeGet hashmaliciousAgentTeslaBrowse
                                                                kzy8qg5lbR.exeGet hashmaliciousAgentTeslaBrowse
                                                                  OP53532 Harumi new order.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                    172.67.74.152jgbC220X2U.exeGet hashmaliciousUnknownBrowse
                                                                    • api.ipify.org/?format=text
                                                                    malware.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
                                                                    • api.ipify.org/
                                                                    Simple1.exeGet hashmaliciousUnknownBrowse
                                                                    • api.ipify.org/
                                                                    Simple2.exeGet hashmaliciousUnknownBrowse
                                                                    • api.ipify.org/
                                                                    systemConfigChecker.exeGet hashmaliciousUnknownBrowse
                                                                    • api.ipify.org/
                                                                    systemConfigChecker.exeGet hashmaliciousUnknownBrowse
                                                                    • api.ipify.org/
                                                                    2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                                                    • api.ipify.org/
                                                                    Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
                                                                    • api.ipify.org/
                                                                    67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                                                                    • api.ipify.org/
                                                                    Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                                                    • api.ipify.org/
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    mail.iaa-airferight.comjKqPSehspS.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    A6AHI7Uk18.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    MyzWeEOlqb.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    xJZHVgxQul.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    jG8N6WDJOx.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    HGhGAjCVw5.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    0PPJsQE4wD.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    kzy8qg5lbR.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    OP53532 Harumi new order.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    api.ipify.orgShipping Docs Waybill No 2009 xxxx 351.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.13.205
                                                                    rCHARTERREQUEST.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 104.26.12.205
                                                                    http://clumsy-sulky-helium.glitch.me/Get hashmaliciousUnknownBrowse
                                                                    • 104.26.12.205
                                                                    gem1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                    • 104.26.13.205
                                                                    gem2.exeGet hashmaliciousUnknownBrowse
                                                                    • 104.26.12.205
                                                                    gem1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                    • 104.26.12.205
                                                                    https://pub-ce1f93897bdf44e9b1cd99ad0325c570.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                    • 172.67.74.152
                                                                    https://support-confirm-help.click/Get hashmaliciousUnknownBrowse
                                                                    • 172.67.74.152
                                                                    zmpZMfK1b4.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                    • 172.67.74.152
                                                                    kAsh3nmsgs.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                    • 104.26.13.205
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    ASLAGIDKOM-NETUAjKqPSehspS.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    A6AHI7Uk18.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    MyzWeEOlqb.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    xJZHVgxQul.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    jG8N6WDJOx.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    HGhGAjCVw5.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    0PPJsQE4wD.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    kzy8qg5lbR.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    OP53532 Harumi new order.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 46.175.148.58
                                                                    CLOUDFLARENETUSg6.elfGet hashmaliciousUnknownBrowse
                                                                    • 1.1.1.1
                                                                    http://communication.investecprivatebank.co.za/Marketing/DocFusion/Headers/PBHeaderBanner.jpgGet hashmaliciousUnknownBrowse
                                                                    • 104.21.96.1
                                                                    CSZ inquiry for MH raw material.exeGet hashmaliciousFormBookBrowse
                                                                    • 188.114.96.3
                                                                    g3.elfGet hashmaliciousUnknownBrowse
                                                                    • 1.1.1.1
                                                                    1001-13.exeGet hashmaliciousFormBookBrowse
                                                                    • 188.114.96.3
                                                                    24010-KAPSON.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                                    • 104.21.32.1
                                                                    https://file2-cdn.creality.com/file/2e068bd90e233501c8036fb25c76e092/CrealityScan_win_3.3.4-20241030.exeGet hashmaliciousUnknownBrowse
                                                                    • 162.159.61.3
                                                                    g4.elfGet hashmaliciousUnknownBrowse
                                                                    • 1.1.1.1
                                                                    msit.exeGet hashmaliciousLummaC StealerBrowse
                                                                    • 104.21.6.116
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    3b5074b1b5d032e5620f69f9f700ff0eShipping Docs Waybill No 2009 xxxx 351.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 172.67.74.152
                                                                    wuknbFMdeq.exeGet hashmaliciousFunkLockerBrowse
                                                                    • 172.67.74.152
                                                                    rCHARTERREQUEST.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 172.67.74.152
                                                                    https://www.flndmy.er-xu.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                    • 172.67.74.152
                                                                    https://support.wt-nx.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                    • 172.67.74.152
                                                                    https://www.maps-s.xz-sr.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                    • 172.67.74.152
                                                                    https://www.support.wt-nx.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                    • 172.67.74.152
                                                                    https://www.location.as-nt.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                    • 172.67.74.152
                                                                    https://findmy.cl-ew.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                    • 172.67.74.152
                                                                    No context
                                                                    Process:C:\Users\user\Desktop\invnoIL438805.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1387392
                                                                    Entropy (8bit):7.688494305432386
                                                                    Encrypted:false
                                                                    SSDEEP:24576:uJc06N6kTdOUmt9HbygoY8VB5Lc4DYWktF1pGlwgUd0z+A:umoBl7oY8zVc4sWC1wl/UdvA
                                                                    MD5:253AA736DCD90CAA801BA4AAD9F0B7CE
                                                                    SHA1:2545298C281E583269F7B24D2C20B9F176056FDA
                                                                    SHA-256:3B593DA5F678AF89946AEBB762AB465C627A4DEA6942B1A134A22536FB9EC7B6
                                                                    SHA-512:204C654B51AC3F6E921648C755E8E20B7EB26066D0FF012D4FB9D974CFCAA0E2380C2AA8785AC578C88D41BEE9780D77FE19B36A388EC9AD591702137F4386F4
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 61%
                                                                    • Antivirus: Virustotal, Detection: 71%, Browse
                                                                    Reputation:low
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....g.....................T........... ........@.. .......................@............`.................................8...J.......6P...............I... ....................................................... ............... ..H............text........ ...................... ..`.rsrc...6P.......R..................@..@.reloc....... ......................@..B................h.......H.......T....Y..........p...............................................(....(A...*..(....*.~....-.r...p.....+.+.+......~....*(....+.o....+.s....+..~....*..+......*.+..+.rC..p~....+.t....*(....+.o....+....(....*..(....*6..(....(....*....(....*V.(......(......(....*...+.{....*.+.B+.+.}....*.+..+.....+.{....*.+.B+.+.}....*.+..+......(.....s$...(.....s....(.....s....(....*....0..^........,*+6+;+<+=}.....-..,#+3+4......s....+*+/+0-..{....s....z.*s....+..+..+..+..+..+.(...++..+..
                                                                    Process:C:\Users\user\Desktop\invnoIL438805.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:modified
                                                                    Size (bytes):26
                                                                    Entropy (8bit):3.95006375643621
                                                                    Encrypted:false
                                                                    SSDEEP:3:ggPYV:rPYV
                                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                    Malicious:true
                                                                    Reputation:high, very likely benign file
                                                                    Preview:[ZoneTransfer]....ZoneId=0
                                                                    Process:C:\Users\user\Desktop\invnoIL438805.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):89
                                                                    Entropy (8bit):4.844864535069645
                                                                    Encrypted:false
                                                                    SSDEEP:3:FER/n0eFHHo0nacwREaKC5xOGHn:FER/lFHIcNwiaZ5UQ
                                                                    MD5:403CAC2F20860833502075088B61EA64
                                                                    SHA1:E236360779F72BD9CBE08FF597118193F1F1D891
                                                                    SHA-256:B2760A2B500701B0CD82C0755CB45A93BEEB57A56F73CD41CBFFE95E7F05C9D8
                                                                    SHA-512:36B063E346518445938C4AEDAA956BE92A3D980E49E245FD4F088217EDB8384096EB5232361D404EECE679DAC602C928AF0097B201D12FD5447CF4B244E78D39
                                                                    Malicious:true
                                                                    Reputation:low
                                                                    Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Roaming\MemberType.exe"""
                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Entropy (8bit):7.688494305432386
                                                                    TrID:
                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                    • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                    • DOS Executable Generic (2002/1) 0.01%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:invnoIL438805.exe
                                                                    File size:1'387'392 bytes
                                                                    MD5:253aa736dcd90caa801ba4aad9f0b7ce
                                                                    SHA1:2545298c281e583269f7b24d2c20b9f176056fda
                                                                    SHA256:3b593da5f678af89946aebb762ab465c627a4dea6942b1a134a22536fb9ec7b6
                                                                    SHA512:204c654b51ac3f6e921648c755e8e20b7eb26066d0ff012d4fb9d974cfcaa0e2380c2aa8785ac578c88d41bee9780d77fe19b36a388ec9ad591702137f4386f4
                                                                    SSDEEP:24576:uJc06N6kTdOUmt9HbygoY8VB5Lc4DYWktF1pGlwgUd0z+A:umoBl7oY8zVc4sWC1wl/UdvA
                                                                    TLSH:A355F0C4E68566A4DE09AB34A977CD348623BDADA874D51C24DE3E373FBB3D35025022
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.....................T........... ........@.. .......................@............`................................
                                                                    Icon Hash:c5a684988c94a0c5
                                                                    Entrypoint:0x51ab82
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:true
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x6781DCDF [Sat Jan 11 02:52:15 2025 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                    Signature Valid:false
                                                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                    Signature Validation Error:The digital signature of the object did not verify
                                                                    Error Number:-2146869232
                                                                    Not Before, Not After
                                                                    • 08/04/2024 02:00:00 11/04/2027 01:59:59
                                                                    Subject Chain
                                                                    • CN=Google LLC, O=Google LLC, L=Mountain View, S=California, C=US, SERIALNUMBER=3582691, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Delaware, OID.1.3.6.1.4.1.311.60.2.1.3=US
                                                                    Version:3
                                                                    Thumbprint MD5:F87B1BFA8FFB860CE59A8D63EC60262F
                                                                    Thumbprint SHA-1:607A3EDAA64933E94422FC8F0C80388E0590986C
                                                                    Thumbprint SHA-256:2029505D14BAF18AF60A0D1A7D8B56447DB643B32FAA849D4C08D2AB1FF3A4FD
                                                                    Serial:0B50CF246B263EFD85A729315158F3FF
                                                                    Instruction
                                                                    jmp dword ptr [00402000h]
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax], al
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x11ab380x4a.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x11c0000x35036.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x14e2000x4980
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1520000xc.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x20000x118b880x118c0034139bddb5e4ff64de688c0135530d6eFalse0.9792304374443455data7.981722339551131IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rsrc0x11c0000x350360x35200929fc7eb24e0ad93b9855ac5686f5071False0.2104549632352941data4.439473284461782IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0x1520000xc0x200b38b202fdb40ab55c8be476545c93712False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_ICON0x11c0f40x668Device independent bitmap graphic, 48 x 96 x 4, image size 11520.3225609756097561
                                                                    RT_ICON0x11c7800x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 5120.43951612903225806
                                                                    RT_ICON0x11ca8c0x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 2880.4016393442622951
                                                                    RT_ICON0x11cc980x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.4831081081081081
                                                                    RT_ICON0x11cde40x35e0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9907192575406032
                                                                    RT_ICON0x1203e80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.4584221748400853
                                                                    RT_ICON0x1212b40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.47382671480144406
                                                                    RT_ICON0x121b800x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.45564516129032256
                                                                    RT_ICON0x12226c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.3504335260115607
                                                                    RT_ICON0x1227f80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.07868508221933042
                                                                    RT_ICON0x1330440x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.15114568005045195
                                                                    RT_ICON0x13c5100x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 265600.1543233082706767
                                                                    RT_ICON0x142d1c0x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.175184842883549
                                                                    RT_ICON0x1481c80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.15948275862068967
                                                                    RT_ICON0x14c4140x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.24107883817427386
                                                                    RT_ICON0x14e9e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.2678236397748593
                                                                    RT_ICON0x14faac0x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.37459016393442623
                                                                    RT_ICON0x1504580x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.42819148936170215
                                                                    RT_GROUP_ICON0x1508fc0x102data0.6046511627906976
                                                                    RT_VERSION0x150a3a0x3d6data0.40325865580448067
                                                                    RT_MANIFEST0x150e4c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                    DLLImport
                                                                    mscoree.dll_CorExeMain
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 13, 2025 10:09:06.997786999 CET49700443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:06.997823000 CET44349700172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:06.997910976 CET49700443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:07.004168987 CET49700443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:07.004184961 CET44349700172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:07.500945091 CET44349700172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:07.501034021 CET49700443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:07.505315065 CET49700443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:07.505327940 CET44349700172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:07.505722046 CET44349700172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:07.550261974 CET49700443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:07.563059092 CET49700443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:07.603338957 CET44349700172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:07.672754049 CET44349700172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:07.672899008 CET44349700172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:07.672967911 CET49700443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:07.679270983 CET49700443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:08.713738918 CET4970125192.168.2.746.175.148.58
                                                                    Jan 13, 2025 10:09:09.716502905 CET4970125192.168.2.746.175.148.58
                                                                    Jan 13, 2025 10:09:11.722192049 CET4970125192.168.2.746.175.148.58
                                                                    Jan 13, 2025 10:09:15.737808943 CET4970125192.168.2.746.175.148.58
                                                                    Jan 13, 2025 10:09:16.221301079 CET49708443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:16.221329927 CET44349708172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:16.221414089 CET49708443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:16.224869013 CET49708443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:16.224881887 CET44349708172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:16.686820030 CET44349708172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:16.686960936 CET49708443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:16.688512087 CET49708443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:16.688529968 CET44349708172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:16.689528942 CET44349708172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:16.737840891 CET49708443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:16.750904083 CET49708443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:16.791331053 CET44349708172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:16.856079102 CET44349708172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:16.856183052 CET44349708172.67.74.152192.168.2.7
                                                                    Jan 13, 2025 10:09:16.856566906 CET49708443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:16.859178066 CET49708443192.168.2.7172.67.74.152
                                                                    Jan 13, 2025 10:09:17.718887091 CET4971925192.168.2.746.175.148.58
                                                                    Jan 13, 2025 10:09:18.722198963 CET4971925192.168.2.746.175.148.58
                                                                    Jan 13, 2025 10:09:20.737848043 CET4971925192.168.2.746.175.148.58
                                                                    Jan 13, 2025 10:09:24.737888098 CET4971925192.168.2.746.175.148.58
                                                                    Jan 13, 2025 10:09:32.737936020 CET4971925192.168.2.746.175.148.58
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 13, 2025 10:09:06.906965971 CET6122653192.168.2.71.1.1.1
                                                                    Jan 13, 2025 10:09:06.914056063 CET53612261.1.1.1192.168.2.7
                                                                    Jan 13, 2025 10:09:08.695559978 CET5952953192.168.2.71.1.1.1
                                                                    Jan 13, 2025 10:09:08.712166071 CET53595291.1.1.1192.168.2.7
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Jan 13, 2025 10:09:06.906965971 CET192.168.2.71.1.1.10x8d49Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 10:09:08.695559978 CET192.168.2.71.1.1.10xad7fStandard query (0)mail.iaa-airferight.comA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Jan 13, 2025 10:09:06.914056063 CET1.1.1.1192.168.2.70x8d49No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 10:09:06.914056063 CET1.1.1.1192.168.2.70x8d49No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 10:09:06.914056063 CET1.1.1.1192.168.2.70x8d49No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                    Jan 13, 2025 10:09:08.712166071 CET1.1.1.1192.168.2.70xad7fNo error (0)mail.iaa-airferight.com46.175.148.58A (IP address)IN (0x0001)false
                                                                    • api.ipify.org
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.749700172.67.74.1524436560C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 09:09:07 UTC155OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                    Host: api.ipify.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 09:09:07 UTC424INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 09:09:07 GMT
                                                                    Content-Type: text/plain
                                                                    Content-Length: 12
                                                                    Connection: close
                                                                    Vary: Origin
                                                                    CF-Cache-Status: DYNAMIC
                                                                    Server: cloudflare
                                                                    CF-RAY: 90143ee29ace7d11-EWR
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1962&min_rtt=1961&rtt_var=737&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1482986&cwnd=252&unsent_bytes=0&cid=eb94685690c62cc4&ts=193&x=0"
                                                                    2025-01-13 09:09:07 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                                    Data Ascii: 8.46.123.189


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.749708172.67.74.1524437460C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2025-01-13 09:09:16 UTC155OUTGET / HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                    Host: api.ipify.org
                                                                    Connection: Keep-Alive
                                                                    2025-01-13 09:09:16 UTC424INHTTP/1.1 200 OK
                                                                    Date: Mon, 13 Jan 2025 09:09:16 GMT
                                                                    Content-Type: text/plain
                                                                    Content-Length: 12
                                                                    Connection: close
                                                                    Vary: Origin
                                                                    CF-Cache-Status: DYNAMIC
                                                                    Server: cloudflare
                                                                    CF-RAY: 90143f1c0bbf8c4e-EWR
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1939&min_rtt=1917&rtt_var=763&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1393129&cwnd=205&unsent_bytes=0&cid=3584a76d2159b7a2&ts=181&x=0"
                                                                    2025-01-13 09:09:16 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                                    Data Ascii: 8.46.123.189


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:04:09:04
                                                                    Start date:13/01/2025
                                                                    Path:C:\Users\user\Desktop\invnoIL438805.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\invnoIL438805.exe"
                                                                    Imagebase:0x6f0000
                                                                    File size:1'387'392 bytes
                                                                    MD5 hash:253AA736DCD90CAA801BA4AAD9F0B7CE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1274366166.00000000057D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1266988411.0000000003E77000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1266988411.0000000003E77000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1250319039.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1266988411.0000000003B61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:2
                                                                    Start time:04:09:05
                                                                    Start date:13/01/2025
                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                                                    Imagebase:0x710000
                                                                    File size:42'064 bytes
                                                                    MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.1352638764.0000000002A8C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.1352638764.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.1352638764.0000000002A61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.1349069950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.1349069950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:10
                                                                    Start time:04:09:13
                                                                    Start date:13/01/2025
                                                                    Path:C:\Windows\System32\wscript.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MemberType.vbs"
                                                                    Imagebase:0x7ff7be3f0000
                                                                    File size:170'496 bytes
                                                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:11
                                                                    Start time:04:09:13
                                                                    Start date:13/01/2025
                                                                    Path:C:\Users\user\AppData\Roaming\MemberType.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Roaming\MemberType.exe"
                                                                    Imagebase:0x3f0000
                                                                    File size:1'387'392 bytes
                                                                    MD5 hash:253AA736DCD90CAA801BA4AAD9F0B7CE
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1375996697.00000000038A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000B.00000002.1351422998.00000000028A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.1375996697.0000000003A17000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Antivirus matches:
                                                                    • Detection: 100%, Avira
                                                                    • Detection: 100%, Joe Sandbox ML
                                                                    • Detection: 61%, ReversingLabs
                                                                    • Detection: 71%, Virustotal, Browse
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:12
                                                                    Start time:04:09:15
                                                                    Start date:13/01/2025
                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                                                    Imagebase:0x8e0000
                                                                    File size:42'064 bytes
                                                                    MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.2502881597.0000000002C7C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.2502881597.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.2502881597.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high
                                                                    Has exited:false

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:12.2%
                                                                      Dynamic/Decrypted Code Coverage:99.1%
                                                                      Signature Coverage:3.1%
                                                                      Total number of Nodes:322
                                                                      Total number of Limit Nodes:13
                                                                      execution_graph 66814 5908db0 66815 5908dff NtProtectVirtualMemory 66814->66815 66817 5908e77 66815->66817 67180 58986e8 67181 58986f2 67180->67181 67185 56a0968 67181->67185 67191 56a095a 67181->67191 67182 5898730 67186 56a097d 67185->67186 67197 56a0998 67186->67197 67202 56a0f59 67186->67202 67207 56a09a8 67186->67207 67187 56a0993 67187->67182 67192 56a097d 67191->67192 67194 56a09a8 2 API calls 67192->67194 67195 56a0998 2 API calls 67192->67195 67196 56a0f59 2 API calls 67192->67196 67193 56a0993 67193->67182 67194->67193 67195->67193 67196->67193 67199 56a099b 67197->67199 67198 56a0a36 67198->67187 67199->67198 67200 56a4b08 VirtualProtect 67199->67200 67201 56a4b00 VirtualProtect 67199->67201 67200->67199 67201->67199 67203 56a0a36 67202->67203 67204 56a0a24 67202->67204 67203->67187 67204->67203 67205 56a4b08 VirtualProtect 67204->67205 67206 56a4b00 VirtualProtect 67204->67206 67205->67204 67206->67204 67209 56a09d2 67207->67209 67208 56a0a36 67208->67187 67209->67208 67210 56a4b08 VirtualProtect 67209->67210 67211 56a4b00 VirtualProtect 67209->67211 67210->67209 67211->67209 66856 58988cd 66857 58988d7 66856->66857 66861 56af860 66857->66861 66865 56af850 66857->66865 66858 5898915 66862 56af875 66861->66862 66863 56af88b 66862->66863 66869 56af917 66862->66869 66863->66858 66866 56af860 66865->66866 66867 56af88b 66866->66867 66868 56af917 10 API calls 66866->66868 66867->66858 66868->66867 66870 56af902 66869->66870 66871 56af91f 66869->66871 66871->66870 66874 5900f31 66871->66874 66882 5900f40 66871->66882 66875 5900f40 66874->66875 66890 590171c 66875->66890 66894 5901876 66875->66894 66898 5901398 66875->66898 66902 5901686 66875->66902 66906 5901388 66875->66906 66876 5900f77 66876->66870 66883 5900f55 66882->66883 66885 5901686 10 API calls 66883->66885 66886 5901876 10 API calls 66883->66886 66887 5901398 10 API calls 66883->66887 66888 5901388 10 API calls 66883->66888 66889 590171c 10 API calls 66883->66889 66884 5900f77 66884->66870 66885->66884 66886->66884 66887->66884 66888->66884 66889->66884 66892 5901403 66890->66892 66891 5901462 66891->66876 66892->66891 66910 5901b50 66892->66910 66896 5901403 66894->66896 66895 5901462 66895->66876 66896->66895 66897 5901b50 10 API calls 66896->66897 66897->66896 66900 59013c5 66898->66900 66899 5901462 66899->66876 66900->66899 66901 5901b50 10 API calls 66900->66901 66901->66900 66904 5901403 66902->66904 66903 5901462 66903->66876 66904->66903 66905 5901b50 10 API calls 66904->66905 66905->66904 66907 5901398 66906->66907 66908 5901462 66907->66908 66909 5901b50 10 API calls 66907->66909 66908->66876 66909->66907 66911 5901b75 66910->66911 66942 5902750 66911->66942 66947 590212b 66911->66947 66955 590256e 66911->66955 66960 5902429 66911->66960 66965 590276b 66911->66965 66970 59020e3 66911->66970 66975 5901fa8 66911->66975 66980 5901da0 66911->66980 66985 5902ce0 66911->66985 66990 59025bc 66911->66990 66995 5901cff 66911->66995 67000 5901df6 66911->67000 67008 5901eb8 66911->67008 67016 590270b 66911->67016 67021 5902b4c 66911->67021 67026 5902b88 66911->67026 67031 59020c9 66911->67031 67036 59026c7 66911->67036 67041 5902148 66911->67041 67049 5901d44 66911->67049 67054 5902005 66911->67054 67059 5902c9f 66911->67059 67064 5902bc0 66911->67064 67069 5902a1c 66911->67069 67074 590301d 66911->67074 67079 5901d5c 66911->67079 67084 590235c 66911->67084 67089 5902892 66911->67089 67094 590205a 66911->67094 66912 5901b97 66912->66892 66943 590275a 66942->66943 67099 590c130 66943->67099 67103 590c12a 66943->67103 66944 5902abf 66944->66912 66948 5902484 66947->66948 66949 5901cf5 66947->66949 67107 590ca80 66948->67107 67111 590ca78 66948->67111 66953 590c130 VirtualAllocEx 66949->66953 66954 590c12a VirtualAllocEx 66949->66954 66950 5902abf 66950->66912 66953->66950 66954->66950 66956 5901cf5 66955->66956 66958 590c130 VirtualAllocEx 66956->66958 66959 590c12a VirtualAllocEx 66956->66959 66957 5902abf 66957->66912 66958->66957 66959->66957 66961 5902441 66960->66961 67116 59034a0 66961->67116 67121 5903492 66961->67121 66962 5902459 66966 5901cf5 66965->66966 66968 590c130 VirtualAllocEx 66966->66968 66969 590c12a VirtualAllocEx 66966->66969 66967 5902abf 66967->66912 66968->66967 66969->66967 66971 5901cf5 66970->66971 66973 590c130 VirtualAllocEx 66971->66973 66974 590c12a VirtualAllocEx 66971->66974 66972 5902abf 66972->66912 66973->66972 66974->66972 66976 5901cf5 66975->66976 66978 590c130 VirtualAllocEx 66976->66978 66979 590c12a VirtualAllocEx 66976->66979 66977 5902abf 66977->66912 66978->66977 66979->66977 66981 5901cf5 66980->66981 66981->66980 66983 590c130 VirtualAllocEx 66981->66983 66984 590c12a VirtualAllocEx 66981->66984 66982 5902abf 66982->66912 66983->66982 66984->66982 66986 5901cf5 66985->66986 66988 590c130 VirtualAllocEx 66986->66988 66989 590c12a VirtualAllocEx 66986->66989 66987 5902abf 66987->66912 66988->66987 66989->66987 66991 59025cb 66990->66991 67144 590c400 66991->67144 67148 590c3f8 66991->67148 66992 590263c 66992->66912 66996 5901cf5 66995->66996 66998 590c130 VirtualAllocEx 66996->66998 66999 590c12a VirtualAllocEx 66996->66999 66997 5902abf 66997->66912 66998->66997 66999->66997 67001 5901e05 67000->67001 67152 590bad8 67001->67152 67156 590bad0 67001->67156 67002 5901cf5 67004 590c130 VirtualAllocEx 67002->67004 67005 590c12a VirtualAllocEx 67002->67005 67003 5902abf 67003->66912 67004->67003 67005->67003 67009 5901ebe 67008->67009 67012 590c400 WriteProcessMemory 67009->67012 67013 590c3f8 WriteProcessMemory 67009->67013 67010 5901cf5 67014 590c130 VirtualAllocEx 67010->67014 67015 590c12a VirtualAllocEx 67010->67015 67011 5902abf 67011->66912 67012->67010 67013->67010 67014->67011 67015->67011 67017 5901cf5 67016->67017 67019 590c130 VirtualAllocEx 67017->67019 67020 590c12a VirtualAllocEx 67017->67020 67018 5902abf 67018->66912 67019->67018 67020->67018 67022 5901cf5 67021->67022 67024 590c130 VirtualAllocEx 67022->67024 67025 590c12a VirtualAllocEx 67022->67025 67023 5902abf 67023->66912 67024->67023 67025->67023 67027 5901cf5 67026->67027 67029 590c130 VirtualAllocEx 67027->67029 67030 590c12a VirtualAllocEx 67027->67030 67028 5902abf 67028->66912 67029->67028 67030->67028 67032 5901cf5 67031->67032 67034 590c130 VirtualAllocEx 67032->67034 67035 590c12a VirtualAllocEx 67032->67035 67033 5902abf 67033->66912 67034->67033 67035->67033 67037 5901cf5 67036->67037 67039 590c130 VirtualAllocEx 67037->67039 67040 590c12a VirtualAllocEx 67037->67040 67038 5902abf 67038->66912 67039->67038 67040->67038 67042 5902157 67041->67042 67045 590c400 WriteProcessMemory 67042->67045 67046 590c3f8 WriteProcessMemory 67042->67046 67043 5901cf5 67047 590c130 VirtualAllocEx 67043->67047 67048 590c12a VirtualAllocEx 67043->67048 67044 5902abf 67044->66912 67045->67043 67046->67043 67047->67044 67048->67044 67050 5901cf5 67049->67050 67052 590c130 VirtualAllocEx 67050->67052 67053 590c12a VirtualAllocEx 67050->67053 67051 5902abf 67051->66912 67052->67051 67053->67051 67055 5901cf5 67054->67055 67057 590c130 VirtualAllocEx 67055->67057 67058 590c12a VirtualAllocEx 67055->67058 67056 5902abf 67056->66912 67057->67056 67058->67056 67060 5901cf5 67059->67060 67062 590c130 VirtualAllocEx 67060->67062 67063 590c12a VirtualAllocEx 67060->67063 67061 5902abf 67061->66912 67062->67061 67063->67061 67065 5902bcf 67064->67065 67067 590bad0 Wow64SetThreadContext 67065->67067 67068 590bad8 Wow64SetThreadContext 67065->67068 67066 5902bfb 67067->67066 67068->67066 67070 5902a26 67069->67070 67072 590c130 VirtualAllocEx 67070->67072 67073 590c12a VirtualAllocEx 67070->67073 67071 5902abf 67071->66912 67072->67071 67073->67071 67075 5901cf5 67074->67075 67077 590c130 VirtualAllocEx 67075->67077 67078 590c12a VirtualAllocEx 67075->67078 67076 5902abf 67076->66912 67077->67076 67078->67076 67080 5901cf5 67079->67080 67082 590c130 VirtualAllocEx 67080->67082 67083 590c12a VirtualAllocEx 67080->67083 67081 5902abf 67081->66912 67082->67081 67083->67081 67085 5901cf5 67084->67085 67087 590c130 VirtualAllocEx 67085->67087 67088 590c12a VirtualAllocEx 67085->67088 67086 5902abf 67086->66912 67087->67086 67088->67086 67090 5901cf5 67089->67090 67092 590c130 VirtualAllocEx 67090->67092 67093 590c12a VirtualAllocEx 67090->67093 67091 5902abf 67091->66912 67092->67091 67093->67091 67095 5901cf5 67094->67095 67097 590c130 VirtualAllocEx 67095->67097 67098 590c12a VirtualAllocEx 67095->67098 67096 5902abf 67096->66912 67097->67096 67098->67096 67100 590c174 VirtualAllocEx 67099->67100 67102 590c1ec 67100->67102 67102->66944 67104 590c130 VirtualAllocEx 67103->67104 67106 590c1ec 67104->67106 67106->66944 67108 590cac9 NtResumeThread 67107->67108 67110 590cb20 67108->67110 67110->66949 67112 590ca7b NtResumeThread 67111->67112 67113 590c9de 67111->67113 67115 590cb20 67112->67115 67113->66949 67115->66949 67117 59034b7 67116->67117 67118 59034d9 67117->67118 67126 5903bf7 67117->67126 67131 5903c73 67117->67131 67118->66962 67122 59034a0 67121->67122 67123 5903c73 2 API calls 67122->67123 67124 5903bf7 2 API calls 67122->67124 67125 59034d9 67122->67125 67123->67125 67124->67125 67125->66962 67127 5903bfd 67126->67127 67136 5909900 67127->67136 67140 59098f4 67127->67140 67132 5903c9b 67131->67132 67134 5909900 CreateProcessA 67132->67134 67135 59098f4 CreateProcessA 67132->67135 67133 5903dde 67134->67133 67135->67133 67137 5909980 CreateProcessA 67136->67137 67139 5909b7c 67137->67139 67141 5909980 CreateProcessA 67140->67141 67143 5909b7c 67141->67143 67145 590c44c WriteProcessMemory 67144->67145 67147 590c4e5 67145->67147 67147->66992 67149 590c400 WriteProcessMemory 67148->67149 67151 590c4e5 67149->67151 67151->66992 67153 590bb21 Wow64SetThreadContext 67152->67153 67155 590bb99 67153->67155 67155->67002 67157 590bad8 Wow64SetThreadContext 67156->67157 67159 590bb99 67157->67159 67159->67002 66818 567ead0 66819 567eb14 VirtualAlloc 66818->66819 66821 567eb81 66819->66821 66822 58990b4 66823 58990ba 66822->66823 66827 56a8ffb 66823->66827 66832 56a9008 66823->66832 66824 5898587 66828 56a9008 66827->66828 66829 56a9033 66828->66829 66837 56ab75d 66828->66837 66842 56ab80a 66828->66842 66829->66824 66833 56a901d 66832->66833 66834 56a9033 66833->66834 66835 56ab80a 2 API calls 66833->66835 66836 56ab75d 2 API calls 66833->66836 66834->66824 66835->66834 66836->66834 66838 56ab76c 66837->66838 66848 56ae814 66838->66848 66852 56ae820 66838->66852 66843 56ab75c 66842->66843 66845 56a9e8d 66842->66845 66846 56ae820 CopyFileA 66843->66846 66847 56ae814 CopyFileA 66843->66847 66844 56ab7ed 66845->66829 66846->66844 66847->66844 66850 56ae87c 66848->66850 66849 56ae974 CopyFileA 66851 56ae9ad 66849->66851 66850->66849 66850->66850 66853 56ae87c CopyFileA 66852->66853 66855 56ae9ad 66853->66855 67212 e1d01c 67213 e1d034 67212->67213 67214 e1d08f 67213->67214 67216 567e020 67213->67216 67217 567e079 67216->67217 67220 567e580 67217->67220 67218 567e0ae 67221 567e5ad 67220->67221 67222 567d498 VirtualProtect 67221->67222 67224 567e743 67221->67224 67223 567e734 67222->67223 67223->67218 67224->67218 67160 11744c8 67161 11744e5 67160->67161 67162 11744f5 67161->67162 67165 567464e 67161->67165 67169 5678eb7 67161->67169 67166 567466d 67165->67166 67172 567d498 67166->67172 67171 567d498 VirtualProtect 67169->67171 67170 56701d4 67171->67170 67173 567d4bf 67172->67173 67176 567d998 67173->67176 67177 567d9e1 VirtualProtect 67176->67177 67179 5674698 67177->67179
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,q$4$$q$$q$$q$$q$$q$$q$$q$$q$$q$$q
                                                                      • API String ID: 0-2072453518
                                                                      • Opcode ID: 83de5a2f597a02e4fa12b65cf7c950539a95f217e7aefb0b32cdb6e3948d4944
                                                                      • Instruction ID: 49e2bdaa5b84289566b7d63b228b48a88b40b4e2b85bff8500a48bb303481a31
                                                                      • Opcode Fuzzy Hash: 83de5a2f597a02e4fa12b65cf7c950539a95f217e7aefb0b32cdb6e3948d4944
                                                                      • Instruction Fuzzy Hash: 65B20834A002189FDF18DFA4D995BADBBB6BB88304F194599E905EB3A5CB70DC81CF50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 324 5891423-58917ce 363 58917d0 324->363 364 58917d5-58917ff 324->364 363->364 548 5891805 call 5894919 364->548 549 5891805 call 5894928 364->549 366 589180b-5891b64 387 5891b6b-5891d89 366->387 388 5891b66 366->388 401 5891d8b 387->401 402 5891d90-5891f87 387->402 388->387 401->402 415 5891f89 402->415 416 5891f8e-589216c 402->416 415->416 429 589216e 416->429 430 5892173-58931b5 416->430 429->430 541 58900d8-58905ae 430->541 542 58931bb-58931c3 430->542 545 58905b0 541->545 546 58905b7-58905d6 541->546 542->541 545->546 546->541 547 58905dc-58905e4 546->547 547->541 548->366 549->366
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: :v$A$G9$N$TJq$$q$$q
                                                                      • API String ID: 0-2772156697
                                                                      • Opcode ID: 7eb98c40e1d4dc9dfd8310d1cb74ccaece8cb91684bd1b3d95aab87839fee523
                                                                      • Instruction ID: b0c32c59beb32bdd561e48c6bdda7d246bafb6a97806940023b2d3ab47cbbb44
                                                                      • Opcode Fuzzy Hash: 7eb98c40e1d4dc9dfd8310d1cb74ccaece8cb91684bd1b3d95aab87839fee523
                                                                      • Instruction Fuzzy Hash: CE13157A600105AFDB069F94DD44D99BBB6FF8D314F0680D4E209AB276CB36D9A1EF40
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,q$4$$q$$q$$q$$q
                                                                      • API String ID: 0-3956183810
                                                                      • Opcode ID: 176b6a5e4524299abf3a35653c2cd6c59662848aea06d44bc48098a94b6fd7d6
                                                                      • Instruction ID: 45f9b7f945431b290ecb61d7e7373a11ad16e21687d42659ce6b40694ebb9b94
                                                                      • Opcode Fuzzy Hash: 176b6a5e4524299abf3a35653c2cd6c59662848aea06d44bc48098a94b6fd7d6
                                                                      • Instruction Fuzzy Hash: 5622EB34A00219DFDF28DFA5C985BADBBB6BF88304F148199E905EB295DB709D81CF50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 856 1178868-1178889 857 1178890-1178977 856->857 858 117888b 856->858 860 117897d-1178abe call 1174b58 857->860 861 1179079-11790a1 857->861 858->857 907 1178ac4-1178b1f 860->907 908 1179042-117906c 860->908 864 11797a7-11797b0 861->864 865 11797b6-11797cd 864->865 866 11790af-11790b9 864->866 868 11790c0-11791b4 call 1174b58 866->868 869 11790bb 866->869 890 11791b6-11791c2 868->890 891 11791de 868->891 869->868 893 11791c4-11791ca 890->893 894 11791cc-11791d2 890->894 892 11791e4-1179204 891->892 899 1179206-117925f 892->899 900 1179264-11792e4 892->900 896 11791dc 893->896 894->896 896->892 912 11797a4 899->912 920 11792e6-1179339 900->920 921 117933b-117937e call 1174b58 900->921 915 1178b24-1178b2f 907->915 916 1178b21 907->916 918 1179076-1179077 908->918 919 117906e 908->919 912->864 922 1178f57-1178f5d 915->922 916->915 918->861 919->918 947 1179389-1179392 920->947 921->947 923 1178b34-1178b52 922->923 924 1178f63-1178fdf call 117040c 922->924 927 1178b54-1178b58 923->927 928 1178ba9-1178bbe 923->928 967 117902c-1179032 924->967 927->928 934 1178b5a-1178b65 927->934 931 1178bc5-1178bdb 928->931 932 1178bc0 928->932 937 1178be2-1178bf9 931->937 938 1178bdd 931->938 932->931 939 1178b9b-1178ba1 934->939 942 1178c00-1178c16 937->942 943 1178bfb 937->943 938->937 944 1178b67-1178b6b 939->944 945 1178ba3-1178ba4 939->945 950 1178c1d-1178c24 942->950 951 1178c18 942->951 943->942 948 1178b71-1178b89 944->948 949 1178b6d 944->949 946 1178c27-1178c92 945->946 957 1178ca6-1178e5b 946->957 958 1178c94-1178ca0 946->958 953 11793f2-1179401 947->953 955 1178b90-1178b98 948->955 956 1178b8b 948->956 949->948 950->946 951->950 959 1179394-11793bc 953->959 960 1179403-117948b 953->960 955->939 956->955 965 1178ebf-1178ed4 957->965 966 1178e5d-1178e61 957->966 958->957 962 11793c3-11793ec 959->962 963 11793be 959->963 995 1179604-1179610 960->995 962->953 963->962 973 1178ed6 965->973 974 1178edb-1178efc 965->974 966->965 969 1178e63-1178e72 966->969 971 1179034-117903a 967->971 972 1178fe1-1179029 967->972 978 1178eb1-1178eb7 969->978 971->908 972->967 973->974 975 1178f03-1178f22 974->975 976 1178efe 974->976 979 1178f24 975->979 980 1178f29-1178f49 975->980 976->975 982 1178e74-1178e78 978->982 983 1178eb9-1178eba 978->983 979->980 988 1178f50 980->988 989 1178f4b 980->989 986 1178e82-1178ea3 982->986 987 1178e7a-1178e7e 982->987 990 1178f54 983->990 991 1178ea5 986->991 992 1178eaa-1178eae 986->992 987->986 988->990 989->988 990->922 991->992 992->978 997 1179616-1179671 995->997 998 1179490-1179499 995->998 1013 1179673-11796a6 997->1013 1014 11796a8-11796d2 997->1014 999 11794a2-11795f8 998->999 1000 117949b 998->1000 1015 11795fe 999->1015 1000->999 1002 1179577-11795b7 1000->1002 1003 1179532-1179572 1000->1003 1004 11794ed-117952d 1000->1004 1005 11794a8-11794e8 1000->1005 1002->1015 1003->1015 1004->1015 1005->1015 1022 11796db-117976e 1013->1022 1014->1022 1015->995 1026 1179775-1179795 1022->1026 1026->912
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: TJq$Teq$pq$xbq
                                                                      • API String ID: 0-2466396065
                                                                      • Opcode ID: 0686f84995d7bfdd8fbbb04047dbf50e6394ea696badf59dcbee0c6407818e22
                                                                      • Instruction ID: 50bbe725a4cd3a5f37ad8dad9c8375be8df0f5209dc2fbcf59a7185f85a035db
                                                                      • Opcode Fuzzy Hash: 0686f84995d7bfdd8fbbb04047dbf50e6394ea696badf59dcbee0c6407818e22
                                                                      • Instruction Fuzzy Hash: E6A2D674A00228CFDB64CF69C984AD9BBB2FF89314F1581E9D509AB365DB319E85CF40

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1562 5905558-5905579 1563 5905580-5905653 call 5906099 1562->1563 1564 590557b 1562->1564 1571 5905662 1563->1571 1572 5905655-5905660 1563->1572 1564->1563 1573 590566c-5905787 1571->1573 1572->1573 1584 5905799-59057c4 1573->1584 1585 5905789-590578f 1573->1585 1586 5905f78-5905f94 1584->1586 1585->1584 1587 59057c9-590592c call 59044f8 1586->1587 1588 5905f9a-5905fb5 1586->1588 1599 590593e-5905a46 call 5907ca8 1587->1599 1600 590592e-5905934 1587->1600 1607 5905a4c-5905abb 1599->1607 1600->1599 1610 5905b20-5905b2a 1607->1610 1611 5905abd-5905ac1 1607->1611 1614 5905d51-5905d70 1610->1614 1612 5905ac3-5905ac4 1611->1612 1613 5905ac9-5905b1b 1611->1613 1615 5905df6-5905e61 1612->1615 1613->1615 1616 5905d76-5905da0 1614->1616 1617 5905b2f-5905c75 call 59044f8 1614->1617 1634 5905e73-5905ebe 1615->1634 1635 5905e63-5905e69 1615->1635 1623 5905da2-5905df0 1616->1623 1624 5905df3-5905df4 1616->1624 1646 5905d4a-5905d4b 1617->1646 1647 5905c7b-5905d47 call 59044f8 1617->1647 1623->1624 1624->1615 1637 5905ec4-5905f5c 1634->1637 1638 5905f5d-5905f75 1634->1638 1635->1634 1637->1638 1638->1586 1646->1614 1647->1646
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: fq$8
                                                                      • API String ID: 0-1651916650
                                                                      • Opcode ID: 061142df6f7efda08bf50f06b8fac754ef73a0bc8ed4434ee6f6ef79548b83c2
                                                                      • Instruction ID: 8e0bd9339a130aa28a4cb01d0eaeb7f2bcfccbdf771359603ab72774d0c21196
                                                                      • Opcode Fuzzy Hash: 061142df6f7efda08bf50f06b8fac754ef73a0bc8ed4434ee6f6ef79548b83c2
                                                                      • Instruction Fuzzy Hash: 9F52D375E002298FDB64DF68C994AD9B7B2BF89300F1085AAD50DA7395DB30AE85CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: fq$h
                                                                      • API String ID: 0-152923806
                                                                      • Opcode ID: 749ebb704fae5a191aa890d83714becb45f708dcf7541b8069e01738cf7742ae
                                                                      • Instruction ID: 35581717ec1c4bab3f0a1d66d89dccbdf3819053a2d4142f6d44e98f57a2ee22
                                                                      • Opcode Fuzzy Hash: 749ebb704fae5a191aa890d83714becb45f708dcf7541b8069e01738cf7742ae
                                                                      • Instruction Fuzzy Hash: 3271F575E012198FEB24DF69C840BD9B7B6FB89300F1085AAD51DB7295DB309E85CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q
                                                                      • API String ID: 0-3126353813
                                                                      • Opcode ID: 26826e01c938d1564c62ba56f816c7352b071e838ac0e3b02bdc531ee36c3600
                                                                      • Instruction ID: 75d873b081eb952ed6039365ce9388118ac9bd26715587d9af37a173b6c2618c
                                                                      • Opcode Fuzzy Hash: 26826e01c938d1564c62ba56f816c7352b071e838ac0e3b02bdc531ee36c3600
                                                                      • Instruction Fuzzy Hash: D1411E75E01119CBEB28DF6AD8407AEB7F6BF88300F14C1A6D50AA7755DB354982CF50
                                                                      APIs
                                                                      • NtResumeThread.NTDLL(?,?), ref: 0590CB0E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: ResumeThread
                                                                      • String ID:
                                                                      • API String ID: 947044025-0
                                                                      • Opcode ID: 818e91a1deaa093edf06db3a5b0838f99336fb0a1a911190ed3a3a3e1413e575
                                                                      • Instruction ID: 5fd017e8ad57650d67a22fc3ce2523a5bca3147f6418f952c674c369cc7e3372
                                                                      • Opcode Fuzzy Hash: 818e91a1deaa093edf06db3a5b0838f99336fb0a1a911190ed3a3a3e1413e575
                                                                      • Instruction Fuzzy Hash: AC41BBB5E00219DFDB14DFA9D880AAEFBF5BB49310F10952AE819B7240D7346A45CF94
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Teq
                                                                      • API String ID: 0-1098410595
                                                                      • Opcode ID: 88e545f91f69bf70aa0986c4dc8e027708e78ba74b1a898ffe5315db0642edbc
                                                                      • Instruction ID: 08afb026f586e18177dcf28f7a6cd47f487274a3f147a466930d52ef1f2ffc1d
                                                                      • Opcode Fuzzy Hash: 88e545f91f69bf70aa0986c4dc8e027708e78ba74b1a898ffe5315db0642edbc
                                                                      • Instruction Fuzzy Hash: AAF13074A05218CFEB68DF69C984BADB7F2BB89304F1480A9D80EA7395DB745D84CF11
                                                                      APIs
                                                                      • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05908E65
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: MemoryProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 2706961497-0
                                                                      • Opcode ID: 967e5d844ee01b37d7ac093e5e5439b9c51084026c718a9eaa8cf9ecf7b27c47
                                                                      • Instruction ID: c5f2684d9469b3e66adc47ea281ed805c27ee41e2a1adad811dd0ba60a53582b
                                                                      • Opcode Fuzzy Hash: 967e5d844ee01b37d7ac093e5e5439b9c51084026c718a9eaa8cf9ecf7b27c47
                                                                      • Instruction Fuzzy Hash: 694187B9D002589FDF10CFAAD980ADEFBB5BB09310F10A42AE815B7350D735A945CF69
                                                                      APIs
                                                                      • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05908E65
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: MemoryProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 2706961497-0
                                                                      • Opcode ID: aaa36fea938aba7b0d9b9c3316bb4adb06c12ebc80a4e6f3b0a72b105cc7bf59
                                                                      • Instruction ID: c7ccc8a7be2f25d92259794bb5caec8b19dd774a21c3ed117faeb533b8970564
                                                                      • Opcode Fuzzy Hash: aaa36fea938aba7b0d9b9c3316bb4adb06c12ebc80a4e6f3b0a72b105cc7bf59
                                                                      • Instruction Fuzzy Hash: CC4197B9D002589FDF10CFAAD980ADEFBB5BB09310F10A42AE815B7340D735A941CF69
                                                                      APIs
                                                                      • NtResumeThread.NTDLL(?,?), ref: 0590CB0E
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: ResumeThread
                                                                      • String ID:
                                                                      • API String ID: 947044025-0
                                                                      • Opcode ID: c2c1602ea80801069c3366c633dbecd90592ab5e36bd49fc5fa8491e3a93fa0f
                                                                      • Instruction ID: 09fdbc048adb81e496dc0c4e9ca195e874782970d80d7f914d50f68af53e34df
                                                                      • Opcode Fuzzy Hash: c2c1602ea80801069c3366c633dbecd90592ab5e36bd49fc5fa8491e3a93fa0f
                                                                      • Instruction Fuzzy Hash: 6231A8B5D012189FDF14DFAAD980ADEFBF5BB49310F10942AE815B7240C735A945CFA8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273551941.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56a0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: PHq
                                                                      • API String ID: 0-3820536768
                                                                      • Opcode ID: 15430e81d3bd9723d5f36119d132b09cf1d8821d6569c3c0ffd1a2561ccb0935
                                                                      • Instruction ID: fa16ad36b2879dc84c08b2738a105e53b03017a826749189830a2bea86b4612c
                                                                      • Opcode Fuzzy Hash: 15430e81d3bd9723d5f36119d132b09cf1d8821d6569c3c0ffd1a2561ccb0935
                                                                      • Instruction Fuzzy Hash: F0D14474E05218CFDB14CF69C984BAEBBF2BB8A304F1090A9D40AA7795DB345D85CF41
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273551941.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56a0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: PHq
                                                                      • API String ID: 0-3820536768
                                                                      • Opcode ID: da13e906d4787c6930419be6d5190568c384dfacf32982d6b8977929564b180a
                                                                      • Instruction ID: 29ccba02d9b00b0feb01ef359e1b8fb3a2d86c46da69c6f3cdcffd2afc449635
                                                                      • Opcode Fuzzy Hash: da13e906d4787c6930419be6d5190568c384dfacf32982d6b8977929564b180a
                                                                      • Instruction Fuzzy Hash: 2DD13374E05218CFEB14CFA9C584BAEBBF2BB8A304F1090A9D40AA7795DB345D85CF01
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Dq
                                                                      • API String ID: 0-144822681
                                                                      • Opcode ID: 52b8116339c98b98f35055c9a0d6405d19c541cf345a899b0989732ce47b8b88
                                                                      • Instruction ID: 95223dc55436a96ffe7e509b8005be020e9804aaafe30071ba88b41a279f224e
                                                                      • Opcode Fuzzy Hash: 52b8116339c98b98f35055c9a0d6405d19c541cf345a899b0989732ce47b8b88
                                                                      • Instruction Fuzzy Hash: 5CD19378E00218CFDB54DFA9D994B9DBBF2BF88300F1091A9D409AB365DB359981CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Teq
                                                                      • API String ID: 0-1098410595
                                                                      • Opcode ID: 18c1ce4629cbf60a2828070c5239ffff03950cba5f512b17a77baac6f788beb5
                                                                      • Instruction ID: 215214c5660d28bae4acb788f5a4205170349d158a6cc2d5d84f94806f565644
                                                                      • Opcode Fuzzy Hash: 18c1ce4629cbf60a2828070c5239ffff03950cba5f512b17a77baac6f788beb5
                                                                      • Instruction Fuzzy Hash: 81B1D074E152088FDB18DFA9D984BADBBF2FB8A304F149069D80AE7295DB345D85CF00
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Teq
                                                                      • API String ID: 0-1098410595
                                                                      • Opcode ID: c2c42039aa753b3f413f3ac6d0bd87e86271f0d60f4be2f7da04232ac4ff1a17
                                                                      • Instruction ID: a410f0b655e121f53102d95d04ac78110692ad492b22ea9fcf8039d3cfacd48a
                                                                      • Opcode Fuzzy Hash: c2c42039aa753b3f413f3ac6d0bd87e86271f0d60f4be2f7da04232ac4ff1a17
                                                                      • Instruction Fuzzy Hash: 54B1D174E152088FDB18DFA9D984B9DBBF2FB8A304F189069D80AE7295DB345D85CF10
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Dq
                                                                      • API String ID: 0-144822681
                                                                      • Opcode ID: 9b59b274126e9e5a49bfc23c2dbe5b734d3c484b77a6cf2e1228d401d8be4649
                                                                      • Instruction ID: e0a5884dd1a67762cc1519ad90f9304e1b5bc19a182645b1a85b5b53d62b05ca
                                                                      • Opcode Fuzzy Hash: 9b59b274126e9e5a49bfc23c2dbe5b734d3c484b77a6cf2e1228d401d8be4649
                                                                      • Instruction Fuzzy Hash: 8AA1D178A00218CFDB54DFA9D984B9DBBF2BF89300F1081A9D409AB365DB30AD85CF51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: R="
                                                                      • API String ID: 0-3611162886
                                                                      • Opcode ID: 5d0c9b24dbc03030cfe20a19744f61a59b15ee72069b2e61f7efd18eb0270861
                                                                      • Instruction ID: bf2351d37693196bd09f969fd77bf51f1b9df0f9b73b7c5b31097571c06ad466
                                                                      • Opcode Fuzzy Hash: 5d0c9b24dbc03030cfe20a19744f61a59b15ee72069b2e61f7efd18eb0270861
                                                                      • Instruction Fuzzy Hash: FE515D74E0021A8FDB08DFA9D9846AFBBF2FF88300F149125E419E7394D7349946CB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6b1fc646845b0c942d7065a49478e4f6abe13b4cc779b325b6d5f53026362d93
                                                                      • Instruction ID: 56b5d09cca4f5c7133bde5d84a5d59dd45fa52edd61977dc724fcab28b5b5654
                                                                      • Opcode Fuzzy Hash: 6b1fc646845b0c942d7065a49478e4f6abe13b4cc779b325b6d5f53026362d93
                                                                      • Instruction Fuzzy Hash: 5DD15774E05209CFDB44DFA8D585BEEBBF2BB48304F20452AE41AAB391CB345986CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c70aa3534555236604025975b3acebb5a79736f9994e176bbb03b14adb9288e0
                                                                      • Instruction ID: faaffb5172392742ad4ce11a9d7f54eb48ed8db03798415ff660383fe79b800d
                                                                      • Opcode Fuzzy Hash: c70aa3534555236604025975b3acebb5a79736f9994e176bbb03b14adb9288e0
                                                                      • Instruction Fuzzy Hash: 07C1E274D09209CFDF10DF99C449BEEBBF2BB45305F009029D42AA76A5DBB85986CF84
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8a36d1cb08656c08da0b9205abc69aeba033ef5d812d4caa77e89586cd37d1ca
                                                                      • Instruction ID: 26f19d080c1e5e807626f29d828f55591b0d06aa0d71e9b6970944fef7730a3f
                                                                      • Opcode Fuzzy Hash: 8a36d1cb08656c08da0b9205abc69aeba033ef5d812d4caa77e89586cd37d1ca
                                                                      • Instruction Fuzzy Hash: 73B1F374D09209CFDF10DF99C449BEEBBF2BB45305F009029D42AA76A5DBB85986CF84
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 247877fce711aeba6cd530eca8d7effe6443c5f33b88a1c6872da51e120103fe
                                                                      • Instruction ID: 798f6d785d7b6a75cea66a9602ab5b308cfb6831a49b7d82db3383ddba098baf
                                                                      • Opcode Fuzzy Hash: 247877fce711aeba6cd530eca8d7effe6443c5f33b88a1c6872da51e120103fe
                                                                      • Instruction Fuzzy Hash: 19B15B74A04208CFDB44DFA8D595BAEBBF2FB48304F204529E41AAB395DB349985CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7807413c9aa271bf756928d0952a963df5406048c3af8abaf312b89b30f9046e
                                                                      • Instruction ID: b9e526de8fdf277a8727f1d67d6858de969cb157d566fe2ff81426b65b909aba
                                                                      • Opcode Fuzzy Hash: 7807413c9aa271bf756928d0952a963df5406048c3af8abaf312b89b30f9046e
                                                                      • Instruction Fuzzy Hash: C2A19D74A04208CFDB44DFA8D595BEEBBF2FB48304F205529E41AAB395DB349986CF41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0f2c006136fbc76efad1163e785aa4691f0f08a020333afa4a9065b8be805472
                                                                      • Instruction ID: 9818ef48a9f4010a00187fa1313614ea0dcbf2f3710ffe4589ae9d0ab313622b
                                                                      • Opcode Fuzzy Hash: 0f2c006136fbc76efad1163e785aa4691f0f08a020333afa4a9065b8be805472
                                                                      • Instruction Fuzzy Hash: E9A17C74A05208CFDB44DFA8D595BAEBBF2FB48304F20452AE41AAB395DB349D85CF41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 514bef943b9a60741d672ac5846a2687bff78af44345850cbb0bd38d18342cdf
                                                                      • Instruction ID: 7eca13f2dbe4b6f7b510a912ae59d2d38613ffbd81acf1e24753db3934ecadf5
                                                                      • Opcode Fuzzy Hash: 514bef943b9a60741d672ac5846a2687bff78af44345850cbb0bd38d18342cdf
                                                                      • Instruction Fuzzy Hash: AA91DFB4E00648CFCB08CF99D484AAEBBF2FF89314F148169D809A7355D734A986CF90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1028 117251a-117251e 1029 1172524-117252d 1028->1029 1030 1172678-117267d 1028->1030 1031 11726f4-11726fa 1029->1031 1032 1172533-1172538 1029->1032 1033 117269c-11726a2 1030->1033 1034 1172617 1032->1034 1035 117253e-1172727 1032->1035 1036 11726a9-11726af 1033->1036 1038 1172636-117263d 1034->1038 1039 11726b1-11726b6 1036->1039 1040 117267f-1172691 1036->1040 1046 117263f-1172675 1038->1046 1047 1172619-117262b 1038->1047 1044 11725d1-1172609 1039->1044 1045 11726bc-11726e8 1039->1045 1042 1172697 1040->1042 1043 1172764-117278b 1040->1043 1042->1033 1059 1172795-1172799 call 117297c 1043->1059 1044->1036 1051 117260f-1172615 1044->1051 1046->1030 1047->1043 1049 1172631 1047->1049 1049->1038 1051->1034 1054 11725d3-117275c 1051->1054 1054->1043 1062 117279f-11727a1 1059->1062
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $T`$T`$E
                                                                      • API String ID: 0-2494232921
                                                                      • Opcode ID: 74f564c3ff4029b3bcc0a206d7f371406c7a27445bde5b450dc36fc93803d327
                                                                      • Instruction ID: a875c10dc8418d132a5a8ff00249b9217fd431fee2c5d82ea8435380690de2ae
                                                                      • Opcode Fuzzy Hash: 74f564c3ff4029b3bcc0a206d7f371406c7a27445bde5b450dc36fc93803d327
                                                                      • Instruction Fuzzy Hash: 5C414774E04249DFCB19CFA8C9905EDBBF1BF48304F258566D806EB392D734AA86CB51

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1065 56b17f0-56b1818 1067 56b181a-56b1861 1065->1067 1068 56b1866-56b1874 1065->1068 1116 56b1cbd-56b1cc4 1067->1116 1069 56b1883 1068->1069 1070 56b1876-56b1881 1068->1070 1071 56b1885-56b188c 1069->1071 1070->1071 1074 56b1892-56b1896 1071->1074 1075 56b1975-56b1979 1071->1075 1076 56b189c-56b18a0 1074->1076 1077 56b1cc5-56b1ced 1074->1077 1079 56b197b-56b198a 1075->1079 1080 56b19cf-56b19d9 1075->1080 1081 56b18b2-56b1910 1076->1081 1082 56b18a2-56b18ac 1076->1082 1087 56b1cf4-56b1d1e 1077->1087 1089 56b198e-56b1993 1079->1089 1083 56b19db-56b19ea 1080->1083 1084 56b1a12-56b1a38 1080->1084 1121 56b1d83-56b1d91 1081->1121 1122 56b1916-56b1970 1081->1122 1082->1081 1082->1087 1098 56b19f0-56b1a0d 1083->1098 1099 56b1d26-56b1d3c 1083->1099 1106 56b1a3a-56b1a43 1084->1106 1107 56b1a45 1084->1107 1087->1099 1094 56b198c 1089->1094 1095 56b1995-56b19ca call 56b16c0 1089->1095 1094->1089 1095->1116 1098->1116 1124 56b1d44-56b1d7c 1099->1124 1112 56b1a47-56b1a6f 1106->1112 1107->1112 1129 56b1b40-56b1b44 1112->1129 1130 56b1a75-56b1a8e 1112->1130 1131 56b1df8-56b1dfb 1121->1131 1132 56b1d93-56b1d99 1121->1132 1122->1116 1124->1121 1133 56b1bbe-56b1bc8 1129->1133 1134 56b1b46-56b1b5f 1129->1134 1130->1129 1154 56b1a94-56b1aa3 1130->1154 1139 56b1d9b-56b1dad 1132->1139 1140 56b1e00-56b1e26 1132->1140 1136 56b1bca-56b1bd4 1133->1136 1137 56b1c25-56b1c2e 1133->1137 1134->1133 1160 56b1b61-56b1b70 1134->1160 1155 56b1bda-56b1bec 1136->1155 1156 56b1bd6-56b1bd8 1136->1156 1142 56b1c30-56b1c5e 1137->1142 1143 56b1c66-56b1cb3 1137->1143 1144 56b1daf-56b1db5 1139->1144 1145 56b1db7-56b1dbd 1139->1145 1142->1143 1164 56b1cbb 1143->1164 1144->1145 1151 56b1dbe-56b1df7 1144->1151 1151->1131 1171 56b1abb-56b1ad0 1154->1171 1172 56b1aa5-56b1aab 1154->1172 1161 56b1bee-56b1bf0 1155->1161 1156->1161 1177 56b1b88-56b1b93 1160->1177 1178 56b1b72-56b1b78 1160->1178 1168 56b1c1e-56b1c23 1161->1168 1169 56b1bf2-56b1bf6 1161->1169 1164->1116 1168->1136 1168->1137 1173 56b1bf8-56b1c11 1169->1173 1174 56b1c14-56b1c17 1169->1174 1183 56b1ad2-56b1afe 1171->1183 1184 56b1b04-56b1b0d 1171->1184 1179 56b1aaf-56b1ab1 1172->1179 1180 56b1aad 1172->1180 1173->1174 1174->1168 1177->1121 1189 56b1b99-56b1bbc 1177->1189 1187 56b1b7a 1178->1187 1188 56b1b7c-56b1b7e 1178->1188 1179->1171 1180->1171 1183->1124 1183->1184 1184->1121 1186 56b1b13-56b1b3a 1184->1186 1186->1129 1186->1154 1187->1177 1188->1177 1189->1133 1189->1160
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Hq$Hq$Hq
                                                                      • API String ID: 0-2505839570
                                                                      • Opcode ID: 4f4b2201de20cb46b818d69a85f305a6e87a95e57b03bcebf5db68ad2605d982
                                                                      • Instruction ID: efba11267645d6edec491b0c2b4fbd82caa103d394465286d8c571723b378a40
                                                                      • Opcode Fuzzy Hash: 4f4b2201de20cb46b818d69a85f305a6e87a95e57b03bcebf5db68ad2605d982
                                                                      • Instruction Fuzzy Hash: 9A125E30A00604AFDB24DFA5D495AAEB7F6FF89300F148529E4069B791DB75EC86CB90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1202 56b34b8-56b34f5 1204 56b3517-56b352d call 56b32c0 1202->1204 1205 56b34f7-56b34fa 1202->1205 1211 56b38a3-56b38b7 1204->1211 1212 56b3533-56b353f 1204->1212 1318 56b34fc call 56b3e28 1205->1318 1319 56b34fc call 56b3dd0 1205->1319 1207 56b3502-56b3504 1207->1204 1209 56b3506-56b350e 1207->1209 1209->1204 1221 56b38f7-56b3900 1211->1221 1213 56b3670-56b3677 1212->1213 1214 56b3545-56b3548 1212->1214 1215 56b367d-56b3686 1213->1215 1216 56b37a6-56b37e0 call 56b2cc8 1213->1216 1218 56b354b-56b3554 1214->1218 1215->1216 1220 56b368c-56b3798 call 56b2cc8 call 56b3258 call 56b2cc8 1215->1220 1316 56b37e3 call 56b5c60 1216->1316 1317 56b37e3 call 56b5c70 1216->1317 1222 56b355a-56b356e 1218->1222 1223 56b3998 1218->1223 1313 56b379a 1220->1313 1314 56b37a3-56b37a4 1220->1314 1225 56b3902-56b3909 1221->1225 1226 56b38c5-56b38ce 1221->1226 1238 56b3660-56b366a 1222->1238 1239 56b3574-56b3609 call 56b32c0 * 2 call 56b2cc8 call 56b3258 call 56b3300 call 56b33a8 call 56b3410 1222->1239 1227 56b399d-56b39a1 1223->1227 1231 56b390b-56b394e call 56b2cc8 1225->1231 1232 56b3957-56b395e 1225->1232 1226->1223 1229 56b38d4-56b38e6 1226->1229 1234 56b39ac 1227->1234 1235 56b39a3 1227->1235 1248 56b38e8-56b38ed 1229->1248 1249 56b38f6 1229->1249 1231->1232 1236 56b3983-56b3996 1232->1236 1237 56b3960-56b3970 1232->1237 1247 56b39ad 1234->1247 1235->1234 1236->1227 1237->1236 1254 56b3972-56b397a 1237->1254 1238->1213 1238->1218 1292 56b360b-56b3623 call 56b33a8 call 56b2cc8 call 56b2f78 1239->1292 1293 56b3628-56b365b call 56b3410 1239->1293 1247->1247 1320 56b38f0 call 56b6400 1248->1320 1321 56b38f0 call 56b6410 1248->1321 1249->1221 1254->1236 1261 56b37e9-56b389a call 56b2cc8 1261->1211 1292->1293 1293->1238 1313->1314 1314->1216 1316->1261 1317->1261 1318->1207 1319->1207 1320->1249 1321->1249
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'q$4'q$4'q
                                                                      • API String ID: 0-3126650252
                                                                      • Opcode ID: 3d4e3bb2e27cb3260bda7db8bc0b6024cde80589d1caff4a2c8b86f85fc21f19
                                                                      • Instruction ID: 16fd9bd5a3bf4d68f54ebd27da9a8804438f60117ddcd22806936f13d0c9eb5f
                                                                      • Opcode Fuzzy Hash: 3d4e3bb2e27cb3260bda7db8bc0b6024cde80589d1caff4a2c8b86f85fc21f19
                                                                      • Instruction Fuzzy Hash: E4F1CC34B10218DFDB08DFA4D999AADBBB2FF88300F518558E406AB365DB71EC46CB50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1322 56b7aa0-56b7ab0 1323 56b7bc9-56b7bee 1322->1323 1324 56b7ab6-56b7aba 1322->1324 1326 56b7bf5-56b7c1a 1323->1326 1325 56b7ac0-56b7ac9 1324->1325 1324->1326 1327 56b7acf-56b7af6 1325->1327 1328 56b7c21-56b7c57 1325->1328 1326->1328 1339 56b7bbe-56b7bc8 1327->1339 1340 56b7afc-56b7afe 1327->1340 1346 56b7c5e-56b7cb4 1328->1346 1341 56b7b1f-56b7b21 1340->1341 1342 56b7b00-56b7b03 1340->1342 1344 56b7b24-56b7b28 1341->1344 1345 56b7b09-56b7b13 1342->1345 1342->1346 1347 56b7b2a-56b7b39 1344->1347 1348 56b7b89-56b7b95 1344->1348 1345->1346 1349 56b7b19-56b7b1d 1345->1349 1360 56b7cd8-56b7cef 1346->1360 1361 56b7cb6-56b7cca 1346->1361 1347->1346 1355 56b7b3f-56b7b86 1347->1355 1348->1346 1351 56b7b9b-56b7bb8 1348->1351 1349->1341 1349->1344 1351->1339 1351->1340 1355->1348 1368 56b7de0-56b7df0 1360->1368 1369 56b7cf5-56b7ddb call 56b32c0 call 56b2cc8 * 2 call 56b3300 call 56b6ad8 call 56b2cc8 call 56b5c70 call 56b3b68 1360->1369 1436 56b7ccd call 56b81b8 1361->1436 1437 56b7ccd call 56b8020 1361->1437 1438 56b7ccd call 56b8030 1361->1438 1367 56b7cd3 1371 56b7f03-56b7f0e 1367->1371 1378 56b7ede-56b7efa call 56b2cc8 1368->1378 1379 56b7df6-56b7ed0 call 56b32c0 * 2 call 56b3a78 call 56b2cc8 * 2 call 56b2f78 call 56b3410 call 56b2cc8 1368->1379 1369->1368 1380 56b7f3d-56b7f5e call 56b3410 1371->1380 1381 56b7f10-56b7f20 1371->1381 1378->1371 1433 56b7edb 1379->1433 1434 56b7ed2 1379->1434 1390 56b7f22-56b7f28 1381->1390 1391 56b7f30-56b7f38 call 56b3b68 1381->1391 1390->1391 1391->1380 1433->1378 1434->1433 1436->1367 1437->1367 1438->1367
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (q$(q$Hq
                                                                      • API String ID: 0-2914423630
                                                                      • Opcode ID: 8aaf2c110894b05dde7797bf12065ea6460c43a18106c7f445a319f732c2feff
                                                                      • Instruction ID: 83f3b57f50a9a053a577d23eaee9943d047963bb78a96e4966ed9ba2700753ae
                                                                      • Opcode Fuzzy Hash: 8aaf2c110894b05dde7797bf12065ea6460c43a18106c7f445a319f732c2feff
                                                                      • Instruction Fuzzy Hash: 47E12034B01209DFDB14EF64E4949ADBBB2FFC9300F508569E805AB365DB70AD82CB95

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1439 564ac95-564ac9b 1440 564aca4-564acbd 1439->1440 1441 564ac9d 1439->1441 1452 564aa45-564aa4b 1440->1452 1453 564acc3-564accb 1440->1453 1441->1440 1442 564ad14-564ad1b 1441->1442 1443 564ab27-564ab50 call 564b700 1441->1443 1444 564ab97-564aba7 1441->1444 1445 564ad70-564ad83 1441->1445 1446 564ade2-564ae56 1441->1446 1447 564ab63-564ab74 1441->1447 1448 564aadf-564ab00 1441->1448 1449 564ac28-564ac47 1441->1449 1450 564ad88-564ae64 1441->1450 1451 564abe9-564ac23 1441->1451 1480 564ab56-564ab5e 1443->1480 1444->1452 1445->1450 1445->1452 1446->1452 1447->1452 1448->1452 1454 564ab06-564ab0e 1448->1454 1449->1452 1455 564ac4d-564ac55 1449->1455 1462 564ac5a-564ac90 1450->1462 1463 564ae6a-564ae72 1450->1463 1451->1452 1457 564aa54-564aa55 1452->1457 1458 564aa4d 1452->1458 1453->1452 1459 564acd0-564acd6 1453->1459 1454->1452 1455->1452 1464 564aa5a-564aa87 call 5642e70 1457->1464 1465 564ad0b-564ad0c 1457->1465 1458->1442 1458->1447 1458->1464 1458->1465 1468 564aa97-564aa98 1458->1468 1469 564ad1e-564ad62 1458->1469 1470 564aa9a-564aacc call 5642e70 1458->1470 1471 564acdf-564acf8 1459->1471 1472 564acd8 1459->1472 1462->1452 1462->1459 1463->1452 1464->1452 1484 564aa89-564aa8f 1464->1484 1465->1459 1468->1470 1469->1452 1470->1452 1483 564aad2-564aada 1470->1483 1471->1452 1473 564acfe-564ad06 1471->1473 1472->1442 1472->1443 1472->1444 1472->1446 1472->1447 1472->1448 1472->1450 1472->1465 1473->1452 1473->1465 1480->1452 1483->1452 1484->1452
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $#$%
                                                                      • API String ID: 0-2824088872
                                                                      • Opcode ID: df4ce4aad0c82ba8a1776cee9a377cfac47d106431bb169fdb138aa338cf43a4
                                                                      • Instruction ID: 0e3f60e622ef4a25b64825d2aa97e60e7a96c297f80e230425820829cb29c8d2
                                                                      • Opcode Fuzzy Hash: df4ce4aad0c82ba8a1776cee9a377cfac47d106431bb169fdb138aa338cf43a4
                                                                      • Instruction Fuzzy Hash: 2991D278A44218DFDB40CFA8C684ADDBBF2FB49304F109119E419AB795CB38AC86CF54

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1491 564125c-5641266 1492 5641090-56410da 1491->1492 1493 5641012-564104a 1491->1493 1494 5640f59-5640f79 1491->1494 1495 5640faa-5640fff 1491->1495 1496 56410eb-5641134 1491->1496 1505 5640b03-5640b09 1492->1505 1504 5641050-5641058 1493->1504 1493->1505 1516 5640f7f call 5644300 1494->1516 1517 5640f7f call 5644310 1494->1517 1495->1505 1510 5641005-564100d 1495->1510 1496->1505 1514 564113a-5641142 1496->1514 1504->1492 1504->1505 1506 5640b12-5640b13 1505->1506 1507 5640b0b-5640d6e 1505->1507 1506->1492 1507->1505 1515 5640d74-5640d7c 1507->1515 1508 5640f85-5640f97 1510->1505 1514->1505 1515->1505 1516->1508 1517->1508
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: -$1$6
                                                                      • API String ID: 0-3419987801
                                                                      • Opcode ID: 1b151d0280223e1a4d92437df12e8a7f8acc745ac0609a470f9b902962757950
                                                                      • Instruction ID: 7d619769bf124332506e6db770c24005866166d3ed985b17a2c81523787b7d37
                                                                      • Opcode Fuzzy Hash: 1b151d0280223e1a4d92437df12e8a7f8acc745ac0609a470f9b902962757950
                                                                      • Instruction Fuzzy Hash: 38412274A05218CFDB10DFA8D648B9DBBF2FB49304F1080AAD519AB384CB355E85CF14

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1518 5641291-56412a9 1521 5641090-56410da 1518->1521 1522 5641012-564104a 1518->1522 1523 5640f59-5640f79 1518->1523 1524 56410eb-5641134 1518->1524 1532 5640b03-5640b09 1521->1532 1531 5641050-5641058 1522->1531 1522->1532 1541 5640f7f call 5644300 1523->1541 1542 5640f7f call 5644310 1523->1542 1524->1532 1539 564113a-5641142 1524->1539 1531->1521 1531->1532 1533 5640b12-5640b13 1532->1533 1534 5640b0b-5640d6e 1532->1534 1533->1521 1534->1532 1540 5640d74-5640d7c 1534->1540 1535 5640f85-5640f97 1539->1532 1540->1532 1541->1535 1542->1535
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: -$1$6
                                                                      • API String ID: 0-3419987801
                                                                      • Opcode ID: b730ede5c2a2e61a05321bb4c0fc16442163e6a3e330cc7eb0ca7d3d06597ad7
                                                                      • Instruction ID: 4aa954ad57df9477584d1f91e9c261df015d5581c4127ebfa7a86bcea5dbccf9
                                                                      • Opcode Fuzzy Hash: b730ede5c2a2e61a05321bb4c0fc16442163e6a3e330cc7eb0ca7d3d06597ad7
                                                                      • Instruction Fuzzy Hash: 64313474A05218CFEB10DFA8D549B9DBBF2FB49304F1040AAE509AB785CB355E85CF24

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1543 5640cbb-5640cdd 1559 5640ce3 call 5641448 1543->1559 1560 5640ce3 call 5641458 1543->1560 1561 5640ce3 call 56413d8 1543->1561 1546 5640ce9-5640d35 1549 5640b03-5640b09 1546->1549 1550 5640d3b-5640d43 1546->1550 1551 5640b12-56410da 1549->1551 1552 5640b0b-5640d6e 1549->1552 1550->1549 1551->1549 1552->1549 1556 5640d74-5640d7c 1552->1556 1556->1549 1559->1546 1560->1546 1561->1546
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $$0$TJq
                                                                      • API String ID: 0-1999971732
                                                                      • Opcode ID: d624f3e7aa002a6c25c008e231d1d6af53785bbc091e5ffaf270cd820fab8fd7
                                                                      • Instruction ID: 634316fa3e7c12fff3555329565036093c4f49b56a3d6820455419c91b9bf044
                                                                      • Opcode Fuzzy Hash: d624f3e7aa002a6c25c008e231d1d6af53785bbc091e5ffaf270cd820fab8fd7
                                                                      • Instruction Fuzzy Hash: 01011A74A01218CFCB50DF64C958B9DBBF1BF4A314F1451D5D049AB291CB315E84CF19

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1656 564ee3b-564ee3d 1657 564ee45-564ee4f 1656->1657 1659 564ee75-564ee78 1657->1659 1660 564ee51-564ee6f 1657->1660 1661 564effd-564f004 1659->1661 1662 564ee7e-564ee84 1659->1662 1660->1659 1665 564f046-564f091 1660->1665 1662->1661 1663 564ee8a-564ee93 1662->1663 1667 564ee95-564eea4 1663->1667 1668 564eecb-564eed1 1663->1668 1687 564f093-564f0a0 1665->1687 1688 564f0ca-564f0cc 1665->1688 1667->1668 1675 564eea6-564eebf 1667->1675 1670 564eed7-564eee0 1668->1670 1671 564efdc-564efe2 1668->1671 1670->1671 1679 564eee6-564eef2 1670->1679 1671->1661 1674 564efe4-564eff4 1671->1674 1674->1661 1681 564eff6-564effb 1674->1681 1675->1668 1684 564eec1-564eec4 1675->1684 1685 564ef90-564efd4 1679->1685 1686 564eef8-564ef20 1679->1686 1681->1661 1684->1668 1685->1671 1686->1685 1699 564ef22-564ef5f 1686->1699 1687->1688 1693 564f0a2-564f0c8 1687->1693 1689 564f517-564f51e 1688->1689 1693->1688 1704 564f0d1-564f105 1693->1704 1699->1685 1711 564ef61-564ef8e 1699->1711 1713 564f1a8-564f1b7 1704->1713 1714 564f10b-564f114 1704->1714 1711->1671 1719 564f1f6 1713->1719 1720 564f1b9-564f1cf 1713->1720 1716 564f51f-564f529 1714->1716 1717 564f11a-564f12d 1714->1717 1725 564f196-564f1a2 1717->1725 1726 564f12f-564f148 1717->1726 1724 564f1f8-564f1fd 1719->1724 1731 564f1d1-564f1ed 1720->1731 1732 564f1ef-564f1f4 1720->1732 1729 564f240-564f25c 1724->1729 1730 564f1ff-564f220 1724->1730 1725->1713 1725->1714 1726->1725 1742 564f14a-564f158 1726->1742 1739 564f324-564f32d 1729->1739 1740 564f262-564f26b 1729->1740 1730->1729 1746 564f222 1730->1746 1731->1724 1732->1724 1743 564f515 1739->1743 1744 564f333 1739->1744 1740->1716 1745 564f271-564f28e 1740->1745 1742->1725 1754 564f15a-564f15e 1742->1754 1743->1689 1747 564f341-564f34f 1744->1747 1748 564f39e-564f3ac 1744->1748 1749 564f33a-564f33c 1744->1749 1766 564f294-564f2aa 1745->1766 1767 564f312-564f31e 1745->1767 1750 564f225-564f23e 1746->1750 1760 564f367-564f36e 1747->1760 1761 564f351-564f359 1747->1761 1756 564f3c4-564f3db 1748->1756 1757 564f3ae-564f3b6 1748->1757 1749->1689 1750->1729 1754->1716 1759 564f164-564f17d 1754->1759 1772 564f3f3-564f406 1756->1772 1773 564f3dd-564f3e5 1756->1773 1757->1756 1759->1725 1777 564f17f-564f193 1759->1777 1760->1689 1761->1760 1766->1767 1778 564f2ac-564f2ba 1766->1778 1767->1739 1767->1740 1781 564f41e-564f43b 1772->1781 1782 564f408-564f410 1772->1782 1773->1772 1777->1725 1778->1767 1786 564f2bc-564f2c0 1778->1786 1792 564f453 1781->1792 1793 564f43d-564f445 1781->1793 1782->1781 1786->1716 1789 564f2c6-564f2ef 1786->1789 1789->1767 1797 564f2f1-564f30f 1789->1797 1792->1689 1793->1792 1797->1767
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Plq$$q
                                                                      • API String ID: 0-181920578
                                                                      • Opcode ID: ccd32abb697895a6fc297c98a386e2011e722796f4a60c270c94cfbe34f64ed7
                                                                      • Instruction ID: 52af8adcba86f398fc76b2cc2c3e3f4292b60951b6931cf2a99b2913fe419ad0
                                                                      • Opcode Fuzzy Hash: ccd32abb697895a6fc297c98a386e2011e722796f4a60c270c94cfbe34f64ed7
                                                                      • Instruction Fuzzy Hash: 0F12F534B00205CFDB14DF29D984A6ABBF6BF88711B1584A9E506DB7A1DB31EC42CF61

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1801 56b0ea8-56b0eba 1802 56b0ebc-56b0edd 1801->1802 1803 56b0ee4-56b0ee8 1801->1803 1802->1803 1804 56b0eea-56b0eec 1803->1804 1805 56b0ef4-56b0f03 1803->1805 1804->1805 1806 56b0f0f-56b0f3b 1805->1806 1807 56b0f05 1805->1807 1811 56b1168-56b11af 1806->1811 1812 56b0f41-56b0f47 1806->1812 1807->1806 1843 56b11b1 1811->1843 1844 56b11c5-56b11d1 1811->1844 1813 56b1019-56b101d 1812->1813 1814 56b0f4d-56b0f53 1812->1814 1817 56b101f-56b1028 1813->1817 1818 56b1040-56b1049 1813->1818 1814->1811 1816 56b0f59-56b0f66 1814->1816 1820 56b0ff8-56b1001 1816->1820 1821 56b0f6c-56b0f75 1816->1821 1817->1811 1822 56b102e-56b103e 1817->1822 1823 56b104b-56b106b 1818->1823 1824 56b106e-56b1071 1818->1824 1820->1811 1827 56b1007-56b1013 1820->1827 1821->1811 1828 56b0f7b-56b0f93 1821->1828 1826 56b1074-56b107a 1822->1826 1823->1824 1824->1826 1826->1811 1829 56b1080-56b1093 1826->1829 1827->1813 1827->1814 1830 56b0f9f-56b0fb1 1828->1830 1831 56b0f95 1828->1831 1829->1811 1834 56b1099-56b10a9 1829->1834 1830->1820 1838 56b0fb3-56b0fb9 1830->1838 1831->1830 1834->1811 1836 56b10af-56b10bc 1834->1836 1836->1811 1840 56b10c2-56b10d7 1836->1840 1841 56b0fbb 1838->1841 1842 56b0fc5-56b0fcb 1838->1842 1840->1811 1852 56b10dd-56b1100 1840->1852 1841->1842 1842->1811 1845 56b0fd1-56b0ff5 1842->1845 1846 56b11b4-56b11b6 1843->1846 1848 56b11dd-56b11f9 1844->1848 1849 56b11d3 1844->1849 1850 56b11fa-56b1227 1846->1850 1851 56b11b8-56b11c3 1846->1851 1849->1848 1862 56b1229-56b122f 1850->1862 1863 56b123f-56b1241 1850->1863 1851->1844 1851->1846 1852->1811 1858 56b1102-56b110d 1852->1858 1860 56b110f-56b1119 1858->1860 1861 56b115e-56b1165 1858->1861 1860->1861 1867 56b111b-56b1131 1860->1867 1865 56b1233-56b1235 1862->1865 1866 56b1231 1862->1866 1886 56b1243 call 56b2478 1863->1886 1887 56b1243 call 56b16c0 1863->1887 1865->1863 1866->1863 1872 56b113d-56b1156 1867->1872 1873 56b1133 1867->1873 1868 56b1249-56b124d 1869 56b1298-56b12a8 1868->1869 1870 56b124f-56b1266 1868->1870 1870->1869 1878 56b1268-56b1272 1870->1878 1872->1861 1873->1872 1881 56b1285-56b1295 1878->1881 1882 56b1274-56b1283 1878->1882 1882->1881 1886->1868 1887->1868
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (q$d
                                                                      • API String ID: 0-1617062230
                                                                      • Opcode ID: f37000e6455053549a5d65c5567762303d20341dbf1434ce7f2b0c90a40ba819
                                                                      • Instruction ID: 0bdf23e9923402406e89cb9f41d4ceee648ee5370784d373c1042f14bf5f66d8
                                                                      • Opcode Fuzzy Hash: f37000e6455053549a5d65c5567762303d20341dbf1434ce7f2b0c90a40ba819
                                                                      • Instruction Fuzzy Hash: 09D1AF30700605DFDB24CF29C494AAAB7F6FF89310B658969D85A9B751DB30FC82CB90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1888 55651a8-55651cd 1889 55651d4-55651f3 1888->1889 1890 55651cf 1888->1890 1891 5565214 1889->1891 1892 55651f5-55651fe 1889->1892 1890->1889 1895 5565217-556521b 1891->1895 1893 5565205-5565208 1892->1893 1894 5565200-5565203 1892->1894 1896 5565212 1893->1896 1894->1896 1897 55653d6-55653ed 1895->1897 1896->1895 1899 55653f3-55653f7 1897->1899 1900 5565220-5565224 1897->1900 1903 5565420-5565424 1899->1903 1904 55653f9-556541d 1899->1904 1901 5565226-5565281 1900->1901 1902 5565229-556522d 1900->1902 1910 5565286-556528a 1901->1910 1911 5565283-55652e4 1901->1911 1908 5565256-556526f 1902->1908 1909 556522f-5565253 1902->1909 1905 5565426-556542f 1903->1905 1906 5565445 1903->1906 1904->1903 1912 5565436-5565439 1905->1912 1913 5565431-5565434 1905->1913 1914 5565448-556544e 1906->1914 1931 5565277-5565278 1908->1931 1909->1908 1917 55652b3-55652ca 1910->1917 1918 556528c-55652b0 1910->1918 1922 55652e6-5565347 1911->1922 1923 55652e9-55652ed 1911->1923 1919 5565443 1912->1919 1913->1919 1934 55652cc-55652d2 1917->1934 1935 55652da-55652db 1917->1935 1918->1917 1919->1914 1932 556534c-5565350 1922->1932 1933 5565349-55653a2 1922->1933 1926 5565316-556532d 1923->1926 1927 55652ef-5565313 1923->1927 1944 556532f-5565335 1926->1944 1945 556533d-556533e 1926->1945 1927->1926 1931->1897 1938 5565352-5565376 1932->1938 1939 5565379-556539c 1932->1939 1946 55653a4-55653c8 1933->1946 1947 55653cb-55653ce 1933->1947 1934->1935 1935->1897 1938->1939 1939->1897 1944->1945 1945->1897 1946->1947 1947->1897
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271032608.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5560000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'q$4'q
                                                                      • API String ID: 0-1467158625
                                                                      • Opcode ID: 875fb1881d6d2bd31617bc096f56b05711283d31e47e57341f9bf972da97f04f
                                                                      • Instruction ID: 491b2215a9a534e2660df1f2b7b73508cc443819a63f0a927f6b8609dfa6a9ca
                                                                      • Opcode Fuzzy Hash: 875fb1881d6d2bd31617bc096f56b05711283d31e47e57341f9bf972da97f04f
                                                                      • Instruction Fuzzy Hash: EB91E070E00248DFDB18DFE9D4586EDBBB2BF49301F90922AE412B7250EB715981CF61

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1959 564ae7e-564ae7f 1960 564ae81-564ae97 1959->1960 1961 564ae99-564ae9c 1959->1961 1960->1961 1962 564ae9d-564aea6 1961->1962 1963 564ae3f-564ae56 1961->1963 1964 564aa45-564aa4b 1962->1964 1965 564aea7-564aeb4 1962->1965 1963->1964 1966 564aa54-564aa55 1964->1966 1967 564aa4d 1964->1967 1965->1964 1969 564aa5a-564aa87 call 5642e70 1966->1969 1970 564ad0b-564ad0c 1966->1970 1967->1969 1967->1970 1971 564ad14-564ad1b 1967->1971 1972 564aa97-564aa98 1967->1972 1973 564ab63-564ab74 1967->1973 1974 564ad1e-564ad62 1967->1974 1975 564aa9a-564aacc call 5642e70 1967->1975 1969->1964 1986 564aa89-564aa8f 1969->1986 1977 564acd0-564acd6 1970->1977 1972->1975 1973->1964 1974->1964 1975->1964 1984 564aad2-564aada 1975->1984 1982 564acdf-564acf8 1977->1982 1983 564acd8 1977->1983 1982->1964 1985 564acfe-564ad06 1982->1985 1983->1970 1983->1971 1983->1973 1987 564ab27-564ab50 call 564b700 1983->1987 1988 564ab97-564aba7 1983->1988 1989 564ade2-564ae3c 1983->1989 1990 564aadf-564ab00 1983->1990 1991 564ad88-564ae64 1983->1991 1984->1964 1985->1964 1985->1970 1986->1964 2001 564ab56-564ab5e 1987->2001 1988->1964 1989->1963 1990->1964 1993 564ab06-564ab0e 1990->1993 1996 564ac5a-564ac90 1991->1996 1997 564ae6a-564ae72 1991->1997 1993->1964 1996->1964 1996->1977 1997->1964 2001->1964
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %$'
                                                                      • API String ID: 0-2502232532
                                                                      • Opcode ID: ec73841716121797a8bda23651513bc41d6cab417c2400876c95fb404c739389
                                                                      • Instruction ID: 49c3bc38b1beeabfdcebef7c73c95ea0f221ca1b7b44f553c5e5c39b4efe5b78
                                                                      • Opcode Fuzzy Hash: ec73841716121797a8bda23651513bc41d6cab417c2400876c95fb404c739389
                                                                      • Instruction Fuzzy Hash: 9281F378A44218DFDB40CFA8D584ADDBBF2FB4D304F10912AE419AB795CB389886CF54
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (q$(q
                                                                      • API String ID: 0-2485164810
                                                                      • Opcode ID: d2f071ae6812a0634dd50988c7ab1580b0cc6bd59ba63c61e9a890e787f81a0b
                                                                      • Instruction ID: 04de5dc80970d30e36c56882b5405903ca2e743398d7bfe7161ded95fc7090de
                                                                      • Opcode Fuzzy Hash: d2f071ae6812a0634dd50988c7ab1580b0cc6bd59ba63c61e9a890e787f81a0b
                                                                      • Instruction Fuzzy Hash: A8519C317042059FEB15DF28E854AAE7BA2BFC4314B54816AE806CB3A1DF35DC42CBA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (q$Hq
                                                                      • API String ID: 0-1154169777
                                                                      • Opcode ID: 80a710768f3c6ac07de9a5ec4d4ba5720168f432c4e8f23c1679b6376f7bcb07
                                                                      • Instruction ID: 3c1a0ba00668325284853d34695c37ef0fd5feb64564649c383f6dc2d56d265d
                                                                      • Opcode Fuzzy Hash: 80a710768f3c6ac07de9a5ec4d4ba5720168f432c4e8f23c1679b6376f7bcb07
                                                                      • Instruction Fuzzy Hash: 41519930B002049FDB29AF78D455A2A77B2AFC5304B64896DE906DB3A1DE35EC42CB91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $$%
                                                                      • API String ID: 0-2062090959
                                                                      • Opcode ID: ab7af7d004dda0a9f013f3cc99fbb9ac58ed59af382cc1e44d324822fb954430
                                                                      • Instruction ID: 3a88583a67dca0b207bee61f145c682aadb39f043fe138a0867c65c0f4e91f38
                                                                      • Opcode Fuzzy Hash: ab7af7d004dda0a9f013f3cc99fbb9ac58ed59af382cc1e44d324822fb954430
                                                                      • Instruction Fuzzy Hash: 5371C174A44219DFDB40CFE8D684ADDBBF2FB49300F109129E419AB395CB389986CF54
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (q$Hq
                                                                      • API String ID: 0-1154169777
                                                                      • Opcode ID: 89f1c796f1de833566f843b7fd418084d60c14d8a917a6a43a592c1563925849
                                                                      • Instruction ID: ac5ed24e21f45b3c3614305b5bf0111a725e34d9989eb559e1a52d98c02baf65
                                                                      • Opcode Fuzzy Hash: 89f1c796f1de833566f843b7fd418084d60c14d8a917a6a43a592c1563925849
                                                                      • Instruction Fuzzy Hash: 2C51E1716047009FEB28DF3AE44435A77E2EFC4324F188A29E45ACB791DB74DD458BA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: * u$d%q
                                                                      • API String ID: 0-2585222517
                                                                      • Opcode ID: bd52f67240718602e0835c2b4c50d0447bd8496bd88c5ecbb4fe82565f26b0b7
                                                                      • Instruction ID: b9d514b8aa622fb727c8d998e7543b4d5117d0c64d82c22e2da323e8b8dcf554
                                                                      • Opcode Fuzzy Hash: bd52f67240718602e0835c2b4c50d0447bd8496bd88c5ecbb4fe82565f26b0b7
                                                                      • Instruction Fuzzy Hash: D5516C74A01219CFDB64DB68C945BAAB7F2BF49300F5481A9E40EE7395DB389D82CF41
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $-
                                                                      • API String ID: 0-1933255201
                                                                      • Opcode ID: 8fbb88df82bee41ce9bd59d03ad6bda848ebf0add28493c8e2924260c8823720
                                                                      • Instruction ID: 9864df3ee037e62493b0272236f5b643eb9b2c41f28694bf16dc06016f63a532
                                                                      • Opcode Fuzzy Hash: 8fbb88df82bee41ce9bd59d03ad6bda848ebf0add28493c8e2924260c8823720
                                                                      • Instruction Fuzzy Hash: 8BF05274D10258DFDB10CFA9D889BADBBF2BB04304F40619AE919B7781C7749985CF02
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ,q
                                                                      • API String ID: 0-196045463
                                                                      • Opcode ID: b5eab95425f9860a15ec4f5658b02093c893ac504efe74b941cf43f65781779a
                                                                      • Instruction ID: 2bbb0f44b5faf8c7d85d3095a15bbcaba0dad7df5bf7d6097dac5341c2b05426
                                                                      • Opcode Fuzzy Hash: b5eab95425f9860a15ec4f5658b02093c893ac504efe74b941cf43f65781779a
                                                                      • Instruction Fuzzy Hash: DC523C75A002289FDB24DF69C981BEDBBF6BF88300F1581D9E509AB351DA709D81CF61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (_q
                                                                      • API String ID: 0-3590916094
                                                                      • Opcode ID: dad224f6aa1b3a34acd7b7d77c57ea06d28f282764554f3100d32fe1da6f663d
                                                                      • Instruction ID: d14d39ccfdd7eee0c171c59b8cadcc52cc45bbe533cd3a7ce759730534f2e9c5
                                                                      • Opcode Fuzzy Hash: dad224f6aa1b3a34acd7b7d77c57ea06d28f282764554f3100d32fe1da6f663d
                                                                      • Instruction Fuzzy Hash: 49226D35B102089FDB14DFA8D495A6DBBF6BF88300F148169E906EB391DB72ED81CB51
                                                                      APIs
                                                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05909B67
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: CreateProcess
                                                                      • String ID:
                                                                      • API String ID: 963392458-0
                                                                      • Opcode ID: 1010725c2d8dee53097000e42c3bb473a9f285678012e14d60f8d966adf93e2b
                                                                      • Instruction ID: 263fb83d9ae7cf388a0a87e9656656b609f61cebacb071ca35bae6670b425614
                                                                      • Opcode Fuzzy Hash: 1010725c2d8dee53097000e42c3bb473a9f285678012e14d60f8d966adf93e2b
                                                                      • Instruction Fuzzy Hash: 06A10371D00228DFDF10CFA9C885BEEBBF1BB49310F14A56AE859A7281DB748985CF45
                                                                      APIs
                                                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05909B67
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: CreateProcess
                                                                      • String ID:
                                                                      • API String ID: 963392458-0
                                                                      • Opcode ID: a48b68d055f2cf6f69c785df87f5144d02145fa823cd992d6808721909935256
                                                                      • Instruction ID: f7b97af95503de2bf731ee33d3a51209ab54209d446711e98949e7ff3cbfd475
                                                                      • Opcode Fuzzy Hash: a48b68d055f2cf6f69c785df87f5144d02145fa823cd992d6808721909935256
                                                                      • Instruction Fuzzy Hash: 60A10270D00228DFDF10CFA9C885BEEBBF5BB49310F14A56AE859A7281DB748985CF45
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q
                                                                      • API String ID: 0-1301096350
                                                                      • Opcode ID: ba64372a5738066e508abd23910afbf74483c249a4e4237f498a1742129031c6
                                                                      • Instruction ID: 4f0bc88c2f7947a8945e7017f0dda75129d1b2f2e4867a9f09337e0e8869dee7
                                                                      • Opcode Fuzzy Hash: ba64372a5738066e508abd23910afbf74483c249a4e4237f498a1742129031c6
                                                                      • Instruction Fuzzy Hash: 80F1C1707142059FE714DF68D4916FABBE7AF94300F14812AE543DB3A1EAB5C9C2CB51
                                                                      APIs
                                                                      • CopyFileA.KERNEL32(?,?,?), ref: 056AE99B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273551941.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56a0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: CopyFile
                                                                      • String ID:
                                                                      • API String ID: 1304948518-0
                                                                      • Opcode ID: c3e82b13b22a73d748ab13e3dba898819e2353e672af59dddef647cfb876174c
                                                                      • Instruction ID: 36e0859e8eba4daa4ddaf7dcc3bec6101ce848a089e735beff12cc8fd8d97c96
                                                                      • Opcode Fuzzy Hash: c3e82b13b22a73d748ab13e3dba898819e2353e672af59dddef647cfb876174c
                                                                      • Instruction Fuzzy Hash: 1C610072D003189FEB14CFA9C9857EDBBF5BB08300F248129E859A7284DB799D81CF45
                                                                      APIs
                                                                      • CopyFileA.KERNEL32(?,?,?), ref: 056AE99B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273551941.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56a0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: CopyFile
                                                                      • String ID:
                                                                      • API String ID: 1304948518-0
                                                                      • Opcode ID: fc35c6cf2ea21f0ac10a71be8f87e6e2512db875f7219838203d6d8bdcb85a0d
                                                                      • Instruction ID: 3696c2f2458b62b6d48cfac53a6788158f6fed7c640d18cd4c292c0ec4187228
                                                                      • Opcode Fuzzy Hash: fc35c6cf2ea21f0ac10a71be8f87e6e2512db875f7219838203d6d8bdcb85a0d
                                                                      • Instruction Fuzzy Hash: 7B611071D003189FEB14CFA9C8857EDBBF5BB48300F208129E859A7280DB799D81CF85
                                                                      APIs
                                                                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0590C4D3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: MemoryProcessWrite
                                                                      • String ID:
                                                                      • API String ID: 3559483778-0
                                                                      • Opcode ID: 8c9069f1950bad00992080418d5d226959c0aee286da9fb51178335ed6eb26af
                                                                      • Instruction ID: 4737b596198215edac87237b02f7b76efd6e9df2de60291fb3c74bd76d6296df
                                                                      • Opcode Fuzzy Hash: 8c9069f1950bad00992080418d5d226959c0aee286da9fb51178335ed6eb26af
                                                                      • Instruction Fuzzy Hash: D841DCB5D012589FDF10CFA9D980AEEFBF1BB09310F10942AE818B7240C735AA05CF68
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: `Qq
                                                                      • API String ID: 0-2318545310
                                                                      • Opcode ID: 6664d1c258cf19155d8763bb77874fb7401a82bc25f45fb6193281a1225a8692
                                                                      • Instruction ID: 70ab900a38081af8a3683b4ccf0a7ab2157ff97288cd503bbadbb92a348d5a2d
                                                                      • Opcode Fuzzy Hash: 6664d1c258cf19155d8763bb77874fb7401a82bc25f45fb6193281a1225a8692
                                                                      • Instruction Fuzzy Hash: 97E16F31B003159FDB19DBA8C894B6EBBF2BF89300F258569E5159B3A5DB71EC41CB80
                                                                      APIs
                                                                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0590C4D3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: MemoryProcessWrite
                                                                      • String ID:
                                                                      • API String ID: 3559483778-0
                                                                      • Opcode ID: 994c7c66fa8552898b5f493ef3df5a37d328134bda0eb2c30301cbb8b361e6c0
                                                                      • Instruction ID: d2947d3d861b0e7902f5f653bc55dc6126a7b1f3d7d9bdf6366f722377f8f08a
                                                                      • Opcode Fuzzy Hash: 994c7c66fa8552898b5f493ef3df5a37d328134bda0eb2c30301cbb8b361e6c0
                                                                      • Instruction Fuzzy Hash: 4F41CCB5D012589FDF10CFA9D984AEEFBF1BB09310F10942AE815B7240D735AA45CF68
                                                                      APIs
                                                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0590C1DA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: AllocVirtual
                                                                      • String ID:
                                                                      • API String ID: 4275171209-0
                                                                      • Opcode ID: 8331d7ed348328e3f092a92977aa6b122b19b8227f7d9e47ac90d8a504ab4296
                                                                      • Instruction ID: 1eaef9de662feeb50ad50cc3353e5b448064e5183ff10bf003b11d02f8302bd1
                                                                      • Opcode Fuzzy Hash: 8331d7ed348328e3f092a92977aa6b122b19b8227f7d9e47ac90d8a504ab4296
                                                                      • Instruction Fuzzy Hash: 603195B9D042589FDF14CFA9D980ADEFBB5BB09310F10A42AE815B7350D735A906CF68
                                                                      APIs
                                                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0590C1DA
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: AllocVirtual
                                                                      • String ID:
                                                                      • API String ID: 4275171209-0
                                                                      • Opcode ID: bf5d317255209580f17736f965ab1d9dbf67c11cb6f8fd918dcda4a82a440102
                                                                      • Instruction ID: 0d581c6943eb5779bf3380c1740e82eb1fcab758feb20ecc70de0cb349ba4de4
                                                                      • Opcode Fuzzy Hash: bf5d317255209580f17736f965ab1d9dbf67c11cb6f8fd918dcda4a82a440102
                                                                      • Instruction Fuzzy Hash: BC3195B9D002589FDF14CFA9D980ADEFBB1BB09310F10A42AE815B7250D735A902CF68
                                                                      APIs
                                                                      • VirtualProtect.KERNELBASE(?,?,?,?), ref: 056A4BAC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273551941.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56a0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: 2038af24ea1552f1b6e822c903eb0278ed67d350263c3ae18c26a5baf4b4de5a
                                                                      • Instruction ID: 42fa16b0d142d16adef97f764dc71bc2aadf0709b179f8d2f2ffcf6e57561274
                                                                      • Opcode Fuzzy Hash: 2038af24ea1552f1b6e822c903eb0278ed67d350263c3ae18c26a5baf4b4de5a
                                                                      • Instruction Fuzzy Hash: FB31C8B5D012589FDF14CFAAD880AEEFBF1BB49310F14942AE815B7200C779A945CF68
                                                                      APIs
                                                                      • VirtualProtect.KERNELBASE(?,?,?,?), ref: 056A4BAC
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273551941.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56a0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: 9fde96d6b8892386af583e9e4f85188b8da68cf1709e987f2a204b7d80659f27
                                                                      • Instruction ID: 2d3d135815103f7c281fdb64f23e687d4b1c6c3c85d2c3e48f40b9aa1ab74c8f
                                                                      • Opcode Fuzzy Hash: 9fde96d6b8892386af583e9e4f85188b8da68cf1709e987f2a204b7d80659f27
                                                                      • Instruction Fuzzy Hash: EC31B8B9D012589FDF14CFA9D980AEEFBB1BB08310F14942AE815B7200C739A945CF68
                                                                      APIs
                                                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 0590BB87
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: ContextThreadWow64
                                                                      • String ID:
                                                                      • API String ID: 983334009-0
                                                                      • Opcode ID: de9a892efa375a53b0b91d6fa9780503ee62ad66da6915f1b5b0c25c9e8ebb0d
                                                                      • Instruction ID: 92515096e73a7205a6662e83e8868700740eeedef27de9a3841284c795e442ca
                                                                      • Opcode Fuzzy Hash: de9a892efa375a53b0b91d6fa9780503ee62ad66da6915f1b5b0c25c9e8ebb0d
                                                                      • Instruction Fuzzy Hash: 4041CBB5D012589FDF14DFAAD884AEEFBF5BB48310F14942AE414B7240C738A949CF68
                                                                      APIs
                                                                      • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0567DA3C
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273098398.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5670000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: 34e27a35b85a9d7fcf8ba7093c1ed120adacaf68c7c438de1f47ffd76b81155b
                                                                      • Instruction ID: 13cddb62cc87757101476801299a040bba1e2a59f7e97eac682cc40c557ed2f7
                                                                      • Opcode Fuzzy Hash: 34e27a35b85a9d7fcf8ba7093c1ed120adacaf68c7c438de1f47ffd76b81155b
                                                                      • Instruction Fuzzy Hash: 7A3195B9D052489FDF14CFA9D980A9EFBF1BB09310F14942AE815B7210D735A945CF68
                                                                      APIs
                                                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 0590BB87
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: ContextThreadWow64
                                                                      • String ID:
                                                                      • API String ID: 983334009-0
                                                                      • Opcode ID: d492feee817b739492a666b33bb3e1ab840461ba5e1d1d618fae0881784b2ef7
                                                                      • Instruction ID: 6aa6256e095b053bf0ab359ba3ff814657b8dd3820ce591e9821370fe9dde0ad
                                                                      • Opcode Fuzzy Hash: d492feee817b739492a666b33bb3e1ab840461ba5e1d1d618fae0881784b2ef7
                                                                      • Instruction Fuzzy Hash: D331CAB5D012589FDB14DFAAD884AEEFBF5BB48310F14942AE418B7240C738A945CF68
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: @
                                                                      • API String ID: 0-2766056989
                                                                      • Opcode ID: dfde73e5af4e145c60f0230dad884c4f047dded76f96382fed7f7f2019275d31
                                                                      • Instruction ID: c18f625f420596b4e8a31693f5931b94993777d8042b72805d18beba54bca221
                                                                      • Opcode Fuzzy Hash: dfde73e5af4e145c60f0230dad884c4f047dded76f96382fed7f7f2019275d31
                                                                      • Instruction Fuzzy Hash: AFF1F378A04229CFDB64DF64C854BADBBF2BB49304F2080A9E50EA7795DB345E85CF11
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (q
                                                                      • API String ID: 0-2414175341
                                                                      • Opcode ID: c017977723d816402fcbdacacc6c1b4db50080ede05237e8e82b72e328a00b4b
                                                                      • Instruction ID: a36ff521d84aae8e3b395bec632f7dafab1c227a0fc673f1f5841e3ec0351e4e
                                                                      • Opcode Fuzzy Hash: c017977723d816402fcbdacacc6c1b4db50080ede05237e8e82b72e328a00b4b
                                                                      • Instruction Fuzzy Hash: EBA1A2317042009FDB169F68D854E6A7BB3FF89300F1585A9E5068B7A2DB76EC42DB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: @
                                                                      • API String ID: 0-2766056989
                                                                      • Opcode ID: d56375434f8ac9d62311f6e01025d6373200a8928bf957131a1237abb56511eb
                                                                      • Instruction ID: c8ae736484d12b20af142081a28205deede80694ecd54efeb1238b461b363a2a
                                                                      • Opcode Fuzzy Hash: d56375434f8ac9d62311f6e01025d6373200a8928bf957131a1237abb56511eb
                                                                      • Instruction Fuzzy Hash: 74C1DE78A04229DFDB64DF24C854BDABBB2BB49304F1081EAE50EA7784DB345E85CF51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'q
                                                                      • API String ID: 0-1807707664
                                                                      • Opcode ID: da802baef5fecfc13c00121de695360b88319f77fc67f9539f88b81949ff1ab5
                                                                      • Instruction ID: 2a1773d3ec5ebd7ca1fd81cb9e43cde68d8c6605ced23066bd5904c57841b34c
                                                                      • Opcode Fuzzy Hash: da802baef5fecfc13c00121de695360b88319f77fc67f9539f88b81949ff1ab5
                                                                      • Instruction Fuzzy Hash: F6A1DC34B10218DFDB04DFA4D898AADBBB2FF89300F558559E405AB365DB70EC86CB54
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: 71ed24ddffa02f65f63ef58d362e4dcd58947b0a71854155a2f3cd8f64272d2e
                                                                      • Instruction ID: d6efbcc6f0973c59b5191bb5b79fbcbfd3402224af81d3f3e9c5688460394566
                                                                      • Opcode Fuzzy Hash: 71ed24ddffa02f65f63ef58d362e4dcd58947b0a71854155a2f3cd8f64272d2e
                                                                      • Instruction Fuzzy Hash: 2B91E474E04218DFDB44CFA9C944ADEBBF2FB89300F109129E419AB395CB389886CF54
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: dcff94721aac6851e3c249bec4b561bfaeec613234987021720468104ba25440
                                                                      • Instruction ID: 14392be81e9cfcce4942fc31422223da4c1734c349b107789080382b563d2af9
                                                                      • Opcode Fuzzy Hash: dcff94721aac6851e3c249bec4b561bfaeec613234987021720468104ba25440
                                                                      • Instruction Fuzzy Hash: 1E913475A40219EFDB40CFE8C985A9DBBF2FB49310F549129E419AB385DB389886CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: E
                                                                      • API String ID: 0-3015059025
                                                                      • Opcode ID: 824418b2841e771ec33f739120d1a114c796f1956d1d8b1ddbd021c88d1719e8
                                                                      • Instruction ID: 57932e46fca1833db0890f45cc3161839d4a978d17892d941ff681ebdd115523
                                                                      • Opcode Fuzzy Hash: 824418b2841e771ec33f739120d1a114c796f1956d1d8b1ddbd021c88d1719e8
                                                                      • Instruction Fuzzy Hash: ED71B171A041558FDB19CB68C8906ACFBF2FB49300F1A86AAD456EB343D334ED46CB91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: 7f6abc31fef2d687195989c8f7fcb4827e467d578fcf756b7947faa99933a5a8
                                                                      • Instruction ID: 4bdaab0055c63a238073029f6d5cb1d0bcf148aae1c92f0c7ca087d634e30f33
                                                                      • Opcode Fuzzy Hash: 7f6abc31fef2d687195989c8f7fcb4827e467d578fcf756b7947faa99933a5a8
                                                                      • Instruction Fuzzy Hash: 1B81F574E44218DFDB44CFA9C944ADEBBF2FB89300F109129E819AB355DB389986CF54
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: T`
                                                                      • API String ID: 0-1151632334
                                                                      • Opcode ID: 377b1398723379cc2bb4debde54be272f8a2cb39b602943b1be97bbb2f668c26
                                                                      • Instruction ID: 2fcc21259fb7586fb1809f67da52bcee9ac075392486204921217c4f1e2adb8f
                                                                      • Opcode Fuzzy Hash: 377b1398723379cc2bb4debde54be272f8a2cb39b602943b1be97bbb2f668c26
                                                                      • Instruction Fuzzy Hash: FB614E70204B028FD729DF29C49062AB7F2AF99314F14CA2DC49B87BA6D774F9478B51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: 1a60942bc52f8908ff44af673e22a9665a53b69961a2fe855eea01800137799a
                                                                      • Instruction ID: e812b51b5a1ed52f20e4a2595ec79f541e70785f254e26d8e6902a3b8cb2361d
                                                                      • Opcode Fuzzy Hash: 1a60942bc52f8908ff44af673e22a9665a53b69961a2fe855eea01800137799a
                                                                      • Instruction Fuzzy Hash: B071CF74A44219DFDB40DFE8D684AADBBF2FB49300F109119E419AB395CB389986CF64
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: 924dbc9d5173020a5117bd5d4ce1c305369f9d980f46ce28ee7464b79e9f8fd2
                                                                      • Instruction ID: 345cff204b0b7ab062d699b37b76e20971237c51d11f2210ba49ce9188bcef68
                                                                      • Opcode Fuzzy Hash: 924dbc9d5173020a5117bd5d4ce1c305369f9d980f46ce28ee7464b79e9f8fd2
                                                                      • Instruction Fuzzy Hash: 7371D374A44219DFCB40DFE8D684ADDBBF2FB49304F109129E819AB355DB389886CF54
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: TJq
                                                                      • API String ID: 0-48878262
                                                                      • Opcode ID: 3c3445de58d4f53c3b2c940a1ed52f2a9988ca89747d481ad8c7f726cdf72c2c
                                                                      • Instruction ID: 7fb152200665cd6f1db12493cdc52da4457403fe488199f3bde972692e858965
                                                                      • Opcode Fuzzy Hash: 3c3445de58d4f53c3b2c940a1ed52f2a9988ca89747d481ad8c7f726cdf72c2c
                                                                      • Instruction Fuzzy Hash: DA713574E042098FDB04EFA9E54569EBBF6FF89304F209029E416B7394DB385985CF51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: 1a68c3eb9a5ab93c9d279349cecb0f678f32fb3d38463fa7a8c21aeedb71cde8
                                                                      • Instruction ID: 357a47a3eee1ceeff07999820bb862c2e17d1ffe9bffbe026906dc6009ab14b1
                                                                      • Opcode Fuzzy Hash: 1a68c3eb9a5ab93c9d279349cecb0f678f32fb3d38463fa7a8c21aeedb71cde8
                                                                      • Instruction Fuzzy Hash: 4771B378A44219DFDB40CFA8D584ADDBBF2FB4D310F109119E419AB395CB389986CF54
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: 6647fb87d9c04623f8d54584a08182cfc60e987ecee383fef196d4bbd9acf8d1
                                                                      • Instruction ID: 08df81abdbf69957ea236b61762f8cb1b2d86134a1a4f01579e060c9667804b6
                                                                      • Opcode Fuzzy Hash: 6647fb87d9c04623f8d54584a08182cfc60e987ecee383fef196d4bbd9acf8d1
                                                                      • Instruction Fuzzy Hash: 0D71B178A44219DFDB40DFA8D584ADDBBF2FB49300F109129E819AB395CB389986CF54
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: 454008deb1f457dab689069d2d479ff1505f9ebedcf308b3ffe48be9789435cf
                                                                      • Instruction ID: 309ff7d5044de0fc0d17c9f9165d9e216e303ef36536a4ab09230ad713c185b5
                                                                      • Opcode Fuzzy Hash: 454008deb1f457dab689069d2d479ff1505f9ebedcf308b3ffe48be9789435cf
                                                                      • Instruction Fuzzy Hash: 1561B174A44219DFDB40CFA8D684ADDBBF2FB49300F109129E419AB395CB38A986CF55
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: 56068a0dca88351897180df522a40c95329c24172b8a0e3894e753636da992e4
                                                                      • Instruction ID: d6eab95623b8c8e85e6545488f4f69cadf75b3ba0a01091c53ae2ec2aa16c369
                                                                      • Opcode Fuzzy Hash: 56068a0dca88351897180df522a40c95329c24172b8a0e3894e753636da992e4
                                                                      • Instruction Fuzzy Hash: 0561B174A44219DFDB40CFE8D684ADDBBF2FB49300F109129E419AB395CB389986CF54
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (q
                                                                      • API String ID: 0-2414175341
                                                                      • Opcode ID: 1c91cfbeb1906348d2094218ea8ee598a6feefaa095f214069620dd96a9add1f
                                                                      • Instruction ID: df961727ad5d37fb7f496a97bd2dbad4a161195a03ee02d1737fa5f1d3255ed3
                                                                      • Opcode Fuzzy Hash: 1c91cfbeb1906348d2094218ea8ee598a6feefaa095f214069620dd96a9add1f
                                                                      • Instruction Fuzzy Hash: 9D51B075B006168FCB04DF68C484A6AFBB5FF89320F59866AE915DB281D731EC52CBD0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: pq
                                                                      • API String ID: 0-153521182
                                                                      • Opcode ID: c2402255977bf114b13075724ee739e523772da062e919ddd26093569c40b733
                                                                      • Instruction ID: b82fdf48d28188694224f488045a65f2e93f6bdf83d23d5ac4905e1836a57607
                                                                      • Opcode Fuzzy Hash: c2402255977bf114b13075724ee739e523772da062e919ddd26093569c40b733
                                                                      • Instruction Fuzzy Hash: E1515D76600104AFCB459FA8D905E69BBF3FF8D3147198098E6099B372DA36DC22EB51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'q
                                                                      • API String ID: 0-1807707664
                                                                      • Opcode ID: e41045c7afd3b1e5c7e66dc12a66ad343f306a43be48d663a51b2b9957215440
                                                                      • Instruction ID: e2ddf913681ce91912f461237a5e754fed1e32cd8dd26572db07abeca3c5ae5c
                                                                      • Opcode Fuzzy Hash: e41045c7afd3b1e5c7e66dc12a66ad343f306a43be48d663a51b2b9957215440
                                                                      • Instruction Fuzzy Hash: 7241A5347106149FDB15AB64C468AAEB7F7EFC9700F10491DE402AB3A4CFB0AC86CB95
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'q
                                                                      • API String ID: 0-1807707664
                                                                      • Opcode ID: 8fe70f3d909320cfdc30d8dab2195cda2758ee3452500adff919d785547d5f1b
                                                                      • Instruction ID: abf9469ac83d2e0c3da77ca2c0e1fc723b9dcd9384ab9179870aefefab54ac8e
                                                                      • Opcode Fuzzy Hash: 8fe70f3d909320cfdc30d8dab2195cda2758ee3452500adff919d785547d5f1b
                                                                      • Instruction Fuzzy Hash: 45417C717006009FE719DB25D858B6BB7E6EFC8B04F144568E60A8F7A1CE71EC82C7A4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'q
                                                                      • API String ID: 0-1807707664
                                                                      • Opcode ID: 33a767b797201e84af72e3e15271b1c331c7a36c45873381eec62815573648b5
                                                                      • Instruction ID: 5e0db67979af4969c2bf227f952c66256aeb282c06a48cf85c36953784ebe14d
                                                                      • Opcode Fuzzy Hash: 33a767b797201e84af72e3e15271b1c331c7a36c45873381eec62815573648b5
                                                                      • Instruction Fuzzy Hash: 76316D717006049FE318DB25D498F6BB7A6EFC8B10F104568E50A8B7A5CE71EC42C7A4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'q
                                                                      • API String ID: 0-1807707664
                                                                      • Opcode ID: fd18c135d3a202712a1c091b08183d35337d9bf7ce8710a8f74189f82cec2bac
                                                                      • Instruction ID: fe6674fb5e17fe2da19f6788432969928e6510737dd404b1c5c061b8dedf76b1
                                                                      • Opcode Fuzzy Hash: fd18c135d3a202712a1c091b08183d35337d9bf7ce8710a8f74189f82cec2bac
                                                                      • Instruction Fuzzy Hash: 3431B075B002049FCF24DF64D8949ADBBB3FF88320B044969E50A9B271DE71DC86CB50
                                                                      APIs
                                                                      • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 0567EB6F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273098398.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5670000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID: AllocVirtual
                                                                      • String ID:
                                                                      • API String ID: 4275171209-0
                                                                      • Opcode ID: 2af2b7c07ac122e4f9723efd993043dd9ba580ec532c5498ca56ecb0ec10e22e
                                                                      • Instruction ID: 882986f29ba828692a6a5dc09a7d085d00ac49385a3b45199dc7f4c3e9fbd67e
                                                                      • Opcode Fuzzy Hash: 2af2b7c07ac122e4f9723efd993043dd9ba580ec532c5498ca56ecb0ec10e22e
                                                                      • Instruction Fuzzy Hash: 6F31A7B9D012489FDF14CFA9D980ADEFBB5BB49310F10942AE815B7310C735A945CFA8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (q
                                                                      • API String ID: 0-2414175341
                                                                      • Opcode ID: 9bacba33ca552cf52f45122aad8ca1b66ba422f79a9d7fbec06c6175ba14fa29
                                                                      • Instruction ID: a8967f2e193224097ce77edeaddd3f0c6a70129fd198c5b13982a7e0ae880a25
                                                                      • Opcode Fuzzy Hash: 9bacba33ca552cf52f45122aad8ca1b66ba422f79a9d7fbec06c6175ba14fa29
                                                                      • Instruction Fuzzy Hash: D921C1367052056BDB199F68E840AAA7BA6EFC9311B54403AF909DB350DE358C12C790
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'q
                                                                      • API String ID: 0-1807707664
                                                                      • Opcode ID: 3510aa1614ad6124f5f6616ca27a55cbc78ff2b264285696acd27354ec43a732
                                                                      • Instruction ID: 8efb452bbcd6e8b2140b10084011c637d8bf1b97bed330ae45d189bea70a21fc
                                                                      • Opcode Fuzzy Hash: 3510aa1614ad6124f5f6616ca27a55cbc78ff2b264285696acd27354ec43a732
                                                                      • Instruction Fuzzy Hash: CE21A1356002049FCF149F94D864EADBBB3FF8C310B0545A9E90AAB361DA31DC56CB50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: p<q
                                                                      • API String ID: 0-3896934649
                                                                      • Opcode ID: 342ca950f3983664b540d8f433a92e68b7628cb067a9ca03787c9fb2bdd808f1
                                                                      • Instruction ID: a042fce1c2b4da8890ec0b600b63c8bd085081c774efc3b344120d726db3894b
                                                                      • Opcode Fuzzy Hash: 342ca950f3983664b540d8f433a92e68b7628cb067a9ca03787c9fb2bdd808f1
                                                                      • Instruction Fuzzy Hash: 68213D713041599FDB19CF2EC840AAA7BF5AF8A310B454095FD64CB361CB31DC52CB61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: H]
                                                                      • API String ID: 0-3824539953
                                                                      • Opcode ID: d681e77eb19c6d38b253af2f16ffb8e08abd49bbadd87d682d0a3f7e4362ad5f
                                                                      • Instruction ID: 8c48d0b6dac847e2e64f0e8930bfcd8900cfaa479c6589c05e1b2a7f500f8157
                                                                      • Opcode Fuzzy Hash: d681e77eb19c6d38b253af2f16ffb8e08abd49bbadd87d682d0a3f7e4362ad5f
                                                                      • Instruction Fuzzy Hash: 9F218134B00204EFCB05DFA9D49599DBBF2FF89310B29806DE502A73A1DB315D46CB51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 8q
                                                                      • API String ID: 0-4083045702
                                                                      • Opcode ID: 0b30c6af12871323b6bbafef2605d63868914fcb304a243fd5feba7dff8fa078
                                                                      • Instruction ID: 94456d9b34297539ae9aa298cf8193c86544f7eeceee12fbe92c296d2e3a3bb8
                                                                      • Opcode Fuzzy Hash: 0b30c6af12871323b6bbafef2605d63868914fcb304a243fd5feba7dff8fa078
                                                                      • Instruction Fuzzy Hash: D101D438D04308DFCB19AF68D4405B87BF5AB8E208B014096F045AB7A1D7345E858B93
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: E
                                                                      • API String ID: 0-3015059025
                                                                      • Opcode ID: 39a06f67b825532e5757da366347050a5694d72412e3b18aa1639cc01a9cc0b2
                                                                      • Instruction ID: 5d8be65a59784b253fc8616994ac4860252f8637fd8e2f4b0cd983a816828591
                                                                      • Opcode Fuzzy Hash: 39a06f67b825532e5757da366347050a5694d72412e3b18aa1639cc01a9cc0b2
                                                                      • Instruction Fuzzy Hash: B8F0C27160D3C48FC71B8BA8D550288FFB15F56300F1A80D2D085DB393D2248C4AC762
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: k
                                                                      • API String ID: 0-140662621
                                                                      • Opcode ID: 4399c433df5bbe0015e3a60c3e07a6c390c080796535070a873c6ef69aa1ac47
                                                                      • Instruction ID: 7537a6e982b21bc1100c35aa51b48f67b4b5c54b0fe9d4e0a0e0e84ea634d1e0
                                                                      • Opcode Fuzzy Hash: 4399c433df5bbe0015e3a60c3e07a6c390c080796535070a873c6ef69aa1ac47
                                                                      • Instruction Fuzzy Hash: AE11F77490011ACFDB60DF24C984BA9B7B1BB48304F1080E6D819A3784DF345EC5DF51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: E
                                                                      • API String ID: 0-3015059025
                                                                      • Opcode ID: 600cb7489795e72bb658a3fcc9151e7b08a0f96e3f7eb5a65c717eef0b93a095
                                                                      • Instruction ID: 1e603afd2d52c3f88964a727943dea46a37739061b263d11ec70180f381aca21
                                                                      • Opcode Fuzzy Hash: 600cb7489795e72bb658a3fcc9151e7b08a0f96e3f7eb5a65c717eef0b93a095
                                                                      • Instruction Fuzzy Hash: 5BF0B4B160D3848FC71A8BA8D95028DFFB1AF56300F1A8092D081DB3D3C7248C46C756
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (
                                                                      • API String ID: 0-3887548279
                                                                      • Opcode ID: bdb5f5a12508284a28286b171b3c82d364fd2a2bc0ba9a4ffe6d2ce26275c8bb
                                                                      • Instruction ID: 74ed20ec4f7194ed8fe1f2c63383923b4353bfad0055ac5bf437929060a911ba
                                                                      • Opcode Fuzzy Hash: bdb5f5a12508284a28286b171b3c82d364fd2a2bc0ba9a4ffe6d2ce26275c8bb
                                                                      • Instruction Fuzzy Hash: 4AE0DF3451965A9FDB629B38C8889ADBBB5FF06300F0001D5E005A7156CF3C8E43CF02
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Teq
                                                                      • API String ID: 0-1098410595
                                                                      • Opcode ID: b04b8c7ab28e3ffa22b121613c143ac80ac611d67a90e512fa768d5b16a28810
                                                                      • Instruction ID: 7473c227a646f0890dcbe950f208b1f2fe2beb25a2ca00fc2ad21be9287a84b6
                                                                      • Opcode Fuzzy Hash: b04b8c7ab28e3ffa22b121613c143ac80ac611d67a90e512fa768d5b16a28810
                                                                      • Instruction Fuzzy Hash: CDF09874A0025DCFDB64DF64D895BDDB7B1AB49304F1090D69809B7385CA345E85CF61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 2
                                                                      • API String ID: 0-450215437
                                                                      • Opcode ID: 848fbfc4ddd04bf78ff04db4065a3d2dc52363438bc7086e6ff5fe4e3eaf6150
                                                                      • Instruction ID: 128ddce3a49edc343d3e3fbbf3cd2c8d47c7c2b03a9c67aa66701b6eeefa89c9
                                                                      • Opcode Fuzzy Hash: 848fbfc4ddd04bf78ff04db4065a3d2dc52363438bc7086e6ff5fe4e3eaf6150
                                                                      • Instruction Fuzzy Hash: 85F05274A10219AFDB50CF28C981B9EB7F5FF4A204F108295A95DE7305DB70AE89CF52
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: E
                                                                      • API String ID: 0-3015059025
                                                                      • Opcode ID: 8f380446da6cf9c53df4cb8543c8b403c6233cb730f1129ed8368aba4fdb8bc4
                                                                      • Instruction ID: f52ec1fd6e91537de46268f6ab199dc13ba650e0ca3a1714fc5fd6e043b01565
                                                                      • Opcode Fuzzy Hash: 8f380446da6cf9c53df4cb8543c8b403c6233cb730f1129ed8368aba4fdb8bc4
                                                                      • Instruction Fuzzy Hash: 2CD02B217091104FC70B277478000DC9B769FC13107054063D041AE3D7CB24458A4392
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: \
                                                                      • API String ID: 0-2967466578
                                                                      • Opcode ID: fd973ecf5eefa1bc574100da9078a89d6d61370de29f31b08c23fee9ccc9208f
                                                                      • Instruction ID: 5f3f684b6f4f8858051c724280199f1226ec5d19b2c2adfd48687282581ecc7c
                                                                      • Opcode Fuzzy Hash: fd973ecf5eefa1bc574100da9078a89d6d61370de29f31b08c23fee9ccc9208f
                                                                      • Instruction Fuzzy Hash: E7E09274910268DFDB25CF94ED84F9DBAB5BB04744F0099DAE90A73284CBB40A84CF40
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: '
                                                                      • API String ID: 0-1997036262
                                                                      • Opcode ID: f1057855a4505cd16fbf9d4c11945d893c1865b9baca09baee32c1eea404f7af
                                                                      • Instruction ID: 0ad3764071a0963223e5aaeab00c33247f61d8e08afd76ede4c5beb044ebf051
                                                                      • Opcode Fuzzy Hash: f1057855a4505cd16fbf9d4c11945d893c1865b9baca09baee32c1eea404f7af
                                                                      • Instruction Fuzzy Hash: 81E09978A042188FDB10DFA4D64578DBAF2AB4A300F5050AAD809A7384DB384A868F02
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: \
                                                                      • API String ID: 0-2967466578
                                                                      • Opcode ID: c8ce460f46de386346c6023d59938821f7ca7fe8024a804502e59fedda178797
                                                                      • Instruction ID: 17ca68d948d7dc8ae79ebb24a6f37a74be4261ac754989d7ea5c0c1a2d8b4ee4
                                                                      • Opcode Fuzzy Hash: c8ce460f46de386346c6023d59938821f7ca7fe8024a804502e59fedda178797
                                                                      • Instruction Fuzzy Hash: CDE09274A10668CFDB65CB68E848A9DB6B1BB04204F1095E6A50AB7251DB740E94CF00
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: toq
                                                                      • API String ID: 0-207910900
                                                                      • Opcode ID: 947d8487e29df23865e45af95143537b3c75a0ca042ec4ecc4a8b52d08adb495
                                                                      • Instruction ID: 03ef8dd66c4dd80bda5343d95a74c4b662579704d9471235e2c0d5a480976a9d
                                                                      • Opcode Fuzzy Hash: 947d8487e29df23865e45af95143537b3c75a0ca042ec4ecc4a8b52d08adb495
                                                                      • Instruction Fuzzy Hash: 3FC04C12B555155B525C7375001233E00E627CD2907AE5569A44BDB385EF145D43C397
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 43363ab35af73a58479b2d3fd3563e90a911dde9909b28c794c3e8b4ec2aace0
                                                                      • Instruction ID: 7431600998d9bbdb53c254decb820806626c9010af34078099d507a966d506d5
                                                                      • Opcode Fuzzy Hash: 43363ab35af73a58479b2d3fd3563e90a911dde9909b28c794c3e8b4ec2aace0
                                                                      • Instruction Fuzzy Hash: 2E12C834B102198FDB14EF64C894AADB7B2FF89300F5186A9D44AAB365DF70ED85CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ed406f437b91ddc263ca1ac27ce05e1bfc591876a09482ad61b6b429b0363374
                                                                      • Instruction ID: 437895fd0121222ad326ecb1e4a10b1eea90713f5c9e3399e87ed127a59746e6
                                                                      • Opcode Fuzzy Hash: ed406f437b91ddc263ca1ac27ce05e1bfc591876a09482ad61b6b429b0363374
                                                                      • Instruction Fuzzy Hash: 3FA17C35B012099FCB18CF65E555AADBBB2FF89315F188169E812DB391CB32DD42CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b6e9898c9b337bb3dcd9107b47f1362d0a209454a51b9a85808f8cacd3d5b76c
                                                                      • Instruction ID: fbff9db98f90d2d8175008ff3036b2640215b89ed64d8a9d931bcae25cd6ea2d
                                                                      • Opcode Fuzzy Hash: b6e9898c9b337bb3dcd9107b47f1362d0a209454a51b9a85808f8cacd3d5b76c
                                                                      • Instruction Fuzzy Hash: C7814A31B106149FDB54DF68D898AADBBB6FF88700F548569E406DB3A1CB70ED81CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2a7d0eda0814ec7beac8156daa94a060b33b4c052cbdf25917533ee5afc07497
                                                                      • Instruction ID: 9e7d3f627e4ba34b3bff20b12d308ae7118e8b2156c4ea598530aa5708821bdb
                                                                      • Opcode Fuzzy Hash: 2a7d0eda0814ec7beac8156daa94a060b33b4c052cbdf25917533ee5afc07497
                                                                      • Instruction Fuzzy Hash: FC812675A00618CFDB24DF68C484A9EB7F6FF89710B1581A9E8169B760DB30EC42CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e739569badbd5f69618c4cac65b5dc1e9cca1bd6de02ac1f8e26978692d716fb
                                                                      • Instruction ID: 295d46f26e7fcb43ccab4577c4408a71f2f146c471dbc72519052d875e5c3ecc
                                                                      • Opcode Fuzzy Hash: e739569badbd5f69618c4cac65b5dc1e9cca1bd6de02ac1f8e26978692d716fb
                                                                      • Instruction Fuzzy Hash: 3F71E3B4E00649CFDB08CF99C484AAEBBF2FF89314F149129D815A7755D734A986CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 36b45c1f2ed104fe107a2d6bf45595470d744783f8d0fe1689052dac0a45942c
                                                                      • Instruction ID: cb325e8cf05b1d81e20730700f87a994ffadd143c13181ef2682478dea959083
                                                                      • Opcode Fuzzy Hash: 36b45c1f2ed104fe107a2d6bf45595470d744783f8d0fe1689052dac0a45942c
                                                                      • Instruction Fuzzy Hash: A6614F35B10514DFDB54DF68C898AADB7B6FF88700F108569E4069B361CB70ED81CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a0912901af95d96fa1578b07bc50d09a8ac44fd8e60c99e7cfc8bb196a1890ed
                                                                      • Instruction ID: cf26af672c36375bdbb8eea8eacab3ea20aed9ca2d4ba05c6d427f67b22f7ba1
                                                                      • Opcode Fuzzy Hash: a0912901af95d96fa1578b07bc50d09a8ac44fd8e60c99e7cfc8bb196a1890ed
                                                                      • Instruction Fuzzy Hash: 5971F774E002198FDB14DFA9D585A9DBBF2FB88304F20802AE819B7795DB385D85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 571226840d781479dea32bf3867e620fcd4251064b7d70509cc0ba95a5583982
                                                                      • Instruction ID: d628342b31b86fb99795c9cea825f5530c91fb97e747218ecab748a13b0d2689
                                                                      • Opcode Fuzzy Hash: 571226840d781479dea32bf3867e620fcd4251064b7d70509cc0ba95a5583982
                                                                      • Instruction Fuzzy Hash: B4511474D05218CBDF04CFA9E486BAEBBF6FB48305F109129E519A7790DB745985CF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 924c09d4ded8baf53e9f43fcfefc74a7035c1e9ead06f892d33a990b3ceaf0b8
                                                                      • Instruction ID: 7cef0aaa9349b4dcc8f2fdf023fa487ec285861aba029807e28d15c2e2f0bac7
                                                                      • Opcode Fuzzy Hash: 924c09d4ded8baf53e9f43fcfefc74a7035c1e9ead06f892d33a990b3ceaf0b8
                                                                      • Instruction Fuzzy Hash: 3F513774D05208DBDF04CF95E4867AEBBF6FB88305F208129E519A3390DB745986CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c13eefd388f60238feb788432efaefd9ee66bc68828c314a9cfcec066cc97d6a
                                                                      • Instruction ID: d9c257636698187b0e730346fed58eebdb7a96d48e1f9967b3a431d41df5ad9a
                                                                      • Opcode Fuzzy Hash: c13eefd388f60238feb788432efaefd9ee66bc68828c314a9cfcec066cc97d6a
                                                                      • Instruction Fuzzy Hash: 2551B531A08295FFCB1CAF59D8449BEBBF1BB80310716866AD4569B700E730EA458793
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 47b41b48a464270155980d0d0bc3d63bf0e72b83b80fef32e7e822a9f9a6ce3d
                                                                      • Instruction ID: a64e8b8f59e9753843212bcef9676ca400b6df6e30aff398117ea7d117be9111
                                                                      • Opcode Fuzzy Hash: 47b41b48a464270155980d0d0bc3d63bf0e72b83b80fef32e7e822a9f9a6ce3d
                                                                      • Instruction Fuzzy Hash: E461F774E002198FEB14DFA9D58569DBBF2FB88304F20802AE819B7795DB385D85CF61
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 98c269f62783ae8badf706cce2dd3dbf4f5d12a728b7242742dbf7de9cec33a8
                                                                      • Instruction ID: 593e59410356450f47ef03edfc87ada071aded26adca5bd11c1ffb25bdc06b0c
                                                                      • Opcode Fuzzy Hash: 98c269f62783ae8badf706cce2dd3dbf4f5d12a728b7242742dbf7de9cec33a8
                                                                      • Instruction Fuzzy Hash: C2516034B10609AFDB04EF65E8A9AAE7BB6FFC8701F008519F50297364DF749946CB81
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 26b9b98d998b76175ec10787453213dbd6c44fa5dc2d4ba63cac187f9eddd5d0
                                                                      • Instruction ID: f33f30808275487285cb1d3915c1116c0da55cbde0bce73547ff27ae9584ddd5
                                                                      • Opcode Fuzzy Hash: 26b9b98d998b76175ec10787453213dbd6c44fa5dc2d4ba63cac187f9eddd5d0
                                                                      • Instruction Fuzzy Hash: 30516770A05228CFEB14DF64DA58BADBBF2FB49314F209169C50EAB7A1D7344981CF41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 376377dbf897a5b5c39508c970bf3d099233a7857fa5e93ed2e5f4693b769275
                                                                      • Instruction ID: bfb21c6975c7594fc6ee6130c691bc467ce86a291cfc6124cc7e91442ad8955e
                                                                      • Opcode Fuzzy Hash: 376377dbf897a5b5c39508c970bf3d099233a7857fa5e93ed2e5f4693b769275
                                                                      • Instruction Fuzzy Hash: 9E514B74E00109DFDB04DFA5E584AADBBF6FB89308F509069E019A7799CB786941CF60
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 86e61620ac487a8db74630f1fe717dfbdede327ebc755875e80b52f62d469902
                                                                      • Instruction ID: af6cbe1a73772268abffe96672ef7c308521e9b3eed5916253609bb6370ff486
                                                                      • Opcode Fuzzy Hash: 86e61620ac487a8db74630f1fe717dfbdede327ebc755875e80b52f62d469902
                                                                      • Instruction Fuzzy Hash: 3D418E35A007049FDB20CF69C944AAABBF2FF88300F14896DD58697B60D770E945CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f3967192d2bdf853ce6e00c4abed21eaee2b03c4343e4b1e151506055afa5ef2
                                                                      • Instruction ID: db56a5e7dd50552ad3f76ff2b11aa2e7069f58a2da481672476e36bdb1be2ec4
                                                                      • Opcode Fuzzy Hash: f3967192d2bdf853ce6e00c4abed21eaee2b03c4343e4b1e151506055afa5ef2
                                                                      • Instruction Fuzzy Hash: 8E413B34B01209DFDB28DF65D894B6ABBF2BB88305F148169E91ADB390DB71DC02CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: eb97f5504ea22e08dc1f91e138f0799e6d9c7018462530bbcd3ae51ca213c50b
                                                                      • Instruction ID: 570b91a117593cc280a0164f293f85d14f9ce6f6558c987c1fab53ccdce9d2ab
                                                                      • Opcode Fuzzy Hash: eb97f5504ea22e08dc1f91e138f0799e6d9c7018462530bbcd3ae51ca213c50b
                                                                      • Instruction Fuzzy Hash: 4F412330F04609AFDB219F68D904BEEBBB2FF85700F10455AE14ADB3A0DB70A945CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2b98f5459d3bc89bd14e0c7e5dede20d6dfef322d5f0b8624610ff3e05d499d0
                                                                      • Instruction ID: ef5b016dec14f102c3d7cb27cfd140ee0e90994e1f7ff7fe2d6d2840538a0d7c
                                                                      • Opcode Fuzzy Hash: 2b98f5459d3bc89bd14e0c7e5dede20d6dfef322d5f0b8624610ff3e05d499d0
                                                                      • Instruction Fuzzy Hash: 7F410274E06208DFDB04DF9AD548BAEBBF6BB88300F20942AE519B7394D7744A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2699702739a30c0ebd6d4de166e15eea1aa5937d44150b7f2cbfadf3074b3aca
                                                                      • Instruction ID: d8e255bb428aeea669df5ac35f6f62ce9ffa4fd07516298cb7ed330cef36dbde
                                                                      • Opcode Fuzzy Hash: 2699702739a30c0ebd6d4de166e15eea1aa5937d44150b7f2cbfadf3074b3aca
                                                                      • Instruction Fuzzy Hash: 7031F336611108AFDB05DF58D988EA9BBB2FF48320B0680A9E50A9F372D771EC55DB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 936f4d5aee2e0ad72a71fccca58afa99e3c6ce8e705035329f4eaa8120fe8245
                                                                      • Instruction ID: 63fdc1579ee2c9607f57759976baee29b71077ab1568a81ee7cb4dff7c7bffe8
                                                                      • Opcode Fuzzy Hash: 936f4d5aee2e0ad72a71fccca58afa99e3c6ce8e705035329f4eaa8120fe8245
                                                                      • Instruction Fuzzy Hash: 67416B72A012198FDF18EFA5D944ABEBBB2FF84304F04852AE816D7294D734DD45CB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bdaed548fd3080fafc40968e34cd1b8139edd3757db2d0e3dad68d1f42a9508b
                                                                      • Instruction ID: 0da6618b30b6fc33c2d0f92780577d2ae994274a7a9957ca970d118cf4c6194a
                                                                      • Opcode Fuzzy Hash: bdaed548fd3080fafc40968e34cd1b8139edd3757db2d0e3dad68d1f42a9508b
                                                                      • Instruction Fuzzy Hash: 0B314474E04209DFDB08DFAAD8493EEBBF1BB89304F149069D515B7391DB348A46CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4d57e19299aba8020a94e7d2e4275d6a81d9af695ded5d14eb007cacd6921776
                                                                      • Instruction ID: 655e79142a2db7daa827c4d9956ca4ad99f8c1a23dda24e9e4926028f2bfcb75
                                                                      • Opcode Fuzzy Hash: 4d57e19299aba8020a94e7d2e4275d6a81d9af695ded5d14eb007cacd6921776
                                                                      • Instruction Fuzzy Hash: 9731B1B3819744AFCB01DE60DD827AA7BB0EB16610F9880D6C841D7352E735DA06DF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1c8b7c524d29302f199a94e566a9c1ae68b106eb6e5af381c3e0370cb42d9884
                                                                      • Instruction ID: 314832c63331f98c2ac1d14d2f4ca8168404789ef4cfe7aa6d941ba1c285a46b
                                                                      • Opcode Fuzzy Hash: 1c8b7c524d29302f199a94e566a9c1ae68b106eb6e5af381c3e0370cb42d9884
                                                                      • Instruction Fuzzy Hash: CD312F35B001199FDB14EF65D859AEEB7B5FF88310F108069D806B73A0DB75AD45CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6cb7b5f1ac599f436eb38173e22d75395bc0a25668e1089bee0dc4e99215f2bd
                                                                      • Instruction ID: f7fe442de34f7952b56b874b68970187bc12a4b3b12b504e5e39975f8f2dede4
                                                                      • Opcode Fuzzy Hash: 6cb7b5f1ac599f436eb38173e22d75395bc0a25668e1089bee0dc4e99215f2bd
                                                                      • Instruction Fuzzy Hash: 3E312374E02208DBDB04CFAAD548BAEBBF6FB88300F14942AE519A7390D7344A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c1c5ee1f814c681ae589c0a43a1464d90489f07375363a461dbbe3e240133a9d
                                                                      • Instruction ID: 389f22283c75d3919a7290f482214ed28a54e3f4911fe32752354a6d3205634f
                                                                      • Opcode Fuzzy Hash: c1c5ee1f814c681ae589c0a43a1464d90489f07375363a461dbbe3e240133a9d
                                                                      • Instruction Fuzzy Hash: 92310570E15209DBDB08CF99D944BEEBBF2FB89304F18802AE809F3295D7745A44CB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 90681ee5b94d562f7568cd05ab2f01df954d428cef500c8d166c2ee9ced0b44a
                                                                      • Instruction ID: 73c8cf003d0fa17eb42e9cd9f756949024dabd41e6a2a69e5120a59a7d2561d0
                                                                      • Opcode Fuzzy Hash: 90681ee5b94d562f7568cd05ab2f01df954d428cef500c8d166c2ee9ced0b44a
                                                                      • Instruction Fuzzy Hash: 5C310570E15209DBDB08CF99D944BEEBBF2FB89304F18802AE809F3295D7785A44CB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 98b82eae26b2ed79562bd07ac9725211600526c2b6ad6c7a68e5974201bdc827
                                                                      • Instruction ID: b2b2b479ce7165c0dd5efe56914964dc2f4c4d90a902aee7b4f94c4aa31d5f6e
                                                                      • Opcode Fuzzy Hash: 98b82eae26b2ed79562bd07ac9725211600526c2b6ad6c7a68e5974201bdc827
                                                                      • Instruction Fuzzy Hash: 4941E534A422288FEB28DF24CD91FA9B7B1FB59310F1441D5E909AB391CA31AD81CF54
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4b095c393e47fa171f97e5ce7a3d03a4b1fff55efadfb6864ff2417b12a239f4
                                                                      • Instruction ID: 9cf397abfc83ec0aa96cd27be2986c64c70abcc2c0021c409b3549cce35c6f02
                                                                      • Opcode Fuzzy Hash: 4b095c393e47fa171f97e5ce7a3d03a4b1fff55efadfb6864ff2417b12a239f4
                                                                      • Instruction Fuzzy Hash: CC315774E04209DFDB08DFAAD4446AEBBF2BB88314F189068D829A7395DB345A418F51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f2580d1ff5c9293cc2b14817f08ff66adda19ae7db9508f6842e04f972534163
                                                                      • Instruction ID: e9693cb9fc28932861f060fd6dac9f792008e6ea5d2c9fdad4d4d5ba47189cbb
                                                                      • Opcode Fuzzy Hash: f2580d1ff5c9293cc2b14817f08ff66adda19ae7db9508f6842e04f972534163
                                                                      • Instruction Fuzzy Hash: 5621F9323046049FE7249B6AE888BA6B7E5EFC0321B15897BE50EC7751DB72EC42C751
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d71d4518f7b6abe64caa77bb6f3fd3e57f60300dc46a76468052697356d92413
                                                                      • Instruction ID: 0a96fa0c74b7190b590782de96afad5a33a77f1890399df2ebf8bbc5bbd1c29e
                                                                      • Opcode Fuzzy Hash: d71d4518f7b6abe64caa77bb6f3fd3e57f60300dc46a76468052697356d92413
                                                                      • Instruction Fuzzy Hash: EE313974E04209DFDB08DF9AD4446EEBBF6BB88304F189068D819A7395DB345A458F51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a7275dea154b2d032314fd07385bd88421e31aaada0a37fbf4a0aeeb6d68555c
                                                                      • Instruction ID: c31603cb097998296f4110420175864ed358aba5b9950a3b41d69264f38e251d
                                                                      • Opcode Fuzzy Hash: a7275dea154b2d032314fd07385bd88421e31aaada0a37fbf4a0aeeb6d68555c
                                                                      • Instruction Fuzzy Hash: 3941ED74A012188FDB14DF68D995B9DBBF2FB89304F1450AAE40AA7795CB385EC88F01
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b28875fc9493954857aa443125efd6aaed6be8fcd0daa780b2736bbdfcbf3e7c
                                                                      • Instruction ID: ff86820b2b0905865f1a5a78f62c9b9c53142ee7776442d7c8823cfd4ddfa07e
                                                                      • Opcode Fuzzy Hash: b28875fc9493954857aa443125efd6aaed6be8fcd0daa780b2736bbdfcbf3e7c
                                                                      • Instruction Fuzzy Hash: F1311570A05209CFDB58DF94C558BADB7F2BB8A308F1890A9D80AE7795CB785D85CF00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 76d0a0b6f5078ec07b4cefe2cf3c27578973bbcc01ce8f381f50a1a3f3d91109
                                                                      • Instruction ID: 2070dac252b05bc0270b3ea03f48ebc47977a7b356adf5754d248c4d73871388
                                                                      • Opcode Fuzzy Hash: 76d0a0b6f5078ec07b4cefe2cf3c27578973bbcc01ce8f381f50a1a3f3d91109
                                                                      • Instruction Fuzzy Hash: 4A216DB5A28510DFC70CDB6AC884A79BBB0FF44310B17816BD52BDB361D721AC41AB93
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 82fa02c7851fe44c8f87401a61d31f0da7f2e441ba67b3a9713a0570a44029a1
                                                                      • Instruction ID: 4ab164dc1b7a72760cfaa859daaaa514f46c062cb0516482fa80a7bf496e747c
                                                                      • Opcode Fuzzy Hash: 82fa02c7851fe44c8f87401a61d31f0da7f2e441ba67b3a9713a0570a44029a1
                                                                      • Instruction Fuzzy Hash: 8521A135604204EFCB1DEBA8E5546E977F1FB84315F02002BC10B9BB95DB345A04DB92
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: abd85eea877d04f7686ecee5b22082c2024fd27961905268c153839ded43f0d8
                                                                      • Instruction ID: ff6cd3734734c6c0f4dde497da053ff8f71744c6623dc3f1ee0a50b3c7770fdd
                                                                      • Opcode Fuzzy Hash: abd85eea877d04f7686ecee5b22082c2024fd27961905268c153839ded43f0d8
                                                                      • Instruction Fuzzy Hash: E7315CB4900209DFD708DFA9C5497AEBBF1FB49304F129069D11AB3BA1DB784A84CF52
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5e4ffbe82a063f82dfb59b59e8a560f13a281de506ff51e1164ae460811219b7
                                                                      • Instruction ID: 0d6b05e8d9909a0c65c5860d9754211691d2485b6ca44e102f19bfbc669a7f24
                                                                      • Opcode Fuzzy Hash: 5e4ffbe82a063f82dfb59b59e8a560f13a281de506ff51e1164ae460811219b7
                                                                      • Instruction Fuzzy Hash: 7321F236B082416FEB199E68E844BBA7BA6EFC9311F58407AE905CB351DF758C02C790
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7c1071a0449d50e97a0a7eee93b91f7d4345b0174bba0aab780094b1a2fd9608
                                                                      • Instruction ID: 6ae110a7e96ab68b79dbd4640fd4c87f923f90f8a25955507d63301b5c9ae7cb
                                                                      • Opcode Fuzzy Hash: 7c1071a0449d50e97a0a7eee93b91f7d4345b0174bba0aab780094b1a2fd9608
                                                                      • Instruction Fuzzy Hash: C4218834B10A098FCB04EF68C4548AEF7B5FF89700B10462AD506A7320EF70AA46CB95
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d7b54315c8d8fef99e7f6878e4622addfdaf777aacf01e3a0adf50b6e13a48ac
                                                                      • Instruction ID: 9c5850071dee5be6bf12c4a1ffdd582a2cede77f89a435c7c15f70e19ab88d27
                                                                      • Opcode Fuzzy Hash: d7b54315c8d8fef99e7f6878e4622addfdaf777aacf01e3a0adf50b6e13a48ac
                                                                      • Instruction Fuzzy Hash: D7314AB4900208DFD708DFA9C5487AEBBF5FB49304F129069D11AB3BA1DB744A84CF52
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 574b495113dca5a84b2abdd2003ced8c0d02ace12dc690ef27c338380558d5d2
                                                                      • Instruction ID: 5fc3e0c47d7ce0bdac187e5ca87a14f8d2d8f048269cf7601b9b734ad11a25f7
                                                                      • Opcode Fuzzy Hash: 574b495113dca5a84b2abdd2003ced8c0d02ace12dc690ef27c338380558d5d2
                                                                      • Instruction Fuzzy Hash: C23116749042188FDB18DF64D8957DDBBF2BB8A304F0491AAE85AE7391CB745E88CF00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 42e9fa9df0116426bc69544b3172cff37ca32d3268527b0990dad6e829c7b9fe
                                                                      • Instruction ID: d7e75994ec13f5738ed1ebd0bcbf2abd676b0ea9adca67b4eed2d4400c7883ff
                                                                      • Opcode Fuzzy Hash: 42e9fa9df0116426bc69544b3172cff37ca32d3268527b0990dad6e829c7b9fe
                                                                      • Instruction Fuzzy Hash: 0431E8749052188FDB18DF64D9957DDBBF2BB4A304F0490AAE90AE7291CB745E888F40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249011527.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_e0d000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8fc1bb5292bbe93b1b889e2cbdb0c3a70cc273f0e340cdd4f29cc0b5107f7e5c
                                                                      • Instruction ID: c2572d330ea5642325c0642fcc7c8505081124e5e764872d8a4af00ac26c947f
                                                                      • Opcode Fuzzy Hash: 8fc1bb5292bbe93b1b889e2cbdb0c3a70cc273f0e340cdd4f29cc0b5107f7e5c
                                                                      • Instruction Fuzzy Hash: 1A213776508340DFDF15DF90DDC0B26BFA5FB98314F24856AE8091B296C336D896CBA2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249011527.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_e0d000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3ca8ede999e389e236f4361c0d01baf55d8fc6e7ec0237540e8945093584ad27
                                                                      • Instruction ID: 50e43259fc37d7f24afec3f45bb16feb254446a2a165a0319200a816d9621ba8
                                                                      • Opcode Fuzzy Hash: 3ca8ede999e389e236f4361c0d01baf55d8fc6e7ec0237540e8945093584ad27
                                                                      • Instruction Fuzzy Hash: 42214871508200EFDB14DF90ECC0B16BB61FB88318F20C168E8091B296C337D886CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a8b1085414edf79a5d8c73686d58301e7906e30bb294abe2163e13cb616d8f53
                                                                      • Instruction ID: d829629a8632119cea93fd9b89b511e770d4a2c2de08711eef42d30c7e09ac4d
                                                                      • Opcode Fuzzy Hash: a8b1085414edf79a5d8c73686d58301e7906e30bb294abe2163e13cb616d8f53
                                                                      • Instruction Fuzzy Hash: FA213671E002099FDF19DFB8D884BAEBBF5AB44340F588066DA16DB290E734CE50CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249056836.0000000000E1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E1D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_e1d000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f3fd5660eb363fbc3b556d8721c1d60177641497a4a9a23c4f8302e6c4b64ad3
                                                                      • Instruction ID: 87890151bcfbc4ab4154c44a13fecabfb34a4720620e7bc5cbb0adb6b2ddc05e
                                                                      • Opcode Fuzzy Hash: f3fd5660eb363fbc3b556d8721c1d60177641497a4a9a23c4f8302e6c4b64ad3
                                                                      • Instruction Fuzzy Hash: 5D212571508240DFDB14DF10DDC4B96BBA6FB88314F208569E9091B242C336D887CAA2
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4e76bd4924bf6182a0041f54a68dba928cb629d13c6a509d2f0f7e309bbf0991
                                                                      • Instruction ID: 9a7564fcce4ce64b185235ef9bb8bc054c86c0ce6faa4aaea35d62e73f46693b
                                                                      • Opcode Fuzzy Hash: 4e76bd4924bf6182a0041f54a68dba928cb629d13c6a509d2f0f7e309bbf0991
                                                                      • Instruction Fuzzy Hash: BA214A36A10104EFCB05DF98D988E99BBB2FF48310B0684A9F609AB372D731E955DB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e92f8dc0dd118af5fef920123e950b6c7a64fe6afd0095772e8322f8e98532cd
                                                                      • Instruction ID: ca86564b0f7c56fdf5ddf811828f9f268743bd114f15a6c80ae38a5c262a349b
                                                                      • Opcode Fuzzy Hash: e92f8dc0dd118af5fef920123e950b6c7a64fe6afd0095772e8322f8e98532cd
                                                                      • Instruction Fuzzy Hash: 05214474D01608DFEB44DFA4D5586EDBBF6FB45304F1480A9C42AA3791CBB68A82CF00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dc258b3706680e74e99a28f41324dcc9d2236fe83ae0c80a61ff32f5250ed338
                                                                      • Instruction ID: 83b95afd7b042137230c867dd63ac2843afb7b578038b857160de2e2b763cd2c
                                                                      • Opcode Fuzzy Hash: dc258b3706680e74e99a28f41324dcc9d2236fe83ae0c80a61ff32f5250ed338
                                                                      • Instruction Fuzzy Hash: 00217135A04208AFCF188F58C8449EEBFB6EB8C721F185619E811B7390DF349C41CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5edf08cbfac8517fd89f1a304ceabe408d430fca482ced25f9156e5d929eeabb
                                                                      • Instruction ID: 2a65387add40a88c5f08856642272d394690f5fd3ca97d54a3e7a6f11339705e
                                                                      • Opcode Fuzzy Hash: 5edf08cbfac8517fd89f1a304ceabe408d430fca482ced25f9156e5d929eeabb
                                                                      • Instruction Fuzzy Hash: 0F31E2B4900218CFDB14DF64D895B9CBBB1FB49304F5450AAE45AE7791CB785EC88F50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 14c99ac262c3eaaa24a6d37f8fda92b611a4131f51e0a0c766761c057dada487
                                                                      • Instruction ID: 2a225f1d73f1d42f042af5b1461ac4467ad7d2d50837b12108cc36adca954e29
                                                                      • Opcode Fuzzy Hash: 14c99ac262c3eaaa24a6d37f8fda92b611a4131f51e0a0c766761c057dada487
                                                                      • Instruction Fuzzy Hash: 3D31F3B4A002188FDB18DF64D899B9DBBB1FB49304F4450AAE85AE7791CB785EC4CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 23a2d7dbf18d745f24c74fe22a18643ddcc3da90785718a7fb659c877ded9a0b
                                                                      • Instruction ID: f59b0a1bb668695bc109960ccdb64b37b608932b241db82e46a1093fd9c27154
                                                                      • Opcode Fuzzy Hash: 23a2d7dbf18d745f24c74fe22a18643ddcc3da90785718a7fb659c877ded9a0b
                                                                      • Instruction Fuzzy Hash: 6431F274A042188FCB14DF24D895B9CBBB1FB49304F4490AAE84AE7791CB785EC8CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 351b5fd5afd00955ad05dbfd1a21676ba61880ede5056f3a3f62cb272820a8e6
                                                                      • Instruction ID: f8a46776d7c7289554c2edaf2f510785706d7e1bb0d1630adcef5ddb63ad8c91
                                                                      • Opcode Fuzzy Hash: 351b5fd5afd00955ad05dbfd1a21676ba61880ede5056f3a3f62cb272820a8e6
                                                                      • Instruction Fuzzy Hash: C72149B1D04208EFCB44EFA4D844A9DBBF4FF49314F10C1AA9808A3350DA319A41DF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cec7e0c6beed6fc6541094744d2a8c9a9422173dfb00ea70d32ce937a24c2b08
                                                                      • Instruction ID: 9520108a58943731f645cda86a024d19092bfe300a8bf0fcde508133e402c41c
                                                                      • Opcode Fuzzy Hash: cec7e0c6beed6fc6541094744d2a8c9a9422173dfb00ea70d32ce937a24c2b08
                                                                      • Instruction Fuzzy Hash: 1821E635A002099FDF14DFA8C695AEDB7F2FB89301F2041A5E405BB361CB75AD85CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 43454134f9117e51a217c5b9a259330f6fb1d410a0dd9ca2c862c696ca518140
                                                                      • Instruction ID: 2a86555463663de29a8f97ed4c143f34fe39e5ad470fc20e0cf691ee92c96f50
                                                                      • Opcode Fuzzy Hash: 43454134f9117e51a217c5b9a259330f6fb1d410a0dd9ca2c862c696ca518140
                                                                      • Instruction Fuzzy Hash: 6B31D1B49052188FDB14DF64D999BDDBBB2FB49304F4450AAE40AA7791CB785EC88F00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3030013629403d15521f751821fd0f970c24a36df69e4900c55bc3dfe1866a06
                                                                      • Instruction ID: 1078d94bceb26ebf962e7838f2d654e9b49455cfc251a5d0b4bbe05910bd6b81
                                                                      • Opcode Fuzzy Hash: 3030013629403d15521f751821fd0f970c24a36df69e4900c55bc3dfe1866a06
                                                                      • Instruction Fuzzy Hash: DB218975A016158FCF18EFA8C884AAEBBB2FF88304F048429D81AE7355E734DD05CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9c9baebca9ca65a2c5656f79b003a2141ecc44494059e732da22e0b024adf216
                                                                      • Instruction ID: 5d6d33dd9c8b1d1d526e74972c0aa7cf4a603ce4ad5490e20283304fa7d85887
                                                                      • Opcode Fuzzy Hash: 9c9baebca9ca65a2c5656f79b003a2141ecc44494059e732da22e0b024adf216
                                                                      • Instruction Fuzzy Hash: 4621AE34B00A09CFCB15EF68C5549EEBBB5FF89300F10466AD505D7360EB74AA45CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 433fc119885d7157dcb3999e8e30434992a4f4c345ec9801a6db28e908dcf1f9
                                                                      • Instruction ID: 4d51fca5975992e02dc6c21a478c93aa621c969ba3378c910edf24ebfd1d0246
                                                                      • Opcode Fuzzy Hash: 433fc119885d7157dcb3999e8e30434992a4f4c345ec9801a6db28e908dcf1f9
                                                                      • Instruction Fuzzy Hash: FC212874D0562ACBDB08DFAAC4482EEBBF6FB88310F14942AD425B3351DB744A45CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 70ff9e7500d7fbf9c20660c5680bcc0690e121bbefd23c63eb120f3b9a612f93
                                                                      • Instruction ID: e26acbf79056d49405957f90aa6ab17ff5ed9ca8b91d3e05cee499b3db1b8a84
                                                                      • Opcode Fuzzy Hash: 70ff9e7500d7fbf9c20660c5680bcc0690e121bbefd23c63eb120f3b9a612f93
                                                                      • Instruction Fuzzy Hash: 3D214AB4E0420ADFCB04DFE9C4846AEBBF6BB49300F14C5A9D405A7255D734A981CF91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e80b7c096a70dc7e7671d7a935ef0cc67c2d1aac4cefd45465ce9336d18a212a
                                                                      • Instruction ID: d93276a4d692b9eb3d99d56c1823b0acc87056c3959999bbd3b612b9bc24264e
                                                                      • Opcode Fuzzy Hash: e80b7c096a70dc7e7671d7a935ef0cc67c2d1aac4cefd45465ce9336d18a212a
                                                                      • Instruction Fuzzy Hash: CF21C334A10205AFD714EF74E8867AE7BF7EB85314F408628E00AEB685DF746902C7A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6de6cd10abeace7b5c2700d40c9507360e1982127861c68789166c956e5cc084
                                                                      • Instruction ID: f651ef4bb62aa805409f17214b1b7f4717d37dd206ca788e553260cac667b387
                                                                      • Opcode Fuzzy Hash: 6de6cd10abeace7b5c2700d40c9507360e1982127861c68789166c956e5cc084
                                                                      • Instruction Fuzzy Hash: 60311474A042188FDB14DF64D895B9DBBB2FF8A304F4450AAE54AE7391CB785EC88F40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 31226b4b2689319b385b9837538a356e02bc30d7a4a5d5e81026f2a30ec87dc6
                                                                      • Instruction ID: e63e640fd87f9d4da57364eeabd861e748bb912fe1c0d08ec94440d5a9a74404
                                                                      • Opcode Fuzzy Hash: 31226b4b2689319b385b9837538a356e02bc30d7a4a5d5e81026f2a30ec87dc6
                                                                      • Instruction Fuzzy Hash: C6310474A002188FDB18DF24D896BDCBBB1FB4A304F4450AAE41AA7791CB785EC88F11
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 29baef108169a2e0c4c0ae99365f57752955c0dceaf61dda19dd04e882de0f95
                                                                      • Instruction ID: c4f35331416f014575bfec37ab47eaa37c8719aa02c53c7666a54fefb51c49bb
                                                                      • Opcode Fuzzy Hash: 29baef108169a2e0c4c0ae99365f57752955c0dceaf61dda19dd04e882de0f95
                                                                      • Instruction Fuzzy Hash: A821C335A062899FCB1ACF64E5549EDBFB6FF4A200B1940E5E840EB311CB31DD06CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b59887df080ec0d3b99ff1971c56352358270b7ea703b65b29b1ddda6f16f812
                                                                      • Instruction ID: 89de311f530e60278c0fbeb644b23d24eed54563df4d01f79fd445a05893ab0f
                                                                      • Opcode Fuzzy Hash: b59887df080ec0d3b99ff1971c56352358270b7ea703b65b29b1ddda6f16f812
                                                                      • Instruction Fuzzy Hash: 113102B4A002088FDB18DF68D495B9CBBF2FB89304F4450AAE41AE7691CB785DC88F00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249056836.0000000000E1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E1D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_e1d000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d0cda14c7fe48c40aec57c9f7c7a93f55da214bdc908302555cc94f79e562914
                                                                      • Instruction ID: 9c5f7907ac99c336d39a2aed2139ac46b0ba3c70dada84a2776cf363f538bee4
                                                                      • Opcode Fuzzy Hash: d0cda14c7fe48c40aec57c9f7c7a93f55da214bdc908302555cc94f79e562914
                                                                      • Instruction Fuzzy Hash: 4C21B07500D3C08FCB12CF20D994756BF72FB86314F2981EAD8449B653C33A984ACB62
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 57996656d4204b2820ad0f6f0eec2c824c2c1fdf9c9a5e40f478411ed54c6cd3
                                                                      • Instruction ID: 79bd4b32ef24a4b38c785326023fcef676109722dbeec97712ca4fba39a9324a
                                                                      • Opcode Fuzzy Hash: 57996656d4204b2820ad0f6f0eec2c824c2c1fdf9c9a5e40f478411ed54c6cd3
                                                                      • Instruction Fuzzy Hash: 6D119430648109FBC71C8A55C455ABEBAF9AF49710F12406AD403A7351FB719E428B93
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6580c8ec65bdca4b806f2824a4bcfbbc4f09db8b47a19432bf048e6a8b6c2594
                                                                      • Instruction ID: eb75dcc643b8d59fb43c1af6dcb90b209ff7e58339a028b3baff945a6bd1e1db
                                                                      • Opcode Fuzzy Hash: 6580c8ec65bdca4b806f2824a4bcfbbc4f09db8b47a19432bf048e6a8b6c2594
                                                                      • Instruction Fuzzy Hash: DA215BB5D0421D8FDB09CF99C8856EEBBF1FB89314F04842AC105B7350D7354A49CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b28c022f021b9f8a6f6d5ce715d8f99cfb3661dc990a097cb776891b82446fdc
                                                                      • Instruction ID: dfe0b8299a008c8ee619adea71ed28712410cdf84a732c334c4244e5470a5da8
                                                                      • Opcode Fuzzy Hash: b28c022f021b9f8a6f6d5ce715d8f99cfb3661dc990a097cb776891b82446fdc
                                                                      • Instruction Fuzzy Hash: CB214834E1020A9FCB04DFA8D9455EEBBF5FB89301F10816AD405B7385DB389E45CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 33da33c295579df9af8fb569e5815e3b3a0a7ced242bdcbf7f1386b2c8100a0b
                                                                      • Instruction ID: b023a494d1e215e31e84a8ba4e7381a2327d7d8b9f64326621ad621f881d0b4e
                                                                      • Opcode Fuzzy Hash: 33da33c295579df9af8fb569e5815e3b3a0a7ced242bdcbf7f1386b2c8100a0b
                                                                      • Instruction Fuzzy Hash: 0A11B975B00349AFCF25DF6998557BA7BF6AF88601F148129F905DB280EE71CD02CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 04e5c8d6e5a17749a4b93fc149017ea438ecda1813043ee6e13a6530f116bbe6
                                                                      • Instruction ID: 379ff45093bed439a373722a5f95eefed26bdd70eed1a311b686913ce6493d4b
                                                                      • Opcode Fuzzy Hash: 04e5c8d6e5a17749a4b93fc149017ea438ecda1813043ee6e13a6530f116bbe6
                                                                      • Instruction Fuzzy Hash: DB31EEB49012188FDB14DF64D999B9DBBB1FB4A304F0850AAE55AE3791CB785EC88F00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1c19197269efb2fda262abb3bc994fd0c99d0437843591cfa325cb936a315783
                                                                      • Instruction ID: 7b5ae705ebbc411462534a0c0318f914e52369b77fb3f147dc7ad73005977f26
                                                                      • Opcode Fuzzy Hash: 1c19197269efb2fda262abb3bc994fd0c99d0437843591cfa325cb936a315783
                                                                      • Instruction Fuzzy Hash: 2E110374D0422D8FCB08CF9AC844AEEBBB5AB89324F00842AD504B3350DB741A49CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9d40497a347ab7644afec3541e29171edcded8a1dff205ae1f4fb63f6a6b1792
                                                                      • Instruction ID: 5d20b9d01ef80c7df2ef113c34bd03115810e3d8d762337041f82d5827650c6b
                                                                      • Opcode Fuzzy Hash: 9d40497a347ab7644afec3541e29171edcded8a1dff205ae1f4fb63f6a6b1792
                                                                      • Instruction Fuzzy Hash: 6021E534E1020A9BDB04EFA8D5455EEB7F6FB89301F10812AD515B7385DB345E45CFA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 70cfc5cac96dbf184a991324651187bc6f74e7bb0da74326f2ce00b1502ce22c
                                                                      • Instruction ID: 7c360d3411215b5a51975ab071c5dc68a9bd98e1e9c47b5fdabec91800197b1a
                                                                      • Opcode Fuzzy Hash: 70cfc5cac96dbf184a991324651187bc6f74e7bb0da74326f2ce00b1502ce22c
                                                                      • Instruction Fuzzy Hash: 5921F3B4A002188FDB28DF64E495B9CBBB1FB89304F5450AAE45AE7791CB745EC4CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249011527.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_e0d000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                                      • Instruction ID: 101d5a40078cf7e9486f5e5fec9046f0376d16d7a06c3486b45cbe6f70cbbe81
                                                                      • Opcode Fuzzy Hash: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                                      • Instruction Fuzzy Hash: 8A11D376508280CFCB16CF50D9C4B16BF72FB98324F28C6AAD8091B656C336D856CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249011527.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_e0d000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                                      • Instruction ID: 2b612ce974f25479d8b7fe38048e1e0fe83612141c80ce54f446797026882a22
                                                                      • Opcode Fuzzy Hash: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                                      • Instruction Fuzzy Hash: 27110372408280CFCB12CF50E9C4B16BF71FB94318F24C6A9D8090B656C337D896CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e024d30eb1181207898f7a4b97ce6e543a8bec7882c49b227557546a03d8225b
                                                                      • Instruction ID: fe099bcb901100cdf9442e782367f7c67dccee169bc022301229a4eaddb02cce
                                                                      • Opcode Fuzzy Hash: e024d30eb1181207898f7a4b97ce6e543a8bec7882c49b227557546a03d8225b
                                                                      • Instruction Fuzzy Hash: 80119E72D00208DFCB04EFA5D84A7ADBBF0FB0A204F1482A9D848D3350EB358A51CF81
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 85bf42b3541e725161b3914c18330d9fa31d1c0b1b44cd969d91bd4bddea3cd6
                                                                      • Instruction ID: 2f5cbe9d7622753583dc6e278509d65dbb799f5b8fb2d0e4af2a253fcbe28d89
                                                                      • Opcode Fuzzy Hash: 85bf42b3541e725161b3914c18330d9fa31d1c0b1b44cd969d91bd4bddea3cd6
                                                                      • Instruction Fuzzy Hash: FE318F78A012688FCB64CF69C984AD9BBF1FB48304F1094E6E859A7355CA709EC0CF60
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4195d8e806819e2b71ccc5eed539ccfb383df43660d84da2de2a446b5bf0086e
                                                                      • Instruction ID: 637243677c15dbe907a8ec55b25724d1b7d143a955fbc83062a491d9cbdc936f
                                                                      • Opcode Fuzzy Hash: 4195d8e806819e2b71ccc5eed539ccfb383df43660d84da2de2a446b5bf0086e
                                                                      • Instruction Fuzzy Hash: 98012676E0D3945FEB165B28AC10B26BFA5DFC6215F0D41A9D889CF3A2D652AC02C390
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3320b8009e8f84370dca3655de4dc58b527e70be3c8ccd57ae4c1fb395ac9e3d
                                                                      • Instruction ID: a7549db595ac1cc47ac6c1667fde141bc10a9e83909d940f5e42359ef34f5b62
                                                                      • Opcode Fuzzy Hash: 3320b8009e8f84370dca3655de4dc58b527e70be3c8ccd57ae4c1fb395ac9e3d
                                                                      • Instruction Fuzzy Hash: 52219278A02218AFDB14CF68E594EADBBF2BF49300F144159E802EB360CB35AD41CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d67e7cdbf87dc1f328fa2d55ea5dd10c770b93a04c46b09cb45aebf9357fee6b
                                                                      • Instruction ID: 30d55d208d297702231698e43d4efc5aacc5681074b00837e57433bc17b74ee4
                                                                      • Opcode Fuzzy Hash: d67e7cdbf87dc1f328fa2d55ea5dd10c770b93a04c46b09cb45aebf9357fee6b
                                                                      • Instruction Fuzzy Hash: 7221D478A4522ACFDB64CF64C988EE9BBF1BB09314F1150E5D829A7641DB309EC5CF06
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e16c6ff2ffd9ee22b056968ceaec91737d6b042f80c902b71c540052692bf38c
                                                                      • Instruction ID: 81ef48a7d683fdec54856704eec642a9ecac15a811ddb7507617bf313a449454
                                                                      • Opcode Fuzzy Hash: e16c6ff2ffd9ee22b056968ceaec91737d6b042f80c902b71c540052692bf38c
                                                                      • Instruction Fuzzy Hash: 8311ECB0E0020A9FDB44DFA9C9467BFBBF5FF88304F1485699419B7354DB305A418BA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3eddea7b227444f5885d36d0d11ee9807ab9ee243c40710fcba5031e09480ed3
                                                                      • Instruction ID: 3db4a8492103b1f406b71353dd41a5d789964d35e7adbc3db83594cdc6c543fc
                                                                      • Opcode Fuzzy Hash: 3eddea7b227444f5885d36d0d11ee9807ab9ee243c40710fcba5031e09480ed3
                                                                      • Instruction Fuzzy Hash: F1018836340314AFDB048E59DC84FAB7BAAFB89721F104126FA04CB290CAB2DC00C750
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 16ee901b94f429872478becc083f79b9b894888cf55667c53c7abd380c12cb7d
                                                                      • Instruction ID: 62940195a75a4efc194a90cd8913460168097c09afa2788acfda13e9e6e9154c
                                                                      • Opcode Fuzzy Hash: 16ee901b94f429872478becc083f79b9b894888cf55667c53c7abd380c12cb7d
                                                                      • Instruction Fuzzy Hash: 04110034780200CFD708EF68C998A697BF2AB8D710F2185A9E106DB3B1DB74AD41CB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7d1332f755baff7eb62a78e9eb5bdb0c2f14942475e523b95579bf94e8f22c7c
                                                                      • Instruction ID: 2e3be3b77b72630632228f631585c4e79605f0a346d2b8c080479f24cbd73a90
                                                                      • Opcode Fuzzy Hash: 7d1332f755baff7eb62a78e9eb5bdb0c2f14942475e523b95579bf94e8f22c7c
                                                                      • Instruction Fuzzy Hash: 25114235E002198FCB04DFA8D8056EEBBF5FB88305F50406AD909F3284DB799E44CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d967143089bf54407d0eca8b8bba407b55164eb1d14c3bb4da17cb8a3d48653d
                                                                      • Instruction ID: f24c9f9992291e8ad3e41eda39727896c781b9bc11491dfe8c4dff9c80774d32
                                                                      • Opcode Fuzzy Hash: d967143089bf54407d0eca8b8bba407b55164eb1d14c3bb4da17cb8a3d48653d
                                                                      • Instruction Fuzzy Hash: B101043AA00105DFCB45DF94D944CA8BBB2FF8832070681A5EA09AF236C772E856DB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b3a3e3b73cbb8a7d874ac283b256b318135796d801a0e39cfa00406f4fecb651
                                                                      • Instruction ID: 8a40f7d1aceffb1fd470961ec8bf257b6ffa762a04315440a089233a582c3824
                                                                      • Opcode Fuzzy Hash: b3a3e3b73cbb8a7d874ac283b256b318135796d801a0e39cfa00406f4fecb651
                                                                      • Instruction Fuzzy Hash: B3110070904204EFD71DEBA4D665BAA37F1BB40304F12052ED007ABBA6EB791E00CB93
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0f1ea957f1acf63bc1c80e1735e4f96f4450ce519a03020f2fb9a2d6db07d61d
                                                                      • Instruction ID: bc041e5a425fa3999b530ab6070fe9493de30a0ad37288ec938f3dd95156870e
                                                                      • Opcode Fuzzy Hash: 0f1ea957f1acf63bc1c80e1735e4f96f4450ce519a03020f2fb9a2d6db07d61d
                                                                      • Instruction Fuzzy Hash: 1F113031E0020A8BCB08DFA8C4056EEBBF5FB89304F50402AE815A7784DB799E44CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a7e8af43e14423d2676ce906a5689155a91a52fc47cf0d79c9333eebd0c5bdef
                                                                      • Instruction ID: 46119616eb3153e31f1dfcba0f89dc8a5b7da7ca20bdcbd2c3fbb070712383cf
                                                                      • Opcode Fuzzy Hash: a7e8af43e14423d2676ce906a5689155a91a52fc47cf0d79c9333eebd0c5bdef
                                                                      • Instruction Fuzzy Hash: FC113778A0121ACFD764DF24D9967EDBBB1FB48300F2040AAE419E7B95DA384E859F50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2fc500ccbf0baf5c4cc1cf5224f954a4f3cbefef6cfd88e87c6d687d10b2fd74
                                                                      • Instruction ID: 3600f5693354931023cf81a8cf05331529bee65469f337468bb006e8976caf54
                                                                      • Opcode Fuzzy Hash: 2fc500ccbf0baf5c4cc1cf5224f954a4f3cbefef6cfd88e87c6d687d10b2fd74
                                                                      • Instruction Fuzzy Hash: 5801C0357007405FE726AB34D418BBA7BA2EFC9324F14856DD5964BBA1CBB1D882CB80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d2dd45abecd4b6ab99389474fbe37df29df864a1ba1e95a820d9e19ddbfbce3e
                                                                      • Instruction ID: 65e20641fd2cfbdc078a1e8514095f3fe39ee3e09be91ffb18bf1a5a7f63346c
                                                                      • Opcode Fuzzy Hash: d2dd45abecd4b6ab99389474fbe37df29df864a1ba1e95a820d9e19ddbfbce3e
                                                                      • Instruction Fuzzy Hash: 32111234740200CFD70CEF68C598A697BB2AB8D710F2185A9E106DB3B1DB70AC40CB52
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 43e70cd38f60a33e4a2d46d87eb421734b954fc653c20b01d777ed69f8cd6cfa
                                                                      • Instruction ID: 2c0aace6e8a5fdc1ceb2f663ba2e5c915b985392f6e5a64b34fc0bc36968a107
                                                                      • Opcode Fuzzy Hash: 43e70cd38f60a33e4a2d46d87eb421734b954fc653c20b01d777ed69f8cd6cfa
                                                                      • Instruction Fuzzy Hash: 7B019E71904248EFCB44EFA8C880BAEBBF4FB49300F0081DDE819A3240DA318B01DB60
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 757320b6d1f51055a87e2d06f18c32dddf023914ad2ea07c94994161bc84c8f1
                                                                      • Instruction ID: 6045e5916163fde69242033d9e9605f0cb772ae401974855aed7340af6bd4c3b
                                                                      • Opcode Fuzzy Hash: 757320b6d1f51055a87e2d06f18c32dddf023914ad2ea07c94994161bc84c8f1
                                                                      • Instruction Fuzzy Hash: 8D015A71955208EFCF08EFA4E98479DB7F5FB49210F1480AAA809E3310DB369A49DB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6ad26652e51b85cade35ba8a667cf1361035aeed620ea3ae771c4b3638d75b8a
                                                                      • Instruction ID: c9046badbaec05968cdc2cab116a82412934ed6ace38b2aacef22d1367e319b5
                                                                      • Opcode Fuzzy Hash: 6ad26652e51b85cade35ba8a667cf1361035aeed620ea3ae771c4b3638d75b8a
                                                                      • Instruction Fuzzy Hash: D321E274A4012A8FDB64DF28C984BADB7B1BB48305F1040E6E91DA3B84DB349EC59F00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 22f318d61f5c8b7f11d8c6bd98caafe6fa51e33f4e05274fa3ab672851f9c06b
                                                                      • Instruction ID: 690550282864577ccac858419fe5fbe0dcb97fd25c9a6079d25745c5342a871a
                                                                      • Opcode Fuzzy Hash: 22f318d61f5c8b7f11d8c6bd98caafe6fa51e33f4e05274fa3ab672851f9c06b
                                                                      • Instruction Fuzzy Hash: 30112E74E00609DBDB089FA5D458799FBB1BF88310F24CA29E459B77A1EF709984CF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0e511512c4b1ae2295fef69f8ab1896a7db2ac1d7cc2a4875ecaeaa98c124558
                                                                      • Instruction ID: ed2ee8df9562dce13e7b4513dba7bb333dd9a23fac67cebef6dbfeacf2810f16
                                                                      • Opcode Fuzzy Hash: 0e511512c4b1ae2295fef69f8ab1896a7db2ac1d7cc2a4875ecaeaa98c124558
                                                                      • Instruction Fuzzy Hash: BC0148B0E0520A9FCB54DFAAC8417EEBFF6BB89300F18C5AAD408E3211D7709584CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 72ecad107d1d1dc87e17a1af0b4c771e966dabd3cb972afa8c6617642556f47c
                                                                      • Instruction ID: 4f8d8cd26c6cd2c6aa9ceb1508f40e0b0bb1ead3b1c9fcaeca5eeacffe247e6f
                                                                      • Opcode Fuzzy Hash: 72ecad107d1d1dc87e17a1af0b4c771e966dabd3cb972afa8c6617642556f47c
                                                                      • Instruction Fuzzy Hash: C601BC307003008FE725AB24D448ABA77A7ABC8324F14862CD5564BBA0CBB1EC82CB80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 466aa0388390eb19e377337cd6e2dbbf59ba855183ae3e2a7886ebc6bbfea291
                                                                      • Instruction ID: 6125068ddce09df90aaf7dd674ec86beea5f64988cc63ae910269c6dd584c210
                                                                      • Opcode Fuzzy Hash: 466aa0388390eb19e377337cd6e2dbbf59ba855183ae3e2a7886ebc6bbfea291
                                                                      • Instruction Fuzzy Hash: 30018F75A05208DFCF08DFA0E9467ADBBF0FB45315F1082A9880567350EA319A06DB54
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 864a252af3fd820ab11a309ac734839f631d2a5a1b7aabd8ab6265d088f55dec
                                                                      • Instruction ID: fa399654eb8fc972f69295d2bbd096a2c9295c187836fcfcebc90b6173887ee9
                                                                      • Opcode Fuzzy Hash: 864a252af3fd820ab11a309ac734839f631d2a5a1b7aabd8ab6265d088f55dec
                                                                      • Instruction Fuzzy Hash: 3F01A7393015149FC345AF24E558BAB7BA3EFDC711B108569E5068B790DF31EC82CB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8137f86e4c69b8495fd0bc354addeaaf0b7071076fa2cfe2cd25bc59e64497ba
                                                                      • Instruction ID: 1182d02d66a17bf18d2bc1a5274dfab3e62390b9e80e2d17a5cfce25bc55433e
                                                                      • Opcode Fuzzy Hash: 8137f86e4c69b8495fd0bc354addeaaf0b7071076fa2cfe2cd25bc59e64497ba
                                                                      • Instruction Fuzzy Hash: 2F11D674D05218CFDB14DFE5C5887ADBBF5BF4A304F108499D05AAB2A1D7345A85CF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7a24d05eda77cfb7fea38d9023531c803e1550bb9281091e04089a0a483ad575
                                                                      • Instruction ID: 54c82853ebc2785858686a8ddda034e9be49907f8dbe8aa312771affaafa2470
                                                                      • Opcode Fuzzy Hash: 7a24d05eda77cfb7fea38d9023531c803e1550bb9281091e04089a0a483ad575
                                                                      • Instruction Fuzzy Hash: 9001A4353006149FC3499B25E458E6BBBA3EFCC711B104528E50A8B790CF72EC82CBD4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 32c94456749d4f207555029bb188b4d50971e0f74835a7ab51674ed0ac3f97ec
                                                                      • Instruction ID: 676de9e34c34ca3f64b66042a219158a24cabc185c69fc3210eed63db14a5394
                                                                      • Opcode Fuzzy Hash: 32c94456749d4f207555029bb188b4d50971e0f74835a7ab51674ed0ac3f97ec
                                                                      • Instruction Fuzzy Hash: B2F02B327141055BEB19A619D8989AAFBBAEFC4220F08403AE959D73A1DB719C16CB80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7b538614be1f68e5ed9e461e9a5ed2f174c681f057d19790f4772a0b0b8a4867
                                                                      • Instruction ID: 7abd5f2fe5cec240ce353b10ef6f971eedf4ed56a4249994d9557d63c76e01cd
                                                                      • Opcode Fuzzy Hash: 7b538614be1f68e5ed9e461e9a5ed2f174c681f057d19790f4772a0b0b8a4867
                                                                      • Instruction Fuzzy Hash: AAF0AF393107009FC3169B24C858E6A7BB6FF89311B0584AEF946CB3B2CA31EC02CB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f0b2ea2ef58ff20a089d167351b1f268342fceec25637bfb166736a79fdbd2c6
                                                                      • Instruction ID: 309eed92567a711a2b34c3c466d7311706ebed98564933834ec75668b4efc28e
                                                                      • Opcode Fuzzy Hash: f0b2ea2ef58ff20a089d167351b1f268342fceec25637bfb166736a79fdbd2c6
                                                                      • Instruction Fuzzy Hash: ECF0E976F083555FEB199A19A814B2BF7AAEFC8720F144429E94ADB350CA62BC4183D4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 83768283248532daaebbd09b497c800c3370bccf4914b3c8f06ab5872218de06
                                                                      • Instruction ID: cf40f928c955ff9d619072b6326f0b16bf8cbd8a2f668bfb38a605e812105881
                                                                      • Opcode Fuzzy Hash: 83768283248532daaebbd09b497c800c3370bccf4914b3c8f06ab5872218de06
                                                                      • Instruction Fuzzy Hash: 9AF030773445116BC614CA8ED880955F795FB84364715C63AE96AC7680C732EC52C7D4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 57480a2ac8f6e586d809db8e49c0b4452619a94c6a3c17467bd29f4345e614e8
                                                                      • Instruction ID: bf827c31aedd58d44728438ee18e49a15f1308f91f3cba30a767ffa35032cd58
                                                                      • Opcode Fuzzy Hash: 57480a2ac8f6e586d809db8e49c0b4452619a94c6a3c17467bd29f4345e614e8
                                                                      • Instruction Fuzzy Hash: C50116B4D0420ACFCB40EFA8D5852AEBBF5FB49300F20816AD819F3384DB345A41CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e5e7da05f29a3e2ab0974f4a4145caa40ec168d8f5cb31594f30279598a9ba99
                                                                      • Instruction ID: 1bfe2ddafb741f26611782b0d374d6975338831daf878462316eb36899ab3c5c
                                                                      • Opcode Fuzzy Hash: e5e7da05f29a3e2ab0974f4a4145caa40ec168d8f5cb31594f30279598a9ba99
                                                                      • Instruction Fuzzy Hash: 43F0F631C09384AFD700DFA8D9613DCBBF0EF45210F1441DAC8445B352C6395A4ACB95
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 57c27ea24af7fd4441185e817961ac03e419bc4275acdbcf39054614032010d1
                                                                      • Instruction ID: a98615f5be36c54a5f072e58e74b790b2cd6db43c3a23f5cddbb7a7c3ae5b637
                                                                      • Opcode Fuzzy Hash: 57c27ea24af7fd4441185e817961ac03e419bc4275acdbcf39054614032010d1
                                                                      • Instruction Fuzzy Hash: 0AF090363042119FC7048EAAD888D9A7BA6BF99320B158269F808C7360CA71DD01C750
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 456fa49b88a600620f6573868b77048c09ffd2fee02ae06a5cb1673e8df0048e
                                                                      • Instruction ID: 275ae222fe6d2d72d73a22dd625b72ffad1c13b186c414f074e0f3b4de8d0cd2
                                                                      • Opcode Fuzzy Hash: 456fa49b88a600620f6573868b77048c09ffd2fee02ae06a5cb1673e8df0048e
                                                                      • Instruction Fuzzy Hash: 60F055317003159FEB28AA38A8047BA33AEAF81211F140839D506CF380EFB3EC02C781
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b23347c0261fb18a074c274c3a8358f758630d7aaa3da4151f4a8cbe25e25fd9
                                                                      • Instruction ID: 34e968b38458582314c156f402aedbb0c41f15ebeffe4c9f404248afbab82014
                                                                      • Opcode Fuzzy Hash: b23347c0261fb18a074c274c3a8358f758630d7aaa3da4151f4a8cbe25e25fd9
                                                                      • Instruction Fuzzy Hash: A6F02B725046009BC334D771D85598FFBE6BFC4310740CA2DE0495B557EB70994987A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: de3e2330369c81a7ca1150832794f54db0c36e516d874d6f624dfcfc11ec29ef
                                                                      • Instruction ID: 78984af3088342f44d15e1f5514e48b76c6fa94a1a9e0e3d680a2cd770c0bd22
                                                                      • Opcode Fuzzy Hash: de3e2330369c81a7ca1150832794f54db0c36e516d874d6f624dfcfc11ec29ef
                                                                      • Instruction Fuzzy Hash: 0F012874A04109CFEB08DF55C8057A9B7F6FB89304F089065D40AEB399DB344C85CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6b20cd080df272fc8652d4bb5a4f78c491d1c9f602854f876c93d759c55d3060
                                                                      • Instruction ID: 9f8bf0b1a2fb4cf318ba63e0216c1465d74299ef0450b07ecb94afd8c10067bf
                                                                      • Opcode Fuzzy Hash: 6b20cd080df272fc8652d4bb5a4f78c491d1c9f602854f876c93d759c55d3060
                                                                      • Instruction Fuzzy Hash: 4A110574900519CFCB64DF18DD99BAAB7B5FB4830AF1050E5E419A3380DB349EC98F51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e334516ddd7f4bfb5218e2ebc358e23f8c1dd00e9e282297fd6fd4593021d2ae
                                                                      • Instruction ID: d7c4602680aeb3d4395385857561fd52ac20fbffbcbab5e6400f748d60c78e35
                                                                      • Opcode Fuzzy Hash: e334516ddd7f4bfb5218e2ebc358e23f8c1dd00e9e282297fd6fd4593021d2ae
                                                                      • Instruction Fuzzy Hash: 03017C349193999FCB02DF64D994B9D7BF1FB06314F004192E059AB6D2CB385889CF11
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3eec4fbf9f739b98e84a4afd1b0f2e30ef33af5f112fdbb8bce761c122a4094b
                                                                      • Instruction ID: fbf442d3a0070c5909847f524b4936e36f417ab3161caeb1a8d9301fa1a3d246
                                                                      • Opcode Fuzzy Hash: 3eec4fbf9f739b98e84a4afd1b0f2e30ef33af5f112fdbb8bce761c122a4094b
                                                                      • Instruction Fuzzy Hash: 0AF05E35310604AFC714DB19D454D3A77AAFFC8721B10456DF9068B360CA71EC42CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 85100705816382e10a5c38625d743393b97d01209360935cecb40a47e07dd2a5
                                                                      • Instruction ID: 5a0ff4dd636342683e7be17e3542ca6d31030de8019101cb31983a9d86af2821
                                                                      • Opcode Fuzzy Hash: 85100705816382e10a5c38625d743393b97d01209360935cecb40a47e07dd2a5
                                                                      • Instruction Fuzzy Hash: 4AF0177490834CEFCB45DFA8C84469DBFF5AF49214F14C0AADC58A7352D3369A0ADB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5d2bcdd1ad111ef4faa6c05842c74023a49806e6f1a00b05de443409bdafc970
                                                                      • Instruction ID: 22f858c324050e6a3bd61cb66434bda1d924ed7bac3bc35ca206601dac5e9b5a
                                                                      • Opcode Fuzzy Hash: 5d2bcdd1ad111ef4faa6c05842c74023a49806e6f1a00b05de443409bdafc970
                                                                      • Instruction Fuzzy Hash: B2F0E231A0421AAFCF09DB98C4883ED7FB6EB40215F088154E046E7280DB304A82C7C4
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6cb244ed25d4e69881715913bf0a7dd412a5bc58102be65a57e9a514e1b3a03c
                                                                      • Instruction ID: ff68f201943c0ea28d7897a8f753ca92ea46de529269078746842f77b24ef2cf
                                                                      • Opcode Fuzzy Hash: 6cb244ed25d4e69881715913bf0a7dd412a5bc58102be65a57e9a514e1b3a03c
                                                                      • Instruction Fuzzy Hash: 5AE0D86670602157E710191DBC94776C5E9EBC5B11F64073DF805D3704D9918C81C3A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ddf9bf2f34b05f1136fbaecd20109007d2b6f106d6836932fdb73c0e35e9dcda
                                                                      • Instruction ID: 161bceb62afc67ae4eaeb7925c3dcf7b39ea8f0d8e5784b751859fde955d7676
                                                                      • Opcode Fuzzy Hash: ddf9bf2f34b05f1136fbaecd20109007d2b6f106d6836932fdb73c0e35e9dcda
                                                                      • Instruction Fuzzy Hash: BEF0A0357083119FEB256A3499157A53B6AAB42205F0948AAD4029B2D1EFB3DC42CB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e22a538965c3d783fe03ac4382281f2d9466f3a16355e88323dfc140006ce2e9
                                                                      • Instruction ID: d7230e28a1acfa1d791c064c8bf16888b30e8de6de1a479bd6280f87be6219be
                                                                      • Opcode Fuzzy Hash: e22a538965c3d783fe03ac4382281f2d9466f3a16355e88323dfc140006ce2e9
                                                                      • Instruction Fuzzy Hash: C0F05875905208AFDB44DFA8D88179DBBF5FB48310F10C0AADC09A3300C73AAA46DF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4b3b79a3d57d0d3d6e7c4273c4b2108a672ee3fd067d5cbe69a807196c93c763
                                                                      • Instruction ID: b03db23da5952a7ddcde375a1ae28ee03f3ff61d1898f399ce06d3d4c14151b1
                                                                      • Opcode Fuzzy Hash: 4b3b79a3d57d0d3d6e7c4273c4b2108a672ee3fd067d5cbe69a807196c93c763
                                                                      • Instruction Fuzzy Hash: 3DF01774908348AFCB45DFA4C8816A9BBF4EB49210F14C0EA9C4897352D639AA46DF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 884442e41bb36b59ce7e606469a2404c7bd651bce59b947aed96039606e10b78
                                                                      • Instruction ID: 9c212896b0d9b630276ce7b2f18f9dbc1461a5a40e6c25a8fc41bf60413abacf
                                                                      • Opcode Fuzzy Hash: 884442e41bb36b59ce7e606469a2404c7bd651bce59b947aed96039606e10b78
                                                                      • Instruction Fuzzy Hash: C5011474E01118DFEB08DF68D684BACB7F2BB4A314F089059E90AE7695CB389D858F00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e260b11095748472d2af36b325d922ff92297ec895723618658b267df482d736
                                                                      • Instruction ID: 235e499d905d559d819c35967b18717ff9c77f0303d23c9feb8d19095ff4b00d
                                                                      • Opcode Fuzzy Hash: e260b11095748472d2af36b325d922ff92297ec895723618658b267df482d736
                                                                      • Instruction Fuzzy Hash: BEF05475904289AFCB45CF98D851BEDBFF4BB45310F24C5C9E8A5D6291C2358A42DB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2f4243a93474dedab69c2e4e27966ec02125528614196c843f612289120b0d4b
                                                                      • Instruction ID: bc3332c9ec35743224a9a6b0d9f4cd192a93bb690f2ec362100f84af3357d5e0
                                                                      • Opcode Fuzzy Hash: 2f4243a93474dedab69c2e4e27966ec02125528614196c843f612289120b0d4b
                                                                      • Instruction Fuzzy Hash: 48F05E30D49388AFCB45DFA8C84169CBFF4EF45201F1480DAC848D7342C6399946CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7cb0c8704974f8c64b3a14f2f2831a6c2edd4404342f73209a7a95961dbef449
                                                                      • Instruction ID: 14b531a64a116bf7e35d40cb494a344667bc64063b711421902676720c1a61f1
                                                                      • Opcode Fuzzy Hash: 7cb0c8704974f8c64b3a14f2f2831a6c2edd4404342f73209a7a95961dbef449
                                                                      • Instruction Fuzzy Hash: 2BF03435908248EFCB06DF94C880A9DBBB5FF49310F14C09AEC089B392C6369A56DB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: da471542ac5f0b48e4457d85bf01900e003d023cd51c02a85ba8dc2edc9d1049
                                                                      • Instruction ID: 20ee21fdad2df86860d9025ce5d5fcbb230064d5eab387e3dae7d44e2cf3feed
                                                                      • Opcode Fuzzy Hash: da471542ac5f0b48e4457d85bf01900e003d023cd51c02a85ba8dc2edc9d1049
                                                                      • Instruction Fuzzy Hash: 97F08C34E04248AFD700EFA9C54A3ADBFF4FB85700F1080EAE844A3391DE389A45DB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c3bc3f59080d3a1c0dee5c7c6bfc22ce85de05affb0f6c7250b7be8541df7d3b
                                                                      • Instruction ID: c706bafa715a0391b7dbd0036f708c33338581e7527369574c4452bac6e4e14b
                                                                      • Opcode Fuzzy Hash: c3bc3f59080d3a1c0dee5c7c6bfc22ce85de05affb0f6c7250b7be8541df7d3b
                                                                      • Instruction Fuzzy Hash: E3F09E78D0830ADE8B5CDFA994452BEBBF5A74E208F214556A50AE3300E37107448BD3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dca8bb37de3bcf285f1febef117353a0ac90f17b205efa8d0b399cf1adc3c23c
                                                                      • Instruction ID: d03443991dd26a9b1854e8640d13124519cc799fc0ca1b65f7f79c3f916b7b7d
                                                                      • Opcode Fuzzy Hash: dca8bb37de3bcf285f1febef117353a0ac90f17b205efa8d0b399cf1adc3c23c
                                                                      • Instruction Fuzzy Hash: A9F0E971608B429FD72ADF25EC1069977B0AF41714B004E35D0578E6E2DB24A50EC741
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c35c20e6f365ee3ffca65d012cfcce2e3f4c904ec4e7aa7cebae74fc7caaffd9
                                                                      • Instruction ID: 005226e46b83412f4188d4e6dbff04b171c7f2d7d1554075c10f52889fee0ff9
                                                                      • Opcode Fuzzy Hash: c35c20e6f365ee3ffca65d012cfcce2e3f4c904ec4e7aa7cebae74fc7caaffd9
                                                                      • Instruction Fuzzy Hash: 9DE09235A05208EBCB04DF98D941BDEBBF9FB45304F10C59D980423741C7319D56DA90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4519f06149cce2ac14ba296e752dcf7d16ec512e5bd125bcd47cb5fda73b9435
                                                                      • Instruction ID: 5d3699b88c49cc308411aa729f21d6e04d6150452ea3ac1da8d2cbdeb2a0a1e8
                                                                      • Opcode Fuzzy Hash: 4519f06149cce2ac14ba296e752dcf7d16ec512e5bd125bcd47cb5fda73b9435
                                                                      • Instruction Fuzzy Hash: 17F03074E04208AFCB44EFA8C8457ADB7F4EB49204F14C1A99858E3340D735AA46CF91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ddc5fbdc00c93c343aa89c3fcd21cfc641261b6a6981844ddb897976e1635220
                                                                      • Instruction ID: 17756ac94441bac51779afd6fac8317d8c7e1d0462349e5f90daf748b45c447e
                                                                      • Opcode Fuzzy Hash: ddc5fbdc00c93c343aa89c3fcd21cfc641261b6a6981844ddb897976e1635220
                                                                      • Instruction Fuzzy Hash: 17F03A35908388AFCB06CFA4C881A9DBFB1FF49200F1880DAE84497352C7319A11DB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 70473a952c92b44a109ff743c704ac1ec9d11e7ebede8fed0b6250bc4bc5d0fa
                                                                      • Instruction ID: 7038edf69e0c874c6889375174ca92f363ab36c041494d53cb64bde405c6210e
                                                                      • Opcode Fuzzy Hash: 70473a952c92b44a109ff743c704ac1ec9d11e7ebede8fed0b6250bc4bc5d0fa
                                                                      • Instruction Fuzzy Hash: F6014274A05218CFDB10CFA8CA49B8CBBF2BB09304F10509AD519BB782CB318E85CF24
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 13fabc6042d97d1dfff7c4a925926320005c73be7c57cdc66d0bba47c33493d2
                                                                      • Instruction ID: ac7910f69198ab4d468fb9a6e336b465c0d6736bfc3052896b223c3001519265
                                                                      • Opcode Fuzzy Hash: 13fabc6042d97d1dfff7c4a925926320005c73be7c57cdc66d0bba47c33493d2
                                                                      • Instruction Fuzzy Hash: BEF05834909284AFC714CBA8C454A98BFF0AB06324B24C2DAC9289B7A2CB359947CB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6408001097718996a842d98c06e77c14d293dd8178c1b8ad590073edfaec11e6
                                                                      • Instruction ID: d24747e47b14ebed81f87a842a27b4468e7613dfc00c79c3e3106d15aa83a9f2
                                                                      • Opcode Fuzzy Hash: 6408001097718996a842d98c06e77c14d293dd8178c1b8ad590073edfaec11e6
                                                                      • Instruction Fuzzy Hash: 97F01C75D04208AFCB58DFA9D9817DCB7F5EB48314F1480AACC18D3341E635AA46DB41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 790881d07bb926de985620798f715d01123cbdc97ac6a93003fba38f414762c0
                                                                      • Instruction ID: 465e706c57fd76ab53942f7b0d1e7261a1b0c79aeebd396cf5d46e5413f24860
                                                                      • Opcode Fuzzy Hash: 790881d07bb926de985620798f715d01123cbdc97ac6a93003fba38f414762c0
                                                                      • Instruction Fuzzy Hash: 51E06575508208AFC704DED4D851BADBFB8BB45314F14C59D984567341C6329A01D750
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 199fef1e86dfc5c29d5e2aed81a9e2f090fda0eb048064d07eae74c9c5e414ee
                                                                      • Instruction ID: ad1d7e84ed2b0b2b36abeaeff2bf52635ea8fb4088296d134d8a4f7ff6e23a67
                                                                      • Opcode Fuzzy Hash: 199fef1e86dfc5c29d5e2aed81a9e2f090fda0eb048064d07eae74c9c5e414ee
                                                                      • Instruction Fuzzy Hash: 8BE09235A04208EBCB04DF58D945BDDBBB9FB85300F20819CAC4463350C7319942DB61
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 72b4e812b1e6969cf7aee5d51766ac6dfa3a0b48116d44b4879109ee34d726f0
                                                                      • Instruction ID: 1117b38880c9e88990c4f2e09f7aeefa7e2ff1049fcb14e3d9567106db5b2b20
                                                                      • Opcode Fuzzy Hash: 72b4e812b1e6969cf7aee5d51766ac6dfa3a0b48116d44b4879109ee34d726f0
                                                                      • Instruction Fuzzy Hash: 07F01C35404208EBCB08DF94D981AE9BBB5FB49354F148059EC0527350D732DA66EB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 681af08a3514db1f569e4967acb78667d8efdd0224527bc717658e8b7d924105
                                                                      • Instruction ID: c341dda4c4a402e569a0f79fd03437806552a4d665f1ac3444835a7163087ca1
                                                                      • Opcode Fuzzy Hash: 681af08a3514db1f569e4967acb78667d8efdd0224527bc717658e8b7d924105
                                                                      • Instruction Fuzzy Hash: 59F039799482489FC705CF94C5516A8BBF0FB46204F2481DAD89A933A2C7369A02DB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 761e337577e22c51173acbcf6c486c6331b9c75da280f49a9f20ae1486d49b3f
                                                                      • Instruction ID: 93b30cd2e93a5612ab34f4831c746555ec89f2b0a88af03663a1b5e4e3cfe87f
                                                                      • Opcode Fuzzy Hash: 761e337577e22c51173acbcf6c486c6331b9c75da280f49a9f20ae1486d49b3f
                                                                      • Instruction Fuzzy Hash: 61F03A74E05209CFEB44DFA9E884A9DB7F6BF89304F149066E01AA77A5DB385C41CF11
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6d00a05456d363de918953413ff3a549faf95bf5900b6c0824f94b0bb8316b15
                                                                      • Instruction ID: b022d95e417d2272e365c208b6ef85913d7b1f266c023a9d0fdff3bc15e0c6d6
                                                                      • Opcode Fuzzy Hash: 6d00a05456d363de918953413ff3a549faf95bf5900b6c0824f94b0bb8316b15
                                                                      • Instruction Fuzzy Hash: 08F03035508248FFCB04DF94DD81B9DBBB5FB49311F14815AEC0467351C7369A56DB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8ca39c040a756de2c4c300c9783c4af05bf3efbe856993079c1b7f05ac28a7d0
                                                                      • Instruction ID: 13547f9b46312ee0f90907d3f07135f07d8ddf0aba1d30e9baf0682a8ae0f884
                                                                      • Opcode Fuzzy Hash: 8ca39c040a756de2c4c300c9783c4af05bf3efbe856993079c1b7f05ac28a7d0
                                                                      • Instruction Fuzzy Hash: ABF0D435A04208EFCB45DF98D940A9DBBF5FB48300F10C499AD18A3320D7329A62EF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1f0e1a1f3cef5d4314665b7875002e6688466d5b4334036fec0774565713256d
                                                                      • Instruction ID: 43ced713b730087d26c43f1a4c011e2c7903e845db2cb37d67a833049cebfbfb
                                                                      • Opcode Fuzzy Hash: 1f0e1a1f3cef5d4314665b7875002e6688466d5b4334036fec0774565713256d
                                                                      • Instruction Fuzzy Hash: C7F01575904208ABCB04DF94D881698BBB4EB88220F2480AADC05A7341D636AA86DB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 32e26ee9e9500634335f8da089a3f226991377d33203d33b3ace2de915275fad
                                                                      • Instruction ID: 510892d313d7d5645b03ce196fa40fad1b661b7cbdcf08ce36c03d31057f8912
                                                                      • Opcode Fuzzy Hash: 32e26ee9e9500634335f8da089a3f226991377d33203d33b3ace2de915275fad
                                                                      • Instruction Fuzzy Hash: 52F0F978A04219CFE750CF28C880B99B7B6BB89350F5091D5E408A7349C735AE85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c9a902cbad3c8a27dc426fb5d59c866aaaf1ecde1abdcaced20887546064c7d6
                                                                      • Instruction ID: d26238734ff225782273f745f53b9fcace5d787d8baac99790f54dfef8b4bfc1
                                                                      • Opcode Fuzzy Hash: c9a902cbad3c8a27dc426fb5d59c866aaaf1ecde1abdcaced20887546064c7d6
                                                                      • Instruction Fuzzy Hash: D8F05E35904148AFCB48CF94D541AD8BBF1FB04320F24819ADC2497391C73A9A47DB00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cecff433c924fa696dc098239dcaf5cdfbe4905ada35c63b81984bfc98dd9a29
                                                                      • Instruction ID: 876510230087b21eb143aa473b6280c0ce907630ebccb928f36cb9a2623ebcc9
                                                                      • Opcode Fuzzy Hash: cecff433c924fa696dc098239dcaf5cdfbe4905ada35c63b81984bfc98dd9a29
                                                                      • Instruction Fuzzy Hash: 14F03070E04308AFCB48DFA8C9456ACBBF4EB49204F14C09DC808E7341D6359E06CF41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d3a88b1065b57ff17565300c0c81b50427408eb09d7b731c851d31f811cc7436
                                                                      • Instruction ID: 36fb4dee9f384b5ed3e3193f53b562be019f8268dff1dae2a95f0d2511cde8cc
                                                                      • Opcode Fuzzy Hash: d3a88b1065b57ff17565300c0c81b50427408eb09d7b731c851d31f811cc7436
                                                                      • Instruction Fuzzy Hash: 1AF0F874908248AFCB84DFA9C880AADBBF8BB48300F14C4DAA859D3241D6359A11DF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4c3a3404e81332b186b8be679db8dd781fdadf8e7cc91eb5f73e5ae049ca59a3
                                                                      • Instruction ID: ca18a9278e1cc8cbce7f749ef165ae9f20011066f60ded578190dc21fbe34b49
                                                                      • Opcode Fuzzy Hash: 4c3a3404e81332b186b8be679db8dd781fdadf8e7cc91eb5f73e5ae049ca59a3
                                                                      • Instruction Fuzzy Hash: 85F03934904208AFC708DF98D8467ACBBF8FB89304F2480AED85463380DA71AA02CB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f81c5c7735c2f5da41a4a9e420f58e831c4923e17d479277cebb3a0f5e1650a5
                                                                      • Instruction ID: 03af501bcce6968749b42552ee4ff4895e2bb66243f7f337209a8bcaa67e1df1
                                                                      • Opcode Fuzzy Hash: f81c5c7735c2f5da41a4a9e420f58e831c4923e17d479277cebb3a0f5e1650a5
                                                                      • Instruction Fuzzy Hash: 55F0A0799042449FD714DFA8D4417DDBBF0EB45310F24C2DAC82997392C3369A47DB01
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fcb31ead2bb24726f47dbcbb2cf4a61de932a4916cab92af514f403ccc374b44
                                                                      • Instruction ID: 7aaf1409ef9bc9523da6d972574cc9fe077a37a8171f26d2888e62a4e4d6b139
                                                                      • Opcode Fuzzy Hash: fcb31ead2bb24726f47dbcbb2cf4a61de932a4916cab92af514f403ccc374b44
                                                                      • Instruction Fuzzy Hash: 9DE01A393401018FD704EB28EA84E9977B1EB8D318F204595F9049B3A6C731ED05CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 77963c134a14dc3ee8cb8c595e78bf085b353afe7da7498ba14896388c05c0c6
                                                                      • Instruction ID: 6d24f17ef6d32cfcdc0cdd4fc680bdf8c75bf440cd1710a1103eb702b2035f7e
                                                                      • Opcode Fuzzy Hash: 77963c134a14dc3ee8cb8c595e78bf085b353afe7da7498ba14896388c05c0c6
                                                                      • Instruction Fuzzy Hash: B3F01C359442489FCB04CE98C541BDCBBF1EB45321F24829AD85997391C7369A43DF54
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d12af7ebb6b83e78fb1d82c148745c3f7a505d03279e9deb375d4a21483dab4d
                                                                      • Instruction ID: 04e473b2183890fccceb35a19fc0424ae5dd9c6e48814e3c1d38ece3ee82385f
                                                                      • Opcode Fuzzy Hash: d12af7ebb6b83e78fb1d82c148745c3f7a505d03279e9deb375d4a21483dab4d
                                                                      • Instruction Fuzzy Hash: A4F06D75D04208AFCB04DF98E88179CBBF4FB49214F2481AACC18A7342C735AA86DF81
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0fd7eea364e8cc7d7870485d3de81acaa3caf2c87a2b19441a1603692445a156
                                                                      • Instruction ID: a68c8bed3d2ca4d43660b3da4668616e8a68a301f0bee945f5318e4a2a692bd8
                                                                      • Opcode Fuzzy Hash: 0fd7eea364e8cc7d7870485d3de81acaa3caf2c87a2b19441a1603692445a156
                                                                      • Instruction Fuzzy Hash: ACF01CB1E08398EFCB45DFA8D85569CBBF4FB49200F0484EA9858D7342D6359A45CF41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 07af80bffba2ebf029f8cff27cc2ba7fd865b4d11ff759eb5207e192828ad567
                                                                      • Instruction ID: 243542b791b140e000fbd9b84df182740acfa22f391175ccdc77e8467c88e870
                                                                      • Opcode Fuzzy Hash: 07af80bffba2ebf029f8cff27cc2ba7fd865b4d11ff759eb5207e192828ad567
                                                                      • Instruction Fuzzy Hash: EEF0A5B5E05208AFCB88DFA9D9867ACB7F4EB48204F1485A99819E3351E6359A46CB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e0ce34126fcec9bc28439e57ea06c3964fde60d63c10b9de8d586e80e55a4c53
                                                                      • Instruction ID: fbbb5f8be16afd5994c14473359e3ef7840eca9fed437f1cf28bf861bee8d2a0
                                                                      • Opcode Fuzzy Hash: e0ce34126fcec9bc28439e57ea06c3964fde60d63c10b9de8d586e80e55a4c53
                                                                      • Instruction Fuzzy Hash: D4E06D75D04208AFCB08DF94D4817DCB7F4FB44220F1485A9CC0897361C639AE46DB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e4ced9681931e948e7beefcda989570eaf459a0be868d8ebbc08ac409b5f2bc0
                                                                      • Instruction ID: 641ffe6b420aa2ba3ca52a78166feb595265c689830d01c8c025ed9d27e77537
                                                                      • Opcode Fuzzy Hash: e4ced9681931e948e7beefcda989570eaf459a0be868d8ebbc08ac409b5f2bc0
                                                                      • Instruction Fuzzy Hash: 8DF0BD74E011088FEB58DF69D985B9CB7F2BB89300F1480A5E519A77A5DB3459858F00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4d970961f1e9251b260c37903e3038d717e969129cc00bcfdc0f3bd963fb68a2
                                                                      • Instruction ID: 23792132f4d8c3b1a07abbeace32425c07030d139872721a25051a8c754f0a39
                                                                      • Opcode Fuzzy Hash: 4d970961f1e9251b260c37903e3038d717e969129cc00bcfdc0f3bd963fb68a2
                                                                      • Instruction Fuzzy Hash: ADE0C22570D7851FE7134729A8216953FFA4F57604B0A46E3E489CB3A7E9A4DC09C362
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0ca8012590694cdce0da0975ed39d8e44c6d672e7672275c9d2293e3b9c04956
                                                                      • Instruction ID: 36df5fb10fe513f22cdd5ac69b8b33a1f47c5e7dc83dd3d53b193ffdd4845466
                                                                      • Opcode Fuzzy Hash: 0ca8012590694cdce0da0975ed39d8e44c6d672e7672275c9d2293e3b9c04956
                                                                      • Instruction Fuzzy Hash: 58E04835700309A7C720DA26EC84D9BFBDBDFD0674710DA39E10A8B125DE70AD8687A5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 057080cb13d46074853ac60152eca9946f372dc0abf4ab77253f5d0b266d0731
                                                                      • Instruction ID: d79c8d004035829329a2ce33b54eb6652807d12dbe89c63c335fe33284761fc5
                                                                      • Opcode Fuzzy Hash: 057080cb13d46074853ac60152eca9946f372dc0abf4ab77253f5d0b266d0731
                                                                      • Instruction Fuzzy Hash: FCE09275909208EFCF04DF94EC41A99BFB5FB55311F14C2A9D80467351DB319E02DB54
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9faeae50fc736cb87bf1d6ee7c2b6391b8f340aed0410096a6a21e4550f8f460
                                                                      • Instruction ID: 09fd2589bcabd641637949ac4427e64d02689d7a508f618408379982b1b82938
                                                                      • Opcode Fuzzy Hash: 9faeae50fc736cb87bf1d6ee7c2b6391b8f340aed0410096a6a21e4550f8f460
                                                                      • Instruction Fuzzy Hash: E4E09274904208AFDB44EFE8CC82798BBF4EB05200F1840ADCC0DD7341D6359E46CB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 86d06b862cafbce11651fb625901c17bc2a36f7434a278262211aa594bf1621d
                                                                      • Instruction ID: 9e1c4fc199fa4b9981864b08b130505d3fafbc7ce1336fe8f7be487b5e7c3e75
                                                                      • Opcode Fuzzy Hash: 86d06b862cafbce11651fb625901c17bc2a36f7434a278262211aa594bf1621d
                                                                      • Instruction Fuzzy Hash: CEE0D835404208EFCB08DF50E985B9DBBF4FB45310F148099DC04A7340C73AAE46EB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cb75883f1f0aedb063bd595c59c0d2c8898a00d0a36549ca4ad0aac1bcc77cf3
                                                                      • Instruction ID: edce6b0521c6fd4006af5edffa7476d806adba1af660df10b5ce1bfea652cfe8
                                                                      • Opcode Fuzzy Hash: cb75883f1f0aedb063bd595c59c0d2c8898a00d0a36549ca4ad0aac1bcc77cf3
                                                                      • Instruction Fuzzy Hash: 5CF0B774916228CFEB50DFA8D888B9DBAB5BB08314F1195D9D50EA3240DB755A80CF41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7e3f07bfa8a0dd03db4d0017784ce3e077757b55d3038d9677ff10e982441f37
                                                                      • Instruction ID: a6908609e8cbb43037d5c0e58341c0acd1c9641a83f057951e78e821240c48c1
                                                                      • Opcode Fuzzy Hash: 7e3f07bfa8a0dd03db4d0017784ce3e077757b55d3038d9677ff10e982441f37
                                                                      • Instruction Fuzzy Hash: A8F01534D0420CEFCB88DFA8C840A9CBBF4EB48310F10C0AA9818A3311D7319A15DF81
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a09bee1df03dc402cdd9e9a7e4c574983325997e09b860a275d200405493cc7c
                                                                      • Instruction ID: 579921e87702de3c6e210a779417af6a419a19ed0cee5d1eb0c14fecbaed7319
                                                                      • Opcode Fuzzy Hash: a09bee1df03dc402cdd9e9a7e4c574983325997e09b860a275d200405493cc7c
                                                                      • Instruction Fuzzy Hash: 5AE0863535D1449BD308CA54D9517A9BBB6FB8671CF24858CC80947391CB379D43CB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1f020e133a6230c52d5bfd019b7e46c41ab67884923709ac7e333825f5f9ff28
                                                                      • Instruction ID: 3e2ce77793d4ee113381b2edb0ea5257a2e3b131800e5928803ae78966c36fdc
                                                                      • Opcode Fuzzy Hash: 1f020e133a6230c52d5bfd019b7e46c41ab67884923709ac7e333825f5f9ff28
                                                                      • Instruction Fuzzy Hash: E1E0927590D348ABC704DFA4D88179CBBF4EB46304F148199C80457382D7319E03DB92
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9d18e3c04f19ea43efa30e681d24ea7603aff34a65ebf2f48fc48ab992166f0a
                                                                      • Instruction ID: 3c3f3e9e8927e1e013115905808abfa08a09236248236beceef91f3e506100f4
                                                                      • Opcode Fuzzy Hash: 9d18e3c04f19ea43efa30e681d24ea7603aff34a65ebf2f48fc48ab992166f0a
                                                                      • Instruction Fuzzy Hash: 71F0F874E06208DFDB04DF69E880A9DBBF6BF89304F149066E41AA33A5DB385C44CF14
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 087ef5a96d194f6509a90bc2aa9a15a84b7e600c82f2660d2792d4c32acc1a36
                                                                      • Instruction ID: 2011f99bf596d61c01bf9d666609161e9bb0440098201c991d984bdcd0a8873f
                                                                      • Opcode Fuzzy Hash: 087ef5a96d194f6509a90bc2aa9a15a84b7e600c82f2660d2792d4c32acc1a36
                                                                      • Instruction Fuzzy Hash: 31F03974D08248AFCB08DF98C8966ADFBF4FB46205F1480DAC808A7392DB319E46CB41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dd2c0359d64545748e9eb342a5cdf82e7817fae1198a8c0141d997914a1bf0a5
                                                                      • Instruction ID: c51d7861e2344bd0420c742803786fa1c2dafbeedc8c57c50e76a508ac298f18
                                                                      • Opcode Fuzzy Hash: dd2c0359d64545748e9eb342a5cdf82e7817fae1198a8c0141d997914a1bf0a5
                                                                      • Instruction Fuzzy Hash: E2E0ED74D04208EFCB44DFA8D98569CB7F4FB48304F10C1AAD808A3340D7369A46DF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b5a1d1ebe655c69f00b669dbfeaf49b2898f39b880b9f1dbf6228309dbf3d4f5
                                                                      • Instruction ID: f1eba9ccf6b4913cbc0a1c1f9f52d36d4a815715dba406d50b94c673a9b4ae09
                                                                      • Opcode Fuzzy Hash: b5a1d1ebe655c69f00b669dbfeaf49b2898f39b880b9f1dbf6228309dbf3d4f5
                                                                      • Instruction Fuzzy Hash: F5E0DFB5948208EFCB08EF90DC89BADBBB9EB44310F14C1A99C0863341C731AE46DB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ce4a6ae969483dbdd0c2d9b662fae9407e930fe8529d01a112fbafc97cf61ce5
                                                                      • Instruction ID: 0d8dbf48736dd228c85bfebfdf2a8b8aac21c9deda4648a20ec3c68a3208f87c
                                                                      • Opcode Fuzzy Hash: ce4a6ae969483dbdd0c2d9b662fae9407e930fe8529d01a112fbafc97cf61ce5
                                                                      • Instruction Fuzzy Hash: F0F01534D04208EFCB84DFA9C841A9CBBF5FB48300F14C1AA9C18A3310D7319A51DF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7ad5d15aeed3ac66f6d2cbc567a79aa17a9799f76581c793af5d23560276ecc2
                                                                      • Instruction ID: 5252aa3dce6cf5988ef2d9bf907066b3c412e5f0aa1931463586a535a2822dfa
                                                                      • Opcode Fuzzy Hash: 7ad5d15aeed3ac66f6d2cbc567a79aa17a9799f76581c793af5d23560276ecc2
                                                                      • Instruction Fuzzy Hash: B4E04F71A11208ABDB04EF79E9927FEB7F6EB46214F4046A5E404E7240E9355E05D790
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6a7f766ad1d6e9e4690d7590d387f6a6353bf36d3adbfe0b4421ab4b852d9eb2
                                                                      • Instruction ID: bc7a1894fd77e59b9e893793fa783f9f04961356d1a0cbbaebc1300ce0e94a78
                                                                      • Opcode Fuzzy Hash: 6a7f766ad1d6e9e4690d7590d387f6a6353bf36d3adbfe0b4421ab4b852d9eb2
                                                                      • Instruction Fuzzy Hash: 35F01734A05109CFDB18DF59D94469CB7F2FB44300F689069E40AE36A4DB345D81CF01
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8fb1c1dab09e25c741d4d97d894a955f1b01abf382d135ac1e4d9cf76251560e
                                                                      • Instruction ID: e3611a869d7d3a42caccd13109085fb394ca882d589b70ff9369a1f76ad02d0b
                                                                      • Opcode Fuzzy Hash: 8fb1c1dab09e25c741d4d97d894a955f1b01abf382d135ac1e4d9cf76251560e
                                                                      • Instruction Fuzzy Hash: 58E0C974D04208EFCB48DFA8D58569DB7F4EB49204F54C1A9DC09E3340D736AE46DB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0b5ee70fd17fcc0c89b456e940026a1928f8adc4a2748882424a6288ae48077d
                                                                      • Instruction ID: 986c07841eb65c7f9bb11b9ec31595c29b0771cffe316f19b33ae53e16a12311
                                                                      • Opcode Fuzzy Hash: 0b5ee70fd17fcc0c89b456e940026a1928f8adc4a2748882424a6288ae48077d
                                                                      • Instruction Fuzzy Hash: 6FF03974E042089FD740EFA9D14A2ADBBF5EB48300F1081EAD814A3394DA384A45CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6b82db444da95037f703aa83db1e8220fc7219d4aa2fa193e1487d47e85328b4
                                                                      • Instruction ID: 514729e0e5de4fa8954831c671a9e4bd0affbc3547ee0ef7b347d7779921aa04
                                                                      • Opcode Fuzzy Hash: 6b82db444da95037f703aa83db1e8220fc7219d4aa2fa193e1487d47e85328b4
                                                                      • Instruction Fuzzy Hash: FFE0E574E04208EFCB44DFA8D944AADFBF5FB48300F10C1AA9809A3351D7329A52DF84
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6b82db444da95037f703aa83db1e8220fc7219d4aa2fa193e1487d47e85328b4
                                                                      • Instruction ID: 1a89ee09f48441ca796b8658384ce949430a45b6372c325a9acfc9133f98b88c
                                                                      • Opcode Fuzzy Hash: 6b82db444da95037f703aa83db1e8220fc7219d4aa2fa193e1487d47e85328b4
                                                                      • Instruction Fuzzy Hash: 56E0C274E05208EFCB44DFA8D944AADBBF5FB48300F10C1AA9809A3351D7329A92DF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6b82db444da95037f703aa83db1e8220fc7219d4aa2fa193e1487d47e85328b4
                                                                      • Instruction ID: 4eecdd1d10c202ad1c2d14fde8cd2d1d21958bcd2a768571b851c8ca1a655cbd
                                                                      • Opcode Fuzzy Hash: 6b82db444da95037f703aa83db1e8220fc7219d4aa2fa193e1487d47e85328b4
                                                                      • Instruction Fuzzy Hash: 50E0C274E04208EFCB84DFA9D944AADBBF5EB48300F10C1AA9818A3351DB319A52DF84
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6efdef634a79aacc740ba9a38df97877a0317936539ab7ed44f6f3d5ae601503
                                                                      • Instruction ID: 65256d836fcb0eb9b3b4421ad468a1fa719ae60741b0ea84e92b00493a10e487
                                                                      • Opcode Fuzzy Hash: 6efdef634a79aacc740ba9a38df97877a0317936539ab7ed44f6f3d5ae601503
                                                                      • Instruction Fuzzy Hash: A0E02630700305AFDE2CEA69584077133996F00645F280424EB06EF290ED62EC028352
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5d7f7c18cfb706965d3d3b06aee7091dd3d9420fe5421f12853f93da2f27287b
                                                                      • Instruction ID: 188f58bdc7547010f45fe5c8e26accf5993ba3aaa382bcb0fa15718ef9fe07f8
                                                                      • Opcode Fuzzy Hash: 5d7f7c18cfb706965d3d3b06aee7091dd3d9420fe5421f12853f93da2f27287b
                                                                      • Instruction Fuzzy Hash: 76E0ED74E04208EFCB44DFA8D544A9DFBF5FB48300F10C1A99819A3350D7329A52DF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5d7f7c18cfb706965d3d3b06aee7091dd3d9420fe5421f12853f93da2f27287b
                                                                      • Instruction ID: fd852f2d3c0aab75764121c1b6ab5ef8befd532de9618216f15308d8d4bd5477
                                                                      • Opcode Fuzzy Hash: 5d7f7c18cfb706965d3d3b06aee7091dd3d9420fe5421f12853f93da2f27287b
                                                                      • Instruction Fuzzy Hash: 49E0C274E08208EFCB44DFA8D984AADBBF5FB48300F14C1AA9819A3350D7319A52DF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5d7f7c18cfb706965d3d3b06aee7091dd3d9420fe5421f12853f93da2f27287b
                                                                      • Instruction ID: 25d44371d090d5c10732592a5b21a9640414e71150150f79550661255ec8f1e0
                                                                      • Opcode Fuzzy Hash: 5d7f7c18cfb706965d3d3b06aee7091dd3d9420fe5421f12853f93da2f27287b
                                                                      • Instruction Fuzzy Hash: 7FE0E574E04208EFCB44DFA8D984AADFBF5FB88300F14C1AA9819A3350D7319A52DF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1d6d787bbb8ed330b10cffb71c0f5c755e5ba8c7454b5acc79e22b75acbd3441
                                                                      • Instruction ID: ca4ca4486dc8fdbd6efcb558ca90e453b99e55242d6002b84d2af8f5e1b2d57b
                                                                      • Opcode Fuzzy Hash: 1d6d787bbb8ed330b10cffb71c0f5c755e5ba8c7454b5acc79e22b75acbd3441
                                                                      • Instruction Fuzzy Hash: 7AE0C27A9092048FE704EFA0E6423E977A4EB42315F25459AC8095B391DB7B8D47D740
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: aa4566d7c08e04bab39959de5db8a861871964c0b097f5720e21e9d0ec82929e
                                                                      • Instruction ID: 5f528ed2b3db35314b15492189bf6cb83003687be8981a70bacd456c6d37bdc7
                                                                      • Opcode Fuzzy Hash: aa4566d7c08e04bab39959de5db8a861871964c0b097f5720e21e9d0ec82929e
                                                                      • Instruction Fuzzy Hash: 09E0E578E04208EFCB44DFA8D5446ECFBF8EB88200F10C1A98808A3341D7729E52DF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b20757dc9a6634eb7c0137cf8e90df3bf70cfb94bb00da29d80dd5f74b2d8485
                                                                      • Instruction ID: a902c295debad374af633d1b53fc9811eff03acc69bbf52d7bab28e9f2efd88b
                                                                      • Opcode Fuzzy Hash: b20757dc9a6634eb7c0137cf8e90df3bf70cfb94bb00da29d80dd5f74b2d8485
                                                                      • Instruction Fuzzy Hash: C1E01A74E04208EFCB88DFA8D5446ADFBF4FB48300F10C5A99828A3341DB319A02CF41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8d382ee4fcffd08c1f431938a3ab40de308f5665e305927400429037f8f85814
                                                                      • Instruction ID: a23b6f4954ed2bc255b3f55291c25f0bba4a97c2cef3137a3ce47ed8d435bac5
                                                                      • Opcode Fuzzy Hash: 8d382ee4fcffd08c1f431938a3ab40de308f5665e305927400429037f8f85814
                                                                      • Instruction Fuzzy Hash: B8E0E574E04208EFCB44EFA8D5446ACBBF4EB49200F10C1AA9858A3350D7319A42CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0cb2ebd8ec9c2b81d9ce0123c31444b2f340bb787c011210bdb36adb0ae370b1
                                                                      • Instruction ID: 99f0a16f76b6bac37ea898f155aa73863655d49e3af5373a320f05f96c300e4c
                                                                      • Opcode Fuzzy Hash: 0cb2ebd8ec9c2b81d9ce0123c31444b2f340bb787c011210bdb36adb0ae370b1
                                                                      • Instruction Fuzzy Hash: 9AE01A35908208FFCB04DF94D944AADBBB6FB49300F10C199EC0527350C7329A62EB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8d382ee4fcffd08c1f431938a3ab40de308f5665e305927400429037f8f85814
                                                                      • Instruction ID: e8f6c82c6b414a6efb46088808acb87a5a457d728cce261bad95bdb3da7446b5
                                                                      • Opcode Fuzzy Hash: 8d382ee4fcffd08c1f431938a3ab40de308f5665e305927400429037f8f85814
                                                                      • Instruction Fuzzy Hash: CDE0E574E04208EFCB84DFA9D5456ACFBF4FB48201F10C1A99818A3340DB319A02DF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 73a0886289fe13ece0ad725f8845df5d4bae19f28fa2e3a3a2db2add413f1a27
                                                                      • Instruction ID: e2382d6b3f69621d9efa9b08cd777419f49dd63ddddba048f80b242e13bf04bf
                                                                      • Opcode Fuzzy Hash: 73a0886289fe13ece0ad725f8845df5d4bae19f28fa2e3a3a2db2add413f1a27
                                                                      • Instruction Fuzzy Hash: E3E0E574E08258EFCB84DFA9D5456ACBBF4AB49200F10C4AA9858A3341DA359A46DF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8d382ee4fcffd08c1f431938a3ab40de308f5665e305927400429037f8f85814
                                                                      • Instruction ID: f4177e2370b2df405ba89cfbccd133a7f90fee6d33756138cafd0fd63d5f7115
                                                                      • Opcode Fuzzy Hash: 8d382ee4fcffd08c1f431938a3ab40de308f5665e305927400429037f8f85814
                                                                      • Instruction Fuzzy Hash: EFE0E574E05208EFCB44DFA8D5456ACBBF4EB48310F10C1A98808A7341DB359A46CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ea4742752e3eb8b1c8219211da9dcb3440d2de8c85b679e24f8e64e7a2d147d4
                                                                      • Instruction ID: daa149d3b602e96b7e51ed288affb125187aaeb4c319aa5c24b705a3f7aed7ee
                                                                      • Opcode Fuzzy Hash: ea4742752e3eb8b1c8219211da9dcb3440d2de8c85b679e24f8e64e7a2d147d4
                                                                      • Instruction Fuzzy Hash: 90E0E574E04208EFCB88DFA9D5456ACBBF4FB48204F14C1A98819E3340D7319E46CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ea4742752e3eb8b1c8219211da9dcb3440d2de8c85b679e24f8e64e7a2d147d4
                                                                      • Instruction ID: de4ee15ff519a05391964f527e144270e61d9975b8a7372d3ac00f6ed96afaf4
                                                                      • Opcode Fuzzy Hash: ea4742752e3eb8b1c8219211da9dcb3440d2de8c85b679e24f8e64e7a2d147d4
                                                                      • Instruction Fuzzy Hash: 59E0ED74D04208EFCB48EFA9D54469CB7F5FB48204F14C1A98818D3341D7319E01DF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ea4742752e3eb8b1c8219211da9dcb3440d2de8c85b679e24f8e64e7a2d147d4
                                                                      • Instruction ID: e98de4501fffbcb95880188350661c8c258fe22b866631140043364fd11ce338
                                                                      • Opcode Fuzzy Hash: ea4742752e3eb8b1c8219211da9dcb3440d2de8c85b679e24f8e64e7a2d147d4
                                                                      • Instruction Fuzzy Hash: 46E0C274E04208AFCB88EFA8D9456ACBBF4EB48204F14C1ADC808A3340E6319A06CB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 08dfce2d5f624898184618773e904506641c9cc315dcc7c545591b44bd75520f
                                                                      • Instruction ID: 110af329df03c415d35f4a737f804ddbce09ceaa8607a2d466e26c6898b8fcde
                                                                      • Opcode Fuzzy Hash: 08dfce2d5f624898184618773e904506641c9cc315dcc7c545591b44bd75520f
                                                                      • Instruction Fuzzy Hash: 17E0E574E04208EFCB44DFA8D544AACBBF4EB48300F10C1A98818A3344E7319A02DF41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 08dfce2d5f624898184618773e904506641c9cc315dcc7c545591b44bd75520f
                                                                      • Instruction ID: 1d9ebb233d392fcc35d3338ac936635804224e4c740a493a1c3c81339310efc6
                                                                      • Opcode Fuzzy Hash: 08dfce2d5f624898184618773e904506641c9cc315dcc7c545591b44bd75520f
                                                                      • Instruction Fuzzy Hash: 4CE0E574E04208EFCB44DFA8D544AACFBF4EB48200F20C5A98818A3340D7319A02CF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 08dfce2d5f624898184618773e904506641c9cc315dcc7c545591b44bd75520f
                                                                      • Instruction ID: 2b92509ebc4fa2be56e1716a7a38464cb6049450584772bb33710c39fa3be515
                                                                      • Opcode Fuzzy Hash: 08dfce2d5f624898184618773e904506641c9cc315dcc7c545591b44bd75520f
                                                                      • Instruction Fuzzy Hash: 6DE0E574E04208EFCB84DFA8D984AACBBF4EB48300F10C5A98818A3340D731AA02DF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 49fd920602b1398e5008115dc248b649e8b77db769b1ef3d47692ec8b5b333bb
                                                                      • Instruction ID: 2e35522f618094e9bd222513529bef610e7499e8a12d20034c4b563c7def213d
                                                                      • Opcode Fuzzy Hash: 49fd920602b1398e5008115dc248b649e8b77db769b1ef3d47692ec8b5b333bb
                                                                      • Instruction Fuzzy Hash: F8E09B34904204DFCB08DF90D945A9DBFB9BB86314F24D19DD80463351C3314A45DB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3e00eedbe375e01fac4e9a29eda6750d7fe00022596944d1f5c94e9ed28fdd20
                                                                      • Instruction ID: 36f04854500bf30291ff4fb078749e3c4a9f00f1f9388b0fec2b2afcaee68bdd
                                                                      • Opcode Fuzzy Hash: 3e00eedbe375e01fac4e9a29eda6750d7fe00022596944d1f5c94e9ed28fdd20
                                                                      • Instruction Fuzzy Hash: 98E08676908240DBE708EA90DA423E4F7A0EB46314F14949D8404573A2E7368E47C711
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3e80142fba7b3b842b3808198be59f414c756a14cde49cd68b02164bd2c513a8
                                                                      • Instruction ID: 6b60dc20b77a1f140cdae0d748ba7deba0e9c293dd97e8c470ed465b786ee4cc
                                                                      • Opcode Fuzzy Hash: 3e80142fba7b3b842b3808198be59f414c756a14cde49cd68b02164bd2c513a8
                                                                      • Instruction Fuzzy Hash: 4CF02274A10119DFDB50CF28C984B99B7B5FB49314F009695A80DE7345D7709E86CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b7d82963b8fd02e2d68fe917b45197b47981de5f009e3e2d8fe1de6305233e07
                                                                      • Instruction ID: d229ef4a531b3b2efc97c78e85b1d4ad458bc2c068cc229519aeabccd6fc26e8
                                                                      • Opcode Fuzzy Hash: b7d82963b8fd02e2d68fe917b45197b47981de5f009e3e2d8fe1de6305233e07
                                                                      • Instruction Fuzzy Hash: 34E0E574904208EFCB04DF98D544AACBBF5EB49310F10C1A9980863350D7319A52DF80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: debda3084285c9ad4a2ba4868aa8dd9fee3d46fefc7d33bf0bab61fb9c407708
                                                                      • Instruction ID: fe9f79a15cc627cddc37068e0dc7108fc47192e5a8b25dc71d1d194522032ecb
                                                                      • Opcode Fuzzy Hash: debda3084285c9ad4a2ba4868aa8dd9fee3d46fefc7d33bf0bab61fb9c407708
                                                                      • Instruction Fuzzy Hash: D4E04F3490120DABCB00FFB4D98179D7BF9DB46304F6082A9E808D3342DA71AF06C791
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1575bbe32e7beaa90f4da6822a3d79fbedfc71b913484790301a73f04d3f7dcb
                                                                      • Instruction ID: 077c0cd5f6d1fbef8173c2d1f0e1ccc887b35c76458b8797241f924cde67347d
                                                                      • Opcode Fuzzy Hash: 1575bbe32e7beaa90f4da6822a3d79fbedfc71b913484790301a73f04d3f7dcb
                                                                      • Instruction Fuzzy Hash: 52E04F7490820CAFCB04DFD4D944AADBFB8BB45310F10C59D984567341C7319A52DB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 840842a7279cef77e2f9d227f1fc5c99f774f5d6375702a28bb44582a5f51f93
                                                                      • Instruction ID: 089b063bdd0bf1e800de07fe89829a049a288881576e27933656ca98ddc8f5bf
                                                                      • Opcode Fuzzy Hash: 840842a7279cef77e2f9d227f1fc5c99f774f5d6375702a28bb44582a5f51f93
                                                                      • Instruction Fuzzy Hash: 12E01234D08208EFCB04DFA9D5406ECBBF9AB88200F1081AA981863341C6729E42DB80
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9d3b6df9576117264d2476cad9e2b8bae82d413d3761791beced559670c726d6
                                                                      • Instruction ID: 1e3fe88e827fdae89f065c751c81e733d402819fadc041b6166cf15707449ec6
                                                                      • Opcode Fuzzy Hash: 9d3b6df9576117264d2476cad9e2b8bae82d413d3761791beced559670c726d6
                                                                      • Instruction Fuzzy Hash: B4E08C74908208EFCF04DF94E941AADBBB5FB49301F10C2A9DD0423350DB329E52EB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9d3b6df9576117264d2476cad9e2b8bae82d413d3761791beced559670c726d6
                                                                      • Instruction ID: a8c536a2a2df9a62c6a15b831117f2eae1961f9dc5b5539f33b3ba8932454a80
                                                                      • Opcode Fuzzy Hash: 9d3b6df9576117264d2476cad9e2b8bae82d413d3761791beced559670c726d6
                                                                      • Instruction Fuzzy Hash: 44E08C34A08208EFCB04EFA4D9449ADBBB9FB45300F20C1A9DC0523350C7329E92DF90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4097bcaf236a3792d060c9b8d244bd58ccbb2ae750f71f6cc242d5d4f0ac71b0
                                                                      • Instruction ID: 50e52edaa2e60ddbd4e932ee463d0c6a50e5c671c6b35dd65e3d8dbf3435923d
                                                                      • Opcode Fuzzy Hash: 4097bcaf236a3792d060c9b8d244bd58ccbb2ae750f71f6cc242d5d4f0ac71b0
                                                                      • Instruction Fuzzy Hash: 3BE09A74D04208EFC744DF98D5556ACB7F5EB48304F20C1A9985997351D7319A46DF81
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9d3b6df9576117264d2476cad9e2b8bae82d413d3761791beced559670c726d6
                                                                      • Instruction ID: f90fa9e3b9c36dd4186e9e82790c3f3184579290c4f6647c55f5d6e2e35df34e
                                                                      • Opcode Fuzzy Hash: 9d3b6df9576117264d2476cad9e2b8bae82d413d3761791beced559670c726d6
                                                                      • Instruction Fuzzy Hash: 3CE04634A09208EBCB04DF94DA449ADBBB9EB49300F10C5AA980427351C7329A92DB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 80db05d0356db1151e1f1463f5ac5739cb15c18fa237c17c6ab19fe1e5e5a82c
                                                                      • Instruction ID: 4d14ebba8151255b7a5b44931b4d8cfc9bb13e2c3095107253ea1efd26fffd75
                                                                      • Opcode Fuzzy Hash: 80db05d0356db1151e1f1463f5ac5739cb15c18fa237c17c6ab19fe1e5e5a82c
                                                                      • Instruction Fuzzy Hash: 25E01A34D04208EFCB04DF98D5456ADF7F4FB49200F1081A9C81853350CB319E42CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 518e064dc27a5f2b2215e71a5d53c8075bd690ed480885baa03ddaa5050841d7
                                                                      • Instruction ID: 01d6103b6bd7f054fb2f9f1f24d6a9696a5c4bfaabcd8ae232d24640e8a4ff6e
                                                                      • Opcode Fuzzy Hash: 518e064dc27a5f2b2215e71a5d53c8075bd690ed480885baa03ddaa5050841d7
                                                                      • Instruction Fuzzy Hash: 94E09A749042089FCB44EFA8D945698BBF5AB49604F1481A9CC09D3351D6319E46CB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6d523e22581341d87b9cc767a6a6ec1d3733a8bf246b9bbfdec8610aaa55c32f
                                                                      • Instruction ID: 637f60404026a01c4844a161477bc8baec01a2b5077eba7f3a1798589578e085
                                                                      • Opcode Fuzzy Hash: 6d523e22581341d87b9cc767a6a6ec1d3733a8bf246b9bbfdec8610aaa55c32f
                                                                      • Instruction Fuzzy Hash: B0E01A34D04208EFCB48DF98D5416ACB7F4FB48214F1481A98C0897360C7319E42CB40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0216f5e242b9dd8f48fa024a28e61d1ad089680c31ed3c6f611f686fb2276f1d
                                                                      • Instruction ID: 9aa6e32a5184f030438dff226ea8634dcb498e320ee63902f2aab9bb4bcdc7f8
                                                                      • Opcode Fuzzy Hash: 0216f5e242b9dd8f48fa024a28e61d1ad089680c31ed3c6f611f686fb2276f1d
                                                                      • Instruction Fuzzy Hash: 01F01534A002188FCB14EF64D94279DBBF1FB89304F1090AAE90AB7394CF381E848F61
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e2859931d0c1b594025c93fcd130c6794c9a8a70829d4a5c953b41e72dcbd3f0
                                                                      • Instruction ID: b0012d46dc67242a6759ba39c5e44c6cf7583c46c03906ee235f084118fadfa3
                                                                      • Opcode Fuzzy Hash: e2859931d0c1b594025c93fcd130c6794c9a8a70829d4a5c953b41e72dcbd3f0
                                                                      • Instruction Fuzzy Hash: BCE04634D08208EFCB04DFA8D544AACFBF8EB88200F10C1EAC818A3341D7359A02DBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 989d76ebf70b6d5b2f63323287ff7f65b7b739c963a1450f502bf27d33c72e30
                                                                      • Instruction ID: a8fe06f208ebe065042cd5e02552e1dc63cc1711fbc92fdae4bcad378fa399a9
                                                                      • Opcode Fuzzy Hash: 989d76ebf70b6d5b2f63323287ff7f65b7b739c963a1450f502bf27d33c72e30
                                                                      • Instruction Fuzzy Hash: 1BE01238D08208AFCB04DFA8D5426ACFBF8BB88300F1081EED84863341CB319A02DB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 99241d204b39bb30289181f717975fa33973564cdf66a8dc0104dca492046fab
                                                                      • Instruction ID: 8be70da3cbb0d147510bd90ff48819ace1ac8ac81b490e9a906a8317bc71482b
                                                                      • Opcode Fuzzy Hash: 99241d204b39bb30289181f717975fa33973564cdf66a8dc0104dca492046fab
                                                                      • Instruction Fuzzy Hash: F0E04634908208EFCB08DF94D9449ADBBB9BB45304F2081AD980423352C7329A52EB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3014e202654978046e585fe3498a2b941d742a8f83ae898c9416212986e64421
                                                                      • Instruction ID: 4045e236c71804b1e1f1fa1aeefa3107c51fd946e73b14dc05ec9500b052afe5
                                                                      • Opcode Fuzzy Hash: 3014e202654978046e585fe3498a2b941d742a8f83ae898c9416212986e64421
                                                                      • Instruction Fuzzy Hash: 5CE01273449185AFD7415EA0CE647853F618B53305F0A4063D504CA593DB2586079651
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 76d2845ac7bc869d5435839d16d4dfc12f934200bc6068bf1510c7c790f9c482
                                                                      • Instruction ID: 69ed785942a59adc2df23965fee56c9c3ad9cf7492139521a341c850ad6a5710
                                                                      • Opcode Fuzzy Hash: 76d2845ac7bc869d5435839d16d4dfc12f934200bc6068bf1510c7c790f9c482
                                                                      • Instruction Fuzzy Hash: F7E0EC7190530CEFD714EFB5A90969ABBF8AB49251F1045A59509A3110EF314A04DBE6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0044b13079b059da8a316e18e4d4aad735be081c55b3679968ceffb0ba75697e
                                                                      • Instruction ID: abfef2b4b7af8252c68831152dd13f5a9b9ac30c5434547aba71ae60de242e62
                                                                      • Opcode Fuzzy Hash: 0044b13079b059da8a316e18e4d4aad735be081c55b3679968ceffb0ba75697e
                                                                      • Instruction Fuzzy Hash: 14E04F31901208DFEB14EFA0E50879ABBF9FB49204F1045A99004A7120DF314A08DBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a5c8cfe96d8667fb88f453a283080e231f781777471b128a178a45433f451ac3
                                                                      • Instruction ID: 4e98f0750f6bd8be50636f2329dd421abca4e7913999511bef2c3d35c1e95bc0
                                                                      • Opcode Fuzzy Hash: a5c8cfe96d8667fb88f453a283080e231f781777471b128a178a45433f451ac3
                                                                      • Instruction Fuzzy Hash: C7E0123D214604DF824CEF24E554D3933F5B78E7183158854F00ACB375EB24DE158791
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bfcb0cb3f13fb4e4ad8dd39e6dfcea2c74494ede8fbcba194240902239d2311a
                                                                      • Instruction ID: f49f2672fbed2e04b8809f16e00629f42181ea877b28d1fe80de3be988c86b61
                                                                      • Opcode Fuzzy Hash: bfcb0cb3f13fb4e4ad8dd39e6dfcea2c74494ede8fbcba194240902239d2311a
                                                                      • Instruction Fuzzy Hash: 12E01234908218DFC708DFA4D9456ADBBF4EB45304F508199C81827351CB319E47DB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5024dbfa3f2d195e751362e135022d1526a1fa264d8c81aca7580f9b4c3acd5a
                                                                      • Instruction ID: 89d97f9c46d977422ea4b09b1d76e48ac3b09c9d953d99b24288229453070a95
                                                                      • Opcode Fuzzy Hash: 5024dbfa3f2d195e751362e135022d1526a1fa264d8c81aca7580f9b4c3acd5a
                                                                      • Instruction Fuzzy Hash: 88E0EC34A09208DBC704DF94E9456ADBBB9AB86304F108599C80927351CB319E46DB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5024dbfa3f2d195e751362e135022d1526a1fa264d8c81aca7580f9b4c3acd5a
                                                                      • Instruction ID: b7dac10a1b0834ca59b1048d90e461970f06cf0fe575b171ed54cedfdd2ce0ca
                                                                      • Opcode Fuzzy Hash: 5024dbfa3f2d195e751362e135022d1526a1fa264d8c81aca7580f9b4c3acd5a
                                                                      • Instruction Fuzzy Hash: 79E0C234908208DFC704DF94D9405ACFBF4FB46304F108198C80823340C7319E03CB82
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 91395e82471397364b75ae10d2daab3fe169b5a0af1905b8e9819bb2d4d34297
                                                                      • Instruction ID: 81c1baa4ef86d56d2b202bee04b05c0e5bccfcd4c8a9cfcb2c48bc8308c5c89f
                                                                      • Opcode Fuzzy Hash: 91395e82471397364b75ae10d2daab3fe169b5a0af1905b8e9819bb2d4d34297
                                                                      • Instruction Fuzzy Hash: AAE01278908208DFC704EF94D9459ADBBF9FB45304F1081A9C81927391C7319E56DB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 69ddaa60d782b16a5ae547a1eb0b7be57cb70a94b2ecbf112aa6cdb9e89dee0a
                                                                      • Instruction ID: 2944cd5f1cc6efd82c0213a8a0e76ba95dfca8a3854fd807d2266251a95f2934
                                                                      • Opcode Fuzzy Hash: 69ddaa60d782b16a5ae547a1eb0b7be57cb70a94b2ecbf112aa6cdb9e89dee0a
                                                                      • Instruction Fuzzy Hash: 2BE0127190230CEFCB05FFB1A50869EB7F8FB05214F0045A99509E3110EE314A04E7A6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 33548bf9013438476bbd077a41915ee0876893cbfabd0b1d7f52c6d281b52ffa
                                                                      • Instruction ID: e0ebe3a73ec5ab159dfce754c1919afe051bc7a69c5ffb4d587e2d16b72efab6
                                                                      • Opcode Fuzzy Hash: 33548bf9013438476bbd077a41915ee0876893cbfabd0b1d7f52c6d281b52ffa
                                                                      • Instruction Fuzzy Hash: 8EE0EC70959348DFC744EFA8E54969DBFF5BB09301F1045AA9809A3250EB705A44DB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f3b9a51aca9d796718da0563ec839c7729bbf92b61d7e07f97a4ae0d65174c6b
                                                                      • Instruction ID: 41839d7b073685f28f989e62b81d570b154cdb8fae14bc2c42f54993add070e8
                                                                      • Opcode Fuzzy Hash: f3b9a51aca9d796718da0563ec839c7729bbf92b61d7e07f97a4ae0d65174c6b
                                                                      • Instruction Fuzzy Hash: 10E01230A1120CFBDB04EFB5E9417AD77FAEB85210F518598E404EB240DA315F01D791
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2ebd456d85d0149afa4f7995cf59d4033377eceaef03e9231c6597a8a5d3dd0c
                                                                      • Instruction ID: 2f6789045c356bebe1ac611236c42e7efab027b2d7f67822c64ad4719688b3f1
                                                                      • Opcode Fuzzy Hash: 2ebd456d85d0149afa4f7995cf59d4033377eceaef03e9231c6597a8a5d3dd0c
                                                                      • Instruction Fuzzy Hash: 0FD0A730508208DFD704DF94D940AE9B3FDEB45204F10849C880953351DBB39D42C790
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2ebd456d85d0149afa4f7995cf59d4033377eceaef03e9231c6597a8a5d3dd0c
                                                                      • Instruction ID: 8e1225201ba42c82554f6ed30544927c7ce71f6f48ad6aa7b244a6f67ee88574
                                                                      • Opcode Fuzzy Hash: 2ebd456d85d0149afa4f7995cf59d4033377eceaef03e9231c6597a8a5d3dd0c
                                                                      • Instruction Fuzzy Hash: 18D05E30508208EFD704EF94D940AA9F3ECEB4A254F10909C880953361EB729D46C790
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 92fe735f07722c684f38aaf0754bfb6f2126b4b4380f29666372054798950f07
                                                                      • Instruction ID: c771230c4acc2220cf8cfea910f3a2aab1d7e567e5188e2b1ea3ba1d1e30f17b
                                                                      • Opcode Fuzzy Hash: 92fe735f07722c684f38aaf0754bfb6f2126b4b4380f29666372054798950f07
                                                                      • Instruction Fuzzy Hash: 5DD05E30508208EFCB48DFA4E940A69B7FDEB46204F10809C880C53351DB32AD02C751
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 412393faa288a1e1310fa267e34a9f7a4a820f15055c20b8fe1125afc88f85e0
                                                                      • Instruction ID: bb853092f48c9027f2c336945717efd4db00bebf6d57bf266d13ba6c178589c8
                                                                      • Opcode Fuzzy Hash: 412393faa288a1e1310fa267e34a9f7a4a820f15055c20b8fe1125afc88f85e0
                                                                      • Instruction Fuzzy Hash: 89D097B0C2C388CFC708A7750C0B0E97F308907110B0601FAE84082A82F1188B258BD3
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f6d2932dada303e14fe92129ef2bb5f742ff86f7f6875669c51ba311caa29720
                                                                      • Instruction ID: 0afc4eafe32e5f210b53531fff0b425bba25d1fa5c270dae4cbd5735bcde2b37
                                                                      • Opcode Fuzzy Hash: f6d2932dada303e14fe92129ef2bb5f742ff86f7f6875669c51ba311caa29720
                                                                      • Instruction Fuzzy Hash: 4AE0EC74A01108ABCB00EFE4E94169DB7F9DB45304F1082999808D7341DA316F019B91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 83740b0d2e4031191f483bcaf2b80fc5c54fba0a5fa85b8e1086202099f408dd
                                                                      • Instruction ID: 24d9767b68648c9ccc5fc92eff332f8a388947e3cecc84dc782c4e9d1e1ffc6d
                                                                      • Opcode Fuzzy Hash: 83740b0d2e4031191f483bcaf2b80fc5c54fba0a5fa85b8e1086202099f408dd
                                                                      • Instruction Fuzzy Hash: E1D05E6008A388AEE21A6BA8281C2957FB85B53119F090095B188566A2DB651098C63B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 106e4f683b1d9637f6efd0fdd3596e3217b1e7e193958e02ee8ccdd929f1ea4a
                                                                      • Instruction ID: 09daf719e6b5d67841c00ac25d8ce33b116a02a371b6770e8a962f87d9326eb2
                                                                      • Opcode Fuzzy Hash: 106e4f683b1d9637f6efd0fdd3596e3217b1e7e193958e02ee8ccdd929f1ea4a
                                                                      • Instruction Fuzzy Hash: C7E0E57490211ACBEB18EB20DA56BAC76B6FB84300F109199E40AA3380CE341E848FA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cf6dc27c143586d94931e0590860dbacc309becd40d314628deb62ce8a66017c
                                                                      • Instruction ID: 743629e7a43d48a7b45dc9314785d805430ca56855c92a55a7e9d479f3e24f1a
                                                                      • Opcode Fuzzy Hash: cf6dc27c143586d94931e0590860dbacc309becd40d314628deb62ce8a66017c
                                                                      • Instruction Fuzzy Hash: C8E0E5749021198BDB54EB24DEA679DB7BAFB49304F1051DAE509A3380CE341E84DF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b41e55a649e30b3485a9c4108ffb14a8e4d1e1db80f5f5c5db5b470dbb6afa3f
                                                                      • Instruction ID: 32b6666f3f68bd1f8ab26c85c09cd74ad006efd72ea10a27aa85d18dcb36f960
                                                                      • Opcode Fuzzy Hash: b41e55a649e30b3485a9c4108ffb14a8e4d1e1db80f5f5c5db5b470dbb6afa3f
                                                                      • Instruction Fuzzy Hash: 9EE01A70A00258DBDB14DF20E896B9CBBBAEB85305F10909AE40AB7380CF381DC48F65
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e9750f61f10153b683d26593c77e23fc664a55a6e53937d16c6d0ffff3e44eb8
                                                                      • Instruction ID: ae04dfd6d9b065e883c6c38238967fcba6532ae47ec6872ddc002caf2e7f79c8
                                                                      • Opcode Fuzzy Hash: e9750f61f10153b683d26593c77e23fc664a55a6e53937d16c6d0ffff3e44eb8
                                                                      • Instruction Fuzzy Hash: EBE0E530910218CFDB14DB20D995B9D7AB2EB89310F104099A40AA7685CE381D848F20
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e80a3891be78f59d4a5c23e7c4be5834356318ecfc2dd736fdec3369d6792ab7
                                                                      • Instruction ID: 60ba55edbbd755aab304e78fc18e0d73669b9c16e671fca76497f5d0124467b8
                                                                      • Opcode Fuzzy Hash: e80a3891be78f59d4a5c23e7c4be5834356318ecfc2dd736fdec3369d6792ab7
                                                                      • Instruction Fuzzy Hash: 02E0E57491011A8BCB24DF64D5957AD7AF2FB89310F5000AAE00AA3781DB341D949F91
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 16b429343d1c9a43f2e10f00109d667cd6fe7eeea57e91afb71881e744594337
                                                                      • Instruction ID: c26f56107d799e8809d293e3c1439c1607cca05e91c72328f18fa0fc8010a058
                                                                      • Opcode Fuzzy Hash: 16b429343d1c9a43f2e10f00109d667cd6fe7eeea57e91afb71881e744594337
                                                                      • Instruction Fuzzy Hash: EDE04FB8A042089FDB54DF24D695B5977F6FB4A308F108095E81DA3396CF345DC48F01
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a95a9c1f04b543f51e525139af52444fd0dfa83c69b0819928399e41a2c9ba93
                                                                      • Instruction ID: a179888f040b1eb647afdf1174a5336ba7419984f6ad097cfae8e48ce2a42058
                                                                      • Opcode Fuzzy Hash: a95a9c1f04b543f51e525139af52444fd0dfa83c69b0819928399e41a2c9ba93
                                                                      • Instruction Fuzzy Hash: 85E0EE34A152188BCB55EB20D9953ACBBBAFB88305F145099E40AF7380DF782EC4CF00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c7f6cd7a1c6f36bcd25c264857771c619f609fc8448f115b67fd6e5cbdbbdb01
                                                                      • Instruction ID: 55a815541df81fa17e39f2ce45e38225aa5b60f7a24a47190dc0a8718f676697
                                                                      • Opcode Fuzzy Hash: c7f6cd7a1c6f36bcd25c264857771c619f609fc8448f115b67fd6e5cbdbbdb01
                                                                      • Instruction Fuzzy Hash: BCE0ED349002149FD794DF24D49679CBBBAEB45304F508199A409B7290CF341EC8CF41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0b5122b08a9a69760206451be1ac63d93b6b5f3237f825b02700fa707f32ce53
                                                                      • Instruction ID: 45d8f716c6e4babeac1540d54d72b5ff0029ca8d52c06aa62a93a2098cdcb36e
                                                                      • Opcode Fuzzy Hash: 0b5122b08a9a69760206451be1ac63d93b6b5f3237f825b02700fa707f32ce53
                                                                      • Instruction Fuzzy Hash: 96D0A77040430857D70CAA678C089977EB9CB8D310F018020E00571344EB31541044A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3e22c82325b0b69ea424c2ca47fdc07dc497b96f167e7ececef9836ebfe1d902
                                                                      • Instruction ID: 63dcdfde7ca7a32ea629f55d3e26c0d6678bd8dd4abc8087c9755bc3b4348130
                                                                      • Opcode Fuzzy Hash: 3e22c82325b0b69ea424c2ca47fdc07dc497b96f167e7ececef9836ebfe1d902
                                                                      • Instruction Fuzzy Hash: 41E01734A14109CFCB00DFD4D585AAD77B2FB8B308F619055E115AB688CF38AD82CF92
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 507fb36312270c03436c90d9ba28f2bd1b3453a483df6e58d78140d5edf8f6b1
                                                                      • Instruction ID: 2b76097874edd23b7593d27b275f55fa721f65ac99a9d7d9a86e09fb2a3c61bc
                                                                      • Opcode Fuzzy Hash: 507fb36312270c03436c90d9ba28f2bd1b3453a483df6e58d78140d5edf8f6b1
                                                                      • Instruction Fuzzy Hash: 78D012B21442088BDB15F768AC1A4E53720EB9671A315407AD50E15651D663E443C649
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 34e44457bf019467ac0fb410acb8a3b616b0a9353694085c5aa19ac4855d499b
                                                                      • Instruction ID: 25c38173a29200b4e6332ac029e97d2117921a58de7f4ff0349cbd055a68657a
                                                                      • Opcode Fuzzy Hash: 34e44457bf019467ac0fb410acb8a3b616b0a9353694085c5aa19ac4855d499b
                                                                      • Instruction Fuzzy Hash: 6CC08C12B0F7D49DCB0E72B8BA400D8EF7118A222030A10E3E0C19E397E330448F53A6
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0b9b2441bc474a9f46773b7ae1b195dbe74a824d6cd10a25f31a62f9a2ecb5f9
                                                                      • Instruction ID: 910cfaa6d185d852d83dd1ba20aa4c2aa764aeb3821b7b66d2ce9f502d4da869
                                                                      • Opcode Fuzzy Hash: 0b9b2441bc474a9f46773b7ae1b195dbe74a824d6cd10a25f31a62f9a2ecb5f9
                                                                      • Instruction Fuzzy Hash: ACD0127A1882409FC701DF60DD18C817F729F2A31230640D7F5449F6B2E636D924D700
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d1d25c69e059f8591364e4e854f572aa2aaf518d7e2fabce98a4c71ef4249092
                                                                      • Instruction ID: 4bdef413297fecc97749c81a31ad4616e52eee14c723c67aba935468306930c0
                                                                      • Opcode Fuzzy Hash: d1d25c69e059f8591364e4e854f572aa2aaf518d7e2fabce98a4c71ef4249092
                                                                      • Instruction Fuzzy Hash: 35D01230009BC18FC7038B65D865590BF71AE42214B0EC0EFD4DEC7A53D626A639D751
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 37f80e906feab631d5cb5e822484d4c94d64482c2ed08f1b1ee2dce067c92ff4
                                                                      • Instruction ID: ce10adf23b7391dd7582644c485bc0a2f5ca2f154658d0865abdef8bc167ead9
                                                                      • Opcode Fuzzy Hash: 37f80e906feab631d5cb5e822484d4c94d64482c2ed08f1b1ee2dce067c92ff4
                                                                      • Instruction Fuzzy Hash: B9C02B300003085FD11C7FED680C3ED76FC6B02225F000004E20C215A0EFB04044CA7B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: df9c0198095d01a9cda6228924b5cbc0a48a49344ebc26a1e791f7d589c1b085
                                                                      • Instruction ID: e65e8a05fa3676249c7729c7ab3e75b51e9eba4c7ef0bb2dd4b770886aff946f
                                                                      • Opcode Fuzzy Hash: df9c0198095d01a9cda6228924b5cbc0a48a49344ebc26a1e791f7d589c1b085
                                                                      • Instruction Fuzzy Hash: CBD0C935F101088BCF10CBA5E5516CCB774EB88211F20416BEA18A7240C7301A158F40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7ec0406844f88b8679f6d4e6caefff60a04ddc40cf5c894f27070385c963e5b4
                                                                      • Instruction ID: 781d703d97fe436b1dd1623dd0addb485e8c1b227edc335c4b7313f950652cd8
                                                                      • Opcode Fuzzy Hash: 7ec0406844f88b8679f6d4e6caefff60a04ddc40cf5c894f27070385c963e5b4
                                                                      • Instruction Fuzzy Hash: 82D04274915268CFDB65CF54C840B9DBBBABB49304F1094D9C409B2240D7755A81CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c7e3a25612c7d0890852b3362cb70aad2548e9f8143c3b71b03ba1cb5c497577
                                                                      • Instruction ID: 495e88acc2d3935674b9ea4d79539195256892d81863e3c0b01a949c3c81e0d6
                                                                      • Opcode Fuzzy Hash: c7e3a25612c7d0890852b3362cb70aad2548e9f8143c3b71b03ba1cb5c497577
                                                                      • Instruction Fuzzy Hash: E7C02B32100004DBC2004F10EE197873F01CF80305F0A44A1DC0C9B363D713C407C781
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fdbf2503f2f57992d2e8a4a0f08d08bb49f15aca910cc3b4b2ac6358ede0d7b5
                                                                      • Instruction ID: 292c76eb30e291bc024e28a33bee0372e91a4f9669ce28991db9fd681822fbdb
                                                                      • Opcode Fuzzy Hash: fdbf2503f2f57992d2e8a4a0f08d08bb49f15aca910cc3b4b2ac6358ede0d7b5
                                                                      • Instruction Fuzzy Hash: 4BD012BB5040009BC305CA00CC51B11FB62DBA4319F28C45DD48547342D733D903D701
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8d227c80df7390e10de0ff5d53cf09875ffe8083cc4176feaf4d9c9b1452d955
                                                                      • Instruction ID: 08306721c7e8e0ef76589c6d487d9faf995e66d21bf42ffedfe6355fae28dcda
                                                                      • Opcode Fuzzy Hash: 8d227c80df7390e10de0ff5d53cf09875ffe8083cc4176feaf4d9c9b1452d955
                                                                      • Instruction Fuzzy Hash: 0DC0120284D3C82ECF238B70192918A7F7248A3000B0EC2CBAC868E083D92884A1C393
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6956a52ef799271c60e96a8ee2effe04a88592bd5e5b451445cdbf6af82892d5
                                                                      • Instruction ID: 14fc091e2222a2c460fb879a5478fed169f67011ff8d14afb1dab20202fb9d1a
                                                                      • Opcode Fuzzy Hash: 6956a52ef799271c60e96a8ee2effe04a88592bd5e5b451445cdbf6af82892d5
                                                                      • Instruction Fuzzy Hash: 84C0127AF000188B8F00EBC9F4408CDF7B4EB88326F008026D214A7608C6302822CFA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dd96313ef30a7b2672d8a1c57315e2fac26b9791dcd4c7e67d9150c2639eacd0
                                                                      • Instruction ID: fad7412964f1bb7d54e4b25cb9da7dfeb1ff1b468a9be68d644190b0328d5ab5
                                                                      • Opcode Fuzzy Hash: dd96313ef30a7b2672d8a1c57315e2fac26b9791dcd4c7e67d9150c2639eacd0
                                                                      • Instruction Fuzzy Hash: CFC04CB404E3C58EEB0F17259D244E43F706A8F24078644C6F1E6A9263E6185798C657
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                                      • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                                                      • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                                      • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8dcd6ce519500e9a9d115a00076162631f927eaaafd7be5efd34e1baf1cc4e1e
                                                                      • Instruction ID: a1487fd2d23b32535a13e6887733bc7565de3dab2566deb436bbe2268a25f6c7
                                                                      • Opcode Fuzzy Hash: 8dcd6ce519500e9a9d115a00076162631f927eaaafd7be5efd34e1baf1cc4e1e
                                                                      • Instruction Fuzzy Hash: 22C09BF3C184046BE7015500DD4F7697751EB74321F05D965A40082259E7744616D511
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 13bc63028b5bd16cdedc1718db11117e45f2756a6f58dafb9cf39d42c847d078
                                                                      • Instruction ID: a7ddc4dc6911813dd4d240071f4b6149888f9d8ae45394312740b1bb3aa2c7a0
                                                                      • Opcode Fuzzy Hash: 13bc63028b5bd16cdedc1718db11117e45f2756a6f58dafb9cf39d42c847d078
                                                                      • Instruction Fuzzy Hash: 16C01270508106CBC304DB20D55D75C7F64AF03309F140255E05F5B4D2DB280448CE47
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a9e28589ea8c5f467bba967a48bafbaae35f925751165a8c7e8217ed75cecc8c
                                                                      • Instruction ID: 6412280d18426f2f389372b525dde5026f99215da4a72fcaab3c8718d38a825b
                                                                      • Opcode Fuzzy Hash: a9e28589ea8c5f467bba967a48bafbaae35f925751165a8c7e8217ed75cecc8c
                                                                      • Instruction Fuzzy Hash: 09C08C381041058BE304EB20DAA625D3AB6E782308F142026A013676D4CE3808C88B42
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 73237a1b69dcd19ab2c91f7dbefc7b59dc28838225d61267334816a546ce6521
                                                                      • Instruction ID: 57d62d8685a1adb259ac5bc8dd5a8b755879907fcb903adcc4cd59676acdcc1b
                                                                      • Opcode Fuzzy Hash: 73237a1b69dcd19ab2c91f7dbefc7b59dc28838225d61267334816a546ce6521
                                                                      • Instruction Fuzzy Hash: 5BB0923200020CAB86009B85EC18866BF69AB59700700C025AA09061228B32A822DA94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6ef346d67edb860f4151fee1341dc81d96785e3827a7e76df4974627ada2177d
                                                                      • Instruction ID: 75cec7210b180ab4a74e213d7d07f8aa43518bf4defc2573da60f94e488cbc90
                                                                      • Opcode Fuzzy Hash: 6ef346d67edb860f4151fee1341dc81d96785e3827a7e76df4974627ada2177d
                                                                      • Instruction Fuzzy Hash: 75B09275118202EFE30E6B10D8282A632B2A788350B129818D09747794CBA0AD828B52
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cb5584e6bb29d299c64beef78586a7c42469b0bd99e0bd5f07b7ee534e6bd70b
                                                                      • Instruction ID: 6813f24b092497d34048c5ee117d3c5aec3b235b6d635ce60be680b9f6b63a80
                                                                      • Opcode Fuzzy Hash: cb5584e6bb29d299c64beef78586a7c42469b0bd99e0bd5f07b7ee534e6bd70b
                                                                      • Instruction Fuzzy Hash: 78B0923100C780DFD70E4F65C86B1643BB8EE0B31030A5CC2E4028B265C7A12424AA27
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 282ad80bdd2aa6fc8539c179d3a3bad75374460d04a6e3d101e6f05e5f53ae72
                                                                      • Instruction ID: 34ce30e10a1c27107be3f85e1228027903608669bd86b0ae2c82080890e4f703
                                                                      • Opcode Fuzzy Hash: 282ad80bdd2aa6fc8539c179d3a3bad75374460d04a6e3d101e6f05e5f53ae72
                                                                      • Instruction Fuzzy Hash: 34A0243000030CCFC1005745FC1D4517F5CD7447153004054D40D031134F53FC01C5C0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 54d53e6ab232e1f8305e117662fe22339b3042a04c7324e5ee582c88fc8ff773
                                                                      • Instruction ID: 140af51a569406379cd49d6f8f621ed5bf03d37392b4af2da0b0a3fb349d9545
                                                                      • Opcode Fuzzy Hash: 54d53e6ab232e1f8305e117662fe22339b3042a04c7324e5ee582c88fc8ff773
                                                                      • Instruction Fuzzy Hash: 3EA0123001020C8FC2006745E9294107B9CA744604B044094900D021114B12B801C580
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 36c0e262e4ed7b0e6e3ee738fb86174c078f4d2844becc1603974a57242881df
                                                                      • Instruction ID: a3f14bd016162b7597ca0ee11ebb9a44789483b1a9f2809b4316cdc4a0107b3c
                                                                      • Opcode Fuzzy Hash: 36c0e262e4ed7b0e6e3ee738fb86174c078f4d2844becc1603974a57242881df
                                                                      • Instruction Fuzzy Hash: 5AA012F00001888F81002F56BC0D0C9775CD7007123418021B00D90260CE10145545D0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f71878f4daf02c3bc1861747f9731ce7677f68f954ffe33a09770abc2a6b7794
                                                                      • Instruction ID: 91ae3c431f00ba56aab96b3e1951051099f24798e2ae41f59f5e6d8f10e62190
                                                                      • Opcode Fuzzy Hash: f71878f4daf02c3bc1861747f9731ce7677f68f954ffe33a09770abc2a6b7794
                                                                      • Instruction Fuzzy Hash: 7CB0123AD14710EF834C9B72E8D48BD7231BFC814030EC551F803A2380DF340801C511
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8b04cb102f497ae3080d6ef51ee122781844962e7c8e279498ebdfe9503ad8df
                                                                      • Instruction ID: aa782da85013ec6f463ef7a5ceff7c9fd9cea35706fe26fef3766df967b1b3f4
                                                                      • Opcode Fuzzy Hash: 8b04cb102f497ae3080d6ef51ee122781844962e7c8e279498ebdfe9503ad8df
                                                                      • Instruction Fuzzy Hash: B1A002A38A4F10C1C10805381C428D513A495E697032B6B567031D0BD1938E8687511B
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b5f0f45a4f96231d6577a5fbaa670a89b73394d8fe705d70c459c1a802c89c3a
                                                                      • Instruction ID: dee6b963e1d2c5e5ec8ef9ea17722389960be5f0333af51ae903206860e9b0f2
                                                                      • Opcode Fuzzy Hash: b5f0f45a4f96231d6577a5fbaa670a89b73394d8fe705d70c459c1a802c89c3a
                                                                      • Instruction Fuzzy Hash:
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: TJq$Teq$xbq
                                                                      • API String ID: 0-4091408781
                                                                      • Opcode ID: 1078e17ad6c7a6472825b02fd8aef99342fd54971bad2dd0491835e02f20a0ec
                                                                      • Instruction ID: 2fc355739b01839e47bf07adfcb176961ad42e2832bd24ca8fad4d174b008167
                                                                      • Opcode Fuzzy Hash: 1078e17ad6c7a6472825b02fd8aef99342fd54971bad2dd0491835e02f20a0ec
                                                                      • Instruction Fuzzy Hash: E3C18675E016188FDB58CF6AC944ADDBBF2AF89300F14C1AAD909AB365DB305E81CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (q$,q
                                                                      • API String ID: 0-275420656
                                                                      • Opcode ID: 5876a323829e47baf2c750cfcee1aba1b92be3ddfaa7e4912bfd7b0eb2de1e34
                                                                      • Instruction ID: 8397612c8a7dbc7ec071c378ea4df2835447d5c4c4078a2eb5349a7fc9323738
                                                                      • Opcode Fuzzy Hash: 5876a323829e47baf2c750cfcee1aba1b92be3ddfaa7e4912bfd7b0eb2de1e34
                                                                      • Instruction Fuzzy Hash: CAD10934A002058FDB19DF69C584AAEB7F2FF88315F698569E905EB361D734EC41CB50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'q$4'q
                                                                      • API String ID: 0-1467158625
                                                                      • Opcode ID: d82823936b474cf3482fc0a9dfb50674d40839dcf9b68a4cb0fc64890adacf61
                                                                      • Instruction ID: 14a26141e8b645caaacc3ebeeb2dd98ae2e71cb1c9ee6b1cc9ca6a6602f3fc4b
                                                                      • Opcode Fuzzy Hash: d82823936b474cf3482fc0a9dfb50674d40839dcf9b68a4cb0fc64890adacf61
                                                                      • Instruction Fuzzy Hash: B671ECB5E002059FD708EF7AEA416D9BBF3BBC8304F54D129D008AB2BADB355906CB51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'q$4'q
                                                                      • API String ID: 0-1467158625
                                                                      • Opcode ID: cf0e2e7c38060f059755551d5780b5932d81b4748960db9f293987fbfe068bd3
                                                                      • Instruction ID: 660ca934cac50a4fd1148a34698191eade40986f118237c33c97de4b9ac001ea
                                                                      • Opcode Fuzzy Hash: cf0e2e7c38060f059755551d5780b5932d81b4748960db9f293987fbfe068bd3
                                                                      • Instruction Fuzzy Hash: 9F71EB75E002099FD708EF7BEA416D9BBF2BBC8304F54D129D008AB2BADB345906CB51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %$A
                                                                      • API String ID: 0-838127033
                                                                      • Opcode ID: 1f3b927e5fe224819c889e27faace41bd9303ac0d3b4cebf2f73a6d5aa206bb6
                                                                      • Instruction ID: 69d7f41e1928c1716fe73c93691e61add00024b82241e47d194a95768f56c5f3
                                                                      • Opcode Fuzzy Hash: 1f3b927e5fe224819c889e27faace41bd9303ac0d3b4cebf2f73a6d5aa206bb6
                                                                      • Instruction Fuzzy Hash: A8219B71E046589BDB18CFABC9446DDFBF7AFC9300F14C1AA9419AA258DB740986CF40
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: -$1
                                                                      • API String ID: 0-1877142845
                                                                      • Opcode ID: 581e5b7d7584f60d17c514488e74e53e50203fabafb31af6494845a00e53a0a1
                                                                      • Instruction ID: 01a5b8e452e12a700a60d05c72c8d3ac3271385ddd6935f6d6d2018fb45e297d
                                                                      • Opcode Fuzzy Hash: 581e5b7d7584f60d17c514488e74e53e50203fabafb31af6494845a00e53a0a1
                                                                      • Instruction Fuzzy Hash: A721EA71E052298BDB18CF6AC90579EFBF7AFC9300F14C0AA8508AB255DB744A85CF60
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (q
                                                                      • API String ID: 0-2414175341
                                                                      • Opcode ID: 96f7ff769a2e4c4c988a5c140dc943950cca213a0982a19c767e53280b9d193f
                                                                      • Instruction ID: a3cf169a104e38a7187f80ef4ef1907adced354dfd3a95689e1a3be6a5666733
                                                                      • Opcode Fuzzy Hash: 96f7ff769a2e4c4c988a5c140dc943950cca213a0982a19c767e53280b9d193f
                                                                      • Instruction Fuzzy Hash: F5328A74B006069FDB18DF69C495A7EBBF2FF88300F248529E55AD7791CB74A942CB80
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Teq
                                                                      • API String ID: 0-1098410595
                                                                      • Opcode ID: 7cc333c3d98c5244ba223050e4e8dd33dcbb259026b81f7655b583a29fb49343
                                                                      • Instruction ID: 0e72e99850ad952867a696b7360df18970f6aa420905c243ee4eea596750b067
                                                                      • Opcode Fuzzy Hash: 7cc333c3d98c5244ba223050e4e8dd33dcbb259026b81f7655b583a29fb49343
                                                                      • Instruction Fuzzy Hash: 14A1F574E05218CFDB18CFA9C985BADBBF2BB49304F1890A9D80AE7295DB745D85CF00
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Teq
                                                                      • API String ID: 0-1098410595
                                                                      • Opcode ID: c3e92b209e4173a78e2fea70fa5738ea344171eaf8d44706adf80e23b15dd369
                                                                      • Instruction ID: 50d43867762d6b3fd91c72be68f516ada3f365af8fef2d5d6c30f0348aef347c
                                                                      • Opcode Fuzzy Hash: c3e92b209e4173a78e2fea70fa5738ea344171eaf8d44706adf80e23b15dd369
                                                                      • Instruction Fuzzy Hash: 20A1E274E01218CFDB18CFA9D985BADBBF2BB49304F1890A9E809A7395DB745D85CF00
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: dq
                                                                      • API String ID: 0-4057445327
                                                                      • Opcode ID: eb812d7b75d5feb3284681251164d37529d850e839d2b32536adb5ec32a6bdc1
                                                                      • Instruction ID: c3bf33e981a6b86637d2b254fd6e89fac36517cad725c21660b346c646df6ea0
                                                                      • Opcode Fuzzy Hash: eb812d7b75d5feb3284681251164d37529d850e839d2b32536adb5ec32a6bdc1
                                                                      • Instruction Fuzzy Hash: 6F812274A042088FEB10DFA8D944BEDBBF6BB89304F205069E409A77A5DB795D86CF11
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: dq
                                                                      • API String ID: 0-4057445327
                                                                      • Opcode ID: b0379c978265e01948c6f05323fd10f75faaca654db903bd9a84b47aabc2cfc2
                                                                      • Instruction ID: 2ebf9c066fac1cf04fecad1decdf0c24545a0107e0b802a39036a2a7e895dde6
                                                                      • Opcode Fuzzy Hash: b0379c978265e01948c6f05323fd10f75faaca654db903bd9a84b47aabc2cfc2
                                                                      • Instruction Fuzzy Hash: DE811574A002088FEB14DFA8D944BEDBBF6FB89304F105069E409A7795DB795D86CF11
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: pqI
                                                                      • API String ID: 0-1078129942
                                                                      • Opcode ID: 43d5e3e1cdd97493946b211092db081667e3c95289f906564357df9b0acd0aff
                                                                      • Instruction ID: 08e4293714dde54b06ed18fa924fd44a6c7e88dde036751ce433cac47b0d545a
                                                                      • Opcode Fuzzy Hash: 43d5e3e1cdd97493946b211092db081667e3c95289f906564357df9b0acd0aff
                                                                      • Instruction Fuzzy Hash: B6412A74E4520ADFDB44CFAAC8416AEBBF2BB48300F948965D41AE7754E3789A43CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: pqI
                                                                      • API String ID: 0-1078129942
                                                                      • Opcode ID: a0638bf9d0c89e003bfb1e372231c69b664df9f7e0b4a4cc9c1a3ee870b20d74
                                                                      • Instruction ID: eb70109558ffcbe4a814a2472951e9e5ced0c207f426889b173b375bb24a968f
                                                                      • Opcode Fuzzy Hash: a0638bf9d0c89e003bfb1e372231c69b664df9f7e0b4a4cc9c1a3ee870b20d74
                                                                      • Instruction Fuzzy Hash: 8F415C74E4520A9FDB44CFAAC8416AEB7F3BB88200F94C925D456E7B10E3389A43CF50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: '
                                                                      • API String ID: 0-1997036262
                                                                      • Opcode ID: 8db1ab7fe5d3cb8592664a6394ab0cb6b44a1fbdda76dfa093eeda6e84612add
                                                                      • Instruction ID: 7ea67943744bae0fd9f012f2588163f47bbe34294ba9b76b460b8276b558241c
                                                                      • Opcode Fuzzy Hash: 8db1ab7fe5d3cb8592664a6394ab0cb6b44a1fbdda76dfa093eeda6e84612add
                                                                      • Instruction Fuzzy Hash: A4416971E04A189FEB18CFABDC4469EFAF7BFC9301F14D0A99408AA255EB3455868F41
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 1
                                                                      • API String ID: 0-2212294583
                                                                      • Opcode ID: fa2cd184b947d97e659c55805748315ea7813faa3380c5321a40df2b93da5292
                                                                      • Instruction ID: e37289d9911d46c179a955f92ad0120b8a37551d7ceeaf964b64232b8ea0ced7
                                                                      • Opcode Fuzzy Hash: fa2cd184b947d97e659c55805748315ea7813faa3380c5321a40df2b93da5292
                                                                      • Instruction Fuzzy Hash: 2A31EC71D04618CBDB28CF2BC848A99BBF6BF89300F04C0BAD819A7655DB7049858F51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 1
                                                                      • API String ID: 0-2212294583
                                                                      • Opcode ID: d0715f19d56d505b4942b5e19f3ba37f1242066ab952cbf158ed8fa3465abb0f
                                                                      • Instruction ID: ad076f65ba4f8fc7ec9908bf39f7215951fc834deaeb4c3675d0bcdfb98d7de0
                                                                      • Opcode Fuzzy Hash: d0715f19d56d505b4942b5e19f3ba37f1242066ab952cbf158ed8fa3465abb0f
                                                                      • Instruction Fuzzy Hash: AA31EB71D047588FEB29CF6B8845699BBF3AF89304F09C1BAD818A6265E77049858F11
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275073687.0000000005890000.00000040.00000800.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5890000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: T
                                                                      • API String ID: 0-3187964512
                                                                      • Opcode ID: 6d1a5d603d624f1d847f5b796c526e303f9af45e4273e4a5539d627c447ccb4e
                                                                      • Instruction ID: 7fcac9e3d1922f0a9a2a04506d794941c70c37ffd9e08ac094299171460cd7a6
                                                                      • Opcode Fuzzy Hash: 6d1a5d603d624f1d847f5b796c526e303f9af45e4273e4a5539d627c447ccb4e
                                                                      • Instruction Fuzzy Hash: F721ECB1D057588FDB19CF678C0419ABBF7AFC5300F09C0BA9548EB266E6740945CB55
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: A
                                                                      • API String ID: 0-3554254475
                                                                      • Opcode ID: 06ed6b98aa1783dfbb9b1980c2cd6d74ee4f2b7d8ecda9f55773c2cb3ed896eb
                                                                      • Instruction ID: 19d7fa6eb8b52ac9a34ebc77c045b8dd2192579d7b7c7167521374b9df519335
                                                                      • Opcode Fuzzy Hash: 06ed6b98aa1783dfbb9b1980c2cd6d74ee4f2b7d8ecda9f55773c2cb3ed896eb
                                                                      • Instruction Fuzzy Hash: D6219AB1E046589BEB1CCFABD9452DDB6F7AFC9300F54C1BA8408AA218DF7409868F50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 1
                                                                      • API String ID: 0-2212294583
                                                                      • Opcode ID: 4f33a49ad1912a10985b7e2bd6d4fae5aeec6aa89d30409159589f45d174694a
                                                                      • Instruction ID: 67b0b8e8e84dc351b6917e788b1bd5d63ba0a22e481bbde5dcfcd25cbf267de1
                                                                      • Opcode Fuzzy Hash: 4f33a49ad1912a10985b7e2bd6d4fae5aeec6aa89d30409159589f45d174694a
                                                                      • Instruction Fuzzy Hash: 0F11EC71D056598BEB19CF6B880569AFBF7AFC9200F14C0BAC508AA255DB700A45CF60
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271032608.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5560000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a1c097cb99e5d181879133aaa2146438ea2228238ab355793b983b19f2fc3026
                                                                      • Instruction ID: c011f5de244038c9e8743debcd7a33a2e170e6e078efdde808cefd015cc1c249
                                                                      • Opcode Fuzzy Hash: a1c097cb99e5d181879133aaa2146438ea2228238ab355793b983b19f2fc3026
                                                                      • Instruction Fuzzy Hash: DE929B75509384AFDB268B74CC99F9A7FB5BF06304F1A419AE1409B2F2C7749809CB62
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8b8660cd080285a9576a01ad294e7c8784525584aa084f0d9b8fd6f23cc46f4b
                                                                      • Instruction ID: fd9610e284c5e03755364f27fe25340b83f058480ceae97768086379476ef5ba
                                                                      • Opcode Fuzzy Hash: 8b8660cd080285a9576a01ad294e7c8784525584aa084f0d9b8fd6f23cc46f4b
                                                                      • Instruction Fuzzy Hash: 2A12C370E046199FDB14CFEAC98069EFBF2BF88304F24C169D459AB219D734A946CF94
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273551941.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56a0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c59ff6f35e924a1812881e564d4aed0c3a3995ee30296078990234e7a9c757e3
                                                                      • Instruction ID: 840f4198867b85e5841edad5d3c0140eda04d5c523e17a4cb8afaa7b5121b4dc
                                                                      • Opcode Fuzzy Hash: c59ff6f35e924a1812881e564d4aed0c3a3995ee30296078990234e7a9c757e3
                                                                      • Instruction Fuzzy Hash: 52816575A04218CFDB10DFA8D988BADBBF2BB4A314F509069D40AB7395DB749D86CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273551941.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56a0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 605b53ddb7969382d2a8857141969d31d31de003b2eac279ed8b69bc6aa9e58f
                                                                      • Instruction ID: 63f60b2ebe3bfb6b976678afac7b00abf876790729f609f060e0ba36a7bffecd
                                                                      • Opcode Fuzzy Hash: 605b53ddb7969382d2a8857141969d31d31de003b2eac279ed8b69bc6aa9e58f
                                                                      • Instruction Fuzzy Hash: 99815575A04218CFDB10DFA8D988BADBBF2BB4A314F109069D40AB7395DB749D86CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273551941.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56a0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0945af4372f866b1b4b4d437b67ecc254c76c4937e7c4ebc231fd731ddade7c0
                                                                      • Instruction ID: 828c158f60cb2474640705b3650b81d38979e9428d63119adce6ff553d9d9db9
                                                                      • Opcode Fuzzy Hash: 0945af4372f866b1b4b4d437b67ecc254c76c4937e7c4ebc231fd731ddade7c0
                                                                      • Instruction Fuzzy Hash: 73814575E05218CFDB10DFA8D988BADB7F2BB4A314F509069D40AAB795DB349D82CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 343e094cb71642bd26244d84582eafce408fc79008a155290813d2f4d8d26007
                                                                      • Instruction ID: a6bf7f4d8d2adf85f72e0523462df52e9f84fb123edffbbaedb10b144e198a0a
                                                                      • Opcode Fuzzy Hash: 343e094cb71642bd26244d84582eafce408fc79008a155290813d2f4d8d26007
                                                                      • Instruction Fuzzy Hash: BA814978E05218CFDB24DFA6C844BEEBBFABF49300F2494A9D019A7251D7349985CF41
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1276573189.0000000005A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5a50000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7bb90f90ce42f8e344627bc36cafb2026a227a63d877c828eccfa715a39c799f
                                                                      • Instruction ID: 167092b3bfc042cfc2c3ff48300b98b60f5036cd835045232ce059d2fdf94a4d
                                                                      • Opcode Fuzzy Hash: 7bb90f90ce42f8e344627bc36cafb2026a227a63d877c828eccfa715a39c799f
                                                                      • Instruction Fuzzy Hash: B7713978D04208DFDB04DF99D588BAEBBFAFB49304F149029E41AA7394DB785889CF50
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b3c1f08bcfcf5314cd09c2990f03188876cecef17e8e2852549caad3f59f163b
                                                                      • Instruction ID: f2d88ee2efef6b591ffc95290773b6038a70223eefa9c04a76e973be445f1345
                                                                      • Opcode Fuzzy Hash: b3c1f08bcfcf5314cd09c2990f03188876cecef17e8e2852549caad3f59f163b
                                                                      • Instruction Fuzzy Hash: C651F174D05208CFEB14DFA9D9487EDFBF6BB49304F20602AD409A76A5DBB45986CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b32165a94f1788fb1654e7f3f93deb63b4c93b353510cdd38e15344533dbb72b
                                                                      • Instruction ID: 2d51453b182766c4927b00d12515937c6204e16d22c7bcac67e51603ccda4c35
                                                                      • Opcode Fuzzy Hash: b32165a94f1788fb1654e7f3f93deb63b4c93b353510cdd38e15344533dbb72b
                                                                      • Instruction Fuzzy Hash: 9D510274D05208CFEB14DFA8D9487ECBBF2BB49314F20602AD409B76A5DBB85986CF10
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3d9832dfa9eea518b67e727850301f2ed2e5f73b95f03f865aa820cdeb9f22a7
                                                                      • Instruction ID: 5392d7bd9ee88839218aef5e4f93630a620c3951873e54ab5f440049de460873
                                                                      • Opcode Fuzzy Hash: 3d9832dfa9eea518b67e727850301f2ed2e5f73b95f03f865aa820cdeb9f22a7
                                                                      • Instruction Fuzzy Hash: 4C511970D01218CFDB24CFA6D944B9EBBF6FB88314F10D8AAD519A3294DB7419858F40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 467aaa6a77f0e502f9b3cc723cf4a52a0bafcf325086c4c9380be63ea6f387bf
                                                                      • Instruction ID: 611f19461ee6d84bc2c45f09251e03474d5c32978fb746327ab42c7c86eb1244
                                                                      • Opcode Fuzzy Hash: 467aaa6a77f0e502f9b3cc723cf4a52a0bafcf325086c4c9380be63ea6f387bf
                                                                      • Instruction Fuzzy Hash: 8E514B70D01218CFDB24CFA6D84479EBBF2FB88314F10D8AAD519A7294D7741986CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273551941.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56a0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a026298e2c15c9e3619c26faf69be64c9edab0f1ba950c43961cd7b24e90f39e
                                                                      • Instruction ID: bf80dc503edd180f5f095c390f23c505e47afc24f097d067daf3cb394b3f748f
                                                                      • Opcode Fuzzy Hash: a026298e2c15c9e3619c26faf69be64c9edab0f1ba950c43961cd7b24e90f39e
                                                                      • Instruction Fuzzy Hash: E95103B1E05218CBEB14CFAAD944BDDBBF2BB89300F1095AAD409AB354DB745D85CF04
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a619699d83ff06edb12d590027041f365af0dc312c5a624c14e99d61ed168ffd
                                                                      • Instruction ID: f7e12a576dd7ec8540c368fecfaabed9d5da06c76a1768249a1c62bbffaa786f
                                                                      • Opcode Fuzzy Hash: a619699d83ff06edb12d590027041f365af0dc312c5a624c14e99d61ed168ffd
                                                                      • Instruction Fuzzy Hash: 92415AB5E006199BDB18CFABC94069EFBF3BFC8300F14D07AD558AB264DB3059468B54
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273551941.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56a0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8d22629b311eceb0e5c4d93239e10745eba46fd3b1e8a50a3884cb305e3932dc
                                                                      • Instruction ID: 6224593bbb0db233041104432259f2c6419ba377e849bbf928f456213ca20c53
                                                                      • Opcode Fuzzy Hash: 8d22629b311eceb0e5c4d93239e10745eba46fd3b1e8a50a3884cb305e3932dc
                                                                      • Instruction Fuzzy Hash: F75112B5E04258CBEB14CFAAD944BDDBBF2BB89300F1094AAD409BB354DB741989CF00
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273098398.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5670000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b14bc2f074bca44447ec33a2169b2510eb29ea891b1418825e257becac2a34ed
                                                                      • Instruction ID: ed08fa329bbd3191a0e66cece03cc014e342f3064a3d4cea60a3787c8e0a9831
                                                                      • Opcode Fuzzy Hash: b14bc2f074bca44447ec33a2169b2510eb29ea891b1418825e257becac2a34ed
                                                                      • Instruction Fuzzy Hash: 38511B71D056588BEB6CCF6B8D446CAFAF7AFC9300F14C1FA944DA6264EB700AC58E51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273098398.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5670000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 18f4aa6d64ba13e0031f6cf12f0990f758a1eb506ddd4b80c9147c727baf4134
                                                                      • Instruction ID: 705cb4b1a71383497919268a1a84b6aebbfc00bd094c30470f753944660f5b26
                                                                      • Opcode Fuzzy Hash: 18f4aa6d64ba13e0031f6cf12f0990f758a1eb506ddd4b80c9147c727baf4134
                                                                      • Instruction Fuzzy Hash: 0C41BBB4D002489FEB14CFA9D885BAEBBF1BF09310F20942AE865AB350D7749885CF45
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273098398.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5670000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 88656f651eef52a4b127fd42d0587c31af03466738b54ab5aae9c30ba0737145
                                                                      • Instruction ID: 7a865eed29ef5c6cfe41a0b93d05e0db909aab0b7225b04c50a94e884d9953d8
                                                                      • Opcode Fuzzy Hash: 88656f651eef52a4b127fd42d0587c31af03466738b54ab5aae9c30ba0737145
                                                                      • Instruction Fuzzy Hash: 3E514E71D056588BEB6DCF678D452CAFAF3AFC9300F04C1FA844CA6264EB700A868F51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: db59c4c8eb95ed63ad49670603cd21d7e7485c3c1e0b533c40dfa8fb47d323df
                                                                      • Instruction ID: 1c43cfaf037733208cb26413bf5e3afd6a4cda9b032fa1360ae1f86e0b20741a
                                                                      • Opcode Fuzzy Hash: db59c4c8eb95ed63ad49670603cd21d7e7485c3c1e0b533c40dfa8fb47d323df
                                                                      • Instruction Fuzzy Hash: 5031C970D09618CFEB18CFAAC9446DDBBF2BF89300F54C0EA844DA6265DB745A858F40
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b21bf8cada1467accaa2fc728026fa6ca28c1ade93d5203b5cde211238fa02a3
                                                                      • Instruction ID: 12e4595b2b3bf7a6038050e6f3764bc3a1c987a7d4397c30f0541fcac4719236
                                                                      • Opcode Fuzzy Hash: b21bf8cada1467accaa2fc728026fa6ca28c1ade93d5203b5cde211238fa02a3
                                                                      • Instruction Fuzzy Hash: DE3172B1D056188BEB68CF6BC95878AFAF7BFC8304F14C1A9C40CA6264DB750A85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bce0e0c216085c94c01e536e05743b07d3719db5e75c395c56ce31c066a16a95
                                                                      • Instruction ID: 6f65435c2667a9d29ba5d664e3e8cad90ee5813efdda03318c56f374544a7003
                                                                      • Opcode Fuzzy Hash: bce0e0c216085c94c01e536e05743b07d3719db5e75c395c56ce31c066a16a95
                                                                      • Instruction Fuzzy Hash: E121DEB5C042189FDB14CFA9D980AEEBBF5FB49320F14941AE815B7340C735A905CFA8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1271793077.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_55c0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 33faac527d433d356a456edbf9b827c96148bf62ae38a489be931a04e26c0956
                                                                      • Instruction ID: c5b6b654c6be9ebc42f5aae0c52c372184af3cc7c9fa9f8e0764fb32fa06c8a4
                                                                      • Opcode Fuzzy Hash: 33faac527d433d356a456edbf9b827c96148bf62ae38a489be931a04e26c0956
                                                                      • Instruction Fuzzy Hash: 69210E72D057548FD719CFAA89052DABBF7AFCA300F09C0EBC448AA265EB3409858F51
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d686aefe7cf4affa3fe756e140d3c6aa5cda0ead2bb90e1b3e789570f7c8b7fd
                                                                      • Instruction ID: 7f8b29ce7322446e17ca88c5ffe3a054cf98189fd816543075e74779540df0c1
                                                                      • Opcode Fuzzy Hash: d686aefe7cf4affa3fe756e140d3c6aa5cda0ead2bb90e1b3e789570f7c8b7fd
                                                                      • Instruction Fuzzy Hash: C1110173946308AFCB00EFA0E845BADF7F9FB15214F004966D909A3391D6349909CBA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1275826124.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5900000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2b586fc675fb175cc3b0721c7a68dd77e81d84425e915d17889999294fb8875b
                                                                      • Instruction ID: 4928be6e4e2198e5d68d49e9c252bd9f14f230904ffe1be2a5efdc36ccd1b010
                                                                      • Opcode Fuzzy Hash: 2b586fc675fb175cc3b0721c7a68dd77e81d84425e915d17889999294fb8875b
                                                                      • Instruction Fuzzy Hash: E021FEB5C042189FDB14CFA9D880AEEFBF5FB49320F10941AE815B7240C735A901CFA8
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1249976906.0000000001170000.00000040.00000800.00020000.00000000.sdmp, Offset: 01170000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_1170000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7a64087985af161efd8e885b199fcb4ddf562b7feff4fbe2d2cc553c52712517
                                                                      • Instruction ID: 0e84010e4c5ce2dc9faea27ad675064bb0ff644507fc57017dd46fe0f9b43656
                                                                      • Opcode Fuzzy Hash: 7a64087985af161efd8e885b199fcb4ddf562b7feff4fbe2d2cc553c52712517
                                                                      • Instruction Fuzzy Hash: 063187B1D056188BEB58CF6BC95878AFAF2BFC8304F14C1A9C40CA7265DB750985CF51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (q$4'q$4'q$4'q$4'q$pq
                                                                      • API String ID: 0-2944075406
                                                                      • Opcode ID: 897176127bca5f5eb8c05d9659d2197755e4195b3a695ecc2e2fb81e642c6ebb
                                                                      • Instruction ID: 83f96dc7c1dc56f400e4e33b1e3f081d675fc62c9297c527438e41552580e764
                                                                      • Opcode Fuzzy Hash: 897176127bca5f5eb8c05d9659d2197755e4195b3a695ecc2e2fb81e642c6ebb
                                                                      • Instruction Fuzzy Hash: 1E51BF30A003059FEB58EB79A8507AFB6F6BFC8300F548928D44A9B785DF749906C7A1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %$)$-$7$>
                                                                      • API String ID: 0-2464634949
                                                                      • Opcode ID: eed9579261637b8dc784f5753385eb58300784f87198c08d2967285e161a2029
                                                                      • Instruction ID: bd47a8c1c37a2b16a6143d02f770ff05f65a3364c0edd4e9551d588d988d30f5
                                                                      • Opcode Fuzzy Hash: eed9579261637b8dc784f5753385eb58300784f87198c08d2967285e161a2029
                                                                      • Instruction Fuzzy Hash: 7C5134B4A45228DFDB10CF58D884BAEB7F6FB49308F006295E819AB395C7389D84CF41
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1273657691.00000000056B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_56b0000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (_q$(_q$(_q$(_q
                                                                      • API String ID: 0-1088526261
                                                                      • Opcode ID: 0073b8fb3ff33bca2362aaaefab83edf0836b5ed5b39c729a927daec104471cd
                                                                      • Instruction ID: ee94b6564cac75a9e8b71e2827cfe5990e6415c222f4f5b61176d749a42da76b
                                                                      • Opcode Fuzzy Hash: 0073b8fb3ff33bca2362aaaefab83edf0836b5ed5b39c729a927daec104471cd
                                                                      • Instruction Fuzzy Hash: 3C61C375B04604CFDB04EF78D4955AE7BB2FF8A304B154469E506AB3A2DB31DC81CB51
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %$)$7$>
                                                                      • API String ID: 0-1861809249
                                                                      • Opcode ID: 8353861b49f8c2136e4271d4a7ad14262e3b2e4f202b75edf130fd491eed9fda
                                                                      • Instruction ID: b11bb43f6ec067bcbecd46e95b7c1a6cb18575c080b222c6ee29bda17e600818
                                                                      • Opcode Fuzzy Hash: 8353861b49f8c2136e4271d4a7ad14262e3b2e4f202b75edf130fd491eed9fda
                                                                      • Instruction Fuzzy Hash: C05137B4A55218DFDB10CF58D884FAEB7B6FB49304F006295E819AB395CB389D85CF41
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %$)$7$>
                                                                      • API String ID: 0-1861809249
                                                                      • Opcode ID: 22020eaff4ff136fd7948b1aacc1a9bf98ad196cbd0df78dafed73889dfdb526
                                                                      • Instruction ID: 091087a010d2d89a8bc7e434d2246ce64100cb2408212208dc758900f7e94e70
                                                                      • Opcode Fuzzy Hash: 22020eaff4ff136fd7948b1aacc1a9bf98ad196cbd0df78dafed73889dfdb526
                                                                      • Instruction Fuzzy Hash: 915135B4A44218DFDB00CF58D884BAEB7F6FB49304F00A295E819AB394CB389D84CF41
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %$($+$7
                                                                      • API String ID: 0-1064845153
                                                                      • Opcode ID: 30e65428e538914c4f4bc9c10d3b7feea69402c2be8a015681c990d05f78f7ac
                                                                      • Instruction ID: e1afb900ee71cc49ed1ebcd819ab09f0aa29819f77f9aff5b0343e971fe66583
                                                                      • Opcode Fuzzy Hash: 30e65428e538914c4f4bc9c10d3b7feea69402c2be8a015681c990d05f78f7ac
                                                                      • Instruction Fuzzy Hash: 573177B4955218DFDB10CF58D884FAE77F6BB09318F406295E819AB384CB789D89CF41
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1272573424.0000000005640000.00000040.00000800.00020000.00000000.sdmp, Offset: 05640000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_5640000_invnoIL438805.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $%$7$H
                                                                      • API String ID: 0-1079435982
                                                                      • Opcode ID: fffa7122aaae1badf1d968ac1c228e603560027c34993a33816039bc4ac741e8
                                                                      • Instruction ID: ac993d8be27ec7d4db932d574b0183196c3ee573d835fcdd3a0b0369e9177737
                                                                      • Opcode Fuzzy Hash: fffa7122aaae1badf1d968ac1c228e603560027c34993a33816039bc4ac741e8
                                                                      • Instruction Fuzzy Hash: 9D2135B4955218CFDB00CF99D884BAEB7F6FB49308F146255E819AB385C7789D85CF40

                                                                      Execution Graph

                                                                      Execution Coverage:12.5%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:25
                                                                      Total number of Limit Nodes:6
                                                                      execution_graph 23920 e20848 23922 e2084e 23920->23922 23921 e2091b 23922->23921 23925 e21380 23922->23925 23931 e2148a 23922->23931 23926 e21328 23925->23926 23927 e2138b 23925->23927 23926->23922 23928 e21480 23927->23928 23929 e2148a GlobalMemoryStatusEx 23927->23929 23937 e27ea8 23927->23937 23928->23922 23929->23927 23932 e2148f 23931->23932 23933 e21396 23931->23933 23932->23922 23934 e21480 23933->23934 23935 e2148a GlobalMemoryStatusEx 23933->23935 23936 e27ea8 GlobalMemoryStatusEx 23933->23936 23934->23922 23935->23933 23936->23933 23938 e27eb2 23937->23938 23939 e27ecc 23938->23939 23942 647fa0a 23938->23942 23946 647fa18 23938->23946 23939->23927 23944 647fa2d 23942->23944 23943 647fc42 23943->23939 23944->23943 23945 647fc58 GlobalMemoryStatusEx 23944->23945 23945->23944 23948 647fa2d 23946->23948 23947 647fc42 23947->23939 23948->23947 23949 647fc58 GlobalMemoryStatusEx 23948->23949 23949->23948

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 127 6473040-6473061 128 6473063-6473066 127->128 129 6473807-647380a 128->129 130 647306c-647308b 128->130 131 6473830-6473832 129->131 132 647380c-647382b 129->132 139 64730a4-64730ae 130->139 140 647308d-6473090 130->140 133 6473834 131->133 134 6473839-647383c 131->134 132->131 133->134 134->128 137 6473842-647384b 134->137 144 64730b4-64730c3 139->144 140->139 142 6473092-64730a2 140->142 142->144 253 64730c5 call 6473860 144->253 254 64730c5 call 6473859 144->254 146 64730ca-64730cf 147 64730d1-64730d7 146->147 148 64730dc-64733b9 146->148 147->137 169 64733bf-647346e 148->169 170 64737f9-6473806 148->170 179 6473497 169->179 180 6473470-6473495 169->180 182 64734a0-64734b3 179->182 180->182 184 64737e0-64737ec 182->184 185 64734b9-64734db 182->185 184->169 186 64737f2 184->186 185->184 188 64734e1-64734eb 185->188 186->170 188->184 189 64734f1-64734fc 188->189 189->184 190 6473502-64735d8 189->190 202 64735e6-6473616 190->202 203 64735da-64735dc 190->203 207 6473624-6473630 202->207 208 6473618-647361a 202->208 203->202 209 6473632-6473636 207->209 210 6473690-6473694 207->210 208->207 209->210 213 6473638-6473662 209->213 211 64737d1-64737da 210->211 212 647369a-64736d6 210->212 211->184 211->190 223 64736e4-64736f2 212->223 224 64736d8-64736da 212->224 220 6473664-6473666 213->220 221 6473670-647368d 213->221 220->221 221->210 227 64736f4-64736ff 223->227 228 6473709-6473714 223->228 224->223 227->228 233 6473701 227->233 231 6473716-647371c 228->231 232 647372c-647373d 228->232 234 6473720-6473722 231->234 235 647371e 231->235 237 6473755-6473761 232->237 238 647373f-6473745 232->238 233->228 234->232 235->232 242 6473763-6473769 237->242 243 6473779-64737ca 237->243 239 6473747 238->239 240 6473749-647374b 238->240 239->237 240->237 244 647376d-647376f 242->244 245 647376b 242->245 243->211 244->243 245->243 253->146 254->146
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q$$q$$q$$q$$q
                                                                      • API String ID: 0-2069967915
                                                                      • Opcode ID: c29fff6ab50339bee6a4fe4ae6d13a8331dc72711da4ee18c10aac690e1fd969
                                                                      • Instruction ID: c736f3bec169ab1aabbfa1951d2f3c04888e8c45c601c3371610437a05c2f24c
                                                                      • Opcode Fuzzy Hash: c29fff6ab50339bee6a4fe4ae6d13a8331dc72711da4ee18c10aac690e1fd969
                                                                      • Instruction Fuzzy Hash: 38321D31E10719CBDB15EF75D89069DF7B2FF89300F20D6AAE409A7214EB70A985CB90

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 930 6477d68-6477d86 931 6477d88-6477d8b 930->931 932 6477da2-6477da5 931->932 933 6477d8d-6477d9b 931->933 934 6477da7-6477dc1 932->934 935 6477dc6-6477dc9 932->935 939 6477e0e-6477e24 933->939 940 6477d9d 933->940 934->935 937 6477dd6-6477dd9 935->937 938 6477dcb-6477dd5 935->938 942 6477dfc-6477dfe 937->942 943 6477ddb-6477df7 937->943 949 647803f-6478049 939->949 950 6477e2a-6477e33 939->950 940->932 944 6477e05-6477e08 942->944 945 6477e00 942->945 943->942 944->931 944->939 945->944 952 647804a-647807f 950->952 953 6477e39-6477e56 950->953 956 6478081-6478084 952->956 960 647802c-6478039 953->960 961 6477e5c-6477e84 953->961 957 64780a7-64780aa 956->957 958 6478086-64780a2 956->958 962 64780b0-64780bf 957->962 963 64782df-64782e2 957->963 958->957 960->949 960->950 961->960 980 6477e8a-6477e93 961->980 974 64780c1-64780dc 962->974 975 64780de-6478122 962->975 964 647838d-647838f 963->964 965 64782e8-64782f4 963->965 967 6478396-6478399 964->967 968 6478391 964->968 972 64782ff-6478301 965->972 967->956 971 647839f-64783a8 967->971 968->967 977 6478303-6478309 972->977 978 6478319-647831d 972->978 974->975 987 64782b3-64782c9 975->987 988 6478128-6478139 975->988 981 647830d-647830f 977->981 982 647830b 977->982 983 647831f-6478329 978->983 984 647832b 978->984 980->952 989 6477e99-6477eb5 980->989 981->978 982->978 986 6478330-6478332 983->986 984->986 992 6478334-6478337 986->992 993 6478343-647837c 986->993 987->963 997 647813f-647815c 988->997 998 647829e-64782ad 988->998 1000 6477ebb-6477ee5 989->1000 1001 647801a-6478026 989->1001 992->971 993->962 1015 6478382-647838c 993->1015 997->998 1009 6478162-6478258 call 6476590 997->1009 998->987 998->988 1012 6478010-6478015 1000->1012 1013 6477eeb-6477f13 1000->1013 1001->960 1001->980 1063 6478266 1009->1063 1064 647825a-6478264 1009->1064 1012->1001 1013->1012 1021 6477f19-6477f47 1013->1021 1021->1012 1027 6477f4d-6477f56 1021->1027 1027->1012 1028 6477f5c-6477f8e 1027->1028 1036 6477f90-6477f94 1028->1036 1037 6477f99-6477fb5 1028->1037 1036->1012 1038 6477f96 1036->1038 1037->1001 1039 6477fb7-647800e call 6476590 1037->1039 1038->1037 1039->1001 1065 647826b-647826d 1063->1065 1064->1065 1065->998 1066 647826f-6478274 1065->1066 1067 6478276-6478280 1066->1067 1068 6478282 1066->1068 1069 6478287-6478289 1067->1069 1068->1069 1069->998 1070 647828b-6478297 1069->1070 1070->998
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q
                                                                      • API String ID: 0-3126353813
                                                                      • Opcode ID: 698a3d590df6281af60453130b6ce3b82782731598b466a4913607ff08454bfe
                                                                      • Instruction ID: c1bc7efce7e33a312375cbb88b717c130b1cd4212cfc86392578d03de457d8bf
                                                                      • Opcode Fuzzy Hash: 698a3d590df6281af60453130b6ce3b82782731598b466a4913607ff08454bfe
                                                                      • Instruction Fuzzy Hash: 3802AD30B002059FDB65EF68D994BAEBBE2FF84310F15852AD4159B385DB72EC42CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9864e63689bbfbd50467d7a8e054d6c4b428fc9562cce902fcea9c0f94f3d6e6
                                                                      • Instruction ID: 75aef30235b2865d8e05efd8ed6251e278bf9aa897c1e9002f2d142962c86d04
                                                                      • Opcode Fuzzy Hash: 9864e63689bbfbd50467d7a8e054d6c4b428fc9562cce902fcea9c0f94f3d6e6
                                                                      • Instruction Fuzzy Hash: EF925830E002048FDBA5DF68C584B9EB7F2FB45314F5884AAD449AB355DBB5ED82CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d4546e6c985dbdb5321cf8debcf623855306da5a0f7e965b99a5778b2b69a292
                                                                      • Instruction ID: 842f2422dbffd0a5b5650fd9e5d3547def75e51b534add299d23a068b61ff748
                                                                      • Opcode Fuzzy Hash: d4546e6c985dbdb5321cf8debcf623855306da5a0f7e965b99a5778b2b69a292
                                                                      • Instruction Fuzzy Hash: EE629C34A006049FDB65DB68D984BEEB7F3EB89310F15846AE405EB394DB71ED42CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bcdac7d2f54569222c06fa985ae7d1299c6c4b95c89e9095a4fd3363cb0a3d89
                                                                      • Instruction ID: fc83c5087730a10482fb848ea90850962dc383fbe9f1fe9b8f165570ab7f7f19
                                                                      • Opcode Fuzzy Hash: bcdac7d2f54569222c06fa985ae7d1299c6c4b95c89e9095a4fd3363cb0a3d89
                                                                      • Instruction Fuzzy Hash: EC22BF31E102048FDF69DBA8C4807EEBBB2EF85310F25846AD455AF385DA75DD42CBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b2a05e9e2e1d5e4b81c0b046c2eab4af959e1e206d6f533324a3085ee1fbbbb6
                                                                      • Instruction ID: da6b0f7a610a49462bbe0bbc5c7a26ed1bdcc94152ccff2f1430d97d9111964b
                                                                      • Opcode Fuzzy Hash: b2a05e9e2e1d5e4b81c0b046c2eab4af959e1e206d6f533324a3085ee1fbbbb6
                                                                      • Instruction Fuzzy Hash: 71224070E102098FEF65DF68D884BEFB7A6EB45310F24852AE415DB395CA34DD82CB61

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 647acb8-647acd6 1 647acd8-647acdb 0->1 2 647ace5-647ace8 1->2 3 647acdd-647ace2 1->3 4 647ad0b-647ad0e 2->4 5 647acea-647ad06 2->5 3->2 6 647ad10-647ad14 4->6 7 647ad1f-647ad22 4->7 5->4 9 647aee4-647aeee 6->9 10 647ad1a 6->10 11 647ad24-647ad37 7->11 12 647ad3c-647ad3f 7->12 10->7 11->12 13 647ad41-647ad4a 12->13 14 647ad4f-647ad52 12->14 13->14 17 647aed5-647aede 14->17 18 647ad58-647ad5b 14->18 17->9 20 647ad5d-647ad66 17->20 19 647ad75-647ad78 18->19 18->20 23 647ad8c-647ad8e 19->23 24 647ad7a-647ad87 19->24 21 647aeef-647af01 20->21 22 647ad6c-647ad70 20->22 30 647af03-647af26 21->30 31 647af42-647af6c 21->31 22->19 25 647ad95-647ad98 23->25 26 647ad90 23->26 24->23 25->1 28 647ad9e-647adc2 25->28 26->25 45 647aed2 28->45 46 647adc8-647add7 28->46 33 647af28-647af2b 30->33 37 647af72-647af7e 31->37 38 647b15f-647b172 31->38 34 647b194-647b197 33->34 35 647af31-647af3d 33->35 40 647b1a6-647b1a9 34->40 41 647b199 call 647b20f 34->41 35->31 56 647af80-647af99 37->56 57 647af9e-647afe2 37->57 42 647b174 38->42 43 647b1ab-647b1af 40->43 44 647b1ba-647b1bd 40->44 47 647b19f-647b1a1 41->47 53 647b175 42->53 43->35 48 647b1b5 43->48 49 647b1bf-647b1c9 44->49 50 647b1ca-647b1cd 44->50 45->17 58 647adef-647ae2a call 6476590 46->58 59 647add9-647addf 46->59 47->40 48->44 54 647b1f0-647b1f2 50->54 55 647b1cf-647b1eb 50->55 53->53 60 647b1f4 54->60 61 647b1f9-647b1fc 54->61 55->54 56->42 77 647afe4-647aff6 57->77 78 647affe-647b03d 57->78 80 647ae42-647ae59 58->80 81 647ae2c-647ae32 58->81 63 647ade3-647ade5 59->63 64 647ade1 59->64 60->61 61->33 62 647b202-647b20c 61->62 63->58 64->58 77->78 87 647b124-647b139 78->87 88 647b043-647b11e call 6476590 78->88 93 647ae71-647ae82 80->93 94 647ae5b-647ae61 80->94 84 647ae36-647ae38 81->84 85 647ae34 81->85 84->80 85->80 87->38 88->87 100 647ae84-647ae8a 93->100 101 647ae9a-647aecb 93->101 96 647ae65-647ae67 94->96 97 647ae63 94->97 96->93 97->93 103 647ae8e-647ae90 100->103 104 647ae8c 100->104 101->45 103->101 104->101
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q$$q$$q$$q$$q$$q$$q
                                                                      • API String ID: 0-3886557441
                                                                      • Opcode ID: a3ec98cb6e8fb0a557c9e023f2042cae53bf7d04e2fda8d53615ebdbbb9834e3
                                                                      • Instruction ID: 0cc935108037b05092458b315dd90919d9fe9e0be5d1ca07fd31957d39def8b3
                                                                      • Opcode Fuzzy Hash: a3ec98cb6e8fb0a557c9e023f2042cae53bf7d04e2fda8d53615ebdbbb9834e3
                                                                      • Instruction Fuzzy Hash: 78E14C31E103099FDB65DF68D8806EEB7B6FB84310F20852AE805AB355DB759886CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 255 647b630-647b650 256 647b652-647b655 255->256 257 647b657-647b65e 256->257 258 647b66f-647b672 256->258 259 647b664-647b66a 257->259 260 647b9d3-647ba0e 257->260 261 647b674-647b67d 258->261 262 647b682-647b685 258->262 259->258 270 647ba10-647ba13 260->270 261->262 263 647b687-647b689 262->263 264 647b68c-647b68f 262->264 263->264 265 647b691-647b697 264->265 266 647b69c-647b69f 264->266 265->266 268 647b6a5-647b6a8 266->268 269 647b770-647b771 266->269 272 647b6c5-647b6c8 268->272 273 647b6aa-647b6b3 268->273 271 647b776-647b779 269->271 274 647bc7f-647bc82 270->274 275 647ba19-647ba41 270->275 276 647b7ce-647b7d1 271->276 277 647b77b-647b7c9 call 6476590 271->277 281 647b6ca-647b6d3 272->281 282 647b6d8-647b6db 272->282 273->260 278 647b6b9-647b6c0 273->278 279 647bca5-647bca7 274->279 280 647bc84-647bca0 274->280 323 647ba43-647ba46 275->323 324 647ba4b-647ba8f 275->324 288 647b7d3-647b7e8 276->288 289 647b810-647b813 276->289 277->276 278->272 286 647bcae-647bcb1 279->286 287 647bca9 279->287 280->279 281->282 284 647b6dd-647b6e6 282->284 285 647b6eb-647b6ee 282->285 284->285 290 647b6f0-647b6f6 285->290 291 647b708-647b70b 285->291 286->270 292 647bcb7-647bcc0 286->292 287->286 288->260 311 647b7ee-647b80b 288->311 294 647b815-647b82a 289->294 295 647b852-647b855 289->295 290->260 298 647b6fc-647b703 290->298 301 647b70d-647b713 291->301 302 647b71a-647b71d 291->302 294->260 315 647b830-647b84d 294->315 299 647b857-647b85e 295->299 300 647b87f-647b882 295->300 298->291 299->260 307 647b864-647b874 299->307 312 647b8a5-647b8a8 300->312 313 647b884-647b8a0 300->313 301->290 308 647b715 301->308 309 647b72f-647b732 302->309 310 647b71f-647b72a 302->310 339 647b947-647b94e 307->339 340 647b87a 307->340 308->302 319 647b734-647b73b 309->319 320 647b749-647b74c 309->320 310->309 311->289 316 647b8ca-647b8cd 312->316 317 647b8aa-647b8c5 312->317 313->312 315->295 325 647b8d7-647b8da 316->325 326 647b8cf-647b8d2 316->326 317->316 319->260 332 647b741-647b744 319->332 321 647b756-647b759 320->321 322 647b74e-647b753 320->322 336 647b766-647b769 321->336 337 647b75b-647b761 321->337 322->321 323->292 370 647ba95-647ba9e 324->370 371 647bc74-647bc7e 324->371 334 647b92e-647b937 325->334 335 647b8dc-647b8df 325->335 326->325 332->320 334->273 341 647b93d 334->341 345 647b8e1-647b8e5 335->345 346 647b8f0-647b8f3 335->346 336->301 342 647b76b-647b76e 336->342 337->336 339->260 343 647b954-647b964 339->343 340->300 353 647b942-647b945 341->353 342->269 342->271 343->269 361 647b96a 343->361 345->284 350 647b8eb 345->350 351 647b8f5-647b8fe 346->351 352 647b903-647b906 346->352 350->346 351->352 352->269 358 647b90c-647b90f 352->358 353->339 355 647b96f-647b972 353->355 362 647b984-647b987 355->362 363 647b974 355->363 359 647b911-647b918 358->359 360 647b929-647b92c 358->360 359->260 365 647b91e-647b924 359->365 360->334 360->353 361->355 362->269 364 647b98d-647b990 362->364 372 647b97c-647b97f 363->372 368 647b9b6-647b9b8 364->368 369 647b992-647b999 364->369 365->360 375 647b9bf-647b9c2 368->375 376 647b9ba 368->376 369->260 373 647b99b-647b9ab 369->373 377 647baa4-647bb10 call 6476590 370->377 378 647bc6a-647bc6f 370->378 372->362 373->299 383 647b9b1 373->383 375->256 379 647b9c8-647b9d2 375->379 376->375 389 647bb16-647bb1b 377->389 390 647bc0a-647bc1f 377->390 378->371 383->368 392 647bb37 389->392 393 647bb1d-647bb23 389->393 390->378 396 647bb39-647bb3f 392->396 394 647bb25-647bb27 393->394 395 647bb29-647bb2b 393->395 399 647bb35 394->399 395->399 397 647bb54-647bb61 396->397 398 647bb41-647bb47 396->398 406 647bb63-647bb69 397->406 407 647bb79-647bb86 397->407 400 647bbf5-647bc04 398->400 401 647bb4d 398->401 399->396 400->389 400->390 401->397 402 647bbbc-647bbc9 401->402 403 647bb88-647bb95 401->403 414 647bbe1-647bbee 402->414 415 647bbcb-647bbd1 402->415 412 647bb97-647bb9d 403->412 413 647bbad-647bbba 403->413 408 647bb6d-647bb6f 406->408 409 647bb6b 406->409 407->400 408->407 409->407 417 647bba1-647bba3 412->417 418 647bb9f 412->418 413->400 414->400 419 647bbd5-647bbd7 415->419 420 647bbd3 415->420 417->413 418->413 419->414 420->414
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q$$q$$q$$q$$q
                                                                      • API String ID: 0-2069967915
                                                                      • Opcode ID: 32f93406aedabcb16c21c13f3be4546a5837fd49cc0be646a557e023d6f5cc88
                                                                      • Instruction ID: 9c4f0e6d7a34ab7f2784b77168c4978f5a2c4268041a3d4118458479637d09d2
                                                                      • Opcode Fuzzy Hash: 32f93406aedabcb16c21c13f3be4546a5837fd49cc0be646a557e023d6f5cc88
                                                                      • Instruction Fuzzy Hash: 39025830E102098FDBA5DF68D980BEEB7A2FB85310F24856AE415DB355DB31ED42CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 423 6479138-647915d 424 647915f-6479162 423->424 425 6479a20-6479a23 424->425 426 6479168-647917d 424->426 427 6479a25-6479a44 425->427 428 6479a49-6479a4b 425->428 432 6479195-64791ab 426->432 433 647917f-6479185 426->433 427->428 430 6479a52-6479a55 428->430 431 6479a4d 428->431 430->424 435 6479a5b-6479a65 430->435 431->430 440 64791b6-64791b8 432->440 436 6479187 433->436 437 6479189-647918b 433->437 436->432 437->432 441 64791d0-6479241 440->441 442 64791ba-64791c0 440->442 453 6479243-6479266 441->453 454 647926d-6479289 441->454 443 64791c4-64791c6 442->443 444 64791c2 442->444 443->441 444->441 453->454 459 64792b5-64792d0 454->459 460 647928b-64792ae 454->460 465 64792d2-64792f4 459->465 466 64792fb-6479316 459->466 460->459 465->466 471 647933b-6479349 466->471 472 6479318-6479334 466->472 473 647934b-6479354 471->473 474 6479359-64793d3 471->474 472->471 473->435 480 64793d5-64793f3 474->480 481 6479420-6479435 474->481 485 64793f5-6479404 480->485 486 647940f-647941e 480->486 481->425 485->486 486->480 486->481
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q$$q$$q
                                                                      • API String ID: 0-4102054182
                                                                      • Opcode ID: 9f0fce966aeb53967366e914889f66ee2cd99f8dd235ba9a830fbcc9fca86e30
                                                                      • Instruction ID: 17cc98389549c8d9081985576756e604b82e1f7349214cfe50e17ccd94be8252
                                                                      • Opcode Fuzzy Hash: 9f0fce966aeb53967366e914889f66ee2cd99f8dd235ba9a830fbcc9fca86e30
                                                                      • Instruction Fuzzy Hash: 41913130F002199FDB65DB69D891BAE77F6FF88310F108569D819EB348EA70DD428B91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 489 647cf28-647cf43 490 647cf45-647cf48 489->490 491 647cf91-647cf94 490->491 492 647cf4a-647cf8c 490->492 493 647d414-647d420 491->493 494 647cf9a-647cf9d 491->494 492->491 497 647d426-647d713 493->497 498 647d122-647d131 493->498 495 647cfe6-647cfe9 494->495 496 647cf9f-647cfae 494->496 500 647d032-647d035 495->500 501 647cfeb-647d02d 495->501 504 647cfb0-647cfb5 496->504 505 647cfbd-647cfc9 496->505 702 647d93a-647d944 497->702 703 647d719-647d71f 497->703 502 647d133-647d138 498->502 503 647d140-647d14c 498->503 508 647d037-647d079 500->508 509 647d07e-647d081 500->509 501->500 502->503 506 647d945-647d97e 503->506 507 647d152-647d164 503->507 504->505 505->506 510 647cfcf-647cfe1 505->510 529 647d980-647d983 506->529 525 647d169-647d16c 507->525 508->509 514 647d0a4-647d0a7 509->514 515 647d083-647d09f 509->515 510->495 520 647d0f0-647d0f3 514->520 521 647d0a9-647d0eb 514->521 515->514 527 647d0f5-647d0fa 520->527 528 647d0fd-647d100 520->528 521->520 534 647d16e-647d170 525->534 535 647d17b-647d17e 525->535 527->528 536 647d102-647d118 528->536 537 647d11d-647d120 528->537 538 647d9a6-647d9a9 529->538 539 647d985-647d9a1 529->539 543 647d176 534->543 544 647d411 534->544 546 647d1c7-647d1ca 535->546 547 647d180-647d1c2 535->547 536->537 537->498 537->525 540 647d9ab call 647da9d 538->540 541 647d9b8-647d9bb 538->541 539->538 558 647d9b1-647d9b3 540->558 551 647d9ee-647d9f0 541->551 552 647d9bd-647d9e9 541->552 543->535 544->493 553 647d213-647d216 546->553 554 647d1cc-647d20e 546->554 547->546 560 647d9f7-647d9fa 551->560 561 647d9f2 551->561 552->551 562 647d225-647d228 553->562 563 647d218-647d21a 553->563 554->553 558->541 560->529 569 647d9fc-647da0b 560->569 561->560 574 647d271-647d274 562->574 575 647d22a-647d26c 562->575 572 647d220 563->572 573 647d2cf-647d2d8 563->573 594 647da72-647da87 569->594 595 647da0d-647da70 call 6476590 569->595 572->562 580 647d2e7-647d2f3 573->580 581 647d2da-647d2df 573->581 577 647d276-647d2b8 574->577 578 647d2bd-647d2bf 574->578 575->574 577->578 586 647d2c6-647d2c9 578->586 587 647d2c1 578->587 588 647d404-647d409 580->588 589 647d2f9-647d30d 580->589 581->580 586->490 586->573 587->586 588->544 589->544 606 647d313-647d325 589->606 607 647da88 594->607 595->594 619 647d327-647d32d 606->619 620 647d349-647d34b 606->620 607->607 624 647d331-647d33d 619->624 625 647d32f 619->625 621 647d355-647d361 620->621 634 647d363-647d36d 621->634 635 647d36f 621->635 628 647d33f-647d347 624->628 625->628 628->621 637 647d374-647d376 634->637 635->637 637->544 639 647d37c-647d398 call 6476590 637->639 649 647d3a7-647d3b3 639->649 650 647d39a-647d39f 639->650 649->588 651 647d3b5-647d402 649->651 650->649 651->544 704 647d721-647d726 703->704 705 647d72e-647d737 703->705 704->705 705->506 706 647d73d-647d750 705->706 708 647d756-647d75c 706->708 709 647d92a-647d934 706->709 710 647d75e-647d763 708->710 711 647d76b-647d774 708->711 709->702 709->703 710->711 711->506 712 647d77a-647d79b 711->712 715 647d79d-647d7a2 712->715 716 647d7aa-647d7b3 712->716 715->716 716->506 717 647d7b9-647d7d6 716->717 717->709 720 647d7dc-647d7e2 717->720 720->506 721 647d7e8-647d801 720->721 723 647d807-647d82e 721->723 724 647d91d-647d924 721->724 723->506 727 647d834-647d83e 723->727 724->709 724->720 727->506 728 647d844-647d85b 727->728 730 647d85d-647d868 728->730 731 647d86a-647d885 728->731 730->731 731->724 736 647d88b-647d8a4 call 6476590 731->736 740 647d8a6-647d8ab 736->740 741 647d8b3-647d8bc 736->741 740->741 741->506 742 647d8c2-647d916 741->742 742->724
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q$$q
                                                                      • API String ID: 0-3067366958
                                                                      • Opcode ID: 5ecdc6689b1720cb9e4adefbcf4d6a260b0ab922be78bc9421a14be4a1d44d67
                                                                      • Instruction ID: 11cc88d59aabdf53cc1eb02563d83bc03dae9c57b2dbfc4e150e4ecf69830330
                                                                      • Opcode Fuzzy Hash: 5ecdc6689b1720cb9e4adefbcf4d6a260b0ab922be78bc9421a14be4a1d44d67
                                                                      • Instruction Fuzzy Hash: AF628B34A003059FCB65EF68E590A9EB7F2FF84720B248A29D0059F359DB31ED46CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 882 6474b50-6474b74 884 6474b76-6474b79 882->884 885 6474b7f-6474c77 884->885 886 6475258-647525b 884->886 906 6474c7d-6474cca call 64753f8 885->906 907 6474cfa-6474d01 885->907 887 647525d-6475277 886->887 888 647527c-647527e 886->888 887->888 889 6475285-6475288 888->889 890 6475280 888->890 889->884 892 647528e-647529b 889->892 890->889 920 6474cd0-6474cec 906->920 908 6474d07-6474d77 907->908 909 6474d85-6474d8e 907->909 926 6474d82 908->926 927 6474d79 908->927 909->892 924 6474cf7-6474cf8 920->924 925 6474cee 920->925 924->907 925->924 926->909 927->926
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: fq$XPq$\Oq
                                                                      • API String ID: 0-132346853
                                                                      • Opcode ID: a1c74b1a22502145dcaa8b31dc13a3183f51746239099a2cfc027a620b9c6f15
                                                                      • Instruction ID: a4625a2c9d2d9628e4949f6853ccc7e3369a36942284eab2f3a44d2f163bb811
                                                                      • Opcode Fuzzy Hash: a1c74b1a22502145dcaa8b31dc13a3183f51746239099a2cfc027a620b9c6f15
                                                                      • Instruction Fuzzy Hash: 74617231F002189FEF559FA8C8547AEBAF6FF88300F24842AD505AB395DE758D458BA1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1696 6479127-647915d 1698 647915f-6479162 1696->1698 1699 6479a20-6479a23 1698->1699 1700 6479168-647917d 1698->1700 1701 6479a25-6479a44 1699->1701 1702 6479a49-6479a4b 1699->1702 1706 6479195-64791ab 1700->1706 1707 647917f-6479185 1700->1707 1701->1702 1704 6479a52-6479a55 1702->1704 1705 6479a4d 1702->1705 1704->1698 1709 6479a5b-6479a65 1704->1709 1705->1704 1714 64791b6-64791b8 1706->1714 1710 6479187 1707->1710 1711 6479189-647918b 1707->1711 1710->1706 1711->1706 1715 64791d0-6479241 1714->1715 1716 64791ba-64791c0 1714->1716 1727 6479243-6479266 1715->1727 1728 647926d-6479289 1715->1728 1717 64791c4-64791c6 1716->1717 1718 64791c2 1716->1718 1717->1715 1718->1715 1727->1728 1733 64792b5-64792d0 1728->1733 1734 647928b-64792ae 1728->1734 1739 64792d2-64792f4 1733->1739 1740 64792fb-6479316 1733->1740 1734->1733 1739->1740 1745 647933b-6479349 1740->1745 1746 6479318-6479334 1740->1746 1747 647934b-6479354 1745->1747 1748 6479359-64793d3 1745->1748 1746->1745 1747->1709 1754 64793d5-64793f3 1748->1754 1755 6479420-6479435 1748->1755 1759 64793f5-6479404 1754->1759 1760 647940f-647941e 1754->1760 1755->1699 1759->1760 1760->1754 1760->1755
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q
                                                                      • API String ID: 0-3126353813
                                                                      • Opcode ID: 5ddf0cb87be37de1b48c97e43a540c400cb3ff13c36cca605aac7fd8c2bfb77f
                                                                      • Instruction ID: 6ebd18f623ba11d6eb97d26394719c65135c66862cb2c8fc22f302e80518e98a
                                                                      • Opcode Fuzzy Hash: 5ddf0cb87be37de1b48c97e43a540c400cb3ff13c36cca605aac7fd8c2bfb77f
                                                                      • Instruction Fuzzy Hash: 17511030F002049FDB54DB79D891BAE7BE6FF88310F148569D819DB348EA74DD428BA1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1763 e2e908-e2e910 1764 e2e912-e2e923 1763->1764 1765 e2e8cf-e2e8e8 call e2e908 1763->1765 1767 e2e925-e2e94c call e2e164 1764->1767 1768 e2e94d-e2e96c call e2e170 1764->1768 1770 e2e8ee-e2e8f2 1765->1770 1778 e2e972-e2e9d1 1768->1778 1779 e2e96e-e2e971 1768->1779 1773 e2e8f4-e2e8f9 1770->1773 1774 e2e8fb-e2e8fe 1770->1774 1776 e2e901-e2e903 1773->1776 1774->1776 1786 e2e9d3-e2e9d6 1778->1786 1787 e2e9d7-e2ea64 GlobalMemoryStatusEx 1778->1787 1791 e2ea66-e2ea6c 1787->1791 1792 e2ea6d-e2ea95 1787->1792 1791->1792
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1351607489.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: af47668daf414cc8a779ed7011dcff1f20691fe147da223981a8ad8469ee890f
                                                                      • Instruction ID: aa77fc02d1b578c161883467562fb7d0b1e3e732cdca569deaa039f51c6ad90f
                                                                      • Opcode Fuzzy Hash: af47668daf414cc8a779ed7011dcff1f20691fe147da223981a8ad8469ee890f
                                                                      • Instruction Fuzzy Hash: F0517471D043A99FDB14CF79E8006EABBF5AF86310F0481ABE448A7381DB349845CBE0

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1796 e2e9f0-e2ea2e 1797 e2ea36-e2ea64 GlobalMemoryStatusEx 1796->1797 1798 e2ea66-e2ea6c 1797->1798 1799 e2ea6d-e2ea95 1797->1799 1798->1799
                                                                      APIs
                                                                      • GlobalMemoryStatusEx.KERNELBASE ref: 00E2EA57
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1351607489.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID: GlobalMemoryStatus
                                                                      • String ID:
                                                                      • API String ID: 1890195054-0
                                                                      • Opcode ID: 66c29845e115325f80026fbaa39e77109be30232182af6cbefb6b507414105d5
                                                                      • Instruction ID: cdac668c4cc8755786bdcb70a5bd3f3a294d638a59dd5d0619c49c200cf5561b
                                                                      • Opcode Fuzzy Hash: 66c29845e115325f80026fbaa39e77109be30232182af6cbefb6b507414105d5
                                                                      • Instruction Fuzzy Hash: 7A1112B2C006699FDB10CF9AD444BDEFBF4BB48324F10812AE818B7240D378A944CFA5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: XPq
                                                                      • API String ID: 0-1601936878
                                                                      • Opcode ID: a17823b1cdbb52ba9d273dbfb01a47afc3b3ab5d847d21b47d4799924a09b812
                                                                      • Instruction ID: b56e89fd0f47890ed1b0d2d480be529e3faa37c7754389c3f4819c3546fbe7cd
                                                                      • Opcode Fuzzy Hash: a17823b1cdbb52ba9d273dbfb01a47afc3b3ab5d847d21b47d4799924a09b812
                                                                      • Instruction Fuzzy Hash: FB418630F002189FDB559FA5C854BEEBBF6FF88300F24852AD1059B395DA758C05CBA0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: PHq
                                                                      • API String ID: 0-3820536768
                                                                      • Opcode ID: fbef0fe0e42e4b19f84233d81cb41cf5e952bb8d712d6d7118cdf3e223cb5e63
                                                                      • Instruction ID: 529764eb48b56e985be82ab0ca2ef97ec5db968e7b6571c9d3e2b0a742dd49ad
                                                                      • Opcode Fuzzy Hash: fbef0fe0e42e4b19f84233d81cb41cf5e952bb8d712d6d7118cdf3e223cb5e63
                                                                      • Instruction Fuzzy Hash: 26418D30E107499FDB65DFA5C8946DEBBB2BF85300F24852AD806DB350DB70E946CBA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: PHq
                                                                      • API String ID: 0-3820536768
                                                                      • Opcode ID: 901bd81b72ed2b2c328542feaa36c40cb1d4867b2e48cf537d64aae657100929
                                                                      • Instruction ID: 14fbe15b6af8d6f70c4c4d26657044ba7508497a09c78779f6fdb2eaf5ba5621
                                                                      • Opcode Fuzzy Hash: 901bd81b72ed2b2c328542feaa36c40cb1d4867b2e48cf537d64aae657100929
                                                                      • Instruction Fuzzy Hash: A931EF30B002059FDB69AB78D8547AF3BE3EB89610F244429D402DB394DEB5DE42C7A1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: |
                                                                      • API String ID: 0-2343686810
                                                                      • Opcode ID: 0c92f67d364979872d64101ef525e2192742442380e38e1205c38622228812a0
                                                                      • Instruction ID: 1b766f8b7492e042ec1df61029dbb869e3fd34cbd4a5c13fb857de5b8e6431e7
                                                                      • Opcode Fuzzy Hash: 0c92f67d364979872d64101ef525e2192742442380e38e1205c38622228812a0
                                                                      • Instruction Fuzzy Hash: C321D130B043249FDB509B788804BAE7FF6AF49700F1040AEE54ADB3A1DB359C01CB91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: |
                                                                      • API String ID: 0-2343686810
                                                                      • Opcode ID: 0f0834ce40d6a18379a116c2fd8e43fee2e0df8cf1081ee5b4fa943122de6508
                                                                      • Instruction ID: a810a8268d45d9f2b0bb8ee77f24b504de9ee9777f8ebbc029057527d0daa2a8
                                                                      • Opcode Fuzzy Hash: 0f0834ce40d6a18379a116c2fd8e43fee2e0df8cf1081ee5b4fa943122de6508
                                                                      • Instruction Fuzzy Hash: 61115E70F002249FDB54DB78C804B6EBBF6AF4C710F10846AE50AE73A0DB759901CB94
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q
                                                                      • API String ID: 0-1301096350
                                                                      • Opcode ID: 9a4442005abc8afc16fa4c3b3aa25a3cce307dfe6e28647b6bf66817ce6294ac
                                                                      • Instruction ID: 0ff231b50c8e503c0c44e80904f70fbe7fb35f7eff6e0335940a2f7922389bea
                                                                      • Opcode Fuzzy Hash: 9a4442005abc8afc16fa4c3b3aa25a3cce307dfe6e28647b6bf66817ce6294ac
                                                                      • Instruction Fuzzy Hash: 91F0A932E04200CFEF665A8EAA882FA73A1EB04250B0904B3CD00C7A44D373CA02C7A0
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 79d41a22b63a01f905b3a58efdc958dd0ada3c5f5e3fba8e9ca587db755ff17e
                                                                      • Instruction ID: 4f5a409fe26c682a3e5d830cb562f2949f72a75c7e8a71fe6fbad38e48f0db83
                                                                      • Opcode Fuzzy Hash: 79d41a22b63a01f905b3a58efdc958dd0ada3c5f5e3fba8e9ca587db755ff17e
                                                                      • Instruction Fuzzy Hash: C5326C34B002099FDB65DB68D8D4BEEB7B6FB88310F10852AD505EB385DB35EC428B91
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: bae2ef5bd27a8e9e966e01b935dd7be7b86dc5b20657d8073a5910f2e664fc16
                                                                      • Instruction ID: cf66734f91f8aebf89e18ece4694c6e7a07818cefe57319bb231a59ae49c4c77
                                                                      • Opcode Fuzzy Hash: bae2ef5bd27a8e9e966e01b935dd7be7b86dc5b20657d8073a5910f2e664fc16
                                                                      • Instruction Fuzzy Hash: 55917E30B102048FDB55DBB8D8907AEBBF6AF89300F14852AD409DB385EA70DD82CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d5243bef7ea9385107ee79372f4c607e3e2c7c2b3d53ef00fffd0ee7b9d3f970
                                                                      • Instruction ID: b9d44bb4abf30c817ed475716a6ef34772235b12081351927596191637c84cc7
                                                                      • Opcode Fuzzy Hash: d5243bef7ea9385107ee79372f4c607e3e2c7c2b3d53ef00fffd0ee7b9d3f970
                                                                      • Instruction Fuzzy Hash: 0A61B471F005114BDF55AA7DC8806DFBAD7AFC4220B1A443AD80AEB364DEB5ED4287D2
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c16e0ce695770244d62bb4d0b560214291c253cf15ac137cb01cc44db0d71ac8
                                                                      • Instruction ID: a7c5ddc2bfaf9f008fdd49be617abc793f2d03a97da7509833073fcb963ea2c7
                                                                      • Opcode Fuzzy Hash: c16e0ce695770244d62bb4d0b560214291c253cf15ac137cb01cc44db0d71ac8
                                                                      • Instruction Fuzzy Hash: 44914034E002198BDF61DF68C890BDEB7B1FF85310F20869AD549BB345DB70AA85CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 582abb7c5af7b4020b3c25b12a6e4a10e5efc0984e91197b0614af7fe3e357a6
                                                                      • Instruction ID: d142c0de16ff6668d3e79afdec909972508270dc09ce42e004add866edb5bbc4
                                                                      • Opcode Fuzzy Hash: 582abb7c5af7b4020b3c25b12a6e4a10e5efc0984e91197b0614af7fe3e357a6
                                                                      • Instruction Fuzzy Hash: 36815D74E002099FDB54DBA9D980AEEBBF6FF84310F24856AE015AB355DB30ED46CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dafc535db92dc252cd12b8e6ad69e2a792e6e5ccc386d568be462b69a28a8f19
                                                                      • Instruction ID: 68d19f8eaecddd2e19b3f98a42b59be3d0a251e405e67a7baa13ab8f684d91aa
                                                                      • Opcode Fuzzy Hash: dafc535db92dc252cd12b8e6ad69e2a792e6e5ccc386d568be462b69a28a8f19
                                                                      • Instruction Fuzzy Hash: 99911C34E106198BDF60DF68C880BDEB7B1FF89310F208699D549BB345DB71AA85CB91
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 11609fb35ab0c2391d47c230efd1de842ec2ef83345482f5db51b24c5e3f3e89
                                                                      • Instruction ID: 39b74180b348503fd76677d89a2052501775978ba49edfd6ca2ce3092338bb44
                                                                      • Opcode Fuzzy Hash: 11609fb35ab0c2391d47c230efd1de842ec2ef83345482f5db51b24c5e3f3e89
                                                                      • Instruction Fuzzy Hash: 4C713B70E002099FDB54DBA9D980ADEBBF6FF88310F24856AE015AB355DB30ED42CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0bf66c6da447570da2372f2b75d980cf435dbe1e5070bea0bdce70bc52f67fb1
                                                                      • Instruction ID: 86319ac92db6be0dd12cf00cffb990d4ebbc10e427858d4babec30d3edd12246
                                                                      • Opcode Fuzzy Hash: 0bf66c6da447570da2372f2b75d980cf435dbe1e5070bea0bdce70bc52f67fb1
                                                                      • Instruction Fuzzy Hash: B451D131E00209DFDB94EBB8E8547EEBBB2FB84311F10886AE116D7350DB359949C7A1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ab5f68b46a6e94b51bd6d7fe922e08228b09c7c5afe133911dda61ba3f526b1f
                                                                      • Instruction ID: 36636d99ce8f13cc7da679fd34e2fa348f806757dd3d786e9ba0d2a2b13d9ff9
                                                                      • Opcode Fuzzy Hash: ab5f68b46a6e94b51bd6d7fe922e08228b09c7c5afe133911dda61ba3f526b1f
                                                                      • Instruction Fuzzy Hash: 0C519830F203155FEFB55668D864BBF265AD789750F20442BE40AD73D9CA68CC4687F2
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ed1786daf25ec810ab403d7cf8106ec4ec55424f1bc8ef75946dc0ab6e692af1
                                                                      • Instruction ID: 66fd214b780d77509743169e8973a27d1508037d75f4c8a11bcdff457bff295a
                                                                      • Opcode Fuzzy Hash: ed1786daf25ec810ab403d7cf8106ec4ec55424f1bc8ef75946dc0ab6e692af1
                                                                      • Instruction Fuzzy Hash: 0751B930F202155BFFB56668D864BAF265BD789750F20442BD50BDB3D8CA68DC4683F2
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e45bbdc22b1296046724c410e5aeae628e3b4f6c3660e7c5e277030323b70ee3
                                                                      • Instruction ID: 191e203fcbbdf7e6211257d766ba6122ae83df638cc56beaac6f0a5cef065634
                                                                      • Opcode Fuzzy Hash: e45bbdc22b1296046724c410e5aeae628e3b4f6c3660e7c5e277030323b70ee3
                                                                      • Instruction Fuzzy Hash: 65416C71E006099FDF75CFA9D880AEFFBB2EB84210F10492AE115DB654DB30E9558BA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7932d8d36820ab62a627d262ffe608fed02b528c37710cac62d466887c8755ce
                                                                      • Instruction ID: 2527fb2d469644e98cee9654e7e9f1713465c8f4b973c6ea5d720e400d01e2a9
                                                                      • Opcode Fuzzy Hash: 7932d8d36820ab62a627d262ffe608fed02b528c37710cac62d466887c8755ce
                                                                      • Instruction Fuzzy Hash: 3A317071E2070A9BDB25DF68D8906DEB7B2FF85210F10852AE405EB344EB70E9468B91
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: df2b47f16033ff6cce3239948baa54167599ffa83c56788833a7db9cc15a7062
                                                                      • Instruction ID: 79e657cc939de972e9bf8f78b95806fb924b9693b2dd787bd286d5dd0c6a64cd
                                                                      • Opcode Fuzzy Hash: df2b47f16033ff6cce3239948baa54167599ffa83c56788833a7db9cc15a7062
                                                                      • Instruction Fuzzy Hash: 3C31B234E102059FCB69CF64D85469FBBF2FF89300F108419E902AB344DBB1AE42CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 600890c78f8127e7d4c16b69755a7ef4c63abd14145eaa06819b316bf5048e4c
                                                                      • Instruction ID: b3ab9ea89cb1ed9190da66d2c1a9b44a2693b20759e56fbfec7976f570833a21
                                                                      • Opcode Fuzzy Hash: 600890c78f8127e7d4c16b69755a7ef4c63abd14145eaa06819b316bf5048e4c
                                                                      • Instruction Fuzzy Hash: 9C318235E106159BCB59CF64D85469FBBF6FF89300F108519E906EB344DBB1AE42CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d040c26d9fb614a43d87d868ac883e77f40bff237f00ea5177af210e1a2c3832
                                                                      • Instruction ID: 5b8169e79579373b3225f1db9b6d172a738c843ec7d1c58bf12c58e77270941c
                                                                      • Opcode Fuzzy Hash: d040c26d9fb614a43d87d868ac883e77f40bff237f00ea5177af210e1a2c3832
                                                                      • Instruction Fuzzy Hash: CE217A75E112149FDB51DFB9E881AEEBBF5EB48310F10802AE904E7355E731E8429BA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 71b601e93e1a0f5cff2636fd4bb82a9b3a68558763cae9864c260e56e2ed0c58
                                                                      • Instruction ID: d0e1e48c0115a553aa618a6f5ef7e91c2ce0bc303ef03de4f2e904d9fda3f6eb
                                                                      • Opcode Fuzzy Hash: 71b601e93e1a0f5cff2636fd4bb82a9b3a68558763cae9864c260e56e2ed0c58
                                                                      • Instruction Fuzzy Hash: A8216975E102149FDB52DFA9D881BEEBBF1EB48310F10802AE905E7355E771EC418B90
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1351195213.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_dcd000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7225e44cceb5d335bb6bf41f24f397a97e519a50f934bb0fea8c71ebb2acff86
                                                                      • Instruction ID: b3ec77f3c5fe23dd3ff0bf77572d18de2bedb26b92850be34f7bbdcc8a73dc91
                                                                      • Opcode Fuzzy Hash: 7225e44cceb5d335bb6bf41f24f397a97e519a50f934bb0fea8c71ebb2acff86
                                                                      • Instruction Fuzzy Hash: 2F21D371508205EFDB19DF10D9C0F26BBA6FB94324F24C57DEA490B256C336E856CAB2
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5435fd2bc9aa5329f3a0389bfc0b3d3e096ec884ba16a10cb4d4858022c1f1bc
                                                                      • Instruction ID: b3f8350049c6f537661da88595cba772522f1c1c056d35d858f7a9fe611ba522
                                                                      • Opcode Fuzzy Hash: 5435fd2bc9aa5329f3a0389bfc0b3d3e096ec884ba16a10cb4d4858022c1f1bc
                                                                      • Instruction Fuzzy Hash: 6C118E32B101244FDB9A9A68C850AEF7BEAEBC8311F00447AC506E7384EE65DC1287E0
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9323ecc9e98d0a7546f2d76c7f903b6ef4252213b72dc0f614db4c0d560d3207
                                                                      • Instruction ID: 8ed09a5512dda6ae890b661ab85e99e3d09df13b328f22bf4da3f538c611c674
                                                                      • Opcode Fuzzy Hash: 9323ecc9e98d0a7546f2d76c7f903b6ef4252213b72dc0f614db4c0d560d3207
                                                                      • Instruction Fuzzy Hash: E101D431B142101FDB669A7D945179FA7DBDBCA720F11C46AF10ACB395DA95CC0243E1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8aca62ebbe5c121677a466b040584e29cf29d01880651220c34e4674e244a98b
                                                                      • Instruction ID: 2fcfd8d45b5e472781261dca5da41e162ebb180b351b9a82efddced35d6ed8c6
                                                                      • Opcode Fuzzy Hash: 8aca62ebbe5c121677a466b040584e29cf29d01880651220c34e4674e244a98b
                                                                      • Instruction Fuzzy Hash: 1A21CFB5D01219AFDB10CF9AD884ADEFBF8FB49310F10812AE918B7640D375A954CFA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1351195213.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_dcd000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                                      • Instruction ID: 89837a13dda96240fd4efbcffed83a7bc12d719311820e1512feb57cec7c2851
                                                                      • Opcode Fuzzy Hash: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                                      • Instruction Fuzzy Hash: 4E11B176508240DFCB15CF10D9C4B16BF72FB94324F28C5ADD9090B656C33AE856CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 709e72b362fe8803a21aa5b70efee794c0bec03e5aae17de723e8f0ea9246b19
                                                                      • Instruction ID: ef92817662fc0d2bafab5fd6ebfbd3758bf361b12c0f8b4ac238e53ec6ba937b
                                                                      • Opcode Fuzzy Hash: 709e72b362fe8803a21aa5b70efee794c0bec03e5aae17de723e8f0ea9246b19
                                                                      • Instruction Fuzzy Hash: 0E01D831B141104FCB619A7CE861BDF77D9EB8A311F10846EF40AC7784DA25DC428791
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 6d7bac3539863aba7701a3f66948a350c506dc872922c497dca29e2002788c83
                                                                      • Instruction ID: a9475bd204af7da5c643b4e13395e0dab452558822feb0c7526d5d703dac579d
                                                                      • Opcode Fuzzy Hash: 6d7bac3539863aba7701a3f66948a350c506dc872922c497dca29e2002788c83
                                                                      • Instruction Fuzzy Hash: 07014132B000145BCBA69A699C60AEF3AAF9BC8310F04007AD416D3380EF619C0283E1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9c227dbd1f21270f72828b318eb093849e1adea0c193012ac8b15871a1569625
                                                                      • Instruction ID: e4cb6ddff11a925995c46273ea604d67eaa6f2fc0e2c300d4e380a1f3922b66c
                                                                      • Opcode Fuzzy Hash: 9c227dbd1f21270f72828b318eb093849e1adea0c193012ac8b15871a1569625
                                                                      • Instruction Fuzzy Hash: 3C012436B101014FCB62CA3DD4A1BAFA7E2EFCA310F1485AEE00ACB341DA65DC038395
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 12b936ec1b570c96c8a27bd000cfb99bcc3cc69512d81196917651eb25eed935
                                                                      • Instruction ID: 377de395f1771c174f8b7a541a9dba2873f3d4f2592df3696897ffdb7645086d
                                                                      • Opcode Fuzzy Hash: 12b936ec1b570c96c8a27bd000cfb99bcc3cc69512d81196917651eb25eed935
                                                                      • Instruction Fuzzy Hash: 3E11CCB5D01219AFCB10CF9AD884ADEFBF8FB49310F10812AE918B7240C375A944CBA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fd66339a219a86c5e061cad8ae3754283463735e979f13d5e68fcc4dfeb0dd02
                                                                      • Instruction ID: a05005e4a6d48a8b164efe124de7ebdd0085c1de56600e1f2bc732003156ca89
                                                                      • Opcode Fuzzy Hash: fd66339a219a86c5e061cad8ae3754283463735e979f13d5e68fcc4dfeb0dd02
                                                                      • Instruction Fuzzy Hash: F5018C32B101155BDBA6997DD451B6FA3DBEBC9720F20C83AE10ADB385DEA1DC0243A5
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f4595e4bad712673b61a266522a9f37698de748eef3c52744cca45d2531f4ed4
                                                                      • Instruction ID: ac6f8a7553729d03eaeb0cb4547cc76101503194ee42068ec6a779caba06a381
                                                                      • Opcode Fuzzy Hash: f4595e4bad712673b61a266522a9f37698de748eef3c52744cca45d2531f4ed4
                                                                      • Instruction Fuzzy Hash: BB01F436B101120BDB76D53D946176F63C6EBC9610F10847EF10AC7344DE55DC034395
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2e644f619bf315025351c7166e12c1a3c876e4f15890d38aa1f634288590c261
                                                                      • Instruction ID: b9f15064768e06d12a6a1ed3d7260c76c5f2420caa37b76cd4bf3c991d4921cf
                                                                      • Opcode Fuzzy Hash: 2e644f619bf315025351c7166e12c1a3c876e4f15890d38aa1f634288590c261
                                                                      • Instruction Fuzzy Hash: 5501A431B101144FDB61DA7CE895B5FB3D9EB89710F10C43EE50AC7784DA25DC428791
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c5765654f0a15e1b666204e6d00c7f1ea0404d5746d507eb6bb4b6e4040c594a
                                                                      • Instruction ID: d1ee7ea25cd60e6cf212ca5b6a9a1429c638af2dbf72145b8c716e742448a55c
                                                                      • Opcode Fuzzy Hash: c5765654f0a15e1b666204e6d00c7f1ea0404d5746d507eb6bb4b6e4040c594a
                                                                      • Instruction Fuzzy Hash: A3E09270E116086BDBB1CE7089256DB76AFD741214F2144A6E404CB341E232D901A6A5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q$$q$$q$$q$$q$$q$$q$$q$$q
                                                                      • API String ID: 0-1298971921
                                                                      • Opcode ID: e54d8b9c27ca201fa3e983033c6cf803c6f65f2f1e3da03a91f52a8704b70c64
                                                                      • Instruction ID: 4b396741b03555fe764dc91bc283fd06267cda02e5cde59db24d7cb38fede71c
                                                                      • Opcode Fuzzy Hash: e54d8b9c27ca201fa3e983033c6cf803c6f65f2f1e3da03a91f52a8704b70c64
                                                                      • Instruction Fuzzy Hash: C3123C30E002198FDB65DB65D944BAEB7F2FF88301F60956AD40AAB355DB31AD42CF90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q$$q$$q$$q$$q$$q$$q
                                                                      • API String ID: 0-3886557441
                                                                      • Opcode ID: a288216f353e16497da35d5a21c1f0b4b5e9a4ca20de4b95b7ff4285016ddf5e
                                                                      • Instruction ID: 3a136fb48788a9dfda7f1354ccd7174947c13a4ef71c44a9bab7aa039ee11951
                                                                      • Opcode Fuzzy Hash: a288216f353e16497da35d5a21c1f0b4b5e9a4ca20de4b95b7ff4285016ddf5e
                                                                      • Instruction Fuzzy Hash: C2916E30A00209DFEB65EF65E9857AE77F6FF84301F14852AE401AB395DB749D82CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q$$q$$q$$q$$q
                                                                      • API String ID: 0-2069967915
                                                                      • Opcode ID: 94aba24bf41c6cf864239b6091a56a9f2e6557c6c8636e057dc8a5212cf051f3
                                                                      • Instruction ID: a4b810416fac8648a165eb3d0ce25659459a4265f44b00c255df9961d4b3c6ca
                                                                      • Opcode Fuzzy Hash: 94aba24bf41c6cf864239b6091a56a9f2e6557c6c8636e057dc8a5212cf051f3
                                                                      • Instruction Fuzzy Hash: C8F13E30A00209CFDB55EB64D994BAEB7B2FF88300F648569D4159B3A9DB71ED43CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q$$q$$q
                                                                      • API String ID: 0-4102054182
                                                                      • Opcode ID: 744cf6e45fd13b211ae126fedcce06e7504cd9008cace5a66a1a66844b774d2e
                                                                      • Instruction ID: 1804486fd453b7eb898f7d9f1365d32e5228fe7d8b8807cb1bce0fd0f6c9d3a6
                                                                      • Opcode Fuzzy Hash: 744cf6e45fd13b211ae126fedcce06e7504cd9008cace5a66a1a66844b774d2e
                                                                      • Instruction Fuzzy Hash: 4FB15B30B002198FDB65EB64D984BAEB7B2FF84300F24847AD4069B395DB71DC42CB90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: LRq$LRq$$q$$q
                                                                      • API String ID: 0-2204215535
                                                                      • Opcode ID: 3b50ffba8c0efa3b7bd2dbe25c3bb112de9ca68bc81590b6697a57a1a3597ad7
                                                                      • Instruction ID: 5258f11b35245f8f359a051e3ee6e9e3fd1bd6796b4c841a676ee82cb7937881
                                                                      • Opcode Fuzzy Hash: 3b50ffba8c0efa3b7bd2dbe25c3bb112de9ca68bc81590b6697a57a1a3597ad7
                                                                      • Instruction Fuzzy Hash: 0D51B231B002019FDB58EB39D985BAEB7E2FF88310F15856EE4119B395DA31EC02CB91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1367793207.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_6470000_InstallUtil.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q$$q$$q
                                                                      • API String ID: 0-4102054182
                                                                      • Opcode ID: 8d44bd94174c91afdfb9f0e96d860ef8aa82a0d6b84f88bdd4dba895f04b87c3
                                                                      • Instruction ID: 9a422c88ed4c1c187c9a84b67432690c5ad4e1caace476290694a1560243bc42
                                                                      • Opcode Fuzzy Hash: 8d44bd94174c91afdfb9f0e96d860ef8aa82a0d6b84f88bdd4dba895f04b87c3
                                                                      • Instruction Fuzzy Hash: 82517134E102089FDF66DB64E8806EEB3B6FB88311F14852BE8159B355DB31DC82CB95

                                                                      Execution Graph

                                                                      Execution Coverage:12.7%
                                                                      Dynamic/Decrypted Code Coverage:98.9%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:278
                                                                      Total number of Limit Nodes:9
                                                                      execution_graph 66643 26c44c8 66644 26c44e5 66643->66644 66645 26c44f5 66644->66645 66648 537464e 66644->66648 66652 5378eb7 66644->66652 66649 537466d 66648->66649 66655 537d498 66649->66655 66654 537d498 VirtualProtect 66652->66654 66653 53701d4 66654->66653 66656 537d4bf 66655->66656 66659 537d998 66656->66659 66660 537d9e1 VirtualProtect 66659->66660 66662 5374698 66660->66662 66667 4ef0f59 66668 4ef0a36 66667->66668 66669 4ef0a24 66667->66669 66669->66668 66670 4ef4b08 VirtualProtect 66669->66670 66671 4ef4b00 VirtualProtect 66669->66671 66670->66669 66671->66669 66685 537ead0 66686 537eb14 VirtualAlloc 66685->66686 66688 537eb81 66686->66688 66689 53a88c1 66690 53a88d7 66689->66690 66694 4efd850 66690->66694 66698 4efd860 66690->66698 66691 53a8915 66695 4efd860 66694->66695 66696 4efd88b 66695->66696 66702 4efd917 66695->66702 66696->66691 66699 4efd875 66698->66699 66700 4efd88b 66699->66700 66701 4efd917 10 API calls 66699->66701 66700->66691 66701->66700 66703 4efd902 66702->66703 66704 4efd91f 66702->66704 66704->66703 66707 4eff1f8 66704->66707 66715 4eff208 66704->66715 66708 4eff21d 66707->66708 66723 4eff249 66708->66723 66727 4eff746 66708->66727 66731 4eff258 66708->66731 66735 4eff556 66708->66735 66739 4eff5ec 66708->66739 66709 4eff23f 66709->66703 66716 4eff21d 66715->66716 66718 4eff5ec 10 API calls 66716->66718 66719 4eff249 10 API calls 66716->66719 66720 4eff258 10 API calls 66716->66720 66721 4eff556 10 API calls 66716->66721 66722 4eff746 10 API calls 66716->66722 66717 4eff23f 66717->66703 66718->66717 66719->66717 66720->66717 66721->66717 66722->66717 66725 4eff285 66723->66725 66724 4eff322 66724->66709 66725->66724 66743 4effa20 66725->66743 66729 4eff2c3 66727->66729 66728 4eff322 66728->66709 66729->66728 66730 4effa20 10 API calls 66729->66730 66730->66729 66733 4eff285 66731->66733 66732 4eff322 66732->66709 66733->66732 66734 4effa20 10 API calls 66733->66734 66734->66733 66736 4eff2c3 66735->66736 66737 4eff322 66736->66737 66738 4effa20 10 API calls 66736->66738 66737->66709 66738->66736 66741 4eff2c3 66739->66741 66740 4eff322 66740->66709 66741->66740 66742 4effa20 10 API calls 66741->66742 66742->66741 66744 4effa45 66743->66744 66754 4effa67 66744->66754 66776 56c09fe 66744->66776 66781 56c04ea 66744->66781 66786 56c0be0 66744->66786 66791 56c0f6e 66744->66791 66796 56c112f 66744->66796 66801 56c01ec 66744->66801 66806 56c0eac 66744->66806 66811 56c07ec 66744->66811 66816 56c0b57 66744->66816 66821 56c1050 66744->66821 66826 56c01d4 66744->66826 66831 56c0495 66744->66831 66836 56c0559 66744->66836 66841 56c0b9b 66744->66841 66846 56c0fde 66744->66846 66851 56c05d8 66744->66851 66859 56c100b 66744->66859 66864 56c0286 66744->66864 66872 56c018f 66744->66872 66877 56c0348 66744->66877 66885 56c0573 66744->66885 66890 56c0a4c 66744->66890 66895 56c0230 66744->66895 66900 56c1170 66744->66900 66905 56c05bb 66744->66905 66913 56c0bfb 66744->66913 66918 56c08b9 66744->66918 66923 56c0cbb 66744->66923 66928 56c0438 66744->66928 66933 56c0d22 66744->66933 66754->66725 66777 56c0185 66776->66777 66938 56ca338 66777->66938 66942 56ca340 66777->66942 66778 56c0f4f 66778->66754 66782 56c0185 66781->66782 66784 56ca338 VirtualAllocEx 66782->66784 66785 56ca340 VirtualAllocEx 66782->66785 66783 56c0f4f 66783->66754 66784->66783 66785->66783 66787 56c0bea 66786->66787 66789 56ca338 VirtualAllocEx 66787->66789 66790 56ca340 VirtualAllocEx 66787->66790 66788 56c0f4f 66788->66754 66789->66788 66790->66788 66792 56c0185 66791->66792 66792->66791 66794 56ca338 VirtualAllocEx 66792->66794 66795 56ca340 VirtualAllocEx 66792->66795 66793 56c0f4f 66793->66754 66794->66793 66795->66793 66797 56c0185 66796->66797 66799 56ca338 VirtualAllocEx 66797->66799 66800 56ca340 VirtualAllocEx 66797->66800 66798 56c0f4f 66798->66754 66799->66798 66800->66798 66802 56c0185 66801->66802 66804 56ca338 VirtualAllocEx 66802->66804 66805 56ca340 VirtualAllocEx 66802->66805 66803 56c0f4f 66803->66754 66804->66803 66805->66803 66807 56c0eb6 66806->66807 66809 56ca338 VirtualAllocEx 66807->66809 66810 56ca340 VirtualAllocEx 66807->66810 66808 56c0f4f 66808->66754 66809->66808 66810->66808 66812 56c0185 66811->66812 66814 56ca338 VirtualAllocEx 66812->66814 66815 56ca340 VirtualAllocEx 66812->66815 66813 56c0f4f 66813->66754 66814->66813 66815->66813 66817 56c0185 66816->66817 66819 56ca338 VirtualAllocEx 66817->66819 66820 56ca340 VirtualAllocEx 66817->66820 66818 56c0f4f 66818->66754 66819->66818 66820->66818 66822 56c105f 66821->66822 66946 56c9ce2 66822->66946 66950 56c9ce8 66822->66950 66823 56c108b 66827 56c0185 66826->66827 66829 56ca338 VirtualAllocEx 66827->66829 66830 56ca340 VirtualAllocEx 66827->66830 66828 56c0f4f 66828->66754 66829->66828 66830->66828 66832 56c0185 66831->66832 66834 56ca338 VirtualAllocEx 66832->66834 66835 56ca340 VirtualAllocEx 66832->66835 66833 56c0f4f 66833->66754 66834->66833 66835->66833 66837 56c0185 66836->66837 66839 56ca338 VirtualAllocEx 66837->66839 66840 56ca340 VirtualAllocEx 66837->66840 66838 56c0f4f 66838->66754 66839->66838 66840->66838 66842 56c0185 66841->66842 66844 56ca338 VirtualAllocEx 66842->66844 66845 56ca340 VirtualAllocEx 66842->66845 66843 56c0f4f 66843->66754 66844->66843 66845->66843 66847 56c0185 66846->66847 66849 56ca338 VirtualAllocEx 66847->66849 66850 56ca340 VirtualAllocEx 66847->66850 66848 56c0f4f 66848->66754 66849->66848 66850->66848 66852 56c05e7 66851->66852 66954 56ca60a 66852->66954 66958 56ca610 66852->66958 66853 56c0185 66855 56ca338 VirtualAllocEx 66853->66855 66856 56ca340 VirtualAllocEx 66853->66856 66854 56c0f4f 66854->66754 66855->66854 66856->66854 66860 56c0185 66859->66860 66860->66859 66862 56ca338 VirtualAllocEx 66860->66862 66863 56ca340 VirtualAllocEx 66860->66863 66861 56c0f4f 66861->66754 66862->66861 66863->66861 66869 56c0295 66864->66869 66865 56c0185 66867 56ca338 VirtualAllocEx 66865->66867 66868 56ca340 VirtualAllocEx 66865->66868 66866 56c0f4f 66866->66754 66867->66866 66868->66866 66870 56c9ce8 Wow64SetThreadContext 66869->66870 66871 56c9ce2 Wow64SetThreadContext 66869->66871 66870->66865 66871->66865 66873 56c0185 66872->66873 66875 56ca338 VirtualAllocEx 66873->66875 66876 56ca340 VirtualAllocEx 66873->66876 66874 56c0f4f 66874->66754 66875->66874 66876->66874 66878 56c034e 66877->66878 66883 56ca60a WriteProcessMemory 66878->66883 66884 56ca610 WriteProcessMemory 66878->66884 66879 56c0185 66881 56ca338 VirtualAllocEx 66879->66881 66882 56ca340 VirtualAllocEx 66879->66882 66880 56c0f4f 66880->66754 66881->66880 66882->66880 66883->66879 66884->66879 66886 56c0185 66885->66886 66886->66885 66888 56ca338 VirtualAllocEx 66886->66888 66889 56ca340 VirtualAllocEx 66886->66889 66887 56c0f4f 66887->66754 66888->66887 66889->66887 66891 56c0a5b 66890->66891 66893 56ca60a WriteProcessMemory 66891->66893 66894 56ca610 WriteProcessMemory 66891->66894 66892 56c0acc 66892->66754 66893->66892 66894->66892 66896 56c0185 66895->66896 66898 56ca338 VirtualAllocEx 66896->66898 66899 56ca340 VirtualAllocEx 66896->66899 66897 56c0f4f 66897->66754 66898->66897 66899->66897 66901 56c0185 66900->66901 66903 56ca338 VirtualAllocEx 66901->66903 66904 56ca340 VirtualAllocEx 66901->66904 66902 56c0f4f 66902->66754 66903->66902 66904->66902 66906 56c0914 66905->66906 66907 56c0185 66905->66907 66962 56cb090 66906->66962 66966 56cb088 66906->66966 66909 56ca338 VirtualAllocEx 66907->66909 66910 56ca340 VirtualAllocEx 66907->66910 66908 56c0f4f 66908->66754 66909->66908 66910->66908 66914 56c0185 66913->66914 66916 56ca338 VirtualAllocEx 66914->66916 66917 56ca340 VirtualAllocEx 66914->66917 66915 56c0f4f 66915->66754 66916->66915 66917->66915 66919 56c08d1 66918->66919 66970 56c1930 66919->66970 66975 56c1921 66919->66975 66920 56c08e9 66924 56c0185 66923->66924 66926 56ca338 VirtualAllocEx 66924->66926 66927 56ca340 VirtualAllocEx 66924->66927 66925 56c0f4f 66925->66754 66926->66925 66927->66925 66929 56c0185 66928->66929 66931 56ca338 VirtualAllocEx 66929->66931 66932 56ca340 VirtualAllocEx 66929->66932 66930 56c0f4f 66930->66754 66931->66930 66932->66930 66934 56c0185 66933->66934 66936 56ca338 VirtualAllocEx 66934->66936 66937 56ca340 VirtualAllocEx 66934->66937 66935 56c0f4f 66935->66754 66936->66935 66937->66935 66939 56ca384 VirtualAllocEx 66938->66939 66941 56ca3fc 66939->66941 66941->66778 66943 56ca384 VirtualAllocEx 66942->66943 66945 56ca3fc 66943->66945 66945->66778 66947 56c9d31 Wow64SetThreadContext 66946->66947 66949 56c9da9 66947->66949 66949->66823 66951 56c9d31 Wow64SetThreadContext 66950->66951 66953 56c9da9 66951->66953 66953->66823 66955 56ca65c WriteProcessMemory 66954->66955 66957 56ca6f5 66955->66957 66957->66853 66959 56ca65c WriteProcessMemory 66958->66959 66961 56ca6f5 66959->66961 66961->66853 66963 56cb0d9 NtResumeThread 66962->66963 66965 56cb130 66963->66965 66965->66907 66967 56cb0d9 NtResumeThread 66966->66967 66969 56cb130 66967->66969 66969->66907 66971 56c1947 66970->66971 66972 56c1969 66971->66972 66980 56c1c87 66971->66980 66985 56c1d03 66971->66985 66972->66920 66976 56c1947 66975->66976 66977 56c1969 66976->66977 66978 56c1c87 2 API calls 66976->66978 66979 56c1d03 2 API calls 66976->66979 66977->66920 66978->66977 66979->66977 66981 56c1c8d 66980->66981 66990 56c7d84 66981->66990 66994 56c7d90 66981->66994 66986 56c1d2b 66985->66986 66988 56c7d84 CreateProcessA 66986->66988 66989 56c7d90 CreateProcessA 66986->66989 66987 56c1e6e 66988->66987 66989->66987 66991 56c7d90 CreateProcessA 66990->66991 66993 56c800c 66991->66993 66995 56c7e10 CreateProcessA 66994->66995 66997 56c800c 66995->66997 66663 56c7240 66664 56c728f NtProtectVirtualMemory 66663->66664 66666 56c7307 66664->66666 66672 d3d01c 66673 d3d034 66672->66673 66674 d3d08f 66673->66674 66676 537e020 66673->66676 66677 537e079 66676->66677 66680 537e580 66677->66680 66678 537e0ae 66681 537e5ad 66680->66681 66682 537d498 VirtualProtect 66681->66682 66684 537e743 66681->66684 66683 537e734 66682->66683 66683->66678 66684->66678
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $q$$q
                                                                      • API String ID: 0-3126353813
                                                                      • Opcode ID: 3ce2f8c989f8f9cb225d5ab037285aa08510522e17d2934714eb6d4cf73da881
                                                                      • Instruction ID: 8d0dbdf637f084b4b7401f82e8ba55b121be196cd69998e33fef84b48a18196c
                                                                      • Opcode Fuzzy Hash: 3ce2f8c989f8f9cb225d5ab037285aa08510522e17d2934714eb6d4cf73da881
                                                                      • Instruction Fuzzy Hash: BC414D74E04629CBEB28CF6AD8407EEB7B2FF88300F10C1AA9509A7354DB305981DF90
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 947fc1a66f906c32062855a84a7773562db90963730f2d7f10b6eb706df9280b
                                                                      • Instruction ID: 91bde5a9699d45ea43128f994ab8bc2403dd49fa708c27d166dd221601460934
                                                                      • Opcode Fuzzy Hash: 947fc1a66f906c32062855a84a7773562db90963730f2d7f10b6eb706df9280b
                                                                      • Instruction Fuzzy Hash: 77C1E570E09A09DFDB10CF99C448BEEBBF1BB45308F00A059D565A72A6D3B86A45DFC4
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0069fb11e9aa3efaf5b561b5d3b30c9100fb8346d3224daa625c053ad3e1e237
                                                                      • Instruction ID: 8973ef4499661dc2fa867fec8bb68c472dc2119029bec9ffee8298e32eefc135
                                                                      • Opcode Fuzzy Hash: 0069fb11e9aa3efaf5b561b5d3b30c9100fb8346d3224daa625c053ad3e1e237
                                                                      • Instruction Fuzzy Hash: 41B1F570E09609DFDB10CF99C4487EEBBF1BB45308F00A059D565AB2A6D3B86A85DFC4
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7e4a313c8cd26e3f147a8ecadfa25ef166d971e5d4d2c775b339110ba204de3f
                                                                      • Instruction ID: 0035a23475320e6c34846ee44b5db7d70c4a55825ef4653fd73453de3c67e2f5
                                                                      • Opcode Fuzzy Hash: 7e4a313c8cd26e3f147a8ecadfa25ef166d971e5d4d2c775b339110ba204de3f
                                                                      • Instruction Fuzzy Hash: FDA15174A05608CFDB44DFA8D446AEEB7F2FB49304F205169E84AAB394DB746D01CF91
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c4011935a51793c3349d98b0d09aa81bdd643b3941606fcc1fd1c1af15862bc5
                                                                      • Instruction ID: 28a68ddd711852275455561a559ce777e36584522c22e76b0c8024e327d98621
                                                                      • Opcode Fuzzy Hash: c4011935a51793c3349d98b0d09aa81bdd643b3941606fcc1fd1c1af15862bc5
                                                                      • Instruction Fuzzy Hash: 3CA15074A05608CFDB44DFA8D446AEEB7F2FB49304F20506AE84AA7395DB746D01CF91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1403 4ebac95-4ebac9b 1404 4ebac9d 1403->1404 1405 4ebaca4-4ebacbd 1403->1405 1404->1405 1406 4ebabe9-4ebac23 1404->1406 1407 4ebac28-4ebac47 1404->1407 1408 4ebad88-4ebae64 1404->1408 1409 4ebaadf-4ebab00 1404->1409 1410 4ebab63-4ebab74 1404->1410 1411 4ebade2-4ebae56 1404->1411 1412 4ebad70-4ebad83 1404->1412 1413 4ebab27-4ebab50 call 4ebb700 1404->1413 1414 4ebab97-4ebaba7 1404->1414 1415 4ebad14-4ebad1b 1404->1415 1416 4ebacc3-4ebaccb 1405->1416 1417 4ebaa45-4ebaa4b 1405->1417 1406->1417 1407->1417 1421 4ebac4d-4ebac55 1407->1421 1429 4ebac5a-4ebac90 1408->1429 1430 4ebae6a-4ebae72 1408->1430 1409->1417 1423 4ebab06-4ebab0e 1409->1423 1410->1417 1411->1417 1412->1417 1440 4ebab56-4ebab5e 1413->1440 1414->1417 1416->1417 1418 4ebaa4d 1417->1418 1419 4ebaa54-4ebaa55 1417->1419 1418->1410 1418->1415 1424 4ebad0b-4ebad0c 1418->1424 1425 4ebaa5a-4ebaa87 call 4eb2e70 1418->1425 1426 4ebaa9a-4ebaacc call 4eb2e70 1418->1426 1427 4ebad1e-4ebad62 1418->1427 1428 4ebaa97-4ebaa98 1418->1428 1419->1424 1419->1425 1421->1417 1423->1417 1434 4ebacd0-4ebacd6 1424->1434 1425->1417 1447 4ebaa89-4ebaa8f 1425->1447 1426->1417 1448 4ebaad2-4ebaada 1426->1448 1427->1417 1428->1426 1429->1417 1429->1434 1430->1417 1437 4ebacd8 1434->1437 1438 4ebacdf-4ebacf8 1434->1438 1437->1408 1437->1409 1437->1410 1437->1411 1437->1413 1437->1414 1437->1415 1437->1424 1438->1417 1446 4ebacfe-4ebad06 1438->1446 1440->1417 1446->1417 1446->1424 1447->1417 1448->1417
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $#$%
                                                                      • API String ID: 0-2824088872
                                                                      • Opcode ID: 7fa4dde04ca4b47ba776ef1d45bc19ee8ad24b76f9d5510c2fe7985a09a6bc27
                                                                      • Instruction ID: 0aa8942a66100327d50ffea57225a893d9f76b76118d54e3d65fb30d1adcdcf4
                                                                      • Opcode Fuzzy Hash: 7fa4dde04ca4b47ba776ef1d45bc19ee8ad24b76f9d5510c2fe7985a09a6bc27
                                                                      • Instruction Fuzzy Hash: 4591CC74A04218CFDF40CFA8D984ADEBBF1FB49304F10A169E449AB355D778A845DFA4

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1521 4eb0cbb 1522 4eb0cc1 1521->1522 1523 4eb0ccc-4eb0cdd 1522->1523 1535 4eb0ce3 call 4eb1448 1523->1535 1536 4eb0ce3 call 4eb1458 1523->1536 1524 4eb0ce9-4eb0d35 1527 4eb0d3b-4eb0d43 1524->1527 1528 4eb0b03-4eb0b09 1524->1528 1527->1528 1529 4eb0b0b 1528->1529 1530 4eb0b12-4eb10da 1528->1530 1529->1521 1530->1528 1535->1524 1536->1524
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $$0$TJq
                                                                      • API String ID: 0-1999971732
                                                                      • Opcode ID: 6db6d7724e0dd461dd5e5294532d178f35e97cc40bcb23429e7d30124ba891f8
                                                                      • Instruction ID: 3a2159b83ca9b51b3922951b87dfc532eee76512818ba3d935ec65a05d2f8bf6
                                                                      • Opcode Fuzzy Hash: 6db6d7724e0dd461dd5e5294532d178f35e97cc40bcb23429e7d30124ba891f8
                                                                      • Instruction Fuzzy Hash: 69011034A012188FCB20DF58D998B9EBBF1FF0A314F1051E9D088A7241DB702E84CF69

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1632 4ebee3b-4ebee3d 1633 4ebee45-4ebee4f 1632->1633 1635 4ebee51-4ebee6f 1633->1635 1636 4ebee75-4ebee78 1633->1636 1635->1636 1641 4ebf046-4ebf091 1635->1641 1637 4ebee7e-4ebee84 1636->1637 1638 4ebeffd-4ebf004 1636->1638 1637->1638 1640 4ebee8a-4ebee93 1637->1640 1644 4ebeecb-4ebeed1 1640->1644 1645 4ebee95-4ebeea4 1640->1645 1663 4ebf0ca-4ebf0cc 1641->1663 1664 4ebf093-4ebf0a0 1641->1664 1646 4ebefdc-4ebefe2 1644->1646 1647 4ebeed7-4ebeee0 1644->1647 1645->1644 1652 4ebeea6-4ebeebf 1645->1652 1646->1638 1650 4ebefe4-4ebeff4 1646->1650 1647->1646 1653 4ebeee6-4ebeef2 1647->1653 1650->1638 1657 4ebeff6-4ebeffb 1650->1657 1652->1644 1660 4ebeec1-4ebeec4 1652->1660 1661 4ebeef8-4ebef20 1653->1661 1662 4ebef90-4ebefd4 1653->1662 1657->1638 1660->1644 1661->1662 1676 4ebef22-4ebef5f 1661->1676 1662->1646 1665 4ebf517-4ebf51e 1663->1665 1664->1663 1669 4ebf0a2-4ebf0c8 1664->1669 1669->1663 1680 4ebf0d1-4ebf105 1669->1680 1676->1662 1687 4ebef61-4ebef8e 1676->1687 1689 4ebf10b-4ebf114 1680->1689 1690 4ebf1a8-4ebf1b7 1680->1690 1687->1646 1692 4ebf11a-4ebf12d 1689->1692 1693 4ebf51f-4ebf529 1689->1693 1696 4ebf1b9-4ebf1cf 1690->1696 1697 4ebf1f6 1690->1697 1701 4ebf12f-4ebf148 1692->1701 1702 4ebf196-4ebf1a2 1692->1702 1708 4ebf1ef-4ebf1f4 1696->1708 1709 4ebf1d1-4ebf1ed 1696->1709 1700 4ebf1f8-4ebf1fd 1697->1700 1705 4ebf1ff-4ebf220 1700->1705 1706 4ebf240-4ebf25c 1700->1706 1701->1702 1718 4ebf14a-4ebf158 1701->1718 1702->1689 1702->1690 1705->1706 1722 4ebf222 1705->1722 1715 4ebf262-4ebf26b 1706->1715 1716 4ebf324-4ebf32d 1706->1716 1708->1700 1709->1700 1715->1693 1721 4ebf271-4ebf28e 1715->1721 1719 4ebf333 1716->1719 1720 4ebf515 1716->1720 1718->1702 1730 4ebf15a-4ebf15e 1718->1730 1723 4ebf33a-4ebf33c 1719->1723 1724 4ebf39e-4ebf3ac 1719->1724 1725 4ebf341-4ebf34f 1719->1725 1720->1665 1740 4ebf312-4ebf31e 1721->1740 1741 4ebf294-4ebf2aa 1721->1741 1726 4ebf225-4ebf23e 1722->1726 1723->1665 1733 4ebf3ae-4ebf3b6 1724->1733 1734 4ebf3c4-4ebf3db 1724->1734 1737 4ebf351-4ebf359 1725->1737 1738 4ebf367-4ebf36e 1725->1738 1726->1706 1730->1693 1736 4ebf164-4ebf17d 1730->1736 1733->1734 1748 4ebf3dd-4ebf3e5 1734->1748 1749 4ebf3f3-4ebf406 1734->1749 1736->1702 1753 4ebf17f-4ebf193 1736->1753 1737->1738 1738->1665 1740->1715 1740->1716 1741->1740 1755 4ebf2ac-4ebf2ba 1741->1755 1748->1749 1756 4ebf408-4ebf410 1749->1756 1757 4ebf41e-4ebf43b 1749->1757 1753->1702 1755->1740 1763 4ebf2bc-4ebf2c0 1755->1763 1756->1757 1768 4ebf43d-4ebf445 1757->1768 1769 4ebf453 1757->1769 1763->1693 1765 4ebf2c6-4ebf2ef 1763->1765 1765->1740 1773 4ebf2f1-4ebf30f 1765->1773 1768->1769 1769->1665 1773->1740
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Plq$$q
                                                                      • API String ID: 0-181920578
                                                                      • Opcode ID: e504fa303930d133215742eda95a31475be92462b759dc37652530bdba44084d
                                                                      • Instruction ID: 71928bc5011225e5e0a312cfef60c12b6cbfdb79c15a7ce3c9f705e44c934017
                                                                      • Opcode Fuzzy Hash: e504fa303930d133215742eda95a31475be92462b759dc37652530bdba44084d
                                                                      • Instruction Fuzzy Hash: 75121534B002048FDB14DF29D984AAAB7F2FF88715F1594A9E546CB365DB31EC42CBA1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1936 4ebae7e-4ebae7f 1937 4ebae99-4ebae9c 1936->1937 1938 4ebae81-4ebae97 1936->1938 1939 4ebae3f-4ebae56 1937->1939 1940 4ebae9d-4ebaea6 1937->1940 1938->1937 1942 4ebaa45-4ebaa4b 1939->1942 1941 4ebaea7-4ebaeb4 1940->1941 1940->1942 1941->1942 1943 4ebaa4d 1942->1943 1944 4ebaa54-4ebaa55 1942->1944 1946 4ebad0b-4ebad0c 1943->1946 1947 4ebaa5a-4ebaa87 call 4eb2e70 1943->1947 1948 4ebaa9a-4ebaacc call 4eb2e70 1943->1948 1949 4ebad1e-4ebad62 1943->1949 1950 4ebab63-4ebab74 1943->1950 1951 4ebaa97-4ebaa98 1943->1951 1952 4ebad14-4ebad1b 1943->1952 1944->1946 1944->1947 1953 4ebacd0-4ebacd6 1946->1953 1947->1942 1967 4ebaa89-4ebaa8f 1947->1967 1948->1942 1968 4ebaad2-4ebaada 1948->1968 1949->1942 1950->1942 1951->1948 1956 4ebacd8 1953->1956 1957 4ebacdf-4ebacf8 1953->1957 1956->1946 1956->1950 1956->1952 1961 4ebad88-4ebae64 1956->1961 1962 4ebaadf-4ebab00 1956->1962 1963 4ebade2-4ebae3c 1956->1963 1964 4ebab27-4ebab50 call 4ebb700 1956->1964 1965 4ebab97-4ebaba7 1956->1965 1957->1942 1966 4ebacfe-4ebad06 1957->1966 1973 4ebac5a-4ebac90 1961->1973 1974 4ebae6a-4ebae72 1961->1974 1962->1942 1972 4ebab06-4ebab0e 1962->1972 1963->1939 1978 4ebab56-4ebab5e 1964->1978 1965->1942 1966->1942 1966->1946 1967->1942 1968->1942 1972->1942 1973->1942 1973->1953 1974->1942 1978->1942
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %$'
                                                                      • API String ID: 0-2502232532
                                                                      • Opcode ID: de2ea4ab368163980c9625ae88397448a1624dfec89ca45174ac5a91fa6e9844
                                                                      • Instruction ID: fc03f5959f7b8cacbfdae185affdae0804e10014b595f12a45a982397158787e
                                                                      • Opcode Fuzzy Hash: de2ea4ab368163980c9625ae88397448a1624dfec89ca45174ac5a91fa6e9844
                                                                      • Instruction Fuzzy Hash: 7C81F174A04208CFDF40DFA8D984ADEBBF1FB49304F10A16AE449AB355D778A845DFA4

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1983 4ebf628-4ebf660 1986 4ebf74c-4ebf771 1983->1986 1987 4ebf666-4ebf66a 1983->1987 1994 4ebf778-4ebf79c 1986->1994 1988 4ebf67e-4ebf682 1987->1988 1989 4ebf66c-4ebf678 1987->1989 1990 4ebf688-4ebf69f 1988->1990 1991 4ebf7a3-4ebf7c8 1988->1991 1989->1988 1989->1994 2002 4ebf6b3-4ebf6b7 1990->2002 2003 4ebf6a1-4ebf6ad 1990->2003 2012 4ebf7cf-4ebf822 1991->2012 1994->1991 2006 4ebf6b9-4ebf6d2 2002->2006 2007 4ebf6e3-4ebf6fc 2002->2007 2003->2002 2003->2012 2006->2007 2016 4ebf6d4-4ebf6d7 2006->2016 2017 4ebf6fe-4ebf722 2007->2017 2018 4ebf725-4ebf749 2007->2018 2026 4ebf85a-4ebf87f 2012->2026 2027 4ebf824-4ebf844 2012->2027 2021 4ebf6e0 2016->2021 2021->2007 2034 4ebf886-4ebf8da 2026->2034 2027->2034 2035 4ebf846-4ebf857 2027->2035 2041 4ebf981-4ebf9cf 2034->2041 2042 4ebf8e0-4ebf8ec 2034->2042 2054 4ebf9ff-4ebfa05 2041->2054 2055 4ebf9d1-4ebf9f5 2041->2055 2045 4ebf8ee-4ebf8f5 2042->2045 2046 4ebf8f6-4ebf90a 2042->2046 2049 4ebf979-4ebf980 2046->2049 2050 4ebf90c-4ebf931 2046->2050 2061 4ebf933-4ebf94d 2050->2061 2062 4ebf974-4ebf977 2050->2062 2058 4ebfa17-4ebfa26 2054->2058 2059 4ebfa07-4ebfa14 2054->2059 2055->2054 2057 4ebf9f7 2055->2057 2057->2054 2061->2062 2064 4ebf94f-4ebf958 2061->2064 2062->2049 2062->2050 2065 4ebf95a-4ebf95d 2064->2065 2066 4ebf967-4ebf973 2064->2066 2065->2066
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (q$(q
                                                                      • API String ID: 0-2485164810
                                                                      • Opcode ID: 4894c8b5eb59f2093d50a36cdf67721adde5e663d30927c769d4aa2e282e7fec
                                                                      • Instruction ID: 69a8fe443bd5f9ee38510eaed0f454c2acb3bbc363b501bc95f630492f0a02a2
                                                                      • Opcode Fuzzy Hash: 4894c8b5eb59f2093d50a36cdf67721adde5e663d30927c769d4aa2e282e7fec
                                                                      • Instruction Fuzzy Hash: 1E51AE317002059FEB15DF69E855AAE3BA2EFC4718F64416AE805CF395CB35EC1287E1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $-
                                                                      • API String ID: 0-1933255201
                                                                      • Opcode ID: 90f69a5a46a4eb1d7817053ed736582e5919bd5140cb0120a5363b21840355dc
                                                                      • Instruction ID: 3d7b71371b9348db3c0c820dd88b3d0e5ffaaa8967c9acf016b3aa82f7515fd8
                                                                      • Opcode Fuzzy Hash: 90f69a5a46a4eb1d7817053ed736582e5919bd5140cb0120a5363b21840355dc
                                                                      • Instruction Fuzzy Hash: 2CF09B74D04218DFEF10DF99E884B9EBBF1BB08304F0061AAE919A3341C334A945CF52
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (_q
                                                                      • API String ID: 0-3590916094
                                                                      • Opcode ID: 746675f004beaead485ba547e6d5365b70fa8d5f974c89eca18eab3bdf13d2b0
                                                                      • Instruction ID: 5a974eecc7907a2abd629c0d0041b1990a29620f5530d721590ee559088d729b
                                                                      • Opcode Fuzzy Hash: 746675f004beaead485ba547e6d5365b70fa8d5f974c89eca18eab3bdf13d2b0
                                                                      • Instruction Fuzzy Hash: EE229F31B002149FDB14DFA9D494AEEB7B2FF88304F148069E945AB395DB75ED40CBA0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: @
                                                                      • API String ID: 0-2766056989
                                                                      • Opcode ID: a3446085922747aa8f7a69975fefab1941d83ecb78d8fa49e8aabb0178efb897
                                                                      • Instruction ID: 9631ce75c68bb2442ca81ee3f8778b3c999e3ecb63de9b016ae211e9096eb571
                                                                      • Opcode Fuzzy Hash: a3446085922747aa8f7a69975fefab1941d83ecb78d8fa49e8aabb0178efb897
                                                                      • Instruction Fuzzy Hash: D9F10074A04629CFDB60DF68D848BDAB7B2FB49304F1091E9D649A3394DB746E84CF90
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: 6ec0fa7b61743e2c14e21c8a8ff3392adb330911ae552dd59085808bf201b307
                                                                      • Instruction ID: 7012286f1ee3c7dc3c6634b1576a894a525ba377c27012e6510b198a2149c6c4
                                                                      • Opcode Fuzzy Hash: 6ec0fa7b61743e2c14e21c8a8ff3392adb330911ae552dd59085808bf201b307
                                                                      • Instruction Fuzzy Hash: 6B8126B4A04608CFDF40CF98D584ADEBBF1FB49310F10A169E489AB355D778A845DFA4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: 58c9ff8ffac2dd1bd03c4ddd8ca7b30e060d93f20cfc935bccded87ff886f961
                                                                      • Instruction ID: f8986c71c8d84322508d06549a01abca5c2cbf34f993e67655f868a5c378fc60
                                                                      • Opcode Fuzzy Hash: 58c9ff8ffac2dd1bd03c4ddd8ca7b30e060d93f20cfc935bccded87ff886f961
                                                                      • Instruction Fuzzy Hash: 1C710F74A04218CFDF40DFA8D984ADEBBF1FB49300F10A169E449AB355D778A846DFA0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: 930802620dcc67e897ba2f5329acffa69573f88a87db738a209a9a08594b29ae
                                                                      • Instruction ID: 3714f1ae0cbdb14dd68788fae50bf7a77ac463c4adea50be15f52e080b07026b
                                                                      • Opcode Fuzzy Hash: 930802620dcc67e897ba2f5329acffa69573f88a87db738a209a9a08594b29ae
                                                                      • Instruction Fuzzy Hash: 26710F74A00208CFDF40DFA9D584ADEBBF1FB49300F10A169E849AB355D778A846DFA4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: 4b82956902cbe8f0a0b873d2f3dd2533fb8aa8cc78af34a26aac7780d88f85ae
                                                                      • Instruction ID: 4a2293644ceb96c4a1e9bdfddcca387c7d3eb8450c5a2d90370d1c6fc97baa56
                                                                      • Opcode Fuzzy Hash: 4b82956902cbe8f0a0b873d2f3dd2533fb8aa8cc78af34a26aac7780d88f85ae
                                                                      • Instruction Fuzzy Hash: E371EF78A04208CFDF40DFA8D584ADEBBF1FB49310F10A169E849AB354D778A845DFA4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %
                                                                      • API String ID: 0-2567322570
                                                                      • Opcode ID: f4ef54860ba57f14f000f401fec3632034092b0a20f75efbbd270479fd5a7866
                                                                      • Instruction ID: 82cb719ebd2d40b137c3cc557d5527f8d372cd58e662788175b6635cdba96c89
                                                                      • Opcode Fuzzy Hash: f4ef54860ba57f14f000f401fec3632034092b0a20f75efbbd270479fd5a7866
                                                                      • Instruction Fuzzy Hash: AF71FD74A04208CFDF40DFA9D584ADEBBF1FB49300F10A169E849AB354D778A945DFA4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (
                                                                      • API String ID: 0-3887548279
                                                                      • Opcode ID: 58232d76b2a8e20e9f0f80ae940ee18957b5e93900c19a04346d7bf85d587ae3
                                                                      • Instruction ID: 5bfaaf214f36899fd0298d4f72e16654b257e842107b7d2ca339ce1af7301fbc
                                                                      • Opcode Fuzzy Hash: 58232d76b2a8e20e9f0f80ae940ee18957b5e93900c19a04346d7bf85d587ae3
                                                                      • Instruction Fuzzy Hash: B7E0DF74105256CFD751CB24C88C998BBB1EF0A201F0001C4A049A7116CF785E02DF01
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: '
                                                                      • API String ID: 0-1997036262
                                                                      • Opcode ID: b2984becbbf401d03a1194ad4e4e8da2c4a35050221071e267787fde8427edea
                                                                      • Instruction ID: 8ab0ecf44ff33947cc93f46ef44aedb88f400368d92eabf3bf3957da769b715a
                                                                      • Opcode Fuzzy Hash: b2984becbbf401d03a1194ad4e4e8da2c4a35050221071e267787fde8427edea
                                                                      • Instruction Fuzzy Hash: 9AE0EC74A04218CFDB10DF64D5447CDB7F1EB49304F50409AD849A3344D7745E458F52
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8a53c5c6b09fed685578c7a5fcf769d490380d82e9a0474a37b47618a3581e57
                                                                      • Instruction ID: c2b74d3c45cfafb784d48b598e59df4f8c997edeabb9a32dcf9614f39a18cc18
                                                                      • Opcode Fuzzy Hash: 8a53c5c6b09fed685578c7a5fcf769d490380d82e9a0474a37b47618a3581e57
                                                                      • Instruction Fuzzy Hash: 6A513474E05618CBEB04DFA9E444BEEBBF2FB49308F10A029E155A3392D77469958F90
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 569e4903299dc16b0d254ed5cb5bbd66ef2418c565efc778ee25f07a963ebce2
                                                                      • Instruction ID: 41e417507b38abe5e82c920081045e2794d6eb179389d4abdc79cab05ed44acb
                                                                      • Opcode Fuzzy Hash: 569e4903299dc16b0d254ed5cb5bbd66ef2418c565efc778ee25f07a963ebce2
                                                                      • Instruction Fuzzy Hash: FA513574E05618DFEB04DFA9E444BEEBBF2FB48308F10A029E155A3392D77469958B90
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d6defb8a1c9896637893bcde49415e59e68a91e83989c4b978bcd000f0ffa2ac
                                                                      • Instruction ID: 581288a948494e97ae227f076b6ff5318633496f78492802265d6cb57840817f
                                                                      • Opcode Fuzzy Hash: d6defb8a1c9896637893bcde49415e59e68a91e83989c4b978bcd000f0ffa2ac
                                                                      • Instruction Fuzzy Hash: AA514474E05618CFDB04DFA9E444BEEBBF2FB48308F10A029E159B3392D77469958B90
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a5209b795c3f0e46c82b4ee67d2f0cd621bb42e8be8737167353b3ee1f28d2a4
                                                                      • Instruction ID: c63cde6685484c4f8be58b6aaf932061fe9c39c579f95c598f0706584bfd067e
                                                                      • Opcode Fuzzy Hash: a5209b795c3f0e46c82b4ee67d2f0cd621bb42e8be8737167353b3ee1f28d2a4
                                                                      • Instruction Fuzzy Hash: F3410674E05608DFDB04DF9AD945BEEB7F2FB88300F10A02AE945A7354D7746944CBA1
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5d78e0f9fd6f0c4e59fc0d4da9ecb3c3a946250d708a6980b76a42796a92544a
                                                                      • Instruction ID: 6202dfd8f835470b90572f128c1822bec581b6fb02863717018bc3a60c32b4c8
                                                                      • Opcode Fuzzy Hash: 5d78e0f9fd6f0c4e59fc0d4da9ecb3c3a946250d708a6980b76a42796a92544a
                                                                      • Instruction Fuzzy Hash: DE314A70E06208DFDB04CFAAD9497EEBBF2FB89300F14906AE954A7354E7745A04CB91
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4ca3c28d10b2cd7345221ddefcc0bebb78f40ae08c6c270932aa8f557b27ec15
                                                                      • Instruction ID: 4963578d650c8b44306f6bdbd2ec27969dbcc4fd4bb2e0eeb7122ca8584ddd9e
                                                                      • Opcode Fuzzy Hash: 4ca3c28d10b2cd7345221ddefcc0bebb78f40ae08c6c270932aa8f557b27ec15
                                                                      • Instruction Fuzzy Hash: D4F06D70E09208AFDB45EFA4D8555EEBBB4EB49300F10C1EEDC5893351EA315A06DB91
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8bc9625db76f7402c427d6abcf02cd04e28e337cabad51bc4077a235cfbb3843
                                                                      • Instruction ID: 36b1c2bca1bb480f69e50c5072f44ed6346edfa48dbf2d340385c535d25715e4
                                                                      • Opcode Fuzzy Hash: 8bc9625db76f7402c427d6abcf02cd04e28e337cabad51bc4077a235cfbb3843
                                                                      • Instruction Fuzzy Hash: F8F03A74E06208EFCB50DFA4D844AEDBBF0EB49304F10D1A9DC4997350D6329A12DF84
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2a03f77c5dfba53c5ccd906837b2d1ace9cf11ff960dc7bfe59e4af9d0ade513
                                                                      • Instruction ID: 660490dca62a651f963e8c01de98ddb80458d6c65a271741d4df7acfd205c6eb
                                                                      • Opcode Fuzzy Hash: 2a03f77c5dfba53c5ccd906837b2d1ace9cf11ff960dc7bfe59e4af9d0ade513
                                                                      • Instruction Fuzzy Hash: 2BF0B471D09244BFD701DFA4D5A16ECBFF0EF45208F1481EBC8844B252D6359A46DBD5
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5692f4114a32f6fdbb8826176f15d01517e2c215a5c9d4ec73765ac44630349d
                                                                      • Instruction ID: b9ccfbe8c7d4116a03aa62fbc06dc15cf420bd63e71d3d1dfadd5415daf799c5
                                                                      • Opcode Fuzzy Hash: 5692f4114a32f6fdbb8826176f15d01517e2c215a5c9d4ec73765ac44630349d
                                                                      • Instruction Fuzzy Hash: 5EF0B47580A208EFCB01DF50D8559FEBBB1EF46300F14928DDC4857251D6319A26D781
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 14e83d54efe74503dec69f9108f5d36956eba2d2bc35cc64f3227c13e6ac3e02
                                                                      • Instruction ID: 9be101641457677d20e0d3f0bde076f4250f4d496d16b3c6c16ef88dd4cc2e2a
                                                                      • Opcode Fuzzy Hash: 14e83d54efe74503dec69f9108f5d36956eba2d2bc35cc64f3227c13e6ac3e02
                                                                      • Instruction Fuzzy Hash: 21F05E79904208FFDB01DF94D841AEDBBB4FB49304F0081A9EC0897352D732AA56DF40
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3159e4ec0f05e01dcdff416524bb7ccea802ede0d12e6b8590586a869f5b2ce5
                                                                      • Instruction ID: b4068fb60318da832e245b6e23fba1ff2b8f825e6c904ebd130c1bf6bafb9067
                                                                      • Opcode Fuzzy Hash: 3159e4ec0f05e01dcdff416524bb7ccea802ede0d12e6b8590586a869f5b2ce5
                                                                      • Instruction Fuzzy Hash: F4F0E570909308EFD710CB60DC415ADBFB4EB46304F10D1AACC40A7351D731AD12DB91
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 11396eaea193e54a3ed6ccce512d41e84cc17ba4bb9c84774d24fd0d88512b46
                                                                      • Instruction ID: 3b88d442cad22a2bb6ae7967749ad5d57a76d82cf27b2c00786863d41b18f7d4
                                                                      • Opcode Fuzzy Hash: 11396eaea193e54a3ed6ccce512d41e84cc17ba4bb9c84774d24fd0d88512b46
                                                                      • Instruction Fuzzy Hash: 0FF05870E09348AFD740DFA4D89129CBBF0EB4A204F24C1EAC898D7351E7319A06CB91
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5db955e68c9ac9a6d97d120d9c893720a16cb09960da03cf2777d6083563470f
                                                                      • Instruction ID: 64151af82aae3cf15b7d832b00ae20b964472e7eb4afc91ba9a3342596bfcef1
                                                                      • Opcode Fuzzy Hash: 5db955e68c9ac9a6d97d120d9c893720a16cb09960da03cf2777d6083563470f
                                                                      • Instruction Fuzzy Hash: 28E02234909348EFCB00DBA4DA910ADBBF0EB07304F1491EAC88487392CB34AE03D790
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 327699047aa799c4a87455c2251f63195545e6c3c62890e5501292fe41ab8e3f
                                                                      • Instruction ID: fdca59dc92f4dc34c1911aec283eac69de95e6d631ce1407e87fea93d8fd3563
                                                                      • Opcode Fuzzy Hash: 327699047aa799c4a87455c2251f63195545e6c3c62890e5501292fe41ab8e3f
                                                                      • Instruction Fuzzy Hash: 04F0A070909348EFDB01CFA0D54559CBFB1EB16304F0080D9CD449B362D2319A52DBA1
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8f1e7052d1e7cd1f6e2c777ac04cffcd0c6ab56740d718156629b9b8eb72f869
                                                                      • Instruction ID: e3c7bbcabd579d8ba12e8d0d1dc7f6cf4c4b9801a86e11fa8fa26d7b7f5a8334
                                                                      • Opcode Fuzzy Hash: 8f1e7052d1e7cd1f6e2c777ac04cffcd0c6ab56740d718156629b9b8eb72f869
                                                                      • Instruction Fuzzy Hash: F3E092B5908208AFDB00DF54D8419EDBFB4FB59318F10D2A9D84493392D731AE53DB90
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 379e92f8eac3710836dbbd71a0c9806ad544d5429874975a0b224cd72dfb453d
                                                                      • Instruction ID: ef847d1c9fbd76ad6e444c78eeb80fd64f676a8f9e3b6a922c9f3303e667e77c
                                                                      • Opcode Fuzzy Hash: 379e92f8eac3710836dbbd71a0c9806ad544d5429874975a0b224cd72dfb453d
                                                                      • Instruction Fuzzy Hash: E6F0F875E09208EFC744DFA4D588ADDBBF0EB5C200F10D5AA9849A3340E6359A46DB81
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0bf14d9104dd1ed38d629b702d6559a5c2fc3498aa895f7079050d5f872d68a5
                                                                      • Instruction ID: f77457aee66dbbf85e7466dd68c6d4e7f7779c53620c4ffbbf0cae8df795a65f
                                                                      • Opcode Fuzzy Hash: 0bf14d9104dd1ed38d629b702d6559a5c2fc3498aa895f7079050d5f872d68a5
                                                                      • Instruction Fuzzy Hash: D4F06D70E08618CFDB04DF69D8846CDB7B2FF49310F2090A9E405A3224D7786C41CB51
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e16b459a251a19a697dc253e578ebb09c46728507c6f21e1cdd9c1afe1622083
                                                                      • Instruction ID: d2c53137da707371e5782a9d515ad12a2ad8f2224b1b98b303281e2a0c980ecb
                                                                      • Opcode Fuzzy Hash: e16b459a251a19a697dc253e578ebb09c46728507c6f21e1cdd9c1afe1622083
                                                                      • Instruction Fuzzy Hash: 49E09274909348AFD701DF64D8515ADBFB5EB46204F1091E9CC4497351D731AE02CB91
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 420c6d24bbf7f5814d751c65f5cd0a5cb47ce0cc25297b6019a81c6b7e14d4a4
                                                                      • Instruction ID: 63b8d82bc388b1d9737795b795568c4d283fe829c074f7985f88db938d2cd6b6
                                                                      • Opcode Fuzzy Hash: 420c6d24bbf7f5814d751c65f5cd0a5cb47ce0cc25297b6019a81c6b7e14d4a4
                                                                      • Instruction Fuzzy Hash: EFF0F2B4E05208EFCB44DFA8D984AEDBBF0EB48200F10D1AA984993341E6319A02DB80
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c497ee0c44baa3c84a35f67fcb56590cd622d8819b66783c59b8d9dcb6f2ca48
                                                                      • Instruction ID: 58818936ab00f52c4b679afbf9b477c451a7c534c7303234e33bb37ca71d9724
                                                                      • Opcode Fuzzy Hash: c497ee0c44baa3c84a35f67fcb56590cd622d8819b66783c59b8d9dcb6f2ca48
                                                                      • Instruction Fuzzy Hash: A7F03074D09348AFC702DFA4C8446ADBBF4EF49204F1481EAD98897351E731AE41DB91
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 46d668db0cb7d2b7cae7715a49b587acd4c13cf4149f277fc028986ca52541b0
                                                                      • Instruction ID: 67db239bcac60812408fce13f682c3fc35642fb7a86ab70567ef27865e432830
                                                                      • Opcode Fuzzy Hash: 46d668db0cb7d2b7cae7715a49b587acd4c13cf4149f277fc028986ca52541b0
                                                                      • Instruction Fuzzy Hash: 9FF03474E09618DFDB04DF69E880A8DB7B2BF4A301F1090AAE419A3224EB786804CB50
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7d437495aea089718a053a00111b84bab2548945e6f24397a2b3650e7a514da5
                                                                      • Instruction ID: d841368f421c06295a43e13019eba372ed7d91b65b253e38e772ee3454ea3a14
                                                                      • Opcode Fuzzy Hash: 7d437495aea089718a053a00111b84bab2548945e6f24397a2b3650e7a514da5
                                                                      • Instruction Fuzzy Hash: 27E0C274E04208EFCB44DFA8D944AADBBF4EB48300F10D5AA9848A3355D732AA52DF94
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7d437495aea089718a053a00111b84bab2548945e6f24397a2b3650e7a514da5
                                                                      • Instruction ID: bed6e20546b34e56d68409113d058e91cc891867ea4c913f06d2daa70789c643
                                                                      • Opcode Fuzzy Hash: 7d437495aea089718a053a00111b84bab2548945e6f24397a2b3650e7a514da5
                                                                      • Instruction Fuzzy Hash: 68E0C974E04208EFCB44DFA8D544A9DBBF4EB4C300F10D5A99849A3351D731AA51DF90
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8aee4a49741bcbbadd15eb9f29c3762b3b17b43cad7c8f03dbc263216a4514fd
                                                                      • Instruction ID: 45d3d455d8cd079a14707e87d500f0192579f100ba5c8e466680faa1d994926c
                                                                      • Opcode Fuzzy Hash: 8aee4a49741bcbbadd15eb9f29c3762b3b17b43cad7c8f03dbc263216a4514fd
                                                                      • Instruction Fuzzy Hash: D9E0E574E04308EFCB44DFA8D5546ADFBF4EB48314F10C1A9984893350D731AA02DF80
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d46b496abd20b6e535e66984998b350ea52f7802898df22cc7eca5802c4e4852
                                                                      • Instruction ID: 7bf887faff98e147ba092c7bd89ae7f8599a68184201007e4a40e1d8e642340a
                                                                      • Opcode Fuzzy Hash: d46b496abd20b6e535e66984998b350ea52f7802898df22cc7eca5802c4e4852
                                                                      • Instruction Fuzzy Hash: 7DF09274A101199FEB50CF28C980BDAB7B5FB49314F009695A80CE7305D770AE85CF51
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cf29d28632b415d8800d4e4b6e4d5b39e74efb3789562a45b0ad77733987f5d5
                                                                      • Instruction ID: 7418a898d21fc19202562da39e47ea7f5e713f95d272cb46864e40c8f8c7f940
                                                                      • Opcode Fuzzy Hash: cf29d28632b415d8800d4e4b6e4d5b39e74efb3789562a45b0ad77733987f5d5
                                                                      • Instruction Fuzzy Hash: 9FE08674904208EBCB04DF94D9409ADBBB4EB49304F10D199DC4423391C731AE51EB90
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cf29d28632b415d8800d4e4b6e4d5b39e74efb3789562a45b0ad77733987f5d5
                                                                      • Instruction ID: 039aab49e022b2e95fc143359f06c129c3d5b742aeed15e05f1b8ca57403c592
                                                                      • Opcode Fuzzy Hash: cf29d28632b415d8800d4e4b6e4d5b39e74efb3789562a45b0ad77733987f5d5
                                                                      • Instruction Fuzzy Hash: B7E08C34908208EBCB04DFA4D9459AEBBB8EB49300F10D1A9DC4423350D732AE62EBA0
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f68d437be96852e551dc352e395d58da0b4b635880ce9fb78df37e115eb782d6
                                                                      • Instruction ID: 7a7c10e1e4c4967f45a5300bff5a2766b75a85a7ae0d63cee803bb1848aff184
                                                                      • Opcode Fuzzy Hash: f68d437be96852e551dc352e395d58da0b4b635880ce9fb78df37e115eb782d6
                                                                      • Instruction Fuzzy Hash: 98E01234E04208EFCB05DFA8D9846ADBBF4EB88304F1082E9884897340D732AA02DB90
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cf29d28632b415d8800d4e4b6e4d5b39e74efb3789562a45b0ad77733987f5d5
                                                                      • Instruction ID: 19165f3e77352b8ef4cf28074ed98e00beaeb9db594755081b8fdede23d599ca
                                                                      • Opcode Fuzzy Hash: cf29d28632b415d8800d4e4b6e4d5b39e74efb3789562a45b0ad77733987f5d5
                                                                      • Instruction Fuzzy Hash: F9E04634908308EBCB04DF94DD459AEBBB8EB49300F1091AA9C4427390D732AA52EB90
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9fe56bff48b01a590ee9c0c605fdb65a519e8168cf8f3c8242eb9440f6fbd5b5
                                                                      • Instruction ID: 7782d50fea4da323bf9aff440226feccdfad243c5135d4349ad4efe3b2b45175
                                                                      • Opcode Fuzzy Hash: 9fe56bff48b01a590ee9c0c605fdb65a519e8168cf8f3c8242eb9440f6fbd5b5
                                                                      • Instruction Fuzzy Hash: DAE01234909208EBC704DF94E9566ADFFF9EB85304F10959DCC4857351DB31AE42DB91
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9fe56bff48b01a590ee9c0c605fdb65a519e8168cf8f3c8242eb9440f6fbd5b5
                                                                      • Instruction ID: eebb6a4e20a066595799387742063086987a5f0062cbac1ec1fddccd9594da53
                                                                      • Opcode Fuzzy Hash: 9fe56bff48b01a590ee9c0c605fdb65a519e8168cf8f3c8242eb9440f6fbd5b5
                                                                      • Instruction Fuzzy Hash: DDE01274909208EBC704DF94DA455ADFBF4EB46304F109199D84857351DB31AE43DB91
                                                                      Memory Dump Source
                                                                      • Source File: 0000000B.00000002.1379044106.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_11_2_4eb0000_MemberType.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cc8c172143fd5aae4ddbbbde47920a3e12baa1e7a42daefc4b19bcc13f97dca2
                                                                      • Instruction ID: 667ba253e5d21643dfdf87e4e3b3bd74f81eb8c57e254b51fbf7c13f7a214675
                                                                      • Opcode Fuzzy Hash: cc8c172143fd5aae4ddbbbde47920a3e12baa1e7a42daefc4b19bcc13f97dca2
                                                                      • Instruction Fuzzy Hash: 54D0C935F001099BCF10CBA5E5506DCB774EB88222F20417ADA18A7240C3302A118F40