Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6527_1648106341_4945.exe

Overview

General Information

Sample Name:6527_1648106341_4945.exe
Analysis ID:596830
MD5:0e48327d62a867589302e85169b0a86c
SHA1:03180d1c9907e79cd4f2eb5c5ff6908aac09b646
SHA256:3253372668474668a1c0428accbb15e29f00771e912f9b0e479ab028a611b0f7
Tags:exefile-coin-coin-10-com
Infos:

Detection

RedLine
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected RedLine Stealer
Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Machine Learning detection for sample
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Sample file is different than original file name gathered from version info
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
Binary contains a suspicious time stamp
Detected potential crypto function
Program does not show much activity (idle)

Classification

  • System is w10x64
  • 6527_1648106341_4945.exe (PID: 5592 cmdline: "C:\Users\user\Desktop\6527_1648106341_4945.exe" MD5: 0E48327D62A867589302E85169B0A86C)
  • cleanup
{"C2 url": ["185.252.215.133:35591"], "Bot Id": "Viewimage", "Message": "check", "Authorization Header": "28606a65e239a6f4e2eac5cdd4357bb3"}
SourceRuleDescriptionAuthorStrings
6527_1648106341_4945.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    6527_1648106341_4945.exeMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0xd20:$pat14: , CommandLine:
    • 0x13981:$v2_1: ListOfProcesses
    • 0x13741:$v4_3: base64str
    • 0x144bd:$v4_4: stringKey
    • 0x11e7d:$v4_5: BytesToStringConverted
    • 0x10931:$v4_6: FromBase64
    • 0x123ca:$v4_8: procName
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.428082794.0000000000812000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000000.00000002.697018652.0000000000812000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        Process Memory Space: 6527_1648106341_4945.exe PID: 5592JoeSecurity_RedLineYara detected RedLine StealerJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.6527_1648106341_4945.exe.810000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            0.0.6527_1648106341_4945.exe.810000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0xd20:$pat14: , CommandLine:
            • 0x13981:$v2_1: ListOfProcesses
            • 0x13741:$v4_3: base64str
            • 0x144bd:$v4_4: stringKey
            • 0x11e7d:$v4_5: BytesToStringConverted
            • 0x10931:$v4_6: FromBase64
            • 0x123ca:$v4_8: procName
            0.2.6527_1648106341_4945.exe.810000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              0.2.6527_1648106341_4945.exe.810000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
              • 0xd20:$pat14: , CommandLine:
              • 0x13981:$v2_1: ListOfProcesses
              • 0x13741:$v4_3: base64str
              • 0x144bd:$v4_4: stringKey
              • 0x11e7d:$v4_5: BytesToStringConverted
              • 0x10931:$v4_6: FromBase64
              • 0x123ca:$v4_8: procName
              No Sigma rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 0.2.6527_1648106341_4945.exe.810000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["185.252.215.133:35591"], "Bot Id": "Viewimage", "Message": "check", "Authorization Header": "28606a65e239a6f4e2eac5cdd4357bb3"}
              Source: 6527_1648106341_4945.exeReversingLabs: Detection: 76%
              Source: 6527_1648106341_4945.exeJoe Sandbox ML: detected
              Source: 6527_1648106341_4945.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 6527_1648106341_4945.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: 6527_1648106341_4945.exe, 00000000.00000002.698015219.0000000000F1A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbpu~ source: 6527_1648106341_4945.exe, 00000000.00000002.698015219.0000000000F1A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: 6527_1648106341_4945.exe, 00000000.00000002.698015219.0000000000F1A000.00000004.00000020.00020000.00000000.sdmp
              Source: global trafficTCP traffic: 192.168.2.5:49775 -> 185.252.215.133:35591
              Source: Joe Sandbox ViewASN Name: AIRMOBFR AIRMOBFR
              Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.133
              Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.133
              Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.133
              Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.133
              Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.133
              Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.133
              Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.133
              Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.133
              Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.133
              Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.133
              Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.133
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultD
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698323838.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
              Source: 6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
              Source: 6527_1648106341_4945.exeString found in binary or memory: https://api.ip.sb/ip

              System Summary

              barindex
              Source: 6527_1648106341_4945.exe, type: SAMPLEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 0.0.6527_1648106341_4945.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 0.2.6527_1648106341_4945.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 6527_1648106341_4945.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 6527_1648106341_4945.exe, type: SAMPLEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 0.0.6527_1648106341_4945.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 0.2.6527_1648106341_4945.exe.810000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 6527_1648106341_4945.exeBinary or memory string: OriginalFilename vs 6527_1648106341_4945.exe
              Source: 6527_1648106341_4945.exe, 00000000.00000000.428082794.0000000000812000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameReacquaint.exe4 vs 6527_1648106341_4945.exe
              Source: 6527_1648106341_4945.exeBinary or memory string: OriginalFilenameReacquaint.exe4 vs 6527_1648106341_4945.exe
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeCode function: 0_2_0105F6080_2_0105F608
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeCode function: 0_2_054227140_2_05422714
              Source: 6527_1648106341_4945.exeReversingLabs: Detection: 76%
              Source: 6527_1648106341_4945.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
              Source: 6527_1648106341_4945.exe, MicrosoftSqlServerServerSmiContextY.csBase64 encoded string: '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
              Source: 0.2.6527_1648106341_4945.exe.810000.0.unpack, MicrosoftSqlServerServerSmiContextY.csBase64 encoded string: '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
              Source: 0.0.6527_1648106341_4945.exe.810000.0.unpack, MicrosoftSqlServerServerSmiContextY.csBase64 encoded string: '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
              Source: classification engineClassification label: mal76.troj.winEXE@1/0@0/1
              Source: 6527_1648106341_4945.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: 6527_1648106341_4945.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: 6527_1648106341_4945.exe, 00000000.00000002.698015219.0000000000F1A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbpu~ source: 6527_1648106341_4945.exe, 00000000.00000002.698015219.0000000000F1A000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdb source: 6527_1648106341_4945.exe, 00000000.00000002.698015219.0000000000F1A000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeCode function: 0_2_00817A67 push es; iretd 0_2_00817A7D
              Source: 6527_1648106341_4945.exeStatic PE information: 0xAE76C8DE [Mon Oct 2 13:10:54 2062 UTC]
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exe TID: 4664Thread sleep count: 315 > 30Jump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exe TID: 4664Thread sleep count: 31 > 30Jump to behavior
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: 6527_1648106341_4945.exe, 00000000.00000002.697738015.0000000000EB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeQueries volume information: C:\Users\user\Desktop\6527_1648106341_4945.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\6527_1648106341_4945.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 6527_1648106341_4945.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.6527_1648106341_4945.exe.810000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.6527_1648106341_4945.exe.810000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.428082794.0000000000812000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.697018652.0000000000812000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 6527_1648106341_4945.exe PID: 5592, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 6527_1648106341_4945.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.6527_1648106341_4945.exe.810000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.6527_1648106341_4945.exe.810000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.428082794.0000000000812000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.697018652.0000000000812000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 6527_1648106341_4945.exe PID: 5592, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
              Virtualization/Sandbox Evasion
              OS Credential Dumping1
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Disable or Modify Tools
              LSASS Memory1
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
              Non-Standard Port
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
              Timestomp
              Security Account Manager12
              System Information Discovery
              SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
              Obfuscated Files or Information
              NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              6527_1648106341_4945.exe76%ReversingLabsByteCode-MSIL.Trojan.Whispergate
              6527_1648106341_4945.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://tempuri.org/Entity/Id10Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id8Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id12Response0%URL Reputationsafe
              http://tempuri.org/0%URL Reputationsafe
              http://tempuri.org/Entity/Id2Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id21Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id90%URL Reputationsafe
              http://tempuri.org/Entity/Id80%URL Reputationsafe
              http://tempuri.org/Entity/Id50%URL Reputationsafe
              http://tempuri.org/Entity/Id23Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id40%URL Reputationsafe
              http://tempuri.org/Entity/Id70%URL Reputationsafe
              http://tempuri.org/Entity/Id60%URL Reputationsafe
              http://tempuri.org/Entity/Id19Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id17Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id20Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id15Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id13Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id4Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id6Response0%URL Reputationsafe
              https://api.ip.sb/ip0%URL Reputationsafe
              http://tempuri.org/Entity/Id7Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id11Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id9Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id200%URL Reputationsafe
              http://tempuri.org/Entity/Id22Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id210%URL Reputationsafe
              http://tempuri.org/Entity/Id220%URL Reputationsafe
              http://tempuri.org/Entity/Id230%URL Reputationsafe
              http://tempuri.org/Entity/Id240%URL Reputationsafe
              http://tempuri.org/Entity/Id24Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id1Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id10%URL Reputationsafe
              http://tempuri.org/Entity/Id30%URL Reputationsafe
              http://tempuri.org/Entity/Id20%URL Reputationsafe
              http://tempuri.org/Entity/Id18Response0%URL Reputationsafe
              http://tempuri.org/Entity/0%URL Reputationsafe
              http://tempuri.org/Entity/Id3Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id100%URL Reputationsafe
              http://tempuri.org/Entity/Id110%URL Reputationsafe
              http://tempuri.org/Entity/Id120%URL Reputationsafe
              http://tempuri.org/Entity/Id16Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id130%URL Reputationsafe
              http://tempuri.org/Entity/Id140%URL Reputationsafe
              http://tempuri.org/Entity/Id150%URL Reputationsafe
              http://tempuri.org/Entity/Id160%URL Reputationsafe
              http://tempuri.org/Entity/Id170%URL Reputationsafe
              http://tempuri.org/Entity/Id180%URL Reputationsafe
              http://tempuri.org/Entity/Id5Response0%URL Reputationsafe
              http://tempuri.org/Entity/Id190%URL Reputationsafe
              http://tempuri.org/Entity/Id14Response0%URL Reputationsafe
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://tempuri.org/Entity/Id10Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://tempuri.org/Entity/Id8Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://tempuri.org/Entity/Id12Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/soap/envelope/6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://tempuri.org/6527_1648106341_4945.exe, 00000000.00000002.698323838.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/Entity/Id2Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/Entity/Id21Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/Entity/Id96527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/Entity/Id86527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/Entity/Id56527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/Entity/Id23Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/Entity/Id46527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/Entity/Id76527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/Entity/Id66527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/Entity/Id19Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://tempuri.org/Entity/Id17Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://tempuri.org/Entity/Id20Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id15Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id13Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id4Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://tempuri.org/Entity/Id6Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.ip.sb/ip6527_1648106341_4945.exefalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://tempuri.org/Entity/Id7Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://tempuri.org/Entity/Id11Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://tempuri.org/Entity/Id9Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://tempuri.org/Entity/Id206527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://tempuri.org/Entity/Id22Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://tempuri.org/Entity/Id216527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://tempuri.org/Entity/Id226527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://tempuri.org/Entity/Id236527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://tempuri.org/Entity/Id246527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://tempuri.org/Entity/Id24Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://tempuri.org/Entity/Id1Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://tempuri.org/Entity/Id16527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Entity/Id36527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Entity/Id26527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Entity/Id18Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/Entity/6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/08/addressing6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://tempuri.org/Entity/Id3Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/02/rm6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://tempuri.org/Entity/Id106527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://tempuri.org/Entity/Id116527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://tempuri.org/Entity/Id126527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/Entity/Id16Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/Entity/Id136527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/Entity/Id146527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/Entity/Id156527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/Entity/Id166527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/Entity/Id176527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/Entity/Id186527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/Entity/Id5Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://tempuri.org/Entity/Id196527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2004/08/addressing/faultD6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://tempuri.org/Entity/Id14Response6527_1648106341_4945.exe, 00000000.00000002.698372226.0000000002AE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        185.252.215.133
                                        unknownRussian Federation
                                        49619AIRMOBFRtrue
                                        Joe Sandbox Version:34.0.0 Boulder Opal
                                        Analysis ID:596830
                                        Start date and time:2022-03-25 08:04:26 +01:00
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 6m 43s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Sample file name:6527_1648106341_4945.exe
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:16
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal76.troj.winEXE@1/0@0/1
                                        EGA Information:Failed
                                        HDC Information:
                                        • Successful, ratio: 0.7% (good quality ratio 0.3%)
                                        • Quality average: 28.6%
                                        • Quality standard deviation: 40.9%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 108
                                        • Number of non-executed functions: 5
                                        Cookbook Comments:
                                        • Adjust boot time
                                        • Enable AMSI
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                        • Excluded IPs from analysis (whitelisted): 51.104.136.2, 23.203.70.208, 23.211.6.115
                                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, settings-prod-neu-2.northeurope.cloudapp.azure.com, settings-win.data.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e11290.dspg.akamaiedge.net, e12564.dspb.akamaiedge.net, go.microsoft.com, store-images.s-microsoft.com, go.microsoft.com.edgekey.net, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, atm-settingsfe-prod-geo.trafficmanager.net
                                        • Execution Graph export aborted for target 6527_1648106341_4945.exe, PID 5592 because it is empty
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                        No simulations
                                        No context
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        AIRMOBFRcDtHMoEHO4.exeGet hashmaliciousBrowse
                                        • 185.252.215.138
                                        Summary-133608431-Feb-15.xlsbGet hashmaliciousBrowse
                                        • 185.252.215.41
                                        Summary-133608431-Feb-15.xlsbGet hashmaliciousBrowse
                                        • 185.252.215.41
                                        Summary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                        • 185.252.215.41
                                        Summary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                        • 185.252.215.41
                                        Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                        • 185.252.215.41
                                        Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                        • 185.252.215.41
                                        No context
                                        No context
                                        No created / dropped files found
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):5.809828092815383
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Windows Screen Saver (13104/52) 0.07%
                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                        File name:6527_1648106341_4945.exe
                                        File size:108544
                                        MD5:0e48327d62a867589302e85169b0a86c
                                        SHA1:03180d1c9907e79cd4f2eb5c5ff6908aac09b646
                                        SHA256:3253372668474668a1c0428accbb15e29f00771e912f9b0e479ab028a611b0f7
                                        SHA512:95dce6114665b1ddab4e39cf7871380793a5eb637f9a416587b9ab86da6c711a371ce4db53210e8d2d7e8f2e6aa29bf635633aed10ce90ee8aad0f1c3411b864
                                        SSDEEP:1536:ZRxmkCrVQ2IwAMcGDBYqCtH8xCoPAVf8HVzWc6Yw4buZuFrnlm0wuei67L4:zCrVQyHSfaMf8HtAYV3TlmhJ8
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....v...............0.................. ........@.. ....................................@................................
                                        Icon Hash:00828e8e8686b000
                                        Entrypoint:0x41bcce
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                        Time Stamp:0xAE76C8DE [Mon Oct 2 13:10:54 2062 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:v4.0.30319
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x1bc800x4b.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x4de.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1e0000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000x19cd40x19e00False0.439179498792data5.85780533364IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                        .rsrc0x1c0000x4de0x600False0.376953125data3.73246811002IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x1e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountry
                                        RT_VERSION0x1c0a00x254data
                                        RT_MANIFEST0x1c2f40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        DescriptionData
                                        Translation0x0000 0x04b0
                                        LegalCopyright
                                        Assembly Version0.0.0.0
                                        InternalNameReacquaint.exe
                                        FileVersion0.0.0.0
                                        ProductVersion0.0.0.0
                                        FileDescription
                                        OriginalFilenameReacquaint.exe
                                        TimestampSource PortDest PortSource IPDest IP
                                        Mar 25, 2022 09:06:23.044662952 CET4977535591192.168.2.5185.252.215.133
                                        Mar 25, 2022 09:06:26.059468985 CET4977535591192.168.2.5185.252.215.133
                                        Mar 25, 2022 09:06:32.059859991 CET4977535591192.168.2.5185.252.215.133
                                        Mar 25, 2022 09:06:49.965598106 CET4978735591192.168.2.5185.252.215.133
                                        Mar 25, 2022 09:06:53.137799025 CET4978735591192.168.2.5185.252.215.133
                                        Mar 25, 2022 09:06:59.153909922 CET4978735591192.168.2.5185.252.215.133
                                        Mar 25, 2022 09:07:16.189275980 CET4979135591192.168.2.5185.252.215.133
                                        Mar 25, 2022 09:07:19.186863899 CET4979135591192.168.2.5185.252.215.133
                                        Mar 25, 2022 09:07:25.374916077 CET4979135591192.168.2.5185.252.215.133
                                        Mar 25, 2022 09:07:42.398293018 CET4980035591192.168.2.5185.252.215.133
                                        Mar 25, 2022 09:07:45.407788992 CET4980035591192.168.2.5185.252.215.133

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Target ID:0
                                        Start time:09:05:37
                                        Start date:25/03/2022
                                        Path:C:\Users\user\Desktop\6527_1648106341_4945.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\6527_1648106341_4945.exe"
                                        Imagebase:0x810000
                                        File size:108544 bytes
                                        MD5 hash:0E48327D62A867589302E85169B0A86C
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.428082794.0000000000812000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.697018652.0000000000812000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        Reputation:low

                                        Reset < >
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.699139025.0000000005420000.00000040.00000800.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5420000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ccec75f542ca505259fc81ff375916a1cda5f27e7cd5ebbb9f311ef3bb1c4edc
                                          • Instruction ID: 9439bfa2a04a13915c0ce4fe74a83cd871aedc12b2f470528851fa2e5b9e32ed
                                          • Opcode Fuzzy Hash: ccec75f542ca505259fc81ff375916a1cda5f27e7cd5ebbb9f311ef3bb1c4edc
                                          • Instruction Fuzzy Hash: F1A12935E10229CFDB14DF64D884BEDBBB2FF88304F5085AAE405AB251EF70A985CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0412074be0a5a64f847307fd31563bf1588995fdcaeab87d8c745766b810aee8
                                          • Instruction ID: 65d4b3b094296f82cb9f66356e4ed5ce87ec6615774dd0f0981a698e1d71b0a7
                                          • Opcode Fuzzy Hash: 0412074be0a5a64f847307fd31563bf1588995fdcaeab87d8c745766b810aee8
                                          • Instruction Fuzzy Hash: C1130E38A01244DFCB26AB74D49199DB732FF9935AB1084AADC113BB65DB3F8942DF10
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 51df9817b6b6755d016e137dee5cc6228c184cc0662aaea4121b2d4e29890927
                                          • Instruction ID: ef1382fe388b7cda666ac6b6df978f84fd4b616c63c89a64e4887a9b1f5c3166
                                          • Opcode Fuzzy Hash: 51df9817b6b6755d016e137dee5cc6228c184cc0662aaea4121b2d4e29890927
                                          • Instruction Fuzzy Hash: 31130E38A01244DFCB26AB74D49199DB732FF9935AB1084AADC113BB65DB3F8942DF10
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,~rg
                                          • API String ID: 0-1527801167
                                          • Opcode ID: d4636fad5cb60e8cecccbb0f806cc3e9d2597bce732064a14ee7bb5848b2c236
                                          • Instruction ID: 082dcd492a6704ecdd226ee54421b574ed841c4ff59d88d8f5fd4565b63e53f8
                                          • Opcode Fuzzy Hash: d4636fad5cb60e8cecccbb0f806cc3e9d2597bce732064a14ee7bb5848b2c236
                                          • Instruction Fuzzy Hash: 6DE13E34600209DFCB54DFA5D898A9EBBF6FF88310F148969E8569B361DB30ED45CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,~rg
                                          • API String ID: 0-1527801167
                                          • Opcode ID: c56cdc7f1c83259975b189d7d5b68862190d30b8a5487af72459ada04c3682f4
                                          • Instruction ID: dfdee82291ecc28bd9ac0d3d61ffeb78040fe4d9655e639ac0c158fdc6aa918b
                                          • Opcode Fuzzy Hash: c56cdc7f1c83259975b189d7d5b68862190d30b8a5487af72459ada04c3682f4
                                          • Instruction Fuzzy Hash: 31017BB63002065FC3019A99EC95A5B77EAEBC5260B148C3AD609CB351DF34EC0783B1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: z
                                          • API String ID: 0-1657960367
                                          • Opcode ID: 1e904d88a9baae292cc784955314178b5c638343bc6992c2de57a1d7c22e4675
                                          • Instruction ID: 3c9de41cbe684e9f03bf4e8cc10918ead608a3e7a63329b80c09501e809185a9
                                          • Opcode Fuzzy Hash: 1e904d88a9baae292cc784955314178b5c638343bc6992c2de57a1d7c22e4675
                                          • Instruction Fuzzy Hash: C0E0D867A0C65C2BC795D6A86C8678A7FA6D743210F8944968945C7241EA6868048395
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e799df7c34bb04f7ebb87c3376060799297b8363c17986e8fce08e90a6cf1acd
                                          • Instruction ID: 57dc3c2cdd9742156911249879769fbc01bae22935a8ef495f0c942fe3b3ec1b
                                          • Opcode Fuzzy Hash: e799df7c34bb04f7ebb87c3376060799297b8363c17986e8fce08e90a6cf1acd
                                          • Instruction Fuzzy Hash: 74F1AE357402058FD754EFB8C894A6A7BF6EF89210F1544A9E946CB3A2DF35EC02CB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fb3fbb8c1e692e67cca74b7bfc0027a2b98a94b0b20460888d49e7281c7f7a32
                                          • Instruction ID: 9414e8cdfa3aac34518b4c1c07cb17b77f4cccc7bd63d95d9caab693b9c37de1
                                          • Opcode Fuzzy Hash: fb3fbb8c1e692e67cca74b7bfc0027a2b98a94b0b20460888d49e7281c7f7a32
                                          • Instruction Fuzzy Hash: 06E19C32600615DFCB56AFA4CD40EAEBBB2FF48300F0541A8E60A9B276DB31D951DF61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a63e8de6dc52319e7bb796466e5e9fecb50eac31553595d7a89da5a57a3d5891
                                          • Instruction ID: 8a5c40119a965160f3ce660218ed33fe8941fe6f383eb9e355bd89659d542a3c
                                          • Opcode Fuzzy Hash: a63e8de6dc52319e7bb796466e5e9fecb50eac31553595d7a89da5a57a3d5891
                                          • Instruction Fuzzy Hash: 2FD16B32600215DFDB56AFA5CD44EAABBB2FF48300F0541E8E6099B276DB32D951DF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 918b02d9dc2ead7ad70a0219e49c4c155e8946189293cd05ea508d1d86b84c75
                                          • Instruction ID: dcea4d412dfbc3c912b537d7c6626dc2b5bccd41d7558aaad7efeeab125eb2c3
                                          • Opcode Fuzzy Hash: 918b02d9dc2ead7ad70a0219e49c4c155e8946189293cd05ea508d1d86b84c75
                                          • Instruction Fuzzy Hash: E0A158353042049FC755AF79D844A6F3FABEF85224B14CA6AEC45CB395DF309802CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 934a6fff48803b8e4fa2c1c5f555f42d1ca6b1d5d14f5eeed37996d4fab9cae8
                                          • Instruction ID: a3c0e6e62063018eac8a69ce9856416b85517f544d77d8524bd1f96944b9e2a8
                                          • Opcode Fuzzy Hash: 934a6fff48803b8e4fa2c1c5f555f42d1ca6b1d5d14f5eeed37996d4fab9cae8
                                          • Instruction Fuzzy Hash: 3B718E75E002098FDB54DFA8C4546AEBBF3EF89304F25852AE805EB355DB70AD42CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 621eb1415a9a9503da93e3f5fce128b2b2ba0a3d209c0c9f2c0a89cf982dd81c
                                          • Instruction ID: d0ea530d14371164943fac424db2575b0b98da9493e46a4ed79555861b637add
                                          • Opcode Fuzzy Hash: 621eb1415a9a9503da93e3f5fce128b2b2ba0a3d209c0c9f2c0a89cf982dd81c
                                          • Instruction Fuzzy Hash: 4351AD703009006BD705BFA8DD41AADB393FB8E2047804D38D6064F796EF625E5A87B7
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2fef3adabfed9017a159246579d92980b62a8bd03d355506e4e957d5afcd689e
                                          • Instruction ID: 0d632f801ea107502675828768ba9fbf6c5e4e7961be624064aaf93ceacfdfbf
                                          • Opcode Fuzzy Hash: 2fef3adabfed9017a159246579d92980b62a8bd03d355506e4e957d5afcd689e
                                          • Instruction Fuzzy Hash: C4511D34A1021DEFDF55DFA4E898AADBBB2FF88314F108456E902A7360DB309944DB60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d8b4eea16fa72a2e6a6dd656bdc5e788e7c59089dbf897a036d520989b62adf6
                                          • Instruction ID: 17fb69d70ab22b2850f0e7ad6173d4bf2c5a10e0d21f88f48a988f7510f6b34d
                                          • Opcode Fuzzy Hash: d8b4eea16fa72a2e6a6dd656bdc5e788e7c59089dbf897a036d520989b62adf6
                                          • Instruction Fuzzy Hash: D151E734A00209DFCB54DFA4E998AAEBBB2FF88310F158454E955AB361CB35ED41CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2233b5e6e2e47e3cb4e3005a288b2af9bb7b30cba998e22943a72995c26ec1ca
                                          • Instruction ID: ae999e7f7c388cf49cb1b0a6b7114a9f4417aecbd3c05b899cc7c3b13f545edc
                                          • Opcode Fuzzy Hash: 2233b5e6e2e47e3cb4e3005a288b2af9bb7b30cba998e22943a72995c26ec1ca
                                          • Instruction Fuzzy Hash: D351B2317105048FC704BBB8D85947DBBB7FF89310BA48A69E5529B3D8EF30A949C762
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 58a27a793db267357c1f34ef5c7a99164ca47b656ded920cf69e1a1010c65650
                                          • Instruction ID: 8e6b9b9878b2e0df5ba217d2d6701d2fd129011a4b2a1b8a820406ff2ac2a508
                                          • Opcode Fuzzy Hash: 58a27a793db267357c1f34ef5c7a99164ca47b656ded920cf69e1a1010c65650
                                          • Instruction Fuzzy Hash: 68414930704254AFCB566BA888207AF3A9BDFC6264F058479E946DF395DF35DC0683A2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cbb0e485e107e6333a4e6475c8e3dbcbb58f5edf34c07072e31055c131220e8f
                                          • Instruction ID: bcc498c1cda89c7543849166cb4e27196bdfc2c7fa3565f3c418bfabe8ce9561
                                          • Opcode Fuzzy Hash: cbb0e485e107e6333a4e6475c8e3dbcbb58f5edf34c07072e31055c131220e8f
                                          • Instruction Fuzzy Hash: B8417B397053008FC346ABB8D85857A7FB7EF8620535589BAE946CB386EF358C02D761
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f8e2d2c54b59fa31ea04aa7f0f1e9c8108fa96829b0dc62ca96cb2c6554684cb
                                          • Instruction ID: 537b0c9a5030a8f9144470af299863d8aa7a97f04f7b610683176a87dad280b1
                                          • Opcode Fuzzy Hash: f8e2d2c54b59fa31ea04aa7f0f1e9c8108fa96829b0dc62ca96cb2c6554684cb
                                          • Instruction Fuzzy Hash: E841A2317105088FC704BBB9D85947DBBB7FF89310BA48A29E552973D8EF30A949C762
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f21478476a26c6f7ddb7d3a3aa8a0e3c0bf64598dedc3aa7936dade29b8306a5
                                          • Instruction ID: fb7caca5ded8c9cf89104b2702ebe112231d351b9bdbd9a9b8b265f99a593aa1
                                          • Opcode Fuzzy Hash: f21478476a26c6f7ddb7d3a3aa8a0e3c0bf64598dedc3aa7936dade29b8306a5
                                          • Instruction Fuzzy Hash: 5D41DC35B002048FDB54DBA8D8547BFFBE6EB89310F1484AAD84ADB391DB359D41CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6547ce5ac1e59392d811e23f73372bdbd86225b88c24fe6454781bd548e2903e
                                          • Instruction ID: 5b9ccbcd615812840cd41231276d46155db475e185966dab3fbe36f189ffee39
                                          • Opcode Fuzzy Hash: 6547ce5ac1e59392d811e23f73372bdbd86225b88c24fe6454781bd548e2903e
                                          • Instruction Fuzzy Hash: 1641B07190A384CFD7569F30C4092AA7FF1EF4630DF2584AED48A8B253DB79858ACB41
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3cb9318a5b4b923a43b87747a709a1bba4a040ac372012f7f9762b8da6643e35
                                          • Instruction ID: c7b9e2b19de2a042cd0ae420a9012e69966e3b7aaf13eec4aa90f52b8672de4b
                                          • Opcode Fuzzy Hash: 3cb9318a5b4b923a43b87747a709a1bba4a040ac372012f7f9762b8da6643e35
                                          • Instruction Fuzzy Hash: B141E074B002089FDB44EBB8D815BBF7BB6EB85300F108465E652DB3D5DF749A068BA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94a6007aa2c5085d9bb93da54077c97b1bfdc6c2c58aa9443b848dc68a4008a3
                                          • Instruction ID: db747e6d29347b785c2ef05156240edd6d1901bda3b766c5a2da2e769e64487b
                                          • Opcode Fuzzy Hash: 94a6007aa2c5085d9bb93da54077c97b1bfdc6c2c58aa9443b848dc68a4008a3
                                          • Instruction Fuzzy Hash: EF317F306042199FCB54DB9DD850ABBF7F6FF88614B14846AE94AD7351DB71EC02CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 845993173d2a1f24a53edff28d1ec80cd59ebae8403b2c9b8fb1b46cc9037357
                                          • Instruction ID: 1217f244dd4e89434707e9eb90193fe4a1690e7b22ce708491a2675cb9b54ee1
                                          • Opcode Fuzzy Hash: 845993173d2a1f24a53edff28d1ec80cd59ebae8403b2c9b8fb1b46cc9037357
                                          • Instruction Fuzzy Hash: A3419E34B112149FC708AFB8985957E7BF7EBC8211764886DE806D7344DF359D02DBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 15c894e253e619fd4d805be4ddd5ce9eb97e019bdbd2e9a2b1c8acb2db114e00
                                          • Instruction ID: 2c6dd3c46e591a2fcbe833bf69cb01e91d02af56e4b291f58dc470006c561806
                                          • Opcode Fuzzy Hash: 15c894e253e619fd4d805be4ddd5ce9eb97e019bdbd2e9a2b1c8acb2db114e00
                                          • Instruction Fuzzy Hash: 86317C34B112149FCB08AF78985957E7BF7EBC8211764882DE80AD7344DF359D02DBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b05ae105ef0976aaff19e01586d7c40c42dec3fe718ee7d1962f087a08a0ccca
                                          • Instruction ID: 1014fdb03c48911b55dc26154ec6a2bdfaf821c9e031ae4726f8e93869270d49
                                          • Opcode Fuzzy Hash: b05ae105ef0976aaff19e01586d7c40c42dec3fe718ee7d1962f087a08a0ccca
                                          • Instruction Fuzzy Hash: 2F3150397002088FD754EFA9D4A9A7E3BF6EB88710F248469E906DB361DF359C41DB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d307af986b57d7d321694911c12300de6226f52c98f4e1c9fcb1de32c780465d
                                          • Instruction ID: de59d37e5e27b8873663154693d3a55ee05486bfc7375c4d57bc89ebc7ccc5e8
                                          • Opcode Fuzzy Hash: d307af986b57d7d321694911c12300de6226f52c98f4e1c9fcb1de32c780465d
                                          • Instruction Fuzzy Hash: D5315E357002088FDB94DF6AD495ABA7BE7FB88710F1084A9E9469B360DF35DD01CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.699139025.0000000005420000.00000040.00000800.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5420000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b9a9acf3ad0b14f965af47bac1e44f4101993e9ecd3be74351d70178096d48f9
                                          • Instruction ID: bdd4d7602a8acf9387c1397683ebbe0c1746b77996c8b4329fecf630fd69544f
                                          • Opcode Fuzzy Hash: b9a9acf3ad0b14f965af47bac1e44f4101993e9ecd3be74351d70178096d48f9
                                          • Instruction Fuzzy Hash: 1431E535A041288FCB04DB9AD4449DDBBF6FF8C221F5990A6E406B7364DB30AD95CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d6e16f24ace91070e790be74c5df3e00d537344c4a929e3a999b778f65df001a
                                          • Instruction ID: 7a0858fdc7721033ae694a8225e97d38938c6175f6c82e6732d4d461062db5a3
                                          • Opcode Fuzzy Hash: d6e16f24ace91070e790be74c5df3e00d537344c4a929e3a999b778f65df001a
                                          • Instruction Fuzzy Hash: 2E318B31D107468BCB11EFB9C800699B772FF99324F258716E5557B241EBB0B5D1CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c6736916e4c8371cb91cddd56e0d244c51d28b2780d4c242781873152a8c6578
                                          • Instruction ID: 4183caf518636b0f520edea4d8f892fc4eb863ba315b9c727eeae97f04f87dd3
                                          • Opcode Fuzzy Hash: c6736916e4c8371cb91cddd56e0d244c51d28b2780d4c242781873152a8c6578
                                          • Instruction Fuzzy Hash: 4C419C75951109EFCF01AFA0E949AACBFB2FB48300F108455FA1667364DB325926EF61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9a8877f126b034d8a7f0f2f753fa5bd137afc5b1091e7b1bb3e4b4c1dc02234d
                                          • Instruction ID: f734c03aa10633445352313c59aacdf08bd543bb0deb4b053c341ae579860adb
                                          • Opcode Fuzzy Hash: 9a8877f126b034d8a7f0f2f753fa5bd137afc5b1091e7b1bb3e4b4c1dc02234d
                                          • Instruction Fuzzy Hash: 90314D357002088FD794DF6AD499ABA7BF6FB89710F2484A9E9429B361CB31ED41CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2686651ba16a521e8935ef934331f93a0895569e86e9b41e9829eaeaab14e521
                                          • Instruction ID: 1b366164800a4bcab5c72962612d8d66192e0540c6af59d94bb8de1fd1561685
                                          • Opcode Fuzzy Hash: 2686651ba16a521e8935ef934331f93a0895569e86e9b41e9829eaeaab14e521
                                          • Instruction Fuzzy Hash: DC2149387403048FC7157BB9981917E7BEB9FC52057188D3AE946CB791EF30AC0283A2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.699139025.0000000005420000.00000040.00000800.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5420000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 336488906d0f5976f02e61636eb7dc9019681b0a91b7efdf32f799ccfafc0c6d
                                          • Instruction ID: e189ccca436392f5f21b5aa4fca7a05c4240c11e6a82e83a4f2670a8bbd8e641
                                          • Opcode Fuzzy Hash: 336488906d0f5976f02e61636eb7dc9019681b0a91b7efdf32f799ccfafc0c6d
                                          • Instruction Fuzzy Hash: D2313C35A10218DFDB14DBA8D449AEEBBF6FF88310F50C46AE805AB350DB35A945CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5736d897334cea1e8cc124cda06744817762c5233f7b93f36650aa698e26fec2
                                          • Instruction ID: 0a7a246a18053171102d4a23e5fab8fa8c0388e6c1cd3f03a2e2e432cbfa18f3
                                          • Opcode Fuzzy Hash: 5736d897334cea1e8cc124cda06744817762c5233f7b93f36650aa698e26fec2
                                          • Instruction Fuzzy Hash: B9317A31D10B4A8BDB10EFB9C800299B772FF99324F25871AE5497B244EBB0B5D1CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ecf5903a4e5941127a365d30b7e2fc062c87e8519b2bfcc3e16a14b90756b501
                                          • Instruction ID: 47410c7a40a4ffb3bd3424ed4305319edb8b40355199e94a12317b5451d9b45f
                                          • Opcode Fuzzy Hash: ecf5903a4e5941127a365d30b7e2fc062c87e8519b2bfcc3e16a14b90756b501
                                          • Instruction Fuzzy Hash: F4310931E0070A8BCB55AF79D8141AEFBB0EF95300B20C12BDD56A7241EF34A945CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e63f409122de4b954885720f8538c6905b94a8718c40e47a9c5d14c26598852e
                                          • Instruction ID: 18c618b4f6de44c1e8709e98e0f73b1a711fc32414585e589903a65e0aa8be98
                                          • Opcode Fuzzy Hash: e63f409122de4b954885720f8538c6905b94a8718c40e47a9c5d14c26598852e
                                          • Instruction Fuzzy Hash: 8C314A74951109EFCF01AFA0E949AACBFB2FB48300F108855FA1667264DB325926EF61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e7bf3565ac7e35a660e0da3b4809221387398c10ff9d721dc7abb1be6373aeb2
                                          • Instruction ID: f2469fd7772213ee1c03b3e32e592200b9337bc02fabcbd68d87778f85cbb53f
                                          • Opcode Fuzzy Hash: e7bf3565ac7e35a660e0da3b4809221387398c10ff9d721dc7abb1be6373aeb2
                                          • Instruction Fuzzy Hash: 27317CB5951109DFCF01EFE0E949AACBFB2FB08300F108815FA16A7264DB315926EF60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f5616ef7de86ae082a9ca90abb85cce06dd6b81d38930ceec91cb693dac8dbb0
                                          • Instruction ID: d44ce8864da120724eb786d3b02e5c9a345818a96d05c232d2d0df2107f991e1
                                          • Opcode Fuzzy Hash: f5616ef7de86ae082a9ca90abb85cce06dd6b81d38930ceec91cb693dac8dbb0
                                          • Instruction Fuzzy Hash: 5D31E931E1061A8BCB51AF79D4141AEF7B1FF85300B20C63AD956B7340EF70A951CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.699139025.0000000005420000.00000040.00000800.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5420000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ddd71d6371c83ad686cef929098ce9cfc0fb4baae72a4bccb613c2a174bd3d78
                                          • Instruction ID: 12a8024d0beda32b3fc406d4b253ebb30b174ba452d0110f52be697056a2a6e1
                                          • Opcode Fuzzy Hash: ddd71d6371c83ad686cef929098ce9cfc0fb4baae72a4bccb613c2a174bd3d78
                                          • Instruction Fuzzy Hash: CC2153347001258F8B14CF59D4D09EAF7F6FB88254B5489AAE90AD7315E735EC0ACBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 46c4e486cc097799d2e7375c425f3f5399928884af4688691ef774f81fe524b8
                                          • Instruction ID: 9cf91cc7fcc7be519ea1c63842a23945d848496d35d07147be2f13badc2b84de
                                          • Opcode Fuzzy Hash: 46c4e486cc097799d2e7375c425f3f5399928884af4688691ef774f81fe524b8
                                          • Instruction Fuzzy Hash: A521F430764650CBD75A2734B02B27E3EE79B42306F54846DF98BC7A82DF359806EB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 14bd65d20a4a4d17d18a1391af09b56a9283cbb592db8b9587483d65edaeecdc
                                          • Instruction ID: f982b97bb5c2f18354c6199bdfe58f7550a3dc462eafe403535d1347403d796e
                                          • Opcode Fuzzy Hash: 14bd65d20a4a4d17d18a1391af09b56a9283cbb592db8b9587483d65edaeecdc
                                          • Instruction Fuzzy Hash: FE214C35A0020ADFEB40DF68D8A4AAB7BB5FF48251F1484A9ED419B365DB34DD41CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: af31232090a6bff954c7b237d48b854026b08b689d2e10db63031d74bd614c53
                                          • Instruction ID: dd621387fd5d62749686e753bea630d91e0a422bf0d880489c811427ee323171
                                          • Opcode Fuzzy Hash: af31232090a6bff954c7b237d48b854026b08b689d2e10db63031d74bd614c53
                                          • Instruction Fuzzy Hash: 86216B752047099BC760EF68DC819DF73ABEFC4618B048F29D4454F664EB70EE4687A1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ad262c29bd208e17ea3daefb414908680b800d5d4539d6b4ef8f8bacf654d0bd
                                          • Instruction ID: d2a8f53b8988b2cea879d3c36258fd35b8f0ba90e12c809f952b8a1d0097669b
                                          • Opcode Fuzzy Hash: ad262c29bd208e17ea3daefb414908680b800d5d4539d6b4ef8f8bacf654d0bd
                                          • Instruction Fuzzy Hash: F721F530B69690CBC7562734B02B23E3FE79B02602754846DF88BC6E81DF359406FB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ddee936d9c2faf1ccf06e781b8e4bb487cc2949da0b801d69b4475d2497e4420
                                          • Instruction ID: e3b2fd6f54177084b49ba0a4cdb3e7cf400ebe8c244a8118e3aa3d66b5c73acd
                                          • Opcode Fuzzy Hash: ddee936d9c2faf1ccf06e781b8e4bb487cc2949da0b801d69b4475d2497e4420
                                          • Instruction Fuzzy Hash: 29112B712042018FE3505B65D449BBB7FEAEBC0354F10883EE75AC7781DB70944597A2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 41f26593883d0e5ea12224d7b90ef0e2412d8d28f39d6374f6ba281a7a5ed25a
                                          • Instruction ID: b05202b7063b72c88543667d2f3ed15ccd19b9977ef6792b6088aa4483c3b0cf
                                          • Opcode Fuzzy Hash: 41f26593883d0e5ea12224d7b90ef0e2412d8d28f39d6374f6ba281a7a5ed25a
                                          • Instruction Fuzzy Hash: 2A11663070071A9BC750EF68D88169FB3F6FF84604B104E29E0455B7A5EB70BE468BE1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bdd92aad2ed099b55078a43c38421b7f11ebf313365c8c160901e1ceeb6bd569
                                          • Instruction ID: e33a09b0c6a677b9f041d098a11941fbcacba33fd7200e69a18f162bb8dcb702
                                          • Opcode Fuzzy Hash: bdd92aad2ed099b55078a43c38421b7f11ebf313365c8c160901e1ceeb6bd569
                                          • Instruction Fuzzy Hash: CA1104352402054BC344AB75E4496BF7BB7EBC0325B148D3AE24ACB750EF71690687A5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dbab5226845f893bf641b8455697f5c548f45e6f3f08cfed5e44f15a09c98cb4
                                          • Instruction ID: 8ca6891eb609cbf78377f0c0b516978c46a97042affaa71cbca724cb58488beb
                                          • Opcode Fuzzy Hash: dbab5226845f893bf641b8455697f5c548f45e6f3f08cfed5e44f15a09c98cb4
                                          • Instruction Fuzzy Hash: B51154352047098FC760DF68DC808DB77ABAF852187048F29E4554F664E770FE4A8B91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8c64ca18b4c973953d78f6740df3583156d7e9527d751fb19f611a725114cdde
                                          • Instruction ID: f0955497308d6ee18e42a10fb9e526717a34ed96d20d3b88f05725e5d8a78d47
                                          • Opcode Fuzzy Hash: 8c64ca18b4c973953d78f6740df3583156d7e9527d751fb19f611a725114cdde
                                          • Instruction Fuzzy Hash: 861106352412054F8706BB74A8964BF3BB7EED52113588D3AE206CF741EF31AA0797A2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.699139025.0000000005420000.00000040.00000800.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5420000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1b37fb395540fa289071c4f22042576dce7e79a94dd835f9bf6258fcc2263794
                                          • Instruction ID: 544b9bf7b60a140f153dfcf94e9a941d0c64bc870f1748fe4deb8928ef6ab5ec
                                          • Opcode Fuzzy Hash: 1b37fb395540fa289071c4f22042576dce7e79a94dd835f9bf6258fcc2263794
                                          • Instruction Fuzzy Hash: 5B118132A2051D8FCF05EFA8D8448DDB7B6FF89310B00426AE40177260EF70A949CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 121db9f7c264f6bfe04cfb2f1f4ccbdab8d9402ea1a09f6f1389b886a063e07d
                                          • Instruction ID: cd1eb4505cc9a0db50fbfdc0aa2fbf4b1e8d18af5764b929e55d8b333c1aeef6
                                          • Opcode Fuzzy Hash: 121db9f7c264f6bfe04cfb2f1f4ccbdab8d9402ea1a09f6f1389b886a063e07d
                                          • Instruction Fuzzy Hash: 1A119E303403049BC7145A68E84572A7BA7FB84229F644C2EE58287381DFB0E84AAB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 424171080153eeb1fc96471d11bd8259b3fda4b8db10ae54ae1cf8cbdbb97906
                                          • Instruction ID: 47404d4ec6fd6ca03ba4812432081b16401f2f5a0c307e7fc1d5680853df2289
                                          • Opcode Fuzzy Hash: 424171080153eeb1fc96471d11bd8259b3fda4b8db10ae54ae1cf8cbdbb97906
                                          • Instruction Fuzzy Hash: 061103352007098BC760DF69DC818DB73ABEF846187008F28E4554F664EB70FE4A87D1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dabe7f4a42d1bf253c7e9267f48c9940d1cb4eb16b80817d7d6880b831aac063
                                          • Instruction ID: d180e2b7daddd10c04756d791765c242e60338f1552a9bdd38f802dcd7e5963d
                                          • Opcode Fuzzy Hash: dabe7f4a42d1bf253c7e9267f48c9940d1cb4eb16b80817d7d6880b831aac063
                                          • Instruction Fuzzy Hash: 11015E343103049FC7155B78A84963A7BA7FBC4229B544D2EE58687781DFB1EC09AB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7a4e0f65d000ab262568642e2b4239bf3128703f1decd7c24b5e108fc085ba73
                                          • Instruction ID: 36ed3f4181a57058fea0c8c9c7711b3aebf5885936ea3fa997a72edd21c53f5e
                                          • Opcode Fuzzy Hash: 7a4e0f65d000ab262568642e2b4239bf3128703f1decd7c24b5e108fc085ba73
                                          • Instruction Fuzzy Hash: 16115B366402158FCB50DF69D884E5AB7F9FF48710B1600A9E805DB372C774EC41CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 21115a85363efb84bb0b74b9ba59c7d0c1b048642b6700e6b0e11883508bd7f4
                                          • Instruction ID: 5558d477c95cfced56f8058281eac2d61846776d1b3679259a8cd308dbbc91c1
                                          • Opcode Fuzzy Hash: 21115a85363efb84bb0b74b9ba59c7d0c1b048642b6700e6b0e11883508bd7f4
                                          • Instruction Fuzzy Hash: 0D01DF31304248AFEB429F2DDC51B6B3BAAEBC5268F098069FD46C7355CB349C11DBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 466f9cb60985490bb98a5621855f45534140779ff389b64792bbe2bd5b9f8ce6
                                          • Instruction ID: 4b6e0bdfa54a2c5568090cfec537af5eb39e67769e8c6b4e10768042b5093c0a
                                          • Opcode Fuzzy Hash: 466f9cb60985490bb98a5621855f45534140779ff389b64792bbe2bd5b9f8ce6
                                          • Instruction Fuzzy Hash: 9D01B1342411094B8605BB78E8854BE37ABEFD42253948D3EE207CB744EE30BD0757B2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 25bb94d3fbab6b93db872dcab18ec9bc715e29ba29176e43fc5ed8d977d65f5b
                                          • Instruction ID: b1b8cbb26a135b0e83cac82d6cd3b6bef1dbaddd716468d0399a4346217e4390
                                          • Opcode Fuzzy Hash: 25bb94d3fbab6b93db872dcab18ec9bc715e29ba29176e43fc5ed8d977d65f5b
                                          • Instruction Fuzzy Hash: 2101DB3160131D9BC7109F78EC8569FB7F9FB80614F104D25E0459B291DB70B94A87E1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3732d12850093cf9bfcc17253cbaac86e18c7830c9147c9c91a701de2acd1af0
                                          • Instruction ID: 8a3ea2933346f78e1f5a3a64d6582212e4dd76b91b7084a90c491066804ef71a
                                          • Opcode Fuzzy Hash: 3732d12850093cf9bfcc17253cbaac86e18c7830c9147c9c91a701de2acd1af0
                                          • Instruction Fuzzy Hash: 27017135200605DFD754CF29D944E9ABBEAEF84714B1588A9E9458B731EB70FD01CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e78c3e30090a29075e373300dde9dde91902a1552df67a069e02244816fc03f7
                                          • Instruction ID: 6c03b07afb64bac09fe9dd6a5a5520d3b5fa4ec4e512e0d64e382919ec551503
                                          • Opcode Fuzzy Hash: e78c3e30090a29075e373300dde9dde91902a1552df67a069e02244816fc03f7
                                          • Instruction Fuzzy Hash: D8F0AFB2A042595FD714CE68DC90AEBBBBEEFC9314F00456EE11AC7251DAB1A8058B60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 88748b09ea02ba27942d68c543b556dad55e8859e31c123ab08ecf0c2b67fc0f
                                          • Instruction ID: 000d2c7813f3df8c24e7e9bff4d645c3da2faf1d4ee8d1ec08f3cb1b3db4975f
                                          • Opcode Fuzzy Hash: 88748b09ea02ba27942d68c543b556dad55e8859e31c123ab08ecf0c2b67fc0f
                                          • Instruction Fuzzy Hash: 1901D470A50149DFCB40EFB8D8865AC7FB2EB45204F2085A9E809DB395EF316B06DB52
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f1cb01ad69b01ecb652f5a089c4b24efb441e27c920e235ea411a01dc8b24e08
                                          • Instruction ID: ede911c5466ee76ed90f3fbfea107c3c4d7841e6d41d05041ac434d9d63f1b66
                                          • Opcode Fuzzy Hash: f1cb01ad69b01ecb652f5a089c4b24efb441e27c920e235ea411a01dc8b24e08
                                          • Instruction Fuzzy Hash: E501F2757093808FC712EB68E91915A3F709E4321570905D7CA81CB2A7E6248819C761
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 398a0d5498e9f7c333ff5d56e0090ca3455455e512f27808bdeb14538e8ace40
                                          • Instruction ID: 4a81211f75a647708657f970564f7a2b50dcfa305ab540a1bc4fbd27498a96ec
                                          • Opcode Fuzzy Hash: 398a0d5498e9f7c333ff5d56e0090ca3455455e512f27808bdeb14538e8ace40
                                          • Instruction Fuzzy Hash: 37016934200605CFC794CF29D984C9AB7EABF84714711C9A9E9458BB21EBB0FD41CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.699139025.0000000005420000.00000040.00000800.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5420000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3777cbeb8606c422892a23bc6a5377c14bfc71b1ffe60db9f75c55ca88b34e4c
                                          • Instruction ID: ebe175c6a7dccd0dbfc9b5f6408eddae688c588cac872d2dffe2ecc16032ed53
                                          • Opcode Fuzzy Hash: 3777cbeb8606c422892a23bc6a5377c14bfc71b1ffe60db9f75c55ca88b34e4c
                                          • Instruction Fuzzy Hash: DC016D35A006099F8710DF69D88089AFBF5FF89210700C62AD959D7311EB30B919CBE0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a525803ff6fe732fc0deeeb26d04e80e425983943e80ffb21dc9a10c3732627
                                          • Instruction ID: 9cb2b833ac95e7c1f3acbc0697ad12919f9fa4332cf39aa52432d62048af4ecd
                                          • Opcode Fuzzy Hash: 0a525803ff6fe732fc0deeeb26d04e80e425983943e80ffb21dc9a10c3732627
                                          • Instruction Fuzzy Hash: 32F024316042084FDB109AA9EC58BA7FFF5EF85220F0481BBD949CB392CAB59844C790
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 67a31b28294a4f4508e36ced30a47b17fec3c1af792edf786cf4aa719bb5beb8
                                          • Instruction ID: 51a743e5621f8e513ee740b2ba2ed18f1aecf64c6a499290fd3830586256b413
                                          • Opcode Fuzzy Hash: 67a31b28294a4f4508e36ced30a47b17fec3c1af792edf786cf4aa719bb5beb8
                                          • Instruction Fuzzy Hash: 590181759102198FCB40DFA9E8095DEBFF4FF48320B00451AE449E3390DB745A498F90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d2c699d18c18d5a68354265a9d47fdd8195b65a19018b65792165ca29ed6b109
                                          • Instruction ID: 07702241764e28a80ffacaea44dbe001ab3e76f3a316793dce11bcec3429718d
                                          • Opcode Fuzzy Hash: d2c699d18c18d5a68354265a9d47fdd8195b65a19018b65792165ca29ed6b109
                                          • Instruction Fuzzy Hash: 1BF054727042195FD714CA65DC44EABB7EEEBC8314F10453AE119C7351DB71AC0587A0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.699139025.0000000005420000.00000040.00000800.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5420000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 711da515ee329d1f7974c73f2fbf791f29d6829aa89cf3f3841a123d17888535
                                          • Instruction ID: 2aa1bfb26625aec71ccaf3365f0dd5beea1043e025fc0bdb3321a74e6a9b7d37
                                          • Opcode Fuzzy Hash: 711da515ee329d1f7974c73f2fbf791f29d6829aa89cf3f3841a123d17888535
                                          • Instruction Fuzzy Hash: 6B01D774D0821ADFCB44DFA4C449AEEBBB1BF44304F50846AD415A7210DBB49649CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.699139025.0000000005420000.00000040.00000800.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5420000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f7a9b80fd2510e7c686ad7c85e23536c489d7cc4ea8fec9e816ce88cc5602935
                                          • Instruction ID: a8c9bebc1575b4b5c80908e0727fafcaead7eae5e81e7526b2db5740d8a81af7
                                          • Opcode Fuzzy Hash: f7a9b80fd2510e7c686ad7c85e23536c489d7cc4ea8fec9e816ce88cc5602935
                                          • Instruction Fuzzy Hash: 0E017C70C082A98FEB04CAA1D8187FFBFF2BB45704F44845AD005A6A90CFB84185DBD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 492c892811736c772161e353dd69dd624709198361be1309e589688f5dd1fb60
                                          • Instruction ID: caba52a2d88a1df08fbf56cf84f920f2b9418c4b9e2c82bf4b86e3ac3141f13d
                                          • Opcode Fuzzy Hash: 492c892811736c772161e353dd69dd624709198361be1309e589688f5dd1fb60
                                          • Instruction Fuzzy Hash: F1F0E97A204109ABCB05EF64D880EDE37EAFF893587114825EA008F315DB71D812DBE0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 87bd859880a1eea97a1bcfb6362bf23d9f06163407ae1a76d5b7e26e72bc3b92
                                          • Instruction ID: d3f3a5e8d71178ee45ad868b58c448b0ca24f59749dfd48f6c94cddbc59af72e
                                          • Opcode Fuzzy Hash: 87bd859880a1eea97a1bcfb6362bf23d9f06163407ae1a76d5b7e26e72bc3b92
                                          • Instruction Fuzzy Hash: E4F02777200208ABCB819A5ADC458DF7F6A9B91124344C8A3FE48CA132EB22D917C7D0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d59cced1972c0d690914f8a0c4f21d0596f2a8ba935c66a94f024ba08d701f46
                                          • Instruction ID: 80f67c50c19fcb7733f7471ace72ba3154adc4f54bed268e84e94db223299a8f
                                          • Opcode Fuzzy Hash: d59cced1972c0d690914f8a0c4f21d0596f2a8ba935c66a94f024ba08d701f46
                                          • Instruction Fuzzy Hash: 4FE02B362001042BC3043695FC9AAEA7BDED7C5335B604837F505C7341DDA54C429271
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 013f49c48402518db6a1ad1d1049e525736ef56d989f9ad89f60a0aaaeb3ea9e
                                          • Instruction ID: 1eb629545e290fc78abaadf141763e5e566e58592ae08a8d5f2e5b17a9cded9e
                                          • Opcode Fuzzy Hash: 013f49c48402518db6a1ad1d1049e525736ef56d989f9ad89f60a0aaaeb3ea9e
                                          • Instruction Fuzzy Hash: E0F0EC353093540BDB17127B6C106667FAF8FC6114B0D84FBD948CB752DF18C8058390
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca4030fd22b90ce1eb429329d4e75ad2220933e2d055ff23a48d5bb4415cc866
                                          • Instruction ID: 5e17fad1f5bdac8559de1c5158949b21bcc0cb39d1e5e4e884f5c271131c6359
                                          • Opcode Fuzzy Hash: ca4030fd22b90ce1eb429329d4e75ad2220933e2d055ff23a48d5bb4415cc866
                                          • Instruction Fuzzy Hash: 24F0F6701582058FF3905B68D409B7777D5FB40344F10C8399A66CA680DBB4D445D751
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b0463f9737c24475315df4fca59541173e017fb36ae88ad32d45066df80d2bfc
                                          • Instruction ID: 262481e62cd964c50e0f64d3701d4b228a22f14c0207b8b52f1caec3e715d331
                                          • Opcode Fuzzy Hash: b0463f9737c24475315df4fca59541173e017fb36ae88ad32d45066df80d2bfc
                                          • Instruction Fuzzy Hash: 02F096321143098BC760EF68DC417DA73ABEF80268F404E39D0444E664D774DA5587A1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6019b67f0eb9f93ae5562bd7372440bedc9a96ad95de6c16f775f11a5709843e
                                          • Instruction ID: 877ed2f452240b75dd7af0c76a5d02b4ba1dfc9c68decf60d5376cde113700b7
                                          • Opcode Fuzzy Hash: 6019b67f0eb9f93ae5562bd7372440bedc9a96ad95de6c16f775f11a5709843e
                                          • Instruction Fuzzy Hash: E0F0E976A0034C9BCB00DBA9F8045CEBFF6EF85311F24016AD508EB710DA709D45CB92
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5dc755930d95b5c7099a483740fa9c49d314c57950a73b8a6d11029d7a14887b
                                          • Instruction ID: d8a2be282f8ff0d8b20d821cb53feed0120ad74129f06182248b1e6e1e28c503
                                          • Opcode Fuzzy Hash: 5dc755930d95b5c7099a483740fa9c49d314c57950a73b8a6d11029d7a14887b
                                          • Instruction Fuzzy Hash: 60F02E37201A255FD3118F58D415D4ABBFDEF4162071A816AE848DB372DF24ED41C7C0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 00edc43a3b308febd7d7e3e3906a83467b546486ed7c91f4d76a8b05e134cbf3
                                          • Instruction ID: d12730cb2aa442afb7cf90a4fda1af218e0abcf64862ef75b199cca84ffb10d4
                                          • Opcode Fuzzy Hash: 00edc43a3b308febd7d7e3e3906a83467b546486ed7c91f4d76a8b05e134cbf3
                                          • Instruction Fuzzy Hash: DEF04474E51109EFCB40FFB4E8458ACBFB2EB45204B608569E4099B355EF306F45DB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 831d898521f39a4571cc72734c352cca52e617ba054cb890cb5e946b37a7b261
                                          • Instruction ID: 3c6b73f75bc78ba4599acb320df4d7dc2aaa5899bba090720f64be36565145f1
                                          • Opcode Fuzzy Hash: 831d898521f39a4571cc72734c352cca52e617ba054cb890cb5e946b37a7b261
                                          • Instruction Fuzzy Hash: 18F04970A002188FCB80DFA9E8085DEBBF5FF88710B00462AE449E3250EB706A098F94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 87db89caff35e342b1f328c86e515136ae4a39d8db92f466461763e96d4708d3
                                          • Instruction ID: 37ed947ff65a0b483e4a9c5369cbecd998a33e83f8bb4ff7ecef3b86e09cc988
                                          • Opcode Fuzzy Hash: 87db89caff35e342b1f328c86e515136ae4a39d8db92f466461763e96d4708d3
                                          • Instruction Fuzzy Hash: 4AF03A70E04259CFCB84EFA8A9542AEBBF4AB48254B144269D91AE7344EB345E01CFE0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a7b488eb2eeaf88f19564da356b9a9f483d9938e0683e79cf31667476bf27a97
                                          • Instruction ID: 89cd5323f265f87464377678732480f304e2457e45cde0a44bc613ca49a7b8a6
                                          • Opcode Fuzzy Hash: a7b488eb2eeaf88f19564da356b9a9f483d9938e0683e79cf31667476bf27a97
                                          • Instruction Fuzzy Hash: A501F274A01219AFDF01DB90EC55FEEBB72BF48314F208006E842BB2A1CB719940EB60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f9a9c3ef30cc310c23fa318e4ee60d1d4a0eaddf44292d5ba586138b819fb0ab
                                          • Instruction ID: 7a23887ee7d7a5370be7c245b91c63347ba0cfbe462f662cc840dcfb306656cc
                                          • Opcode Fuzzy Hash: f9a9c3ef30cc310c23fa318e4ee60d1d4a0eaddf44292d5ba586138b819fb0ab
                                          • Instruction Fuzzy Hash: E1F0E974145754CFC350EBB5DC850AA7BE2ED81200344CE6ED085CA561EB20A609C362
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e9ed84f10f43b3f502f988215fc6d3305ba3a1e2e3d5e7f31b4e35bdd8fe9af1
                                          • Instruction ID: 1888007ba10d49fc9db9ee0543a1741e43fc75f1e9957e82177d44a92cf21c76
                                          • Opcode Fuzzy Hash: e9ed84f10f43b3f502f988215fc6d3305ba3a1e2e3d5e7f31b4e35bdd8fe9af1
                                          • Instruction Fuzzy Hash: 97F0E976C04248AFCF42DFB0D9424CDBF75AB06200B2082D6D914DB241EB310B05EB40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 38476c549ae44afde9de34d6e70239e17611e701a8c64867559dcd2387e962bd
                                          • Instruction ID: 4df0a7cb8e64f6607be902c9aec89ff50922dcf095d7d9895948cafefe7e3285
                                          • Opcode Fuzzy Hash: 38476c549ae44afde9de34d6e70239e17611e701a8c64867559dcd2387e962bd
                                          • Instruction Fuzzy Hash: 56F0303530421D9BD715EF69D440CAA37EEEF893543518865EA058B314DFB1D852DBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9f557cae4ab1d727628f77f2d5347c90daf6b3c7cf52f1e9ca27dbfd8ce414ab
                                          • Instruction ID: 2f15cc9aa56419d1dad75d324e6c0e523360df7e619ddf645a6f3564fec0fc1a
                                          • Opcode Fuzzy Hash: 9f557cae4ab1d727628f77f2d5347c90daf6b3c7cf52f1e9ca27dbfd8ce414ab
                                          • Instruction Fuzzy Hash: B3F0E5373016255FC3009F68D404C4ABBAEAF81620305829AE8488B371CF20FE40CBC0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b9e608ad24f8632d1a8439020d6d3d92caf533de24fb9457b516791766ae6cd2
                                          • Instruction ID: bbafad623b0a979bc8b138995bff560f5b62e0d6f49ed8a8b55e57e8ad44061f
                                          • Opcode Fuzzy Hash: b9e608ad24f8632d1a8439020d6d3d92caf533de24fb9457b516791766ae6cd2
                                          • Instruction Fuzzy Hash: D6F09070D00108EFCB45EFB8D94A6ADBFB1DB05200F2084A9D9059B350EA305E04DB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 14eb002d7e7cf7ac495aa7cb158fca922eb0456a89e8fb1d602f6f53c1a14924
                                          • Instruction ID: f14e15a6574f939d496bde921dc8b98144060a93fd215d2fd6367f1ace9b5899
                                          • Opcode Fuzzy Hash: 14eb002d7e7cf7ac495aa7cb158fca922eb0456a89e8fb1d602f6f53c1a14924
                                          • Instruction Fuzzy Hash: B4E02B352403005FC7052769A8198BFBFB7FEC131034944BAF506CB252DF21090193A3
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d50860c4e65a6d2d94e3182751b96ad93c0b44528c5555dbb8071d82d37a8819
                                          • Instruction ID: d7ffd2f019e2f7e693ff9025c05374e861b1e4f298d53732309abb3d03a90752
                                          • Opcode Fuzzy Hash: d50860c4e65a6d2d94e3182751b96ad93c0b44528c5555dbb8071d82d37a8819
                                          • Instruction Fuzzy Hash: 96E09B322401006BC3142A9DA8899BA7FABDBC5720790493DF20EC3341DE6158449376
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 64d7d550f39af167807125d5fa1ce97e058bb0c34a364947b75846f90d6b4899
                                          • Instruction ID: 32c9db1258869ec8c875be7f0b4747acf65a9a3cc096a7cdde72ac641ddac3a2
                                          • Opcode Fuzzy Hash: 64d7d550f39af167807125d5fa1ce97e058bb0c34a364947b75846f90d6b4899
                                          • Instruction Fuzzy Hash: 05F06730501B048FD324DF22E409626BFF2FB88300B10CA2EE84E82A18DF70A40ACF84
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fe845d9f8e3d1484c6f74ca18a8500aa3628c3d2a42c3af7350baf9bf2ad6c92
                                          • Instruction ID: 44dfd109d6132e4a63c9ca8ce4a456af403e3766714ef05b778ec95b740de62d
                                          • Opcode Fuzzy Hash: fe845d9f8e3d1484c6f74ca18a8500aa3628c3d2a42c3af7350baf9bf2ad6c92
                                          • Instruction Fuzzy Hash: 48E0DF353002182B870436AABC898AABAAEE7C9320750443AF50987351EEB10C0597B1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 434f83e0c312769db4fd703e39108eb56b7a1f8f5a6e56c56c692e3ed13c0d62
                                          • Instruction ID: 1e6e556b17bd79d4976acbcf6df7a538987581a5f0f8c903e362c51d82b1eecb
                                          • Opcode Fuzzy Hash: 434f83e0c312769db4fd703e39108eb56b7a1f8f5a6e56c56c692e3ed13c0d62
                                          • Instruction Fuzzy Hash: 9FE0E5301413588FC310AB2AE409A6A7BEBEB81318F04492DE14B87710DF6168058791
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1ca995d65d9d20b3a4719718082eb7c57b8d97d33178d06300f9ba0e5bf81814
                                          • Instruction ID: 562ea4d760d87d4bd5e017e705b731d1f4b3844d4983fb7778eb38956daff93c
                                          • Opcode Fuzzy Hash: 1ca995d65d9d20b3a4719718082eb7c57b8d97d33178d06300f9ba0e5bf81814
                                          • Instruction Fuzzy Hash: DBE02639E853086FE7B12B248D13BBA3754DB05B00F0945F2EA924B2C6D9A0AC138661
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5a8c9d755fcbefdc8ae366d17d5e9c942024dd5bca5ed5218c92ae2d264a20f2
                                          • Instruction ID: b8f540680b23df2ad74bb53a395b52d76e1b869e49d40160a8e2a1bcf393e5ed
                                          • Opcode Fuzzy Hash: 5a8c9d755fcbefdc8ae366d17d5e9c942024dd5bca5ed5218c92ae2d264a20f2
                                          • Instruction Fuzzy Hash: D5F01CB0D042898FCB90CFA9D444ABEBFF0AF1C301F1480AAD958E7311D2344641CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.699139025.0000000005420000.00000040.00000800.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5420000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 20018b492ac54d3be7d09ca1045890e490f6699f81f429f313d5227ed5425a1d
                                          • Instruction ID: f948422053d4683bd8ea215f05d7057fb2298ad33786eb314362dcd238c67c47
                                          • Opcode Fuzzy Hash: 20018b492ac54d3be7d09ca1045890e490f6699f81f429f313d5227ed5425a1d
                                          • Instruction Fuzzy Hash: CCF022393043508FC3218B28EA286A27FE1EF8120274904ABF88AC7351CF34EC48CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 589b249036a662fa96471dfe4f7db4dc4dd3863df37816840f7d205d0fe46657
                                          • Instruction ID: 1f00627bc664b305e176f9270d657906af48c59eb290a3fea3ba039d4936bd19
                                          • Opcode Fuzzy Hash: 589b249036a662fa96471dfe4f7db4dc4dd3863df37816840f7d205d0fe46657
                                          • Instruction Fuzzy Hash: 6FE09A70909348EFCB41EFB8DD4258C7BB4EF4620871008EAD404DB3A2EA32AE019B61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 277b5b78694920f371e00f211b713ccbd2be8b39c5ca903e8428a0967f37c9a1
                                          • Instruction ID: add05c9b7f22928b4110f6ec5a3ab9e0ce658f37313d38d7911df075133371a1
                                          • Opcode Fuzzy Hash: 277b5b78694920f371e00f211b713ccbd2be8b39c5ca903e8428a0967f37c9a1
                                          • Instruction Fuzzy Hash: 18E0C0B0508288CFC740DB68C8514BE3F70DA0330430007C9FC818B265E7218A43D711
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d3aa538cfda7bfbe4a0391b88cb9112823957e8035b6de90394da1135cd83e21
                                          • Instruction ID: 256d0c9ba4c23d6f4da9b582ec0bc5527ed8ce59dcae7d56dc353c92c8b38603
                                          • Opcode Fuzzy Hash: d3aa538cfda7bfbe4a0391b88cb9112823957e8035b6de90394da1135cd83e21
                                          • Instruction Fuzzy Hash: 05F03070D50108EF8B44EFF8D9964ACBBB5EB45200F6085A9D805AB340EB302F049F62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 26a887592da98f04c692e6186deacb925fbb6e6ea174d845db0f536552643f90
                                          • Instruction ID: a54288a9b4dca46e8f3d80f32935360560e098b7fd4fa12d35d6134c45e04356
                                          • Opcode Fuzzy Hash: 26a887592da98f04c692e6186deacb925fbb6e6ea174d845db0f536552643f90
                                          • Instruction Fuzzy Hash: F1E068301062908BEF86B620E868ED93FB1EB42304B094DE9D5864F2CAD7200C838B51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d8b2984ef890d5a6a04b0d6a518d60356e7ab67cd3b5a35d08ce3d647b0c47b8
                                          • Instruction ID: bd7e18f634502f8a3dd07893c9464d955a7edd3de6d505c3f4665f9fcec0b282
                                          • Opcode Fuzzy Hash: d8b2984ef890d5a6a04b0d6a518d60356e7ab67cd3b5a35d08ce3d647b0c47b8
                                          • Instruction Fuzzy Hash: 39E02B3B3543984F834A137C942A4AA7FABEA8742036A84EFFE4BCB541DD2248057391
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.699139025.0000000005420000.00000040.00000800.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5420000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3fa7141104b21e5de785bea0f4b942f7feb2d67c7e214af23a9a9e0833de6804
                                          • Instruction ID: b5ae1f0ce6ab5e39b9598dbe0e3198ac21a43ed7a5baedb78c8e5e9bb108172b
                                          • Opcode Fuzzy Hash: 3fa7141104b21e5de785bea0f4b942f7feb2d67c7e214af23a9a9e0833de6804
                                          • Instruction Fuzzy Hash: 7CE0263110D3B01FC3226324C9047E7BF95AB82311F4930CBD0C1C2291CA61A400CB81
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.699139025.0000000005420000.00000040.00000800.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5420000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 62a1b10cfb9384550d9285a118779179bd0ee32593f8f93c62b19a29d450c77d
                                          • Instruction ID: 2d5d8c3373d3057c4e7736b29049503bfe265cae1ec61864972474077f7ae512
                                          • Opcode Fuzzy Hash: 62a1b10cfb9384550d9285a118779179bd0ee32593f8f93c62b19a29d450c77d
                                          • Instruction Fuzzy Hash: A9E08C39619A208BDB0D2A78A4190AEBBA5EB89211744412AF807D3310EF2099418785
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d1c23e579f7be1299dc2727d6fe5fdaa899497821b2c2e1956a885c7e10614d3
                                          • Instruction ID: f6950ec11e2354b51c4b0dfb9168dee43565f90f4823f017eb04a48dbe02103a
                                          • Opcode Fuzzy Hash: d1c23e579f7be1299dc2727d6fe5fdaa899497821b2c2e1956a885c7e10614d3
                                          • Instruction Fuzzy Hash: A2D02B323505145F8614376AB8094BE3BABDEC4221394483DF107CB380CF311D0253E7
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0f0c0ecaacc99aa47957c031f1dc9b0c9d2ab52696d7c760a6a1ac1941198307
                                          • Instruction ID: 55c4914333be1d5bda9ae4c688f2eb93fa93ca6591c8a3a92d097d9e956ca807
                                          • Opcode Fuzzy Hash: 0f0c0ecaacc99aa47957c031f1dc9b0c9d2ab52696d7c760a6a1ac1941198307
                                          • Instruction Fuzzy Hash: D6E092B4D0420D9F8B94DFA9D8416BEFFF4AB58201F10816AD958E3340E6345A51CFE1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: beb3410fde68d2de5366b7ae4caa916fe9628efe20a2f9b2aa4855e64c73048a
                                          • Instruction ID: 9d683d192cdabed102b3acdd0dd596a25cccb925327856e48070d3a7a33d0571
                                          • Opcode Fuzzy Hash: beb3410fde68d2de5366b7ae4caa916fe9628efe20a2f9b2aa4855e64c73048a
                                          • Instruction Fuzzy Hash: 21E07E75D0020DEFCB40DFA4D9458DDBBB9EB48200F2082AAA819A2200EB306B159B80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 332edc7c6c61935c7f4dc28a891bfe96444735d5885798db9e0acacfcdc16164
                                          • Instruction ID: 8a2ab96eb59e234cb9d5c584d4b0016141a887588be91bf6fc12f0d1f701c8a8
                                          • Opcode Fuzzy Hash: 332edc7c6c61935c7f4dc28a891bfe96444735d5885798db9e0acacfcdc16164
                                          • Instruction Fuzzy Hash: 3AE086316021808BDB58EF24D096B9277E2EB98300F65C496D8428F359DB34D8569B41
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6dbbc47b4462b75d663cf7fcce7b99a0457f0ac370d0ca7e96124eeca0475aaf
                                          • Instruction ID: a933e376149349b82df76cdf0a02fdb68ac524b76ad338b39457ce07f8517d3e
                                          • Opcode Fuzzy Hash: 6dbbc47b4462b75d663cf7fcce7b99a0457f0ac370d0ca7e96124eeca0475aaf
                                          • Instruction Fuzzy Hash: FCD05E70A0530CEF8B40EFE9DE4159DBBF9EB45608B1049A9D409D7390EA316F009BA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 074837da62fa263fdf38bcc7ab4a9a59fedba9f9510a1d60aed705d75a617309
                                          • Instruction ID: 3abcb5d18a7f111132d427a52e751c5984e0963daaa054f5c6c93c95bd7a30fd
                                          • Opcode Fuzzy Hash: 074837da62fa263fdf38bcc7ab4a9a59fedba9f9510a1d60aed705d75a617309
                                          • Instruction Fuzzy Hash: CBD0223360032C2B0B14DAF968824CF7FEECA85130F00086BC40AD7300EF74290042D4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 70b6b67ba263cab2309114564d28ac3dfa542c35d823f8c7b1e1c3a84a45f80b
                                          • Instruction ID: 7f25d1eb6dd2282c7c601efe420a774b32a0aaa11a9ed949e0028bb8439f6017
                                          • Opcode Fuzzy Hash: 70b6b67ba263cab2309114564d28ac3dfa542c35d823f8c7b1e1c3a84a45f80b
                                          • Instruction Fuzzy Hash: 2AD022383C130CAFEB20BA30EE03F323349D348F00F100625BA020A2C9CDB1BC628244
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b00f3087839293074bdcdb131a5cd16c731d868247d1b91e831b4ed1d12b90e5
                                          • Instruction ID: 132737d3152a00bb89e950426f69526ac92a272900ff064e390b034f3db5c6e5
                                          • Opcode Fuzzy Hash: b00f3087839293074bdcdb131a5cd16c731d868247d1b91e831b4ed1d12b90e5
                                          • Instruction Fuzzy Hash: 98C04CF240A380DFCF429F24D9956843BB0BF1765C32E44DAD480DE272D6265915C752
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.699139025.0000000005420000.00000040.00000800.00020000.00000000.sdmp, Offset: 05420000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_5420000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c5b73076a6e85df4b9bf24476446474a790ed1a285c8c15cad2a45bdd303819d
                                          • Instruction ID: 75b139f3e06ebeaa04097e6327642b8ea099637b8bdb60324f4c12d90895af66
                                          • Opcode Fuzzy Hash: c5b73076a6e85df4b9bf24476446474a790ed1a285c8c15cad2a45bdd303819d
                                          • Instruction Fuzzy Hash: B1C04C714491889FDB058B2088699C57F209F1120531744A69550C906BC5149494DA16
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 17050925426dd63cc4bdf0ec40660297e627b2a769e4234315c2f86728c56561
                                          • Instruction ID: ee898da443eaa521e0ffd39f5d53e7673d9846e2d6c4551b23b7b66233341d28
                                          • Opcode Fuzzy Hash: 17050925426dd63cc4bdf0ec40660297e627b2a769e4234315c2f86728c56561
                                          • Instruction Fuzzy Hash: 18A00225621988878E089621B5AA72D3F62B6C02C1398445AE00286248DE25B405E640
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5ca9cf9430680268968aec17825002d5c5bc99eb4ddb5ce265f91cc078c027fa
                                          • Instruction ID: 2a2944ee7596ad80c47564c03936e1a0e6c8964c6671e206d1034e24495731d9
                                          • Opcode Fuzzy Hash: 5ca9cf9430680268968aec17825002d5c5bc99eb4ddb5ce265f91cc078c027fa
                                          • Instruction Fuzzy Hash: 5ED1E735B002058FCB54DBB8D854AAE7BFBEF88210B1584A9E946DB395DF34DD01CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,~rg$,~rg$,~rg$,~rg$,~rg$,~rg$,~rg
                                          • API String ID: 0-1572276241
                                          • Opcode ID: 3659e86908e5cf8415631610b237aa9e467f3a8b1a1de339cc726da0660d2054
                                          • Instruction ID: 8dfa9e416502784731461c649e80a1cff502ef58eed267bc2d73045154e5f5fe
                                          • Opcode Fuzzy Hash: 3659e86908e5cf8415631610b237aa9e467f3a8b1a1de339cc726da0660d2054
                                          • Instruction Fuzzy Hash: 3B318F783020446BE7047768DC6473E226FEBD9258B14882DD9178B798DF75AC13A3B7
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,~rg$,~rg$,~rg$,~rg$,~rg$,~rg$,~rg
                                          • API String ID: 0-1572276241
                                          • Opcode ID: 6673bbf0d2c707470095aefb3452593639cdc93801b9ef381f5a11096875cada
                                          • Instruction ID: 6f88e114efe8682397d544d03abdb6e423f3b373503b84fff3d4ffc5e9cc07e4
                                          • Opcode Fuzzy Hash: 6673bbf0d2c707470095aefb3452593639cdc93801b9ef381f5a11096875cada
                                          • Instruction Fuzzy Hash: 1E316D783020046BEB057B78DC54B3E225BDBD9254F24482DE9138B798DF755C13A3B6
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,~rg$,~rg$,~rg$,~rg$,~rg$,~rg$,~rg
                                          • API String ID: 0-1572276241
                                          • Opcode ID: 3016d6048840a7e3fbfae055573845f4f6d27dcae2cd2c79acce49336aff4ddb
                                          • Instruction ID: af130cf4a73e288306267ee91ebe27599e0e6960d94f8d09faeed88d8ef17dd5
                                          • Opcode Fuzzy Hash: 3016d6048840a7e3fbfae055573845f4f6d27dcae2cd2c79acce49336aff4ddb
                                          • Instruction Fuzzy Hash: 48317E783020446BDB0477689C64A3E226FEBD9258B148C2DD9178B798DF755C13A3B7
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.698145863.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1050000_6527_1648106341_4945.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,~rg$,~rg$,~rg$,~rg$,~rg$,~rg$,~rg
                                          • API String ID: 0-1572276241
                                          • Opcode ID: 6be70a6018e6ecf741a2f1249f28ac693973dcd8ce4985ce0c258fc6dff87b2e
                                          • Instruction ID: cb4558891a4b29213ebd17f1616ae50f2f48467adf8af88098cfb7953f6a0ab4
                                          • Opcode Fuzzy Hash: 6be70a6018e6ecf741a2f1249f28ac693973dcd8ce4985ce0c258fc6dff87b2e
                                          • Instruction Fuzzy Hash: 86316D783020046BEB057B789C54A3E225BEBD9254B24482DE9138B798DF756C13A7B7
                                          Uniqueness

                                          Uniqueness Score: -1.00%