Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
Analysis ID:1527747
MD5:97139b2e30ddb1601c2d64c3cf150979
SHA1:52969d39fa83b12cc8a3066e0202b25e4eb3f4b5
SHA256:37fc573d1110dc7ceea81fd4863eb87f228229615b348b3ed6b1d4a125c92f10
Tags:exe
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large strings
AI detected suspicious sample
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe (PID: 2668 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe" MD5: 97139B2E30DDB1601C2D64C3CF150979)
    • InstallUtil.exe (PID: 5016 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • WerFault.exe (PID: 1992 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1144 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2127423069.0000000005250000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.2111022730.0000000002A01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      Process Memory Space: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe PID: 2668JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Process Memory Space: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe PID: 2668JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Process Memory Space: InstallUtil.exe PID: 5016JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.5250000.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

              System Summary

              barindex
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\Vsjrhifhpua.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, ProcessId: 2668, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vsjrhifhpua
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: C:\Users\user\AppData\Roaming\Vsjrhifhpua.exeReversingLabs: Detection: 23%
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeReversingLabs: Detection: 23%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\Vsjrhifhpua.exeJoe Sandbox ML: detected
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeJoe Sandbox ML: detected
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\InstallUtil.pdbol source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: n.pdb source: InstallUtil.exe, 00000002.00000002.3341057554.0000000000F68000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\InstallUtil.pdbZm source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002F14000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2129554085.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: ((.pdb source: InstallUtil.exe, 00000002.00000002.3341057554.0000000000F68000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: &ulUtil.pdb`W source: InstallUtil.exe, 00000002.00000002.3341183787.00000000010D8000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002F14000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2129554085.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3341057554.0000000000F68000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbN source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.00000000010D8000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdbVl source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdbo source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: nC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdbh source: InstallUtil.exe, 00000002.00000002.3341057554.0000000000F68000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdb.NETFrameworkv4.0.30319InstallUtil.exe source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001180000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001110000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: n8C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3341057554.0000000000F68000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdbw source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdbb] source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb+ source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001110000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdbt source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3341057554.0000000000F68000.00000004.00000010.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_029022A4
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 4x nop then jmp 04FCCA9Bh0_2_04FCC4D0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_04FC1060
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_04FC1058
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 4x nop then jmp 04FCAEDDh0_2_04FCAD8B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 4x nop then jmp 04FCCA9Bh0_2_04FCC4D0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 4x nop then jmp 04FD4428h0_2_04FD4250
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 4x nop then jmp 04FD3B6Fh0_2_04FD3B10
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 4x nop then jmp 04FDCBB0h0_2_04FDCAF8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 4x nop then jmp 04FDCBB0h0_2_04FDCAF1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 4x nop then jmp 04FD4428h0_2_04FD4240
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 4x nop then jmp 04FD3B6Fh0_2_04FD3B0E
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, Vsjrhifhpua.exe.0.drString found in binary or memory: https://github.com/mariuszgromada/MathParser.org-mXparser
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
              Source: Vsjrhifhpua.exe.0.drString found in binary or memory: https://mathparser.org
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, Vsjrhifhpua.exe.0.drString found in binary or memory: https://mathparser.org/mxparser-license
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, Vsjrhifhpua.exe.0.drString found in binary or memory: https://mathparser.org/mxparser-tutorial/confirming-non-commercial-commercial-useeWARNING:
              Source: Vsjrhifhpua.exe.0.drString found in binary or memory: https://mathparser.org/order-commercial-license
              Source: Vsjrhifhpua.exe.0.drString found in binary or memory: https://payhip.com/infima
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, Vsjrhifhpua.exe.0.drString found in binary or memory: https://payhip.com/infima)
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354

              System Summary

              barindex
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, ReponseInitializerLicense.csLong String: Length: 10317
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FDE400 NtProtectVirtualMemory,0_2_04FDE400
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FDF8B0 NtResumeThread,0_2_04FDF8B0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FDF8A9 NtResumeThread,0_2_04FDF8A9
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FDE3F8 NtProtectVirtualMemory,0_2_04FDE3F8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_02901C7A0_2_02901C7A
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_029026580_2_02902658
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_029026490_2_02902649
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_02901C7A0_2_02901C7A
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_02902CF80_2_02902CF8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_02902CE80_2_02902CE8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_02901C7A0_2_02901C7A
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04E54EC00_2_04E54EC0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04E586940_2_04E58694
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04E5729A0_2_04E5729A
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04E514600_2_04E51460
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04E5D5200_2_04E5D520
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04E54EB10_2_04E54EB1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04E5B8280_2_04E5B828
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04E5B8380_2_04E5B838
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04ECC4580_2_04ECC458
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04EC2E0B0_2_04EC2E0B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04EC3B280_2_04EC3B28
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04ECC5300_2_04ECC530
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04EC40700_2_04EC4070
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04EC214B0_2_04EC214B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04EC21500_2_04EC2150
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04ECCEC80_2_04ECCEC8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04ECCED80_2_04ECCED8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04EC3B1A0_2_04EC3B1A
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FCA0400_2_04FCA040
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FC61400_2_04FC6140
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FC93500_2_04FC9350
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FC53100_2_04FC5310
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FC87D00_2_04FC87D0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FC87C00_2_04FC87C0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FCA0300_2_04FCA030
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FC93400_2_04FC9340
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FC4DC00_2_04FC4DC0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FC9FF20_2_04FC9FF2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD4CCE0_2_04FD4CCE
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5CC30_2_04FD5CC3
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD46D50_2_04FD46D5
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5ECF0_2_04FD5ECF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD00400_2_04FD0040
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD51B50_2_04FD51B5
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FDE1800_2_04FDE180
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FDB2D00_2_04FDB2D0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD92500_2_04FD9250
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5CF00_2_04FD5CF0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD4C7C0_2_04FD4C7C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5DFE0_2_04FD5DFE
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5DF30_2_04FD5DF3
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FDD5EF0_2_04FDD5EF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5D4F0_2_04FD5D4F
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5D2E0_2_04FD5D2E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5D140_2_04FD5D14
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5EED0_2_04FD5EED
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5EB20_2_04FD5EB2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5EAD0_2_04FD5EAD
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5E6B0_2_04FD5E6B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5E650_2_04FD5E65
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FDA7C80_2_04FDA7C8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FDA7B80_2_04FDA7B8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD576D0_2_04FD576D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD5F5F0_2_04FD5F5F
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD50300_2_04FD5030
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD51F90_2_04FD51F9
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD61750_2_04FD6175
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FDE1710_2_04FDE171
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FDB2C00_2_04FDB2C0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD92400_2_04FD9240
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_054300400_2_05430040
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_05433A680_2_05433A68
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_054316480_2_05431648
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_054303670_2_05430367
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_055A0D200_2_055A0D20
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_055A0D100_2_055A0D10
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_055A80900_2_055A8090
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_055A80800_2_055A8080
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_055CDE380_2_055CDE38
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_055CD1E80_2_055CD1E8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_055B00400_2_055B0040
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_055B00110_2_055B0011
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_02D230A82_2_02D230A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_02D274802_2_02D27480
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_02D230972_2_02D23097
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_02D245562_2_02D24556
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_02D245602_2_02D24560
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_058269482_2_05826948
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05825B802_2_05825B80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1144
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003B45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLxrjgldfau.dll" vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002F14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002B92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGmcbxaouxsl.exe" vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2129554085.0000000005B80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGmcbxaouxsl.exe" vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIyfueb.exe. vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000000.2085569121.00000000005F4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIyfueb.exe. vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2103281397.0000000000B9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeBinary or memory string: OriginalFilenameIyfueb.exe. vs SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, System.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, iFX3EaoudVR8jYWouhx.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, iFX3EaoudVR8jYWouhx.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, iFX3EaoudVR8jYWouhx.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, iFX3EaoudVR8jYWouhx.csCryptographic APIs: 'CreateDecryptor'
              Source: classification engineClassification label: mal100.evad.winEXE@4/2@0/0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeFile created: C:\Users\user\AppData\Roaming\Vsjrhifhpua.exeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1992:64:WilError_03
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\afee94c7-baad-470e-800b-d59389e73c43Jump to behavior
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeReversingLabs: Detection: 23%
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeString found in binary or memory: power function%f(x) - der(F(x),x)MChebyshev polynomials definition usingfib3Sif(n>1, fib3(n-1)+fib3(n-2), if(n>0,1,0))mcos(x)-der(sum(n,0,20,(-1)^n*(x^(2*n+1))/(2*n+1)!), x)-Start from the license-User defined constants
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1144
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeStatic file information: File size 2824192 > 1048576
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2b0e00
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\InstallUtil.pdbol source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: n.pdb source: InstallUtil.exe, 00000002.00000002.3341057554.0000000000F68000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\InstallUtil.pdbZm source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002F14000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2129554085.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: ((.pdb source: InstallUtil.exe, 00000002.00000002.3341057554.0000000000F68000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: &ulUtil.pdb`W source: InstallUtil.exe, 00000002.00000002.3341183787.00000000010D8000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002F14000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2129554085.0000000005B80000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3341057554.0000000000F68000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbN source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.00000000010D8000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdbVl source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdbo source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: nC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdbh source: InstallUtil.exe, 00000002.00000002.3341057554.0000000000F68000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: InstallUtil.pdb.NETFrameworkv4.0.30319InstallUtil.exe source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001180000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001110000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: n8C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3341057554.0000000000F68000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdbw source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdbb] source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb+ source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001110000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdbt source: InstallUtil.exe, 00000002.00000002.3341183787.0000000001124000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3341057554.0000000000F68000.00000004.00000010.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, iFX3EaoudVR8jYWouhx.cs.Net Code: Type.GetTypeFromHandle(kYsaPBwLU1kZHMd1DEx.hi9sjyIGgA(16777265)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(kYsaPBwLU1kZHMd1DEx.hi9sjyIGgA(16777259)),Type.GetTypeFromHandle(kYsaPBwLU1kZHMd1DEx.hi9sjyIGgA(16777263))})
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, Account.cs.Net Code: PopParams System.AppDomain.Load(byte[])
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.4ed0000.5.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.4ed0000.5.raw.unpack, ListDecorator.cs.Net Code: Read
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.4ed0000.5.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.4ed0000.5.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.4ed0000.5.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.5250000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2127423069.0000000005250000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2111022730.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe PID: 2668, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5016, type: MEMORYSTR
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04E73691 push FFFFFFC3h; ret 0_2_04E73693
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04EC727E push es; iretd 0_2_04EC7281
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeCode function: 0_2_04FD744B pushad ; retf 0_2_04FD744C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_0582310E push esi; iretd 2_2_0582311A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05823D1B push edx; ret 2_2_05823D1E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_0582351C push ebx; retf 2_2_0582351D
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.5100000.6.raw.unpack, dchRS8kYKCuUFvMeYKo.csHigh entropy of concatenated method names: 'RtlInitUnicodeString', 'LdrLoadDll', 'RtlZeroMemory', 'NtQueryInformationProcess', 'SDxkUBbiHE', 'NtProtectVirtualMemory', 'I8nwoCmh3WtsrBd4EDA', 'eo0ClZmub0huka9LYXJ', 'z2ML5bmbuhl8TBQqNQG', 'bvTkE2mK2JgEW7j3j89'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, Ay88cJwjp1vQBWMfPB1.csHigh entropy of concatenated method names: 'pWswGW1Gql', 'udcwTvKRJY', 'vpRwSuYLlw', 'iQ0wcXSl2V', 'zmDwE3u7Zg', 'oOTwrbhDCI', 'UsvwnJip0s', 'xj5wFxfY45', 'sOQwIOfvID', 'GSmwd4M0xi'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, AssemblyLoader.csHigh entropy of concatenated method names: 'CultureToString', 'ReadExistingAssembly', 'CopyTo', 'LoadStream', 'LoadStream', 'ReadStream', 'ReadFromEmbeddedResources', 'ResolveAssembly', 'Attach', 'Poyc7qK3lq5hWrQLT70'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, iFX3EaoudVR8jYWouhx.csHigh entropy of concatenated method names: 'yLS7cthJHVZUKEGyXNn', 'Q8pFlehUbHNgDq0X2lu', 'Ryrww0r8Sx', 'ypYt51hg9vW7l0SNIpl', 'h0EQoLhLaTi5HnXqM93', 'MhLqY2hbgiV6HWnx03Z', 'ItMlivhKcmGiEhKRaC8', 'vYPo0DhhPK626SZhk5w', 'ocAPoShucqjjSfJDPAR', 'eSulPrhja2LZuBQNWue'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, oLQwSTXWww7vAVwHDj7.csHigh entropy of concatenated method names: 'y4pXvwHj2l', 'u6TXshn6iN', 'LYJXDlNa81', 'RH9F0AxWrU1RfxQvGsN', 'cTp6EpxHROJ0UMkO9X6', 'fqMf1IxvwJ34WhTLrW1', 'GlbgPtxjfTEVhop99Kt', 'DxlADRx4fVLxm0px3ND', 'VC75kDxsbqFLbnufutB', 'rDg9rRxDsfpcFZ4i2SH'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, tPfNcYPwX5IODIivob.csHigh entropy of concatenated method names: 'XBryUF1EZ', 'RPX0I3vO4', 'kH384a6tP', 'sQc2tu70N', 's1uQBJPX1', 'bbmOuPJrRL6WII0bO4T', 'PxyhGSJnl9elcHnoikN', 'pterNAJFL432bqDCPK6', 'WJeUUAJIlR4QUmfvpJn', 'BEI640JdkkV2NkjSIxB'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, J2LxTL7Ml8IRAO5gVGa.csHigh entropy of concatenated method names: 'bGM7JXtHXj', 'zv2DHagtvPkDauH2AdT', 'rF61N7gGi18SsR1t9WP', 'qIOOMkgTp4vpYy6uGAN', 'Ep7M6lgS9VOfwBYIJYA', 'UwVDh1gcE82mMcC23kY', 'L73bwdgEsXTefLqTXaw', 'YAnQAFgBxldXqm9pAqK', 'SgeQ6dg6sYdmZfqcPqT'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, GkeKcpk7QFoGMcT3m3v.csHigh entropy of concatenated method names: 'j93kNpyEuv', 'q6TkPKaoPe', 'GmukQG1g0W', 'ydWk09qXec', 'RWPkeH7oMw', 'xoGk81N5Zd', 'jK3k2JoX9s', 'iQZkpjbnNl', 'Jb7k12Tfds', 'AetkOt2THa'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, vrByYdo1MNMYAkokZeI.csHigh entropy of concatenated method names: 'LywoVHxUkv', 'fWy3w6KNFoJ7bE5ZwVk', 'qkp251Kwi5JJALWThhs', 'glDn40KPmrM0xyk2Hw7', 'Y6VCMCKfIXNCKJOr8Lf', 'pEcKUbKQbOm6Gpa66Vi', 'MZf35PKyH4TncV3nsV6', 'IZNYKSK0GcOynZeP4r4', 'sptB3bK7IUN0kDLPw7x', 'e5EPviKox1kQB6ixIAF'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, dchRS8kYKCuUFvMeYKo.csHigh entropy of concatenated method names: 'RtlInitUnicodeString', 'LdrLoadDll', 'RtlZeroMemory', 'NtQueryInformationProcess', 'SDxkUBbiHE', 'NtProtectVirtualMemory', 'I8nwoCmh3WtsrBd4EDA', 'eo0ClZmub0huka9LYXJ', 'z2ML5bmbuhl8TBQqNQG', 'bvTkE2mK2JgEW7j3j89'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, Bb3eG17mn37ccoMRyGH.csHigh entropy of concatenated method names: 'b817LOdW9C', 'wZ7aMfLlywMtL0ExbET', 'bI48eRLqFQKhOnHbq8I', 'ocsqjlL5OerFM5cFsgo', 'hZHB3bLA2MSkg49773c', 'QgJowpLRCONZChwc3if', 'g4yKENLXD3WBjJeAPx2', 'RbYtGcgdcp85tAyIBON', 'uKf10LgzDCU7ZroGMfs'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, fa7YES5MKyHDZY2ekR5.csHigh entropy of concatenated method names: 'ksg5JRCDcj', 'sRGUlBUW9WsGGir02gj', 'suy71sUHcJMcFT7YUsW', 'MmT3gZUvYUrdNTnS1LY', 'ei50PgUsNyGeGfPaWRE', 'LWMNFHUDPgxAbUwZLX2', 'ICZCLpUZNKJTeTyah6K', 'QyTAR8U3EtOl4ShkYeD', 'Sx4qOWUB2YHTyW9Qiur', 'vu75VPU67cyMRdk6mO1'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, u7enb8XYRplvQqq8kwi.csHigh entropy of concatenated method names: 'H4yXUqbn0S', 'e4fXCCGS3v', 'cDKI1SC6qLfves8RXa2', 'Eig51kC3XEY7e1TjJNk', 'C30iSICBce6gwNUWmNV', 'THY2mLCtERwkTShfwDy', 'dkGZ3WCGh5ECAt1uFGw', 'Y9xvZbCTVrgGgfcxFh2', 'e2a2ywCSLZ6VnqbMokE', 'M7kMbcCca7AjCI6oY3X'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, CavLDy7t0PfAWyOn1Kn.csHigh entropy of concatenated method names: 'koM7TYcTtR', 'p3YKw3LFyTEd3PJv9Sq', 'dV3FjrLIoOdSQ2FmfsS', 'WaWMlKLdLTOtRaJOrxV', 'ynSSJXLzKTYEoPLYYXU', 'QO4sqZblbGIcddfcN26', 'w13UyObqGUIVcsBKtuc', 'xVeEq8b51a8ywOBaudi', 'x49jEXbAKCXWsAjVBAN', 'nTXmdObRREFnBJQb98f'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, nsZoj9oe9ZsCl44kerP.csHigh entropy of concatenated method names: 'ljBo2GxDGq', 'acgophEupk', 'V3k3fabTH7B0A7u50ZN', 'WCVhoAbSQBFqex3bV5j', 'RsdoOtbtKOdPaH1qfdC', 'mbKwuabGDll2oIbWTu5', 'kO1oQbbcj52o6rv0ybu', 'LACGAbbEAMnNfmDdFqb', 'mSnXIHbr1dyJ2osUddy', 'aTbRj6bnUmvrLXOYMis'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, kYsaPBwLU1kZHMd1DEx.csHigh entropy of concatenated method names: 'hi9sjyIGgA', 'iVns462NVp', 'egmq6yhI6g22koSJO8J', 'a5nRKrhdaEdRPAwp2Zn', 'jgZ77xhz2Hlks6AjfxO', 'vDFQk8uleRGGZLmb1v3', 'diE1Xeuq4LgXTputVjp', 'Qt3Qdou5X9YlLi2QUNf'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, mrPelIwzkCxvXlL01Ad.csHigh entropy of concatenated method names: 'BZl8MZe1j7', 'gRt8YMZAjg', 'beJ8J6LOK9', 'O8W8UAqeSe', 'MDK8C2DRVm', 'xer8xOs8gv', 'iLx8mHIfik', 'XE6PaE3WLQ', 'cjV8gLdVVL', 'bSB8LFK9lX'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, uVjknGoLDJAevp2PjYV.csHigh entropy of concatenated method names: 'lBDsKd2R0v', 'zc3rvKh0q85TlmaUikV', 'UlImndheLNtNBxC5gvh', 'GdLvUkh8HPNd427ie4C', 'DhHxoBh2jjajXEUrvXq', 'hwictohpxAwfT0wkGF5', 'GVxAMThQ9r82MXGAx80', 'VS3g2ThyYEAlkFhr02O', 'Acwejfh1ik8y3qcVjcl', 'LnTetYhOMJjeUYYo8ap'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, nxaAys7H7LNQDnUsL2a.csHigh entropy of concatenated method names: 'G5F7ZNbYO3', 'xXU73hQfK2', 'icE7sOPPJA', 'D9s7DWCdgQ', 'l1rnGCLBLGTRxwQVNkh', 'A6uMyUL6KCntacEywjm', 'IiJrnoLt53P8rH0WvtG', 'IWc0akLGVu36niModwh', 'P53gqnLTNDblIPyxMxD', 'CnmqXMLSNOfW9mb85Uw'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, nxJoyfVwv5LVgyyAgJ.csHigh entropy of concatenated method names: 'y4hMRc9sl', 'yulYLGwYE', 'fmRUoWMPx', 'dKfJcCet8', 'MASi6fURa4xwWVZL3D1', 'WuLgp3UXpcUWDxjrL86', 'cXPb7PUkkng6WvH9Tuo', 'yUuPmxUiSEmYDNVV6Df', 'F6JUcfU9AFFMWtWNkVE', 'feRc8NU7LXohPbJGMl1'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, X7dEYHXL4O5QQ6PXQhh.csHigh entropy of concatenated method names: 'soCXKvsdiD', 'glXXhmjSMA', 'M7VXucJyK9', 'i5hXjk4Ym5', 'hPiX4Fous7', 'VY117Kx5Prsn5hW8OPW', 'gkaYA3xAkSUdsm8OYcZ', 's99IVxxRkO6kiqv7PU0', 'ySRXHoxX5BNdbxi92lg', 'i93MISxkHvcUaTG6gZ4'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, PNbyS4oaWeCbiWuOyQK.csHigh entropy of concatenated method names: 'I6qoYibUmo', 'VBjoJGYkOW', 'tZc17CKpQVvpv7UrdPs', 'GlRciwK1BIvPL6oHYGG', 'qiEfPSKOSL46eFOaVO1', 'm0Fb05K87KnLvVEx6Cm', 'fW5dTKK2QLLjv2jT4eZ', 'C3SLhwKVQnBMjqfGBe7', 'SRDUPHKamxf27ltwYtn'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, oNTyYC7ruqK8r69YJWv.csHigh entropy of concatenated method names: 'HZp7FFSoy4', 'fq0ypsb0aYwV2em0KNV', 'HOD1RSbemEvhIy7rkv6', 'JL16Aub8dwGU4BuuAxR', 'YDrWLBb2i9s5Hm2jc75', 'tBIX8KbpIli0Bqa13xq', 'TduhHVb12fiKbhwPqH2', 'etH7LmbQiuKSxW8ecPK', 'QH0cAfbyMW8vR0TfVnT'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, GAxVw87jov1wdeRPgnQ.csHigh entropy of concatenated method names: 'S9u7Wo7wDi', 'm2ocRdLj2d7ejDZJpf8', 'SPWYWcL4ZL4XpS4nNBa', 'eGE9v1LWFoNymVJOtNS', 'lh3jWgLHpDtlXOLr6Ff', 'cCoUT6LvXddvBISExYw', 'GXQHHsLsEqvGJ2FXXt4', 'wWEWc9LhSrvtnLeHB0k', 'OTi4EiLutxGJFiUaDeQ'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, SwJyAx7bB0A8nbTChje.csHigh entropy of concatenated method names: 'Wdm7htNKqH', 'uoJ7uVOWm2', 'kUOcDLLi81igW08hOnS', 'VCf0aaL99GLXCTpihQy', 'Q4TfFPL7VSA6CL2lMcl', 'CmEYdhLoXAspbRsy39i', 'La4D74LNcMUgPZVpT73', 'TXGHYWLwCnCvcj3AGDk', 'jqA3oxLP4HJYEJRQMXU', 'kSYViRLfNnNq8sEM3Oi'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, nKCVQc7I3ZwfV63BsQl.csHigh entropy of concatenated method names: 'VFq7zLZoow', 'JmIoqq5TUg', 'eYPollco7o', 'R8rOoDbMCpLwhrgTcyC', 'vwgLYWbVmLkLq1V46xM', 'BHPOIDbaVHS8erDlLLB', 'pfCP9bbYl3UpFpYye66', 'Yl3C54bJs5a2hUhg1Gc', 'EdRhVjbUM5wXpfuFcOA'
              Source: 0.2.SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe.3b4b398.4.raw.unpack, eN4xdEooxKqKduIBp5H.csHigh entropy of concatenated method names: 'C5Xowa8Kbj', 'pjy9Vtbug9Jk7Zx1hIP', 'L5YCH0bjHk7m6wmu1Fo', 'm7HHPeb4r91itPEcRXX', 'OPvAxZbW4n0YIU84Z08', 'PkxaGPbHSpTaU34cPoM', 'zIV6hVbvXldtXlX8Kuq', 'T7ZsCUbKedSDfdUbjke', 'YMxyJ3bhVRRSspSTlpX'
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeFile created: C:\Users\user\AppData\Roaming\Vsjrhifhpua.exeJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run VsjrhifhpuaJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run VsjrhifhpuaJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe PID: 2668, type: MEMORYSTR
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002DF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: EXPLORERJSBIEDLL.DLLKCUCKOOMON.DLLLWIN32_PROCESS.HANDLE='{0}'MPARENTPROCESSIDNCMDOSELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILUREPVERSIONQSERIALNUMBERSVMWARE|VIRTUAL|A M I|XENTSELECT * FROM WIN32_COMPUTERSYSTEMUMANUFACTURERVMODELWMICROSOFT|VMWARE|VIRTUALXJOHNYANNAZXXXXXXXX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeMemory allocated: F60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeMemory allocated: 2A00000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeMemory allocated: FB0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2CE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2F10000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 4F10000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002DF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: crosoft|VMWare|VirtualH
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002DF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $]q 1:en-CH:VMware|VIRTUAL|A M I|Xen
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002DF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $]q 1:en-CH:Microsoft|VMWare|Virtual
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002DF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002DF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002DF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWareLR]q
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002DF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen(_]q
              Source: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: explorerJSbieDll.dllKcuckoomon.dllLwin32_process.handle='{0}'MParentProcessIdNcmdOselect * from Win32_BIOS8Unexpected WMI query failurePversionQSerialNumberSVMware|VIRTUAL|A M I|XenTselect * from Win32_ComputerSystemUmanufacturerVmodelWMicrosoft|VMWare|VirtualXjohnYannaZxxxxxxxx
              Source: InstallUtil.exe, 00000002.00000002.3347479169.0000000005600000.00000004.08000000.00040000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.3343809026.0000000004089000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.3343809026.00000000041FD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qWxObqgzxIqemUDIBsD
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 486000Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 488000Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: C41008Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Windows Management Instrumentation
              1
              Registry Run Keys / Startup Folder
              211
              Process Injection
              1
              Masquerading
              OS Credential Dumping221
              Security Software Discovery
              Remote Services11
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              Registry Run Keys / Startup Folder
              3
              Virtualization/Sandbox Evasion
              LSASS Memory3
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              1
              Disable or Modify Tools
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook211
              Process Injection
              NTDS32
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Obfuscated Files or Information
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe24%ReversingLabs
              SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\Vsjrhifhpua.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\Vsjrhifhpua.exe24%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
              https://stackoverflow.com/q/2152978/233540%URL Reputationsafe
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              https://github.com/mgravell/protobuf-netSecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpfalse
                unknown
                https://mathparser.orgVsjrhifhpua.exe.0.drfalse
                  unknown
                  https://mathparser.org/order-commercial-licenseVsjrhifhpua.exe.0.drfalse
                    unknown
                    https://payhip.com/infimaVsjrhifhpua.exe.0.drfalse
                      unknown
                      https://github.com/mgravell/protobuf-netiSecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        https://stackoverflow.com/q/14436606/23354SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://github.com/mgravell/protobuf-netJSecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2111022730.0000000002A01000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://payhip.com/infima)SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, Vsjrhifhpua.exe.0.drfalse
                            unknown
                            https://stackoverflow.com/q/11564914/23354;SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://stackoverflow.com/q/2152978/23354SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2126155718.0000000004ED0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe, 00000000.00000002.2121927398.0000000003DD9000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            No contacted IP infos
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1527747
                            Start date and time:2024-10-07 09:28:15 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 14s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:8
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
                            Detection:MAL
                            Classification:mal100.evad.winEXE@4/2@0/0
                            EGA Information:
                            • Successful, ratio: 50%
                            HCA Information:
                            • Successful, ratio: 95%
                            • Number of executed functions: 365
                            • Number of non-executed functions: 45
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target InstallUtil.exe, PID 5016 because it is empty
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • VT rate limit hit for: SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
                            TimeTypeDescription
                            09:29:16AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Vsjrhifhpua C:\Users\user\AppData\Roaming\Vsjrhifhpua.exe
                            09:29:37AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Vsjrhifhpua C:\Users\user\AppData\Roaming\Vsjrhifhpua.exe
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):2824192
                            Entropy (8bit):6.966618836220102
                            Encrypted:false
                            SSDEEP:49152:sgpIAVQ/Dia7zcEAA4OTeETOZPKhA1bbxp4AhuwXNLZrFIi:swIAVQ/Dia7z/n4/Z99bxzpNLZr
                            MD5:97139B2E30DDB1601C2D64C3CF150979
                            SHA1:52969D39FA83B12CC8A3066E0202B25E4EB3F4B5
                            SHA-256:37FC573D1110DC7CEEA81FD4863EB87F228229615B348B3ED6B1D4A125C92F10
                            SHA-512:4AE85E8C46146007E6E9D95FA2DA4BD0FEE0462453A91D6418989D576AB8D3DD1005F63AE7F0DA3906DCE4CABA55B5448E820600E149E6815CC55BB85456A8E7
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 24%
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...tn.g..................+..........,+.. ...@+...@.. ........................+...........`.................................`,+.K....@+......................`+...................................................... ............... ..H............text.....+.. ....+................. ..`.rsrc........@+.......+.............@..@.reloc.......`+.......+.............@..B.................,+.....H...........P...........<....^...........................................*...(....*...(....*.(....(....*.0.......... ........8........E............A...........8....*8<... ....8.......(....:.... ....~....{/...9....& ....8....s....z.....(......r...p(......... ....~....{....:q...& ....8f...(....(....(....r...p(...... ....~....{....:7...& ....8,......0..U....... ........8........E............8....*~..........(....& ....~....{....:....& ....8.........(....*:........o....*.:.......
                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Reputation:high, very likely benign file
                            Preview:[ZoneTransfer]....ZoneId=0
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):6.966618836220102
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
                            File size:2'824'192 bytes
                            MD5:97139b2e30ddb1601c2d64c3cf150979
                            SHA1:52969d39fa83b12cc8a3066e0202b25e4eb3f4b5
                            SHA256:37fc573d1110dc7ceea81fd4863eb87f228229615b348b3ed6b1d4a125c92f10
                            SHA512:4ae85e8c46146007e6e9d95fa2da4bd0fee0462453a91d6418989d576ab8d3dd1005f63ae7f0da3906dce4caba55b5448e820600e149e6815cc55bb85456a8e7
                            SSDEEP:49152:sgpIAVQ/Dia7zcEAA4OTeETOZPKhA1bbxp4AhuwXNLZrFIi:swIAVQ/Dia7z/n4/Z99bxzpNLZr
                            TLSH:6DD54B03BADA49A1E1E62775CDBB0C280761FE517633FE1E250A13CA05137799B68F27
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...tn.g..................+..........,+.. ...@+...@.. ........................+...........`................................
                            Icon Hash:00928e8e8686b000
                            Entrypoint:0x6b2cae
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x67036E74 [Mon Oct 7 05:15:32 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x2b2c600x4b.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x2b40000x598.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x2b60000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x2b0cb40x2b0e00d02916367ba14d65be3031de63d5ea64unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x2b40000x5980x600e0afc892e5aec3bd0b2ad80fe773b3c2False0.416015625data4.042923876682927IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x2b60000xc0x200b4f73406dd7526d321bc58a19d626f09False0.044921875MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "+"0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_VERSION0x2b40a00x30cdata0.4282051282051282
                            RT_MANIFEST0x2b43ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            DLLImport
                            mscoree.dll_CorExeMain
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:03:29:11
                            Start date:07/10/2024
                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan-Spy.MSIL.Agent.14880.3646.exe"
                            Imagebase:0x340000
                            File size:2'824'192 bytes
                            MD5 hash:97139B2E30DDB1601C2D64C3CF150979
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2127423069.0000000005250000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2111022730.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:03:29:13
                            Start date:07/10/2024
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                            Imagebase:0xbd0000
                            File size:42'064 bytes
                            MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:false

                            Target ID:5
                            Start time:03:29:14
                            Start date:07/10/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1144
                            Imagebase:0x750000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:13%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:9.6%
                              Total number of Nodes:520
                              Total number of Limit Nodes:24
                              execution_graph 62212 4ecb0ec 62214 4ecacff 62212->62214 62213 4ecad07 62213->62213 62214->62213 62217 4fcdf68 62214->62217 62237 4fcdf58 62214->62237 62218 4fcdf7d 62217->62218 62221 4fcdf93 62218->62221 62257 4fcf45c 62218->62257 62261 4fceba0 62218->62261 62265 4fced47 62218->62265 62269 4fced87 62218->62269 62273 4fcf766 62218->62273 62277 4fcf6e6 62218->62277 62282 4fcf8c8 62218->62282 62287 4fceb8f 62218->62287 62291 4fcf92e 62218->62291 62296 4fceb73 62218->62296 62300 4fcf3d2 62218->62300 62305 4fcf971 62218->62305 62310 4fcfc16 62218->62310 62314 4fce8b5 62218->62314 62318 4fceb9b 62218->62318 62322 4fcfa3a 62218->62322 62327 4fce83e 62218->62327 62221->62214 62238 4fcdf7d 62237->62238 62239 4fcdf93 62238->62239 62240 4fcf45c 2 API calls 62238->62240 62241 4fce83e 2 API calls 62238->62241 62242 4fcfa3a 2 API calls 62238->62242 62243 4fceb9b 2 API calls 62238->62243 62244 4fce8b5 2 API calls 62238->62244 62245 4fcfc16 2 API calls 62238->62245 62246 4fcf971 2 API calls 62238->62246 62247 4fcf3d2 2 API calls 62238->62247 62248 4fceb73 2 API calls 62238->62248 62249 4fcf92e 2 API calls 62238->62249 62250 4fceb8f 2 API calls 62238->62250 62251 4fcf8c8 2 API calls 62238->62251 62252 4fcf6e6 2 API calls 62238->62252 62253 4fcf766 2 API calls 62238->62253 62254 4fced87 2 API calls 62238->62254 62255 4fced47 2 API calls 62238->62255 62256 4fceba0 2 API calls 62238->62256 62239->62214 62240->62239 62241->62239 62242->62239 62243->62239 62244->62239 62245->62239 62246->62239 62247->62239 62248->62239 62249->62239 62250->62239 62251->62239 62252->62239 62253->62239 62254->62239 62255->62239 62256->62239 62258 4fce8be 62257->62258 62331 55a21d0 62258->62331 62336 55a21c0 62258->62336 62262 4fce8be 62261->62262 62263 55a21d0 2 API calls 62262->62263 62264 55a21c0 2 API calls 62262->62264 62263->62262 62264->62262 62266 4fce8be 62265->62266 62267 55a21d0 2 API calls 62266->62267 62268 55a21c0 2 API calls 62266->62268 62267->62266 62268->62266 62270 4fce8be 62269->62270 62270->62269 62271 55a21d0 2 API calls 62270->62271 62272 55a21c0 2 API calls 62270->62272 62271->62270 62272->62270 62274 4fce8be 62273->62274 62275 55a21d0 2 API calls 62274->62275 62276 55a21c0 2 API calls 62274->62276 62275->62274 62276->62274 62279 4fce8be 62277->62279 62278 4fceb14 62279->62277 62279->62278 62280 55a21d0 2 API calls 62279->62280 62281 55a21c0 2 API calls 62279->62281 62280->62279 62281->62279 62283 4fce8be 62282->62283 62284 4fcf5e5 62283->62284 62285 55a21d0 2 API calls 62283->62285 62286 55a21c0 2 API calls 62283->62286 62284->62221 62285->62283 62286->62283 62288 4fce8be 62287->62288 62289 55a21d0 2 API calls 62288->62289 62290 55a21c0 2 API calls 62288->62290 62289->62288 62290->62288 62292 4fce8be 62291->62292 62293 4fcfd29 62291->62293 62294 55a21d0 2 API calls 62292->62294 62295 55a21c0 2 API calls 62292->62295 62294->62292 62295->62292 62297 4fce8be 62296->62297 62298 55a21d0 2 API calls 62297->62298 62299 55a21c0 2 API calls 62297->62299 62298->62297 62299->62297 62301 4fce8be 62300->62301 62302 4fceb14 62301->62302 62303 55a21d0 2 API calls 62301->62303 62304 55a21c0 2 API calls 62301->62304 62303->62301 62304->62301 62306 4fcf9af 62305->62306 62349 4fc1466 62306->62349 62353 4fc1470 62306->62353 62311 4fce8be 62310->62311 62312 55a21d0 2 API calls 62311->62312 62313 55a21c0 2 API calls 62311->62313 62312->62311 62313->62311 62315 4fce8be 62314->62315 62316 55a21d0 2 API calls 62315->62316 62317 55a21c0 2 API calls 62315->62317 62316->62315 62317->62315 62319 4fce8be 62318->62319 62320 55a21d0 2 API calls 62319->62320 62321 55a21c0 2 API calls 62319->62321 62320->62319 62321->62319 62323 4fcfa40 62322->62323 62324 4fcfaff 62323->62324 62357 4fc169c 62323->62357 62361 4fc16a8 62323->62361 62328 4fce849 62327->62328 62329 55a21d0 2 API calls 62328->62329 62330 55a21c0 2 API calls 62328->62330 62329->62328 62330->62328 62332 55a21e5 62331->62332 62341 4fc11be 62332->62341 62345 4fc11c8 62332->62345 62337 55a21d0 62336->62337 62339 4fc11be CopyFileA 62337->62339 62340 4fc11c8 CopyFileA 62337->62340 62338 55a2203 62338->62258 62339->62338 62340->62338 62343 4fc11c8 CopyFileA 62341->62343 62344 4fc1355 62343->62344 62346 4fc1224 CopyFileA 62345->62346 62348 4fc1355 62346->62348 62351 4fc1470 RegOpenKeyExA 62349->62351 62352 4fc15aa 62351->62352 62354 4fc14cf RegOpenKeyExA 62353->62354 62356 4fc15aa 62354->62356 62358 4fc16a8 RegSetValueExA 62357->62358 62360 4fc181a 62358->62360 62362 4fc170d RegSetValueExA 62361->62362 62364 4fc181a 62362->62364 62493 55a467b 62495 55a45f8 62493->62495 62494 55a4690 62495->62494 62500 55a4b72 62495->62500 62535 55a4af0 62495->62535 62572 55a4b80 62495->62572 62496 55a4623 62501 55a4b80 62500->62501 62607 55a4ca8 62501->62607 62611 55a4d75 62501->62611 62615 55a5b34 62501->62615 62619 55a4e74 62501->62619 62623 55a4cf6 62501->62623 62627 55a59f1 62501->62627 62632 55a4f31 62501->62632 62636 55a5870 62501->62636 62641 55a4df3 62501->62641 62646 55a5733 62501->62646 62651 55a4d3c 62501->62651 62655 55a57be 62501->62655 62659 55a4eb8 62501->62659 62663 55a5138 62501->62663 62668 55a5c7b 62501->62668 62672 55a58fa 62501->62672 62676 55a54ba 62501->62676 62680 55a5280 62501->62680 62684 55a5c42 62501->62684 62688 55a540f 62501->62688 62692 55a5209 62501->62692 62696 55a5655 62501->62696 62701 55a5053 62501->62701 62708 55a52dc 62501->62708 62712 55a5adf 62501->62712 62716 55a5818 62501->62716 62720 55a5aa7 62501->62720 62724 55a4da6 62501->62724 62728 55a5361 62501->62728 62732 55a51a2 62501->62732 62738 55a516c 62501->62738 62742 55a5468 62501->62742 62502 55a4bb7 62502->62496 62536 55a4b51 62535->62536 62537 55a4af3 62535->62537 62538 55a4b53 62536->62538 62540 55a5818 2 API calls 62536->62540 62541 55a5adf 2 API calls 62536->62541 62542 55a52dc 2 API calls 62536->62542 62543 55a5053 4 API calls 62536->62543 62544 55a5655 2 API calls 62536->62544 62545 55a5209 2 API calls 62536->62545 62546 55a540f 2 API calls 62536->62546 62547 55a5c42 2 API calls 62536->62547 62548 55a5280 2 API calls 62536->62548 62549 55a54ba 2 API calls 62536->62549 62550 55a58fa 2 API calls 62536->62550 62551 55a5c7b 2 API calls 62536->62551 62552 55a5138 2 API calls 62536->62552 62553 55a4eb8 2 API calls 62536->62553 62554 55a57be 2 API calls 62536->62554 62555 55a4d3c 2 API calls 62536->62555 62556 55a5733 2 API calls 62536->62556 62557 55a4df3 2 API calls 62536->62557 62558 55a5870 2 API calls 62536->62558 62559 55a4f31 2 API calls 62536->62559 62560 55a59f1 2 API calls 62536->62560 62561 55a4cf6 2 API calls 62536->62561 62562 55a4e74 2 API calls 62536->62562 62563 55a5b34 2 API calls 62536->62563 62564 55a4d75 2 API calls 62536->62564 62565 55a4ca8 2 API calls 62536->62565 62566 55a5468 2 API calls 62536->62566 62567 55a516c 2 API calls 62536->62567 62568 55a51a2 4 API calls 62536->62568 62569 55a5361 2 API calls 62536->62569 62570 55a4da6 2 API calls 62536->62570 62571 55a5aa7 2 API calls 62536->62571 62537->62496 62538->62496 62539 55a4bb7 62539->62496 62540->62539 62541->62539 62542->62539 62543->62539 62544->62539 62545->62539 62546->62539 62547->62539 62548->62539 62549->62539 62550->62539 62551->62539 62552->62539 62553->62539 62554->62539 62555->62539 62556->62539 62557->62539 62558->62539 62559->62539 62560->62539 62561->62539 62562->62539 62563->62539 62564->62539 62565->62539 62566->62539 62567->62539 62568->62539 62569->62539 62570->62539 62571->62539 62573 55a4b95 62572->62573 62575 55a5818 2 API calls 62573->62575 62576 55a5adf 2 API calls 62573->62576 62577 55a52dc 2 API calls 62573->62577 62578 55a5053 4 API calls 62573->62578 62579 55a5655 2 API calls 62573->62579 62580 55a5209 2 API calls 62573->62580 62581 55a540f 2 API calls 62573->62581 62582 55a5c42 2 API calls 62573->62582 62583 55a5280 2 API calls 62573->62583 62584 55a54ba 2 API calls 62573->62584 62585 55a58fa 2 API calls 62573->62585 62586 55a5c7b 2 API calls 62573->62586 62587 55a5138 2 API calls 62573->62587 62588 55a4eb8 2 API calls 62573->62588 62589 55a57be 2 API calls 62573->62589 62590 55a4d3c 2 API calls 62573->62590 62591 55a5733 2 API calls 62573->62591 62592 55a4df3 2 API calls 62573->62592 62593 55a5870 2 API calls 62573->62593 62594 55a4f31 2 API calls 62573->62594 62595 55a59f1 2 API calls 62573->62595 62596 55a4cf6 2 API calls 62573->62596 62597 55a4e74 2 API calls 62573->62597 62598 55a5b34 2 API calls 62573->62598 62599 55a4d75 2 API calls 62573->62599 62600 55a4ca8 2 API calls 62573->62600 62601 55a5468 2 API calls 62573->62601 62602 55a516c 2 API calls 62573->62602 62603 55a51a2 4 API calls 62573->62603 62604 55a5361 2 API calls 62573->62604 62605 55a4da6 2 API calls 62573->62605 62606 55a5aa7 2 API calls 62573->62606 62574 55a4bb7 62574->62496 62575->62574 62576->62574 62577->62574 62578->62574 62579->62574 62580->62574 62581->62574 62582->62574 62583->62574 62584->62574 62585->62574 62586->62574 62587->62574 62588->62574 62589->62574 62590->62574 62591->62574 62592->62574 62593->62574 62594->62574 62595->62574 62596->62574 62597->62574 62598->62574 62599->62574 62600->62574 62601->62574 62602->62574 62603->62574 62604->62574 62605->62574 62606->62574 62608 55a4cb9 62607->62608 62746 4fdf8a9 62608->62746 62750 4fdf8b0 62608->62750 62612 55a4d02 62611->62612 62612->62611 62613 4fdf8a9 NtResumeThread 62612->62613 62614 4fdf8b0 NtResumeThread 62612->62614 62613->62612 62614->62612 62616 55a4d02 62615->62616 62617 4fdf8a9 NtResumeThread 62616->62617 62618 4fdf8b0 NtResumeThread 62616->62618 62617->62616 62618->62616 62620 55a4d02 62619->62620 62621 4fdf8a9 NtResumeThread 62620->62621 62622 4fdf8b0 NtResumeThread 62620->62622 62621->62620 62622->62620 62624 55a4d02 62623->62624 62625 4fdf8a9 NtResumeThread 62624->62625 62626 4fdf8b0 NtResumeThread 62624->62626 62625->62624 62626->62624 62628 55a5a09 62627->62628 62754 4fdf698 62628->62754 62758 4fdf691 62628->62758 62629 55a5a36 62629->62502 62633 55a4d02 62632->62633 62634 4fdf8a9 NtResumeThread 62633->62634 62635 4fdf8b0 NtResumeThread 62633->62635 62634->62633 62635->62633 62637 55a587d 62636->62637 62638 55a5655 62636->62638 62638->62636 62762 4fdf531 62638->62762 62766 4fdf538 62638->62766 62642 55a4e10 62641->62642 62644 4fdf698 WriteProcessMemory 62642->62644 62645 4fdf691 WriteProcessMemory 62642->62645 62643 55a4e50 62643->62502 62644->62643 62645->62643 62647 55a5750 62646->62647 62649 4fdf698 WriteProcessMemory 62647->62649 62650 4fdf691 WriteProcessMemory 62647->62650 62648 55a513d 62648->62502 62649->62648 62650->62648 62652 55a4d02 62651->62652 62653 4fdf8a9 NtResumeThread 62652->62653 62654 4fdf8b0 NtResumeThread 62652->62654 62653->62652 62654->62652 62656 55a4d02 62655->62656 62657 4fdf8a9 NtResumeThread 62656->62657 62658 4fdf8b0 NtResumeThread 62656->62658 62657->62656 62658->62656 62660 55a4d02 62659->62660 62661 4fdf8a9 NtResumeThread 62660->62661 62662 4fdf8b0 NtResumeThread 62660->62662 62661->62660 62662->62660 62665 55a5655 62663->62665 62664 55a587d 62665->62664 62666 4fdf538 VirtualAllocEx 62665->62666 62667 4fdf531 VirtualAllocEx 62665->62667 62666->62665 62667->62665 62669 55a4d02 62668->62669 62670 4fdf8a9 NtResumeThread 62669->62670 62671 4fdf8b0 NtResumeThread 62669->62671 62670->62669 62671->62669 62673 55a4d02 62672->62673 62674 4fdf8a9 NtResumeThread 62673->62674 62675 4fdf8b0 NtResumeThread 62673->62675 62674->62673 62675->62673 62677 55a4d02 62676->62677 62678 4fdf8a9 NtResumeThread 62677->62678 62679 4fdf8b0 NtResumeThread 62677->62679 62678->62677 62679->62677 62681 55a4d02 62680->62681 62682 4fdf8a9 NtResumeThread 62681->62682 62683 4fdf8b0 NtResumeThread 62681->62683 62682->62681 62683->62681 62685 55a4d02 62684->62685 62686 4fdf8a9 NtResumeThread 62685->62686 62687 4fdf8b0 NtResumeThread 62685->62687 62686->62685 62687->62685 62689 55a4d02 62688->62689 62690 4fdf8a9 NtResumeThread 62689->62690 62691 4fdf8b0 NtResumeThread 62689->62691 62690->62689 62691->62689 62693 55a4d02 62692->62693 62694 4fdf8a9 NtResumeThread 62693->62694 62695 4fdf8b0 NtResumeThread 62693->62695 62694->62693 62695->62693 62697 55a565f 62696->62697 62697->62696 62698 55a587d 62697->62698 62699 4fdf538 VirtualAllocEx 62697->62699 62700 4fdf531 VirtualAllocEx 62697->62700 62699->62697 62700->62697 62702 55a506b 62701->62702 62770 55a6158 62702->62770 62776 55a6148 62702->62776 62703 55a4d02 62704 4fdf8a9 NtResumeThread 62703->62704 62705 4fdf8b0 NtResumeThread 62703->62705 62704->62703 62705->62703 62709 55a4d02 62708->62709 62710 4fdf8a9 NtResumeThread 62709->62710 62711 4fdf8b0 NtResumeThread 62709->62711 62710->62709 62711->62709 62713 55a4d02 62712->62713 62714 4fdf8a9 NtResumeThread 62713->62714 62715 4fdf8b0 NtResumeThread 62713->62715 62714->62713 62715->62713 62805 55a77ff 62716->62805 62810 55a7810 62716->62810 62717 55a5830 62721 55a4d02 62720->62721 62722 4fdf8a9 NtResumeThread 62721->62722 62723 4fdf8b0 NtResumeThread 62721->62723 62722->62721 62723->62721 62725 55a4d02 62724->62725 62726 4fdf8a9 NtResumeThread 62725->62726 62727 4fdf8b0 NtResumeThread 62725->62727 62726->62725 62727->62725 62729 55a4d02 62728->62729 62730 4fdf8a9 NtResumeThread 62729->62730 62731 4fdf8b0 NtResumeThread 62729->62731 62730->62729 62731->62729 62736 4fdefd8 Wow64SetThreadContext 62732->62736 62737 4fdefd0 Wow64SetThreadContext 62732->62737 62733 55a4d02 62734 4fdf8a9 NtResumeThread 62733->62734 62735 4fdf8b0 NtResumeThread 62733->62735 62734->62733 62735->62733 62736->62733 62737->62733 62739 55a4d02 62738->62739 62740 4fdf8a9 NtResumeThread 62739->62740 62741 4fdf8b0 NtResumeThread 62739->62741 62740->62739 62741->62739 62743 55a4d02 62742->62743 62744 4fdf8a9 NtResumeThread 62743->62744 62745 4fdf8b0 NtResumeThread 62743->62745 62744->62743 62745->62743 62747 4fdf8b0 NtResumeThread 62746->62747 62749 4fdf950 62747->62749 62749->62608 62751 4fdf8f9 NtResumeThread 62750->62751 62753 4fdf950 62751->62753 62753->62608 62755 4fdf6e4 WriteProcessMemory 62754->62755 62757 4fdf77d 62755->62757 62757->62629 62759 4fdf698 WriteProcessMemory 62758->62759 62761 4fdf77d 62759->62761 62761->62629 62763 4fdf538 VirtualAllocEx 62762->62763 62765 4fdf5f4 62763->62765 62765->62638 62767 4fdf57c VirtualAllocEx 62766->62767 62769 4fdf5f4 62767->62769 62769->62638 62771 55a616f 62770->62771 62772 55a6191 62771->62772 62782 55a643e 62771->62782 62787 55a63f1 62771->62787 62792 55a638d 62771->62792 62772->62703 62777 55a616f 62776->62777 62778 55a6191 62777->62778 62779 55a643e 2 API calls 62777->62779 62780 55a638d 2 API calls 62777->62780 62781 55a63f1 2 API calls 62777->62781 62778->62703 62779->62778 62780->62778 62781->62778 62783 55a642b 62782->62783 62797 4fdec14 62783->62797 62801 4fdec20 62783->62801 62788 55a6419 62787->62788 62790 4fdec14 CreateProcessA 62788->62790 62791 4fdec20 CreateProcessA 62788->62791 62789 55a67c4 62790->62789 62791->62789 62793 55a6393 62792->62793 62795 4fdec14 CreateProcessA 62793->62795 62796 4fdec20 CreateProcessA 62793->62796 62794 55a67c4 62795->62794 62796->62794 62799 4fdeca0 CreateProcessA 62797->62799 62800 4fdee9c 62799->62800 62802 4fdeca0 CreateProcessA 62801->62802 62804 4fdee9c 62802->62804 62806 55a7810 62805->62806 62815 4fdefd8 62806->62815 62819 4fdefd0 62806->62819 62807 55a783e 62807->62717 62811 55a7825 62810->62811 62813 4fdefd8 Wow64SetThreadContext 62811->62813 62814 4fdefd0 Wow64SetThreadContext 62811->62814 62812 55a783e 62812->62717 62813->62812 62814->62812 62816 4fdf021 Wow64SetThreadContext 62815->62816 62818 4fdf099 62816->62818 62818->62807 62820 4fdf021 Wow64SetThreadContext 62819->62820 62822 4fdf099 62820->62822 62822->62807 62370 2902518 62371 2902535 62370->62371 62372 2902545 62371->62372 62376 2907812 62371->62376 62381 290716f 62371->62381 62385 2909dd4 62371->62385 62389 4e51190 62376->62389 62397 4e51150 62376->62397 62401 4e51140 62376->62401 62377 2907833 62382 290718e 62381->62382 62414 290f758 62382->62414 62388 290f758 VirtualProtect 62385->62388 62386 2904397 62386->62385 62387 2909e01 62386->62387 62388->62386 62390 4e51157 62389->62390 62393 4e5119f 62389->62393 62396 4e51190 2 API calls 62390->62396 62391 4e5117d 62391->62377 62392 4e51283 62392->62377 62406 4e512a0 62393->62406 62410 4e512a8 62393->62410 62396->62391 62398 4e51165 62397->62398 62400 4e51190 2 API calls 62398->62400 62399 4e5117d 62399->62377 62400->62399 62402 4e51107 62401->62402 62403 4e5114f 62401->62403 62402->62377 62405 4e51190 2 API calls 62403->62405 62404 4e5117d 62404->62377 62405->62404 62407 4e512ec VirtualAlloc 62406->62407 62409 4e51359 62407->62409 62409->62392 62411 4e512ec VirtualAlloc 62410->62411 62413 4e51359 62411->62413 62413->62392 62416 290f77f 62414->62416 62418 290fc58 62416->62418 62419 290fca1 VirtualProtect 62418->62419 62421 2902e96 62419->62421 62422 4ecb2fd 62423 4ecb307 62422->62423 62427 4fc9310 62423->62427 62432 4fc9300 62423->62432 62424 4ecb345 62428 4fc9325 62427->62428 62437 4fc9350 62428->62437 62442 4fc9340 62428->62442 62429 4fc933b 62429->62424 62433 4fc9310 62432->62433 62435 4fc9350 2 API calls 62433->62435 62436 4fc9340 2 API calls 62433->62436 62434 4fc933b 62434->62424 62435->62434 62436->62434 62439 4fc937a 62437->62439 62438 4fc93dc 62438->62429 62439->62438 62447 4fdfb88 62439->62447 62451 4fdfb80 62439->62451 62444 4fc9343 62442->62444 62443 4fc93dc 62443->62429 62444->62443 62445 4fdfb88 VirtualProtect 62444->62445 62446 4fdfb80 VirtualProtect 62444->62446 62445->62444 62446->62444 62448 4fdfbd1 VirtualProtect 62447->62448 62450 4fdfc3e 62448->62450 62450->62439 62452 4fdfb88 VirtualProtect 62451->62452 62454 4fdfc3e 62452->62454 62454->62439 62890 4ecad99 62892 4ecacff 62890->62892 62891 4ecad07 62891->62891 62892->62891 62893 4fcdf68 6 API calls 62892->62893 62894 4fcdf58 6 API calls 62892->62894 62893->62892 62894->62892 62455 4ecaef4 62456 4ecaefe 62455->62456 62460 4fd4201 62456->62460 62465 4fd4210 62456->62465 62457 4ecaf3c 62461 4fd4225 62460->62461 62470 4fd4240 62461->62470 62474 4fd4250 62461->62474 62462 4fd423b 62462->62457 62466 4fd4225 62465->62466 62468 4fd4250 2 API calls 62466->62468 62469 4fd4240 2 API calls 62466->62469 62467 4fd423b 62467->62457 62468->62467 62469->62467 62471 4fd4274 62470->62471 62472 4fd42ae 62471->62472 62478 4fd45a1 62471->62478 62472->62462 62475 4fd4274 62474->62475 62476 4fd42ae 62475->62476 62477 4fd45a1 2 API calls 62475->62477 62476->62462 62477->62475 62479 4fd45c5 62478->62479 62480 4fd45db 62479->62480 62482 4fd5cc3 62479->62482 62480->62471 62485 4fc6cd0 62482->62485 62486 4fc6ce4 62485->62486 62489 4fc852a KiUserCallbackDispatcher 62486->62489 62490 4fc85a0 GetSystemMetrics 62489->62490 62491 4fc8599 62489->62491 62492 4fc6cf6 62490->62492 62491->62490 62492->62480 62895 4fde400 62896 4fde44f NtProtectVirtualMemory 62895->62896 62898 4fde4c7 62896->62898 62833 4ecb353 62834 4ecb35d 62833->62834 62842 4fca000 62834->62842 62848 4fc9faa 62834->62848 62855 4fc9ff2 62834->62855 62835 4ecad07 62835->62835 62836 4ecacff 62836->62835 62837 4fcdf68 6 API calls 62836->62837 62838 4fcdf58 6 API calls 62836->62838 62837->62836 62838->62836 62843 4fca00c 62842->62843 62847 4fc9ff2 2 API calls 62843->62847 62865 4fca040 62843->62865 62870 4fca030 62843->62870 62844 4fca02b 62844->62836 62847->62844 62849 4fca00c 62848->62849 62851 4fc9fb3 62848->62851 62852 4fca040 2 API calls 62849->62852 62853 4fca030 2 API calls 62849->62853 62854 4fc9ff2 2 API calls 62849->62854 62850 4fca02b 62850->62836 62851->62836 62852->62850 62853->62850 62854->62850 62856 4fc9ffa 62855->62856 62858 4fca071 62855->62858 62862 4fca040 2 API calls 62856->62862 62863 4fca030 2 API calls 62856->62863 62864 4fc9ff2 2 API calls 62856->62864 62857 4fca02b 62857->62836 62859 4fca15c 62858->62859 62860 4fdfb88 VirtualProtect 62858->62860 62861 4fdfb80 VirtualProtect 62858->62861 62859->62836 62860->62858 62861->62858 62862->62857 62863->62857 62864->62857 62867 4fca06d 62865->62867 62866 4fca15c 62866->62844 62867->62866 62868 4fdfb88 VirtualProtect 62867->62868 62869 4fdfb80 VirtualProtect 62867->62869 62868->62867 62869->62867 62872 4fca033 62870->62872 62871 4fca15c 62871->62844 62872->62871 62873 4fdfb88 VirtualProtect 62872->62873 62874 4fdfb80 VirtualProtect 62872->62874 62873->62872 62874->62872
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: ,aq$4$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                              • API String ID: 0-3443518476
                              • Opcode ID: f296461cfe5fd815c360a9312bccc6d7b24f6c981b7dbbbe694da35d1dfbd0a0
                              • Instruction ID: 20ec9e6d5f29e5fdf288e91011a8de3f8aacbefdb6aed27986609eb8ccc080e7
                              • Opcode Fuzzy Hash: f296461cfe5fd815c360a9312bccc6d7b24f6c981b7dbbbe694da35d1dfbd0a0
                              • Instruction Fuzzy Hash: E5B21934A002189FDB14CFA8C999BADB7B6FF48704F148596E509AB3A5DB71EC42CF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: ,aq$4$$]q$$]q$$]q$$]q
                              • API String ID: 0-324474496
                              • Opcode ID: 286a155637f8cfd65f640a7aeeaf95474a2cb00f027d05fc3406fe05d0988ed3
                              • Instruction ID: 1c603bcb7658632730d32d2a082958427e7703c97f266b80f65c52fb10467341
                              • Opcode Fuzzy Hash: 286a155637f8cfd65f640a7aeeaf95474a2cb00f027d05fc3406fe05d0988ed3
                              • Instruction Fuzzy Hash: B922D734A00218CFDB24DF64C999BADB7B6FF48704F14819AD509AB3A5DB71AD82CF50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 701 4e54ec0-4e54ee1 702 4e54ee3 701->702 703 4e54ee8-4e54fcf 701->703 702->703 705 4e54fd5-4e55116 703->705 706 4e556d1-4e556f9 703->706 750 4e5511c-4e55177 705->750 751 4e5569a-4e556c4 705->751 709 4e55dff-4e55e08 706->709 711 4e55707-4e55711 709->711 712 4e55e0e-4e55e25 709->712 713 4e55713 711->713 714 4e55718-4e5580c 711->714 713->714 732 4e55836 714->732 733 4e5580e-4e5581a 714->733 737 4e5583c-4e5585c 732->737 735 4e55824-4e5582a 733->735 736 4e5581c-4e55822 733->736 738 4e55834 735->738 736->738 741 4e558bc-4e5593c 737->741 742 4e5585e-4e558b7 737->742 738->737 764 4e55993-4e559d6 741->764 765 4e5593e-4e55991 741->765 754 4e55dfc 742->754 758 4e5517c-4e55187 750->758 759 4e55179 750->759 761 4e556c6 751->761 762 4e556ce 751->762 754->709 763 4e555af-4e555b5 758->763 759->758 761->762 762->706 766 4e5518c-4e551aa 763->766 767 4e555bb-4e55637 763->767 787 4e559e1-4e559ea 764->787 765->787 769 4e55201-4e55216 766->769 770 4e551ac-4e551b0 766->770 808 4e55684-4e5568a 767->808 773 4e5521d-4e55233 769->773 774 4e55218 769->774 770->769 775 4e551b2-4e551bd 770->775 777 4e55235 773->777 778 4e5523a-4e55251 773->778 774->773 779 4e551f3-4e551f9 775->779 777->778 784 4e55253 778->784 785 4e55258-4e5526e 778->785 782 4e551bf-4e551c3 779->782 783 4e551fb-4e551fc 779->783 788 4e551c5 782->788 789 4e551c9-4e551e1 782->789 786 4e5527f-4e552ea 783->786 784->785 790 4e55275-4e5527c 785->790 791 4e55270 785->791 793 4e552ec-4e552f8 786->793 794 4e552fe-4e554b3 786->794 796 4e55a4a-4e55a59 787->796 788->789 797 4e551e3 789->797 798 4e551e8-4e551f0 789->798 790->786 791->790 793->794 806 4e554b5-4e554b9 794->806 807 4e55517-4e5552c 794->807 799 4e559ec-4e55a14 796->799 800 4e55a5b-4e55ae3 796->800 797->798 798->779 803 4e55a16 799->803 804 4e55a1b-4e55a44 799->804 835 4e55c5c-4e55c68 800->835 803->804 804->796 806->807 811 4e554bb-4e554ca 806->811 809 4e55533-4e55554 807->809 810 4e5552e 807->810 813 4e5568c-4e55692 808->813 814 4e55639-4e55681 808->814 815 4e55556 809->815 816 4e5555b-4e5557a 809->816 810->809 818 4e55509-4e5550f 811->818 813->751 814->808 815->816 819 4e55581-4e555a1 816->819 820 4e5557c 816->820 822 4e55511-4e55512 818->822 823 4e554cc-4e554d0 818->823 828 4e555a3 819->828 829 4e555a8 819->829 820->819 830 4e555ac 822->830 826 4e554d2-4e554d6 823->826 827 4e554da-4e554fb 823->827 826->827 831 4e55502-4e55506 827->831 832 4e554fd 827->832 828->829 829->830 830->763 831->818 832->831 837 4e55c6e-4e55cc9 835->837 838 4e55ae8-4e55af1 835->838 853 4e55d00-4e55d2a 837->853 854 4e55ccb-4e55cfe 837->854 839 4e55af3 838->839 840 4e55afa-4e55c50 838->840 839->840 842 4e55b45-4e55b85 839->842 843 4e55b00-4e55b40 839->843 844 4e55bcf-4e55c0f 839->844 845 4e55b8a-4e55bca 839->845 856 4e55c56 840->856 842->856 843->856 844->856 845->856 862 4e55d33-4e55dc6 853->862 854->862 856->835 866 4e55dcd-4e55ded 862->866 866->754
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125795635.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e50000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: TJbq$Te]q$paq$xb`q
                              • API String ID: 0-4160082283
                              • Opcode ID: a54c2dc8d3047b4478671ec751664262266c0d7d2ccd7c0443af251db00c593b
                              • Instruction ID: 950ee88637ac7a2e753f6fbeec59ad783d22e6c292c8a3c448d090de3f080be9
                              • Opcode Fuzzy Hash: a54c2dc8d3047b4478671ec751664262266c0d7d2ccd7c0443af251db00c593b
                              • Instruction Fuzzy Hash: 98A2C675A00228DFDB55CF69C984AD9BBB2FF89304F1581E9D509AB325DB31AE81CF40

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1130 4e54eb1-4e54ebd 1131 4e54e77-4e54e80 1130->1131 1132 4e54ebf-4e54ee1 1130->1132 1135 4e54e87-4e54e9c 1131->1135 1136 4e54e82 1131->1136 1133 4e54ee3 1132->1133 1134 4e54ee8-4e54fcf 1132->1134 1133->1134 1139 4e54fd5-4e55116 1134->1139 1140 4e556d1-4e556f9 1134->1140 1144 4e54ea4-4e54ea8 1135->1144 1136->1135 1186 4e5511c-4e55177 1139->1186 1187 4e5569a-4e556c4 1139->1187 1145 4e55dff-4e55e08 1140->1145 1147 4e55707-4e55711 1145->1147 1148 4e55e0e-4e55e25 1145->1148 1149 4e55713 1147->1149 1150 4e55718-4e5580c 1147->1150 1149->1150 1168 4e55836 1150->1168 1169 4e5580e-4e5581a 1150->1169 1173 4e5583c-4e5585c 1168->1173 1171 4e55824-4e5582a 1169->1171 1172 4e5581c-4e55822 1169->1172 1174 4e55834 1171->1174 1172->1174 1177 4e558bc-4e5593c 1173->1177 1178 4e5585e-4e558b7 1173->1178 1174->1173 1200 4e55993-4e559d6 1177->1200 1201 4e5593e-4e55991 1177->1201 1190 4e55dfc 1178->1190 1194 4e5517c-4e55187 1186->1194 1195 4e55179 1186->1195 1197 4e556c6 1187->1197 1198 4e556ce 1187->1198 1190->1145 1199 4e555af-4e555b5 1194->1199 1195->1194 1197->1198 1198->1140 1202 4e5518c-4e551aa 1199->1202 1203 4e555bb-4e55637 1199->1203 1223 4e559e1-4e559ea 1200->1223 1201->1223 1205 4e55201-4e55216 1202->1205 1206 4e551ac-4e551b0 1202->1206 1244 4e55684-4e5568a 1203->1244 1209 4e5521d-4e55233 1205->1209 1210 4e55218 1205->1210 1206->1205 1211 4e551b2-4e551bd 1206->1211 1213 4e55235 1209->1213 1214 4e5523a-4e55251 1209->1214 1210->1209 1215 4e551f3-4e551f9 1211->1215 1213->1214 1220 4e55253 1214->1220 1221 4e55258-4e5526e 1214->1221 1218 4e551bf-4e551c3 1215->1218 1219 4e551fb-4e551fc 1215->1219 1224 4e551c5 1218->1224 1225 4e551c9-4e551e1 1218->1225 1222 4e5527f-4e552ea 1219->1222 1220->1221 1226 4e55275-4e5527c 1221->1226 1227 4e55270 1221->1227 1229 4e552ec-4e552f8 1222->1229 1230 4e552fe-4e554b3 1222->1230 1232 4e55a4a-4e55a59 1223->1232 1224->1225 1233 4e551e3 1225->1233 1234 4e551e8-4e551f0 1225->1234 1226->1222 1227->1226 1229->1230 1242 4e554b5-4e554b9 1230->1242 1243 4e55517-4e5552c 1230->1243 1235 4e559ec-4e55a14 1232->1235 1236 4e55a5b-4e55ae3 1232->1236 1233->1234 1234->1215 1239 4e55a16 1235->1239 1240 4e55a1b-4e55a44 1235->1240 1271 4e55c5c-4e55c68 1236->1271 1239->1240 1240->1232 1242->1243 1247 4e554bb-4e554ca 1242->1247 1245 4e55533-4e55554 1243->1245 1246 4e5552e 1243->1246 1249 4e5568c-4e55692 1244->1249 1250 4e55639-4e55681 1244->1250 1251 4e55556 1245->1251 1252 4e5555b-4e5557a 1245->1252 1246->1245 1254 4e55509-4e5550f 1247->1254 1249->1187 1250->1244 1251->1252 1255 4e55581-4e555a1 1252->1255 1256 4e5557c 1252->1256 1258 4e55511-4e55512 1254->1258 1259 4e554cc-4e554d0 1254->1259 1264 4e555a3 1255->1264 1265 4e555a8 1255->1265 1256->1255 1266 4e555ac 1258->1266 1262 4e554d2-4e554d6 1259->1262 1263 4e554da-4e554fb 1259->1263 1262->1263 1267 4e55502-4e55506 1263->1267 1268 4e554fd 1263->1268 1264->1265 1265->1266 1266->1199 1267->1254 1268->1267 1273 4e55c6e-4e55cc9 1271->1273 1274 4e55ae8-4e55af1 1271->1274 1289 4e55d00-4e55d2a 1273->1289 1290 4e55ccb-4e55cfe 1273->1290 1275 4e55af3 1274->1275 1276 4e55afa-4e55c50 1274->1276 1275->1276 1278 4e55b45-4e55b85 1275->1278 1279 4e55b00-4e55b40 1275->1279 1280 4e55bcf-4e55c0f 1275->1280 1281 4e55b8a-4e55bca 1275->1281 1292 4e55c56 1276->1292 1278->1292 1279->1292 1280->1292 1281->1292 1298 4e55d33-4e55dc6 1289->1298 1290->1298 1292->1271 1302 4e55dcd-4e55ded 1298->1302 1302->1190
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125795635.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e50000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: TJbq$Te]q$xb`q
                              • API String ID: 0-1930611328
                              • Opcode ID: f866a68733316d86008429f9d778590a824ee076b85e4b973d3975d11bed8218
                              • Instruction ID: a15b05f3f6312fe07c6f103e5bff326b490585e30e96818305bbe7c52e59ff13
                              • Opcode Fuzzy Hash: f866a68733316d86008429f9d778590a824ee076b85e4b973d3975d11bed8218
                              • Instruction Fuzzy Hash: 06C19B75E016588FDB58DF6AC9446DDBBF2AF89300F14C1EAD809AB265DB305E81CF50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1304 5433a68-5433a82 1305 5433a84-5433a8b 1304->1305 1306 5433a8e-5433a9a 1304->1306 1308 5433af6-5433af9 1306->1308 1309 5433a9c-5433aa9 1306->1309 1310 5433afb-5433afd 1308->1310 1311 5433b0c-5433b0f 1308->1311 1316 5433cc7-5433cff 1309->1316 1317 5433aaf-5433adf 1309->1317 1315 5433b05 1310->1315 1313 5433b11-5433b2f 1311->1313 1314 5433b35-5433b38 1311->1314 1313->1314 1323 5433d06-5433d51 1313->1323 1318 5433b3e-5433b44 1314->1318 1319 5433cbd-5433cc4 1314->1319 1315->1311 1316->1323 1348 5433ae1-5433aea 1317->1348 1349 5433aec-5433aef 1317->1349 1318->1319 1321 5433b4a-5433b53 1318->1321 1329 5433b55-5433b64 1321->1329 1330 5433b8b-5433b91 1321->1330 1353 5433d53-5433d60 1323->1353 1354 5433d8a-5433d8c 1323->1354 1329->1330 1340 5433b66-5433b7f 1329->1340 1331 5433b97-5433ba0 1330->1331 1332 5433c9c-5433ca2 1330->1332 1331->1332 1343 5433ba6-5433bb2 1331->1343 1332->1319 1333 5433ca4-5433cb4 1332->1333 1333->1319 1347 5433cb6-5433cbb 1333->1347 1340->1330 1350 5433b81-5433b84 1340->1350 1355 5433c50-5433c94 1343->1355 1356 5433bb8-5433be0 1343->1356 1347->1319 1348->1308 1349->1308 1350->1330 1353->1354 1361 5433d62-5433d88 1353->1361 1357 54341d7-54341de 1354->1357 1355->1332 1356->1355 1367 5433be2-5433c1f 1356->1367 1361->1354 1372 5433d91-5433dc5 1361->1372 1367->1355 1380 5433c21-5433c4e 1367->1380 1381 5433dcb-5433dd4 1372->1381 1382 5433e68-5433e77 1372->1382 1380->1332 1383 5433dda-5433ded 1381->1383 1384 54341df-54341eb 1381->1384 1388 5433eb6 1382->1388 1389 5433e79-5433e8f 1382->1389 1393 5433e56-5433e62 1383->1393 1394 5433def-5433e08 1383->1394 1392 5433eb8-5433ebd 1388->1392 1400 5433e91-5433ead 1389->1400 1401 5433eaf-5433eb4 1389->1401 1397 5433f00-5433f1c 1392->1397 1398 5433ebf-5433ee0 1392->1398 1393->1381 1393->1382 1394->1393 1410 5433e0a-5433e18 1394->1410 1407 5433f22-5433f2b 1397->1407 1408 5433fe4-5433fed 1397->1408 1398->1397 1414 5433ee2 1398->1414 1400->1392 1401->1392 1407->1384 1413 5433f31-5433f4e 1407->1413 1411 5433ff3 1408->1411 1412 54341d5 1408->1412 1410->1393 1423 5433e1a-5433e1e 1410->1423 1415 5434001-543400f call 5431070 1411->1415 1416 5433ffa-5433ffc 1411->1416 1417 543405e-543406c call 5431070 1411->1417 1412->1357 1437 5433fd2-5433fde 1413->1437 1438 5433f54-5433f6a 1413->1438 1418 5433ee5-5433efe 1414->1418 1431 5434011-5434017 1415->1431 1432 5434027-543402a 1415->1432 1416->1357 1426 5434084-5434087 1417->1426 1427 543406e-5434074 1417->1427 1418->1397 1423->1384 1430 5433e24-5433e3d 1423->1430 1441 5434118-5434129 call 5431070 1426->1441 1442 543408d-543409b call 5431070 1426->1442 1435 5434076 1427->1435 1436 5434078-543407a 1427->1436 1430->1393 1467 5433e3f-5433e53 1430->1467 1433 543401b-543401d 1431->1433 1434 5434019 1431->1434 1439 5434033-5434041 call 5431070 1432->1439 1440 543402c-543402e 1432->1440 1433->1432 1434->1432 1435->1426 1436->1426 1437->1407 1437->1408 1438->1437 1468 5433f6c-5433f7a 1438->1468 1453 5434043-5434049 1439->1453 1454 5434059 1439->1454 1440->1357 1451 5434141-5434144 1441->1451 1452 543412b-5434131 1441->1452 1455 54340b3-54340c6 call 5431070 1442->1455 1456 543409d-54340a3 1442->1456 1451->1412 1461 543414a-543415b call 5431070 1451->1461 1458 5434133 1452->1458 1459 5434135-5434137 1452->1459 1462 543404b 1453->1462 1463 543404d-543404f 1453->1463 1454->1357 1472 54340c8-54340ce 1455->1472 1473 54340de-54340eb 1455->1473 1464 54340a7-54340a9 1456->1464 1465 54340a5 1456->1465 1458->1451 1459->1451 1478 5434173-5434183 call 5431070 1461->1478 1479 543415d-5434163 1461->1479 1462->1454 1463->1454 1464->1455 1465->1455 1467->1393 1468->1437 1482 5433f7c-5433f80 1468->1482 1475 54340d2-54340d4 1472->1475 1476 54340d0 1472->1476 1473->1441 1486 54340ed-54340fb call 5431070 1473->1486 1475->1473 1476->1473 1489 5434185-543418b 1478->1489 1490 543419b-54341a8 1478->1490 1483 5434167-5434169 1479->1483 1484 5434165 1479->1484 1482->1384 1487 5433f86-5433faf 1482->1487 1483->1478 1484->1478 1497 5434113 1486->1497 1498 54340fd-5434103 1486->1498 1487->1437 1506 5433fb1-5433fcf 1487->1506 1492 543418f-5434191 1489->1492 1493 543418d 1489->1493 1490->1412 1499 54341aa-54341bb call 5431070 1490->1499 1492->1490 1493->1490 1497->1357 1500 5434107-5434109 1498->1500 1501 5434105 1498->1501 1507 54341d3 1499->1507 1508 54341bd-54341c3 1499->1508 1500->1497 1501->1497 1506->1437 1507->1357 1509 54341c7-54341c9 1508->1509 1510 54341c5 1508->1510 1509->1507 1510->1507
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Pl]q$$]q
                              • API String ID: 0-2369359564
                              • Opcode ID: 826b19b219e1e23472f66e9de65fef5dc14fda6649e9b50b74569f1ab477e648
                              • Instruction ID: 5476a0e33321392c6fd95a4c05764c4fc3dea1bc00ff630cb58ebfba3507bed9
                              • Opcode Fuzzy Hash: 826b19b219e1e23472f66e9de65fef5dc14fda6649e9b50b74569f1ab477e648
                              • Instruction Fuzzy Hash: D5324A34B406088FDB18DF29C989AAA77F6FF89700B1584AAD506CB3B5DB35DC42CB51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1762 4fdb2d0-4fdb2f1 1763 4fdb2f8-4fdb3cd call 4fdbc09 1762->1763 1764 4fdb2f3 1762->1764 1770 4fdb3dc 1763->1770 1771 4fdb3cf-4fdb3da 1763->1771 1764->1763 1772 4fdb3e6-4fdb4b8 1770->1772 1771->1772 1781 4fdb4ca-4fdb4f5 1772->1781 1782 4fdb4ba-4fdb4c0 1772->1782 1783 4fdbb6c-4fdbb88 1781->1783 1782->1781 1784 4fdbb8e-4fdbba9 1783->1784 1785 4fdb4fa-4fdb606 1783->1785 1793 4fdb611-4fdb623 1785->1793 1794 4fdb635-4fdb78e 1793->1794 1795 4fdb625-4fdb62b 1793->1795 1803 4fdb7e7-4fdb7ee 1794->1803 1804 4fdb790-4fdb794 1794->1804 1795->1794 1805 4fdb999-4fdb9b5 1803->1805 1806 4fdb79c-4fdb7e2 1804->1806 1807 4fdb796-4fdb797 1804->1807 1808 4fdb9bb-4fdb9df 1805->1808 1809 4fdb7f3-4fdb8e1 1805->1809 1810 4fdba29-4fdba78 1806->1810 1807->1810 1815 4fdba26-4fdba27 1808->1815 1816 4fdb9e1-4fdba23 1808->1816 1834 4fdb995-4fdb996 1809->1834 1835 4fdb8e7-4fdb992 1809->1835 1823 4fdba8a-4fdbad5 1810->1823 1824 4fdba7a-4fdba80 1810->1824 1815->1810 1816->1815 1827 4fdbb4e-4fdbb69 1823->1827 1828 4fdbad7-4fdbb4d 1823->1828 1824->1823 1827->1783 1828->1827 1834->1805 1835->1834
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: fbq$8
                              • API String ID: 0-3186246319
                              • Opcode ID: d013375be0b2a1af04949b8ad9eab885f07466b0bc6e82dbf13023f4ee31658e
                              • Instruction ID: 711518aa0b99500bd14811be412b9eead33ee5074de6dbce7dcd53ffe3907ef8
                              • Opcode Fuzzy Hash: d013375be0b2a1af04949b8ad9eab885f07466b0bc6e82dbf13023f4ee31658e
                              • Instruction Fuzzy Hash: 9442D475D00629CFDB64DF69C890AD9B7B2BF89314F1486EAD40DA7251EB30AE81CF40

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1990 4fd51b5-4fd51bb 2113 4fd51c1 call 4fc6b44 1990->2113 2114 4fd51c1 call 4fc6a77 1990->2114 2115 4fd51c1 call 4fc6b10 1990->2115 2116 4fd51c1 call 4fc6b02 1990->2116 1991 4fd51c7-4fd51f7 1993 4fd5202-4fd520b 1991->1993 1994 4fd520d 1993->1994 1995 4fd5214-4fd5215 1993->1995 1996 4fd53fd-4fd5404 1994->1996 1997 4fd541d-4fd541e 1994->1997 1998 4fd5458 1994->1998 1999 4fd521a-4fd522e 1994->1999 2000 4fd5417-4fd5418 1994->2000 2001 4fd5233-4fd523a 1994->2001 2002 4fd524d-4fd52fb 1994->2002 2003 4fd5505-4fd5530 1994->2003 2004 4fd5544-4fd555c 1994->2004 2005 4fd55c7-4fd55f2 1994->2005 2006 4fd5561-4fd5576 1994->2006 2007 4fd5300-4fd5349 1994->2007 2008 4fd5423-4fd5453 1994->2008 1995->1998 1995->1999 1996->2004 2011 4fd540a-4fd5411 1996->2011 2013 4fd5354 1997->2013 2120 4fd545e call 4fc6958 1998->2120 2121 4fd545e call 4fc69f0 1998->2121 2122 4fd545e call 4fc69e0 1998->2122 2010 4fd5578-4fd557f 1999->2010 2000->2006 2001->2007 2012 4fd5240-4fd524b 2001->2012 2002->1993 2003->1993 2009 4fd5536-4fd553f 2003->2009 2004->1993 2022 4fd55b2-4fd55bb 2005->2022 2024 4fd55f4-4fd55ff 2005->2024 2006->2010 2007->2013 2008->1993 2009->1993 2016 4fd5585-4fd55a5 2010->2016 2017 4fd5602-4fd5771 2010->2017 2011->2000 2012->1993 2117 4fd535a call 4fc6958 2013->2117 2118 4fd535a call 4fc69f0 2013->2118 2119 4fd535a call 4fc69e0 2013->2119 2021 4fd55a7-4fd55b0 2016->2021 2016->2022 2017->1997 2017->2004 2017->2005 2032 4fd577b-4fd577d 2017->2032 2033 4fd5601 2017->2033 2018 4fd5464-4fd54ef 2018->1993 2042 4fd54f5-4fd5500 2018->2042 2021->2022 2026 4fd55bd 2022->2026 2027 4fd55c4-4fd55c5 2022->2027 2023 4fd5360-4fd53e9 2023->1993 2046 4fd53ef-4fd53f8 2023->2046 2024->2022 2026->2005 2026->2032 2026->2033 2027->2005 2037 4fd5ac0-4fd5ad9 2032->2037 2033->2017 2044 4fd5adb-4fd5afa 2037->2044 2045 4fd5a60-4fd5a79 2037->2045 2042->1993 2047 4fd5b00-4fd5b0b 2044->2047 2048 4fd5782-4fd578b 2044->2048 2070 4fd5a7b-4fd5a87 2045->2070 2071 4fd5aa3 2045->2071 2046->1993 2047->2048 2050 4fd578d 2048->2050 2051 4fd5794-4fd5795 2048->2051 2050->2045 2052 4fd59dc-4fd59dd 2050->2052 2053 4fd59ff-4fd5a00 2050->2053 2054 4fd5abf 2050->2054 2055 4fd587b-4fd591c 2050->2055 2056 4fd579a-4fd579c 2050->2056 2057 4fd5a5a-4fd5a5b 2050->2057 2058 4fd5b75-4fd5b89 2050->2058 2059 4fd5977-4fd598b 2050->2059 2060 4fd5837-4fd5876 2050->2060 2061 4fd5b10-4fd5b61 2050->2061 2062 4fd5990-4fd59a8 2050->2062 2063 4fd5932-4fd5939 2050->2063 2064 4fd59ad-4fd59b1 2050->2064 2065 4fd5a05-4fd5a09 2050->2065 2066 4fd5a44-4fd5a48 2050->2066 2067 4fd57a1-4fd5832 2050->2067 2068 4fd59c3-4fd59d7 2050->2068 2069 4fd59e2-4fd59fa 2050->2069 2051->2056 2051->2064 2052->2054 2054->2037 2055->2048 2112 4fd5922-4fd592d 2055->2112 2056->2037 2057->2056 2072 4fd5b8b-4fd5bc0 2058->2072 2059->2072 2060->2048 2061->2048 2094 4fd5b67-4fd5b70 2061->2094 2062->2048 2063->2069 2079 4fd593f-4fd5961 2063->2079 2064->2062 2073 4fd59b3-4fd59be 2064->2073 2065->2060 2075 4fd5a0f-4fd5a2e 2065->2075 2066->2037 2076 4fd5a4a-4fd5a55 2066->2076 2067->2048 2068->2072 2069->2048 2077 4fd5a89-4fd5a8f 2070->2077 2078 4fd5a91-4fd5a97 2070->2078 2074 4fd5aa9-4fd5aba 2071->2074 2089 4fd5bcd-4fd5bd6 2072->2089 2090 4fd5bc2-4fd5bcb 2072->2090 2073->2048 2075->2048 2083 4fd5a34-4fd5a3f 2075->2083 2076->2048 2080 4fd5aa1 2077->2080 2078->2080 2079->2048 2086 4fd5967-4fd5972 2079->2086 2080->2074 2083->2048 2086->2048 2095 4fd5bdf-4fd5be0 2089->2095 2096 4fd5bd8 2089->2096 2090->2089 2094->2048 2099 4fd5c4c 2095->2099 2101 4fd5be2-4fd5c08 2095->2101 2096->2099 2100 4fd5c15-4fd5c19 2096->2100 2096->2101 2102 4fd5c4d 2099->2102 2100->2102 2103 4fd5c1b-4fd5c3d 2100->2103 2101->2089 2108 4fd5c0a-4fd5c13 2101->2108 2109 4fd5c4e 2102->2109 2103->2089 2107 4fd5c3f-4fd5c4a 2103->2107 2107->2089 2108->2089 2109->2109 2112->2048 2113->1991 2114->1991 2115->1991 2116->1991 2117->2023 2118->2023 2119->2023 2120->2018 2121->2018 2122->2018
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q$yLL9
                              • API String ID: 0-3026206948
                              • Opcode ID: 5f7c2dc146076c5d62b6c81b88712204d26966aa12e65386cbf5035f97af545b
                              • Instruction ID: 8d89506470f5b3d1432660b6735623c35d8894106ad7472dc63061c58e0ea5f6
                              • Opcode Fuzzy Hash: 5f7c2dc146076c5d62b6c81b88712204d26966aa12e65386cbf5035f97af545b
                              • Instruction Fuzzy Hash: C3321774E05228DFDB64DF25C988BA9BBF2FB48305F1461EAD409A7250DB346E86DF04

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2123 4fd576d-4fd5771 2124 4fd541d-4fd541e 2123->2124 2125 4fd577b-4fd577d 2123->2125 2126 4fd5544-4fd555c 2123->2126 2127 4fd55c7-4fd55f2 2123->2127 2128 4fd5601 2123->2128 2131 4fd5354 2124->2131 2130 4fd5ac0-4fd5ad9 2125->2130 2132 4fd5202-4fd520b 2126->2132 2137 4fd55f4-4fd55ff 2127->2137 2138 4fd55b2-4fd55bb 2127->2138 2129 4fd5602 2128->2129 2129->2123 2154 4fd5adb-4fd5afa 2130->2154 2155 4fd5a60-4fd5a79 2130->2155 2243 4fd535a call 4fc6958 2131->2243 2244 4fd535a call 4fc69f0 2131->2244 2245 4fd535a call 4fc69e0 2131->2245 2134 4fd520d 2132->2134 2135 4fd5214-4fd5215 2132->2135 2134->2124 2134->2126 2134->2127 2140 4fd53fd-4fd5404 2134->2140 2141 4fd5458 2134->2141 2142 4fd521a-4fd522e 2134->2142 2143 4fd5417-4fd5418 2134->2143 2144 4fd5233-4fd523a 2134->2144 2145 4fd524d-4fd52fb 2134->2145 2146 4fd5505-4fd5530 2134->2146 2147 4fd5561-4fd5576 2134->2147 2148 4fd5300-4fd5349 2134->2148 2149 4fd5423-4fd5453 2134->2149 2135->2141 2135->2142 2136 4fd5360-4fd53e9 2136->2132 2214 4fd53ef-4fd53f8 2136->2214 2137->2138 2152 4fd55bd 2138->2152 2153 4fd55c4-4fd55c5 2138->2153 2140->2126 2156 4fd540a-4fd5411 2140->2156 2246 4fd545e call 4fc6958 2141->2246 2247 4fd545e call 4fc69f0 2141->2247 2248 4fd545e call 4fc69e0 2141->2248 2151 4fd5578-4fd557f 2142->2151 2143->2147 2144->2148 2157 4fd5240-4fd524b 2144->2157 2145->2132 2146->2132 2150 4fd5536-4fd553f 2146->2150 2147->2151 2148->2131 2149->2132 2150->2132 2151->2129 2162 4fd5585-4fd55a5 2151->2162 2152->2125 2152->2127 2152->2128 2153->2127 2164 4fd5b00-4fd5b0b 2154->2164 2165 4fd5782-4fd578b 2154->2165 2191 4fd5a7b-4fd5a87 2155->2191 2192 4fd5aa3 2155->2192 2156->2143 2157->2132 2160 4fd5464-4fd54ef 2160->2132 2226 4fd54f5-4fd5500 2160->2226 2162->2138 2167 4fd55a7-4fd55b0 2162->2167 2164->2165 2168 4fd578d 2165->2168 2169 4fd5794-4fd5795 2165->2169 2167->2138 2168->2155 2170 4fd59dc-4fd59dd 2168->2170 2171 4fd59ff-4fd5a00 2168->2171 2172 4fd5abf 2168->2172 2173 4fd587b-4fd591c 2168->2173 2174 4fd579a-4fd579c 2168->2174 2175 4fd5a5a-4fd5a5b 2168->2175 2176 4fd5b75-4fd5b89 2168->2176 2177 4fd5977-4fd598b 2168->2177 2178 4fd5837-4fd5876 2168->2178 2179 4fd5b10-4fd5b61 2168->2179 2180 4fd5990-4fd59a8 2168->2180 2181 4fd5932-4fd5939 2168->2181 2182 4fd59ad-4fd59b1 2168->2182 2183 4fd5a05-4fd5a09 2168->2183 2184 4fd5a44-4fd5a48 2168->2184 2185 4fd57a1-4fd5832 2168->2185 2186 4fd59c3-4fd59d7 2168->2186 2187 4fd59e2-4fd59fa 2168->2187 2169->2174 2169->2182 2170->2172 2172->2130 2173->2165 2242 4fd5922-4fd592d 2173->2242 2174->2130 2175->2174 2194 4fd5b8b-4fd5bc0 2176->2194 2177->2194 2178->2165 2179->2165 2223 4fd5b67-4fd5b70 2179->2223 2180->2165 2181->2187 2201 4fd593f-4fd5961 2181->2201 2182->2180 2195 4fd59b3-4fd59be 2182->2195 2183->2178 2197 4fd5a0f-4fd5a2e 2183->2197 2184->2130 2198 4fd5a4a-4fd5a55 2184->2198 2185->2165 2186->2194 2187->2165 2199 4fd5a89-4fd5a8f 2191->2199 2200 4fd5a91-4fd5a97 2191->2200 2196 4fd5aa9-4fd5aba 2192->2196 2215 4fd5bcd-4fd5bd6 2194->2215 2216 4fd5bc2-4fd5bcb 2194->2216 2195->2165 2197->2165 2206 4fd5a34-4fd5a3f 2197->2206 2198->2165 2202 4fd5aa1 2199->2202 2200->2202 2201->2165 2212 4fd5967-4fd5972 2201->2212 2202->2196 2206->2165 2212->2165 2214->2132 2224 4fd5bdf-4fd5be0 2215->2224 2225 4fd5bd8 2215->2225 2216->2215 2223->2165 2228 4fd5c4c 2224->2228 2230 4fd5be2-4fd5c08 2224->2230 2225->2228 2229 4fd5c15-4fd5c19 2225->2229 2225->2230 2226->2132 2232 4fd5c4d 2228->2232 2229->2232 2233 4fd5c1b-4fd5c3d 2229->2233 2230->2215 2238 4fd5c0a-4fd5c13 2230->2238 2239 4fd5c4e 2232->2239 2233->2215 2236 4fd5c3f-4fd5c4a 2233->2236 2236->2215 2238->2215 2239->2239 2242->2165 2243->2136 2244->2136 2245->2136 2246->2160 2247->2160 2248->2160
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q$yLL9
                              • API String ID: 0-3026206948
                              • Opcode ID: 7e2955e8d7608a03c5f1052b96a26ca6a33a49a0dc23063b99c3e7dcd63d9d69
                              • Instruction ID: 4d600bddb75f21730235f560080f0a31e0c823f992113efb46ee2d766482e34c
                              • Opcode Fuzzy Hash: 7e2955e8d7608a03c5f1052b96a26ca6a33a49a0dc23063b99c3e7dcd63d9d69
                              • Instruction Fuzzy Hash: 89321674E05228DFDB64DF25C988BA9BBF2FB48305F1451EAD409A7250DB346E86DF04

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2249 4fd51f9-4fd51fc 2250 4fd5202-4fd520b 2249->2250 2251 4fd520d 2250->2251 2252 4fd5214-4fd5215 2250->2252 2253 4fd53fd-4fd5404 2251->2253 2254 4fd541d-4fd541e 2251->2254 2255 4fd5458 2251->2255 2256 4fd521a-4fd522e 2251->2256 2257 4fd5417-4fd5418 2251->2257 2258 4fd5233-4fd523a 2251->2258 2259 4fd524d-4fd52fb 2251->2259 2260 4fd5505-4fd5530 2251->2260 2261 4fd5544-4fd555c 2251->2261 2262 4fd55c7-4fd55f2 2251->2262 2263 4fd5561-4fd5576 2251->2263 2264 4fd5300-4fd5349 2251->2264 2265 4fd5423-4fd5453 2251->2265 2252->2255 2252->2256 2253->2261 2268 4fd540a-4fd5411 2253->2268 2270 4fd5354 2254->2270 2373 4fd545e call 4fc6958 2255->2373 2374 4fd545e call 4fc69f0 2255->2374 2375 4fd545e call 4fc69e0 2255->2375 2267 4fd5578-4fd557f 2256->2267 2257->2263 2258->2264 2269 4fd5240-4fd524b 2258->2269 2259->2250 2260->2250 2266 4fd5536-4fd553f 2260->2266 2261->2250 2279 4fd55b2-4fd55bb 2262->2279 2281 4fd55f4-4fd55ff 2262->2281 2263->2267 2264->2270 2265->2250 2266->2250 2273 4fd5585-4fd55a5 2267->2273 2274 4fd5602-4fd5771 2267->2274 2268->2257 2269->2250 2370 4fd535a call 4fc6958 2270->2370 2371 4fd535a call 4fc69f0 2270->2371 2372 4fd535a call 4fc69e0 2270->2372 2278 4fd55a7-4fd55b0 2273->2278 2273->2279 2274->2254 2274->2261 2274->2262 2289 4fd577b-4fd577d 2274->2289 2290 4fd5601 2274->2290 2275 4fd5464-4fd54ef 2275->2250 2299 4fd54f5-4fd5500 2275->2299 2278->2279 2283 4fd55bd 2279->2283 2284 4fd55c4-4fd55c5 2279->2284 2280 4fd5360-4fd53e9 2280->2250 2303 4fd53ef-4fd53f8 2280->2303 2281->2279 2283->2262 2283->2289 2283->2290 2284->2262 2294 4fd5ac0-4fd5ad9 2289->2294 2290->2274 2301 4fd5adb-4fd5afa 2294->2301 2302 4fd5a60-4fd5a79 2294->2302 2299->2250 2304 4fd5b00-4fd5b0b 2301->2304 2305 4fd5782-4fd578b 2301->2305 2327 4fd5a7b-4fd5a87 2302->2327 2328 4fd5aa3 2302->2328 2303->2250 2304->2305 2307 4fd578d 2305->2307 2308 4fd5794-4fd5795 2305->2308 2307->2302 2309 4fd59dc-4fd59dd 2307->2309 2310 4fd59ff-4fd5a00 2307->2310 2311 4fd5abf 2307->2311 2312 4fd587b-4fd591c 2307->2312 2313 4fd579a-4fd579c 2307->2313 2314 4fd5a5a-4fd5a5b 2307->2314 2315 4fd5b75-4fd5b89 2307->2315 2316 4fd5977-4fd598b 2307->2316 2317 4fd5837-4fd5876 2307->2317 2318 4fd5b10-4fd5b61 2307->2318 2319 4fd5990-4fd59a8 2307->2319 2320 4fd5932-4fd5939 2307->2320 2321 4fd59ad-4fd59b1 2307->2321 2322 4fd5a05-4fd5a09 2307->2322 2323 4fd5a44-4fd5a48 2307->2323 2324 4fd57a1-4fd5832 2307->2324 2325 4fd59c3-4fd59d7 2307->2325 2326 4fd59e2-4fd59fa 2307->2326 2308->2313 2308->2321 2309->2311 2311->2294 2312->2305 2369 4fd5922-4fd592d 2312->2369 2313->2294 2314->2313 2329 4fd5b8b-4fd5bc0 2315->2329 2316->2329 2317->2305 2318->2305 2351 4fd5b67-4fd5b70 2318->2351 2319->2305 2320->2326 2336 4fd593f-4fd5961 2320->2336 2321->2319 2330 4fd59b3-4fd59be 2321->2330 2322->2317 2332 4fd5a0f-4fd5a2e 2322->2332 2323->2294 2333 4fd5a4a-4fd5a55 2323->2333 2324->2305 2325->2329 2326->2305 2334 4fd5a89-4fd5a8f 2327->2334 2335 4fd5a91-4fd5a97 2327->2335 2331 4fd5aa9-4fd5aba 2328->2331 2346 4fd5bcd-4fd5bd6 2329->2346 2347 4fd5bc2-4fd5bcb 2329->2347 2330->2305 2332->2305 2340 4fd5a34-4fd5a3f 2332->2340 2333->2305 2337 4fd5aa1 2334->2337 2335->2337 2336->2305 2343 4fd5967-4fd5972 2336->2343 2337->2331 2340->2305 2343->2305 2352 4fd5bdf-4fd5be0 2346->2352 2353 4fd5bd8 2346->2353 2347->2346 2351->2305 2356 4fd5c4c 2352->2356 2358 4fd5be2-4fd5c08 2352->2358 2353->2356 2357 4fd5c15-4fd5c19 2353->2357 2353->2358 2359 4fd5c4d 2356->2359 2357->2359 2360 4fd5c1b-4fd5c3d 2357->2360 2358->2346 2365 4fd5c0a-4fd5c13 2358->2365 2366 4fd5c4e 2359->2366 2360->2346 2364 4fd5c3f-4fd5c4a 2360->2364 2364->2346 2365->2346 2366->2366 2369->2305 2370->2280 2371->2280 2372->2280 2373->2275 2374->2275 2375->2275
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q$yLL9
                              • API String ID: 0-3026206948
                              • Opcode ID: de7284575d1a130ccd879c19c8efa1a64a2064163fcf021efbaa4c9e72423949
                              • Instruction ID: abc18ffe7b193889ac6e2633ded202dcbddb0758060d1495c7339bc1764fe3a4
                              • Opcode Fuzzy Hash: de7284575d1a130ccd879c19c8efa1a64a2064163fcf021efbaa4c9e72423949
                              • Instruction Fuzzy Hash: 013205B4E05228DFDB64DF25C988BA9BBF2FB48305F1451EAD409A7250DB346E86DF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: fbq$h
                              • API String ID: 0-3598783323
                              • Opcode ID: fd5f5130c6645a0db695f54eeb3d89d0ad5a16f83fd3a479e014f0d30037a6b3
                              • Instruction ID: c53422e2699b7fc38937fa7935fe01ae5347686c192340d27e7c2a21c69e1571
                              • Opcode Fuzzy Hash: fd5f5130c6645a0db695f54eeb3d89d0ad5a16f83fd3a479e014f0d30037a6b3
                              • Instruction Fuzzy Hash: DA61E671D006298BDB64DF6AC8507D9B7B2BF89300F14C2EAD40CA7254EB306A85CF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125795635.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e50000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 2
                              • API String ID: 0-450215437
                              • Opcode ID: b506f4d88a82a6edb53e64cf8963852159c1ef2150f476880db2275734e3f0c4
                              • Instruction ID: 9644d5de2ff4888c7eea575176376ef0487c4ff758446bf25a31ce6550634be8
                              • Opcode Fuzzy Hash: b506f4d88a82a6edb53e64cf8963852159c1ef2150f476880db2275734e3f0c4
                              • Instruction Fuzzy Hash: 3CC2A5B4A012288FDB65DF69C984B99B7F5FF89304F1081EAD909A7365DB309E85CF40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: (aq
                              • API String ID: 0-600464949
                              • Opcode ID: 82afef376b9c2476dbf69f97c228ea0b20fdfcf1a6315f122ca5d3be795271cc
                              • Instruction ID: 7ec91f5ec976da31d364f20f8a54422496a1ffb3f28913a0dfa2d3d06d08b55a
                              • Opcode Fuzzy Hash: 82afef376b9c2476dbf69f97c228ea0b20fdfcf1a6315f122ca5d3be795271cc
                              • Instruction Fuzzy Hash: F8828971B002158FCB14DF68C494A6EBBF2FF88304F188569E95A9B795DF34E942CB81
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: \Vl
                              • API String ID: 0-682378881
                              • Opcode ID: 30ed9f4d6836374348dbfb92c34c92a10ca80cdeab6bb61ee51b9198170f3a24
                              • Instruction ID: 05f5d1b6e726c6287f3f49fd2776bd599bfd698f47c269abcc74109e47fd430f
                              • Opcode Fuzzy Hash: 30ed9f4d6836374348dbfb92c34c92a10ca80cdeab6bb61ee51b9198170f3a24
                              • Instruction Fuzzy Hash: F802E570D00229DFDB20CFA8C985BDDBBB1BF49304F1495AAD409B7290EB74AA85CF55
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Te]q
                              • API String ID: 0-52440209
                              • Opcode ID: a93846018bccd88a742e308b26b87ce567c68ae14981c17ec95f9cca70ac8d40
                              • Instruction ID: aa18f8a780c4cccc835496a045662790e7a7fba35934b78340c69b198188510d
                              • Opcode Fuzzy Hash: a93846018bccd88a742e308b26b87ce567c68ae14981c17ec95f9cca70ac8d40
                              • Instruction Fuzzy Hash: 1AF1E370E45218CFDB64CF69DA84BA9B7F2FB89304F2090A9D40DA7254DB70AD86CF04
                              APIs
                              • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 04FDE4B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: MemoryProtectVirtual
                              • String ID:
                              • API String ID: 2706961497-0
                              • Opcode ID: 7869f784adb702d1c06fd18656f69660dc87376569034f1af0ba7a95d1ddebbf
                              • Instruction ID: f0c018a7f16ec594fc7bc8021246ee5289d0efb79f95d6c7a994665c5b3b828f
                              • Opcode Fuzzy Hash: 7869f784adb702d1c06fd18656f69660dc87376569034f1af0ba7a95d1ddebbf
                              • Instruction Fuzzy Hash: D04189B9D002589FCF10CFA9D984ADEFBB5FB49310F14942AE819B7210D735A946CFA4
                              APIs
                              • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 04FDE4B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: MemoryProtectVirtual
                              • String ID:
                              • API String ID: 2706961497-0
                              • Opcode ID: 3b0b99147554b9cb09d4f0f04fe94bbffdec4a4df5bc0c619cefd5ce77c2d27a
                              • Instruction ID: 7abab918ce588d92ced58c6cb08903e149c8655c6857567a960e555f5a6e2709
                              • Opcode Fuzzy Hash: 3b0b99147554b9cb09d4f0f04fe94bbffdec4a4df5bc0c619cefd5ce77c2d27a
                              • Instruction Fuzzy Hash: DA417AB9D002589FCF10CFA9D984ADEFBB5BF49310F14942AE819B7210D735A945CF64
                              APIs
                              • NtResumeThread.NTDLL(?,?), ref: 04FDF93E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: cba0b0353e639eb90bf2dbd1d322b40757c7997dfc5629e90d3ea61cd0987989
                              • Instruction ID: 7e7b80f5eb7354ac6513aff6919bf6cee3b6a32bd1e17492fa3f77998bafba76
                              • Opcode Fuzzy Hash: cba0b0353e639eb90bf2dbd1d322b40757c7997dfc5629e90d3ea61cd0987989
                              • Instruction Fuzzy Hash: F731B8B5D012189FCB10CFA9D980AEEFBF5FB49310F14842AE919B7200D735A946CFA5
                              APIs
                              • NtResumeThread.NTDLL(?,?), ref: 04FDF93E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: c52e54fa3c0231b1b491d92a2164d8f006ce4a1d09c05f8fa9c2336cf54a4076
                              • Instruction ID: b80fa3b9d9fa090541b609b7e48a8c245112e8227dbc6e0b2504c0d3fec6ddaf
                              • Opcode Fuzzy Hash: c52e54fa3c0231b1b491d92a2164d8f006ce4a1d09c05f8fa9c2336cf54a4076
                              • Instruction Fuzzy Hash: FA3199B5D012189FCB10CFA9D980A9EFBF5BB49310F14942AE819B7200D735A946CFA5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Te]q
                              • API String ID: 0-52440209
                              • Opcode ID: f66be70a05e22c8c084ec2e609edf6e067ff41a048a0ed4f4a2f8c78effcbf14
                              • Instruction ID: 23b3bc5c807133d2e3667d185f18fc08f2b567eed5584340ed9abf874362b15b
                              • Opcode Fuzzy Hash: f66be70a05e22c8c084ec2e609edf6e067ff41a048a0ed4f4a2f8c78effcbf14
                              • Instruction Fuzzy Hash: D0D1DF74E45218CFDB64CF69DA84BA9B7F2FB89304F2094A9D40DA7254DB70AD86CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Ddq
                              • API String ID: 0-562783569
                              • Opcode ID: 72275d40df14aa4c63ad723d7d897a6046a4b1de16059c827935572f68a99cf1
                              • Instruction ID: 6cdb87f7f9bfbb62b1e661d900b874bafe8f159e9dae613749710e40f4ef6068
                              • Opcode Fuzzy Hash: 72275d40df14aa4c63ad723d7d897a6046a4b1de16059c827935572f68a99cf1
                              • Instruction Fuzzy Hash: 52D1BF74A00218CFDB54DFA9D994B9DBBF2FF89304F1081A9D409AB365DB31A982CF41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: 362ee9bf5489e139c3ea5475311cf0af0e09d1cd3c8a26a0e82d63d3becac82e
                              • Instruction ID: 4bf3fb62ac5c768d8773a830177132d502bdf2d3781282d6cf530a51756f4db3
                              • Opcode Fuzzy Hash: 362ee9bf5489e139c3ea5475311cf0af0e09d1cd3c8a26a0e82d63d3becac82e
                              • Instruction Fuzzy Hash: 45D1C0B0D05228DFDB65DF25D988BA9BBF2FB48305F1460EAD009A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: 08d23e5659162cda09837489f77c3b4e61aca11150064080b3988edcd4e158ed
                              • Instruction ID: 13cdda90fd6cbc7f1611c4e39abb9b572b64304128ea14cc2555f83eed4e64da
                              • Opcode Fuzzy Hash: 08d23e5659162cda09837489f77c3b4e61aca11150064080b3988edcd4e158ed
                              • Instruction Fuzzy Hash: 0DB106B1E05218CFDB24CFAAD944BEDBBF2FB49305F189069D409A7251DBB46986CF00
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: 28476255a820f364f2ece4e3e84f818919e88a96373549ad7277e66fdbb47b43
                              • Instruction ID: 25de0e645d5a7298912c17c9803fc9a400c61e27efd94d80d4602b6bb780929b
                              • Opcode Fuzzy Hash: 28476255a820f364f2ece4e3e84f818919e88a96373549ad7277e66fdbb47b43
                              • Instruction Fuzzy Hash: D1D1E270E05228DFDB64CF25D988BA9BBB2FB48305F1461EAD009A7250DB746EC2CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: b8dc80e3dc7ddc596d969e149bb905344f0ab8ece6c15f96aa0e2cbfed3dde18
                              • Instruction ID: ad8b1487dc97f0d3d7593ebe26acc325f1aacffaa13d39633948e67764681ac3
                              • Opcode Fuzzy Hash: b8dc80e3dc7ddc596d969e149bb905344f0ab8ece6c15f96aa0e2cbfed3dde18
                              • Instruction Fuzzy Hash: 5DB1F6B1E05218CFDB24CFAAD944BEDBBF2FB49305F189069D449A7251DBB46986CF00
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Te]q
                              • API String ID: 0-52440209
                              • Opcode ID: e290a0bcedb5b419430e115db158b27dbba5034253035e0b1aae38eda63f92d3
                              • Instruction ID: ac0b1e87c726af1f9e983a06dd3125de830fd6c51e821164e594d0f7911ecc10
                              • Opcode Fuzzy Hash: e290a0bcedb5b419430e115db158b27dbba5034253035e0b1aae38eda63f92d3
                              • Instruction Fuzzy Hash: 2691B270E05218CFDB14DFAADA44BEDBBF2FB89305F109069D809A7255EB346946CF01
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Te]q
                              • API String ID: 0-52440209
                              • Opcode ID: 53b309d882af74592366a4822b695f30b3198a565dc6b7cd9c3aa2ab3ec2fdcb
                              • Instruction ID: 361e476e14b0167b59178640e5a966a012e8205759fa0f702c7ee76254c102b2
                              • Opcode Fuzzy Hash: 53b309d882af74592366a4822b695f30b3198a565dc6b7cd9c3aa2ab3ec2fdcb
                              • Instruction Fuzzy Hash: 9591C470E05218CFDB14DFAADA84BADBBF2FB89305F149169D809A7255EB346D42CF00
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: daq
                              • API String ID: 0-1532007458
                              • Opcode ID: 2f3acc48a372329a7539ee3b5199f7c42a6d2407951bdae80be45bf3b69a7bfc
                              • Instruction ID: 61790ecfe4b5f36af0b6eb958f13fe249832573964a91768467cb68d2cc54974
                              • Opcode Fuzzy Hash: 2f3acc48a372329a7539ee3b5199f7c42a6d2407951bdae80be45bf3b69a7bfc
                              • Instruction Fuzzy Hash: 8081F370E05208CFDB14EFA9D944BADBBF2FF89304F1480A9D609A7255DB346A86CF41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: daq
                              • API String ID: 0-1532007458
                              • Opcode ID: e014f65bff82d5101354a19a8ba36d208a85b95c6c386e0522d162d0f7236c00
                              • Instruction ID: 56e9aa1a19e040d01a66c9760b510f0b69c7caedb9bf4ea11176428cf11c6a6b
                              • Opcode Fuzzy Hash: e014f65bff82d5101354a19a8ba36d208a85b95c6c386e0522d162d0f7236c00
                              • Instruction Fuzzy Hash: 8E81D270E05218CFDB14EFA9E944B9DBBF2FB89304F1480A9D609A7255DB346A86CF41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: |>D
                              • API String ID: 0-3010875215
                              • Opcode ID: 06a7b17cd535355a1f29c7fdb1b3876c109d6ba4fe1a84073a1c0965a2b32bee
                              • Instruction ID: eb8bdabe3f73b8c2ccd356f91f5e25aea0d8a33e8ec1b0372a2bb964349e8c62
                              • Opcode Fuzzy Hash: 06a7b17cd535355a1f29c7fdb1b3876c109d6ba4fe1a84073a1c0965a2b32bee
                              • Instruction Fuzzy Hash: 8771C571E012089FDB04DFA9D580AAEBBF6FF89300F148069E919AB355DB34A946CF51
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: |>D
                              • API String ID: 0-3010875215
                              • Opcode ID: 4b5a28b3ee55206077affc6c71452fa3ef32079061ac947a7d8569f948ca3559
                              • Instruction ID: 4cbbcfbaaf52421fb2b090c7ac3d46cb70d153134aa7f44098a30553ade02696
                              • Opcode Fuzzy Hash: 4b5a28b3ee55206077affc6c71452fa3ef32079061ac947a7d8569f948ca3559
                              • Instruction Fuzzy Hash: 6471B470E016089FDB04DFA9D590AAEBBF6FF8D300F148069E919AB355DB34A946CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125795635.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e50000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1cd8e7663a64b21c8badc6b78c839ddf6c60e7b1e8abc7a075f0ecd04dc977e9
                              • Instruction ID: 129937eaaf923581b8f07c2bf4e0bf57542ad108e4368f6ed21474b8fa80768f
                              • Opcode Fuzzy Hash: 1cd8e7663a64b21c8badc6b78c839ddf6c60e7b1e8abc7a075f0ecd04dc977e9
                              • Instruction Fuzzy Hash: 98328074A402298FCB65DF28C984A99B7F6FF48300F1095E9E90DA7365DB30AE85CF54
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 272acc6836161fe2afddff44fb3fec134d6da9715759140c08a6c19192a482d3
                              • Instruction ID: f585b963b0c9d124476a68b43cf49ba1a9a76a388f628b36b81f4aa7579d4447
                              • Opcode Fuzzy Hash: 272acc6836161fe2afddff44fb3fec134d6da9715759140c08a6c19192a482d3
                              • Instruction Fuzzy Hash: 07F1D3B0D04219CFEF20CFA8C985BDDBBB1BF49304F1485AAD809A7250EB74A985CF55
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 393934499940bcc5c05d3ab14db7085c0cdb4b9a0c124631cebaa0ee5e9dfe18
                              • Instruction ID: 8fc18d4af6a857831d6c9c36a63e531edce55715e6a64f30a729822e5cd667b9
                              • Opcode Fuzzy Hash: 393934499940bcc5c05d3ab14db7085c0cdb4b9a0c124631cebaa0ee5e9dfe18
                              • Instruction Fuzzy Hash: ACD10171E04218CFDB14DFA5DA94BEDBBF2FB89304F1090A9D109AB295DB746986CF01
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f3dab91869ba378bad5ca8d1b65beed32b56ab3d8b75ebce63bed8b5f893b789
                              • Instruction ID: da288361567030601d3c3c999243e49534194f6542f6eef477732eb5bcdf327f
                              • Opcode Fuzzy Hash: f3dab91869ba378bad5ca8d1b65beed32b56ab3d8b75ebce63bed8b5f893b789
                              • Instruction Fuzzy Hash: A1D148B1E05218CFDB14DFA5DA44BADBBF2FB49304F1090A9D509AB291DB746E86CF01
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 76fadca866277bd33072353964153e23575160aa6beb71df8948ba9bc06db134
                              • Instruction ID: 792d82429fa28dfb6e62cd44d9654ea9770e19e367b67bdff5e20c58134010c4
                              • Opcode Fuzzy Hash: 76fadca866277bd33072353964153e23575160aa6beb71df8948ba9bc06db134
                              • Instruction Fuzzy Hash: AFD147B1E05218CFDB14DFA5DA44BADBBF2FB49304F1090A9D509AB291DB746E86CF01
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 78b48ca283f7f5b7b7c589d6764f961e344ad1ac3e644b60f5ee31ebbf58d81b
                              • Instruction ID: 2935bc46b23af268598c699b93baceeadb82659dba829de60e1c3f803ae65e37
                              • Opcode Fuzzy Hash: 78b48ca283f7f5b7b7c589d6764f961e344ad1ac3e644b60f5ee31ebbf58d81b
                              • Instruction Fuzzy Hash: E0D10E71E0421CCFDB14DFA5DA94BADBBF2FB89304F1090A9D409AB295DB356986CF01
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: faa2b787de538a97e77ad9e9d5957231b51cfdcbca43308c7ecb4f5a3e5a6a43
                              • Instruction ID: 7015fa8f8761f79b65a4774d9077f1f1706afa069d7c786211a905195073628d
                              • Opcode Fuzzy Hash: faa2b787de538a97e77ad9e9d5957231b51cfdcbca43308c7ecb4f5a3e5a6a43
                              • Instruction Fuzzy Hash: 07D11E70E04218CFDB14DFA5DA94BEDBBF2FB89304F1090A9D009AB294DB356986CF01
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d82ffc0c9521cd8c576ce4248afc698cd288d9996dca3611d399baf1b30657e1
                              • Instruction ID: d01d196440df0a349589191e604164e309d2c66eeacb399a0641bd4e8443fc1d
                              • Opcode Fuzzy Hash: d82ffc0c9521cd8c576ce4248afc698cd288d9996dca3611d399baf1b30657e1
                              • Instruction Fuzzy Hash: 61D1D074A09228CFDB64CF29C994BE9B7F2BB4A305F5441E9D54DA7294DB346E82CF00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 51dc25227770327937489599574f3d036a2d144031e0c65b8abaf18cf7bc8388
                              • Instruction ID: 04458e5ce59e8c33d1c1ecfa19d0255bd1e4c647da43a140ef02497a7f2d3ffb
                              • Opcode Fuzzy Hash: 51dc25227770327937489599574f3d036a2d144031e0c65b8abaf18cf7bc8388
                              • Instruction Fuzzy Hash: 0BC1C074A05228CFDBA4CF29D994BE9B7F2FB49305F5481E9D509A7294DB346E82CF00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e2255b3248942a70927a1c6bc8ec19dccff8ac50ac88b99a651aee17b4e95511
                              • Instruction ID: cad813d2e6ff072a5682d0dc298efd70bc4856b0f2ad8040ca8eddad38f90f0c
                              • Opcode Fuzzy Hash: e2255b3248942a70927a1c6bc8ec19dccff8ac50ac88b99a651aee17b4e95511
                              • Instruction Fuzzy Hash: 53C1E274A05228CFDB64CF29C988BE9B7F2FB49305F5481E9D549A7294DB746E82CF00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 865ccd26edc292c91c2d2989463b7de01aab4f0f9635a658669df8e5a5c38024
                              • Instruction ID: 284ca3b6a9c4013fc0a2b72e13727a963f3122dbde80b1ef659b4299ce82a5ee
                              • Opcode Fuzzy Hash: 865ccd26edc292c91c2d2989463b7de01aab4f0f9635a658669df8e5a5c38024
                              • Instruction Fuzzy Hash: C6A12475D15208CFDB04CFAAD588BADBBF2FF89304F10946AD409AB2A5DB716985CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 60122ca14dbfdc14fc46546490b5a48864ace5fcac2a7c4916b75c85b4040c6a
                              • Instruction ID: 814ebc0f056b55e099af8fea1761f557b17152ca6f3ecc2c795038f06b69a1af
                              • Opcode Fuzzy Hash: 60122ca14dbfdc14fc46546490b5a48864ace5fcac2a7c4916b75c85b4040c6a
                              • Instruction Fuzzy Hash: 36A12375D15208CFDB04CFAAD588BADBBF2FF89304F10946AD409AB2A5DB716985CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f018c2c6337c3c6181cae18f0cadf254637122c1fee2aa27fc5df74721525500
                              • Instruction ID: 6df225ff876fb0804abf13a5f401f9e5cd576dca502a1a1edda81ca0f798edc2
                              • Opcode Fuzzy Hash: f018c2c6337c3c6181cae18f0cadf254637122c1fee2aa27fc5df74721525500
                              • Instruction Fuzzy Hash: 26C1D074A05228CFDB64CF29C988BE9B7F2FB49305F5441E9D509A7294DB746E86CF00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2110785855.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2900000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b4ca14d575e2c2558ac7e5433a76696d385fd28de9219ea40ceba30f6a04c282
                              • Instruction ID: bf4136ed32632de9c8af882e3be009ca295cbbf7c02080f0dafcc9cf33299b73
                              • Opcode Fuzzy Hash: b4ca14d575e2c2558ac7e5433a76696d385fd28de9219ea40ceba30f6a04c282
                              • Instruction Fuzzy Hash: BF616B34A04109CFDB14DF69E994BADB7F7FB88314F188475D50A972A9CB74AC86CB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bbe0f559ec6893625c9a5de2b1872f8f783d46f5626f88682db105fa180119dc
                              • Instruction ID: 927bc1be1637ef4a0e7ccd61656617cdf5bc2ab9424037876707ee2812b0b018
                              • Opcode Fuzzy Hash: bbe0f559ec6893625c9a5de2b1872f8f783d46f5626f88682db105fa180119dc
                              • Instruction Fuzzy Hash: EA611770E05258CFDB24CFAACA44BADBBF2FB49305F10A0ADD519AB255D7746982CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: de8d495a2abb93d37ee1066c8876293edd11e34a7d8a3797fa39a66d04922d12
                              • Instruction ID: 3c50f1c671509d222e267c4ab258acb406d913c31ac5279539ca874ae69d4067
                              • Opcode Fuzzy Hash: de8d495a2abb93d37ee1066c8876293edd11e34a7d8a3797fa39a66d04922d12
                              • Instruction Fuzzy Hash: D4512371E05218CFDB04DFA9E9847EDBBF2FB8A309F049129E509A7254E7346846DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf499510c6be6f38928e5d5dd0a1f9a8302456a2faaccd008fddb92177dd1aec
                              • Instruction ID: 4bdc53f7e7af37629cf8949418406c091e48a3241f4fff96d1352df613846461
                              • Opcode Fuzzy Hash: bf499510c6be6f38928e5d5dd0a1f9a8302456a2faaccd008fddb92177dd1aec
                              • Instruction Fuzzy Hash: 5A514571E05218CFDB04DFA9E8847EDBBF6FB4A309F049129D509A7254E7346886EF44

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 638 54374c8-5437514 642 5437692-54376c8 638->642 643 543751a-543752c 638->643 657 5437684-5437685 642->657 658 54376ca-54376fe 642->658 646 543752e-543757a 643->646 647 543757c-54375c5 643->647 676 54375c8-54375dc 646->676 647->676 659 5437688-543768f 657->659 661 5437704-543770d 658->661 662 543794d-5437954 658->662 665 5437783-543779c 661->665 666 543770f-5437713 661->666 678 54377a2 665->678 679 54378c9-54378d9 665->679 668 5437715-543772a 666->668 669 543772c-5437738 666->669 671 5437741-543777e 668->671 669->671 671->662 680 54375e7-5437608 676->680 678->679 683 54378f2-54378fe 679->683 684 54378db-54378f0 679->684 689 5437612-543761c 680->689 690 543760a-5437610 680->690 685 5437907-5437948 683->685 684->685 685->662 691 543761f-5437662 689->691 690->691 691->659 698 5437664-5437680 691->698 698->659
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: (aq$4']q$4']q$4']q$4']q$paq
                              • API String ID: 0-463314800
                              • Opcode ID: b92063ebff1513c7e38bf125c47758faca91e035e0050394f6079ba49d2ce37d
                              • Instruction ID: 003c86cf185aa7c2338ee559b5f113247fb0e45655ff2061815f9e60d3fdd54b
                              • Opcode Fuzzy Hash: b92063ebff1513c7e38bf125c47758faca91e035e0050394f6079ba49d2ce37d
                              • Instruction Fuzzy Hash: DD518370A402059FC718DF6D99507AFBBEBFFC8300F148969C449973A5DF78A90687A1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 868 5436200-5436228 870 5436276-5436284 868->870 871 543622a-5436271 868->871 872 5436293 870->872 873 5436286-5436291 call 5433d28 870->873 920 54366cd-54366d4 871->920 874 5436295-543629c 872->874 873->874 877 54362a2-54362a6 874->877 878 5436385-5436389 874->878 881 54366d5-54366fd 877->881 882 54362ac-54362b0 877->882 883 543638b-543639a call 5431f28 878->883 884 54363df-54363e9 878->884 892 5436704-543672e 881->892 885 54362c2-5436320 call 5433a68 call 54344d0 882->885 886 54362b2-54362bc 882->886 899 543639e-54363a3 883->899 887 5436422-5436448 884->887 888 54363eb-54363fa call 5431648 884->888 930 5436793-54367bd 885->930 931 5436326-5436380 885->931 886->885 886->892 911 5436455 887->911 912 543644a-5436453 887->912 903 5436400-543641d 888->903 904 5436736-543674c 888->904 892->904 905 54363a5-54363da call 54360d0 899->905 906 543639c 899->906 903->920 928 5436754-543678c 904->928 905->920 906->899 919 5436457-543647f 911->919 912->919 936 5436550-5436554 919->936 937 5436485-543649e 919->937 928->930 942 54367c7-54367cd 930->942 943 54367bf-54367c5 930->943 931->920 939 5436556-543656f 936->939 940 54365ce-54365d8 936->940 937->936 959 54364a4-54364b3 call 5431070 937->959 939->940 968 5436571-5436580 call 5431070 939->968 945 5436635-543663e 940->945 946 54365da-54365e4 940->946 943->942 951 54367ce-543680b 943->951 948 5436640-543666e call 5433260 call 5433280 945->948 949 5436676-54366c3 945->949 957 54365e6-54365e8 946->957 958 54365ea-54365fc 946->958 948->949 975 54366cb 949->975 964 54365fe-5436600 957->964 958->964 977 54364b5-54364bb 959->977 978 54364cb-54364e0 959->978 972 5436602-5436606 964->972 973 543662e-5436633 964->973 984 5436582-5436588 968->984 985 5436598-54365a3 968->985 980 5436624-5436627 972->980 981 5436608-5436621 972->981 973->945 973->946 975->920 986 54364bf-54364c1 977->986 987 54364bd 977->987 990 54364e2-543650e call 54323b0 978->990 991 5436514-543651d 978->991 980->973 981->980 994 543658a 984->994 995 543658c-543658e 984->995 985->930 996 54365a9-54365cc 985->996 986->978 987->978 990->928 990->991 991->930 993 5436523-543654a 991->993 993->936 993->959 994->985 995->985 996->940 996->968
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Haq$Haq$Haq
                              • API String ID: 0-3013282719
                              • Opcode ID: df94c912dba961bfe79052c73a431ac5d5b31b13472ebf66ceec070f6779363b
                              • Instruction ID: 65fea79a4a3030ee295559698dc97fb1a6d2dcab56388ae0851ee87939ba33a1
                              • Opcode Fuzzy Hash: df94c912dba961bfe79052c73a431ac5d5b31b13472ebf66ceec070f6779363b
                              • Instruction Fuzzy Hash: 22127D30A002059FDB24DFA5D585AAEBBF2FF88300F15856ED40A9B3A5DB35EC46CB50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1010 5437ec0-5437efd 1012 5437f1f-5437f35 call 5437cc8 1010->1012 1013 5437eff-5437f02 1010->1013 1019 54382ab-54382bf 1012->1019 1020 5437f3b-5437f47 1012->1020 1123 5437f04 call 5438830 1013->1123 1124 5437f04 call 54387cb 1013->1124 1125 5437f04 call 54387d8 1013->1125 1015 5437f0a-5437f0c 1015->1012 1017 5437f0e-5437f16 1015->1017 1017->1012 1030 54382ff-5438308 1019->1030 1021 5438078-543807f 1020->1021 1022 5437f4d-5437f50 1020->1022 1025 5438085-543808e 1021->1025 1026 54381ae-54381e8 call 54376d0 1021->1026 1023 5437f53-5437f5c 1022->1023 1028 5437f62-5437f76 1023->1028 1029 54383a0 1023->1029 1025->1026 1031 5438094-54381a0 call 54376d0 call 5437c60 call 54376d0 1025->1031 1128 54381eb call 543a660 1026->1128 1129 54381eb call 543a670 1026->1129 1046 5438068-5438072 1028->1046 1047 5437f7c-5438011 call 5437cc8 * 2 call 54376d0 call 5437c60 call 5437d08 call 5437db0 call 5437e18 1028->1047 1033 54383a5-54383a9 1029->1033 1034 543830a-5438311 1030->1034 1035 54382cd-54382d6 1030->1035 1121 54381a2 1031->1121 1122 54381ab 1031->1122 1040 54383b4 1033->1040 1041 54383ab 1033->1041 1038 5438313-5438356 call 54376d0 1034->1038 1039 543835f-5438366 1034->1039 1035->1029 1037 54382dc-54382ee 1035->1037 1057 54382f0-54382f5 1037->1057 1058 54382fe 1037->1058 1038->1039 1044 543838b-543839e 1039->1044 1045 5438368-5438378 1039->1045 1049 54383b5 1040->1049 1041->1040 1044->1033 1045->1044 1060 543837a-5438382 1045->1060 1046->1021 1046->1023 1102 5438013-543802b call 5437db0 call 54376d0 call 5437980 1047->1102 1103 5438030-5438063 call 5437e18 1047->1103 1049->1049 1126 54382f8 call 543ae10 1057->1126 1127 54382f8 call 543ae0b 1057->1127 1058->1030 1060->1044 1069 54381f1-54382a2 call 54376d0 1069->1019 1102->1103 1103->1046 1121->1122 1122->1026 1123->1015 1124->1015 1125->1015 1126->1058 1127->1058 1128->1069 1129->1069
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4']q$4']q$4']q
                              • API String ID: 0-705557208
                              • Opcode ID: aefc7012cb927cebbf7d43eb7d51eb1bedb6214a02258d6f8af2485027252e5e
                              • Instruction ID: 240eb69935358b428259d7eb222fed4129a9e5291e72243b79bcb1a4ac80770e
                              • Opcode Fuzzy Hash: aefc7012cb927cebbf7d43eb7d51eb1bedb6214a02258d6f8af2485027252e5e
                              • Instruction Fuzzy Hash: 6BF1C774B10218DFCB08DFA4D999AADBBB2FF88300F158159E406AB365DB75ED42CB50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125853960.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e70000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4']q$4']q
                              • API String ID: 0-3120983240
                              • Opcode ID: 245e34253e4c8d254ec140055f18d44a8a3e8c5586d924968138c0ef86de1e98
                              • Instruction ID: 1e8ad8d3e4c4e6851d3d3bb428466a527cf3b93070ade4dadd61f5788ef9db26
                              • Opcode Fuzzy Hash: 245e34253e4c8d254ec140055f18d44a8a3e8c5586d924968138c0ef86de1e98
                              • Instruction Fuzzy Hash: 2542E034E44219CFDB14DFA8D558AEEB7B2FB88324F10A019D912AB354D738AD82DF51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1755 4fc852a-4fc8597 KiUserCallbackDispatcher 1756 4fc8599-4fc859f 1755->1756 1757 4fc85a0-4fc85d1 GetSystemMetrics 1755->1757 1756->1757 1758 4fc85da-4fc85fa 1757->1758 1759 4fc85d3-4fc85d9 1757->1759 1759->1758
                              APIs
                              • KiUserCallbackDispatcher.NTDLL(00000000), ref: 04FC8586
                              • GetSystemMetrics.USER32(00000001), ref: 04FC85C0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CallbackDispatcherMetricsSystemUser
                              • String ID:
                              • API String ID: 365337688-0
                              • Opcode ID: 1b20866acef9adb320c8b6b02cc4e3ef0e98c4745210ae2c726669f120bfc337
                              • Instruction ID: 73ef66a4e3d7c1890af7de7b896facc4100e20516ae42dda2b5804fdb6bc5c6c
                              • Opcode Fuzzy Hash: 1b20866acef9adb320c8b6b02cc4e3ef0e98c4745210ae2c726669f120bfc337
                              • Instruction Fuzzy Hash: C92164B18003498EEB10DF99C5497AEBFF4EB08324F24841AD558A7340D3B8A584CFA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1842 5432708-543272e 1843 5432730-543273d 1842->1843 1844 543273f-5432748 1842->1844 1843->1844 1845 543274b-5432758 1843->1845 1846 5432763 1845->1846 1847 543275a-5432761 1845->1847 1848 543276a-5432794 1846->1848 1847->1848 1849 5432796 1848->1849 1850 543279d-54327b0 call 54323e8 1848->1850 1849->1850 1853 54327b6-54327c9 1850->1853 1854 54328f4-54328fb 1850->1854 1862 54327d7-54327f1 1853->1862 1863 54327cb-54327d2 1853->1863 1855 5432901-5432916 1854->1855 1856 5432b95-5432b9c 1854->1856 1868 5432936-543293c 1855->1868 1869 5432918-543291a 1855->1869 1858 5432c0b-5432c12 1856->1858 1859 5432b9e-5432ba7 1856->1859 1864 5432c18-5432c21 1858->1864 1865 5432cae-5432cb5 1858->1865 1859->1858 1861 5432ba9-5432bbc 1859->1861 1861->1858 1880 5432bbe-5432c03 1861->1880 1884 54327f3-54327f6 1862->1884 1885 54327f8-5432805 1862->1885 1870 54328ed 1863->1870 1864->1865 1871 5432c27-5432c3a 1864->1871 1866 5432cd1-5432cd7 1865->1866 1867 5432cb7-5432cc8 1865->1867 1874 5432ce9-5432cf2 1866->1874 1875 5432cd9-5432cdf 1866->1875 1867->1866 1890 5432cca 1867->1890 1876 5432942-5432944 1868->1876 1877 5432a04-5432a08 1868->1877 1869->1868 1872 543291c-5432933 1869->1872 1870->1854 1888 5432c4d-5432c51 1871->1888 1889 5432c3c-5432c4b 1871->1889 1872->1868 1881 5432ce1-5432ce7 1875->1881 1882 5432cf5-5432d6a 1875->1882 1876->1877 1883 543294a-5432989 1876->1883 1877->1856 1886 5432a0e-5432a10 1877->1886 1880->1858 1922 5432c05-5432c08 1880->1922 1881->1874 1881->1882 1955 5432d78 1882->1955 1956 5432d6c-5432d76 1882->1956 1988 543298b call 4ecf960 1883->1988 1989 543298b call 4ecf953 1883->1989 1892 5432807-543281b 1884->1892 1885->1892 1886->1856 1893 5432a16-5432a1f 1886->1893 1894 5432c53-5432c55 1888->1894 1895 5432c71-5432c73 1888->1895 1889->1888 1890->1866 1892->1870 1916 5432821-5432875 1892->1916 1900 5432b72-5432b78 1893->1900 1894->1895 1902 5432c57-5432c6e 1894->1902 1895->1865 1903 5432c75-5432c7b 1895->1903 1904 5432b8b 1900->1904 1905 5432b7a-5432b89 1900->1905 1902->1895 1903->1865 1908 5432c7d-5432cab 1903->1908 1911 5432b8d-5432b8f 1904->1911 1905->1911 1908->1865 1911->1856 1914 5432a24-5432a32 call 5431070 1911->1914 1924 5432a34-5432a3a 1914->1924 1925 5432a4a-5432a64 1914->1925 1958 5432883-5432887 1916->1958 1959 5432877-5432879 1916->1959 1922->1858 1929 5432a3e-5432a40 1924->1929 1930 5432a3c 1924->1930 1925->1900 1935 5432a6a-5432a6e 1925->1935 1928 5432990-54329cb 1949 54329e2-5432a01 1928->1949 1950 54329cd-54329df 1928->1950 1929->1925 1930->1925 1939 5432a70-5432a79 1935->1939 1940 5432a8f 1935->1940 1942 5432a80-5432a83 1939->1942 1943 5432a7b-5432a7e 1939->1943 1941 5432a92-5432aac 1940->1941 1941->1900 1961 5432ab2-5432b33 1941->1961 1947 5432a8d 1942->1947 1943->1947 1947->1941 1949->1877 1950->1949 1962 5432d7d-5432d7f 1955->1962 1956->1962 1958->1870 1960 5432889-54328a1 1958->1960 1959->1958 1960->1870 1968 54328a3-54328af 1960->1968 1984 5432b35-5432b47 1961->1984 1985 5432b4a-5432b70 1961->1985 1963 5432d81-5432d84 1962->1963 1964 5432d86-5432d8b 1962->1964 1967 5432d91-5432dbe 1963->1967 1964->1967 1970 54328b1-54328b4 1968->1970 1971 54328be-54328c4 1968->1971 1970->1971 1973 54328c6-54328c9 1971->1973 1974 54328cc-54328d5 1971->1974 1973->1974 1976 54328d7-54328da 1974->1976 1977 54328e4-54328ea 1974->1977 1976->1977 1977->1870 1984->1985 1985->1856 1985->1900 1988->1928 1989->1928
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: $]q$$]q
                              • API String ID: 0-127220927
                              • Opcode ID: 8b646119c4d5d09e5a606e3228fccf9d79adadaefaf213db8b569c26b08a1017
                              • Instruction ID: 30c6c4e3e270455b29802defe382cc9ce590fdc7234a9bf1b1e421e8dfc5f7c3
                              • Opcode Fuzzy Hash: 8b646119c4d5d09e5a606e3228fccf9d79adadaefaf213db8b569c26b08a1017
                              • Instruction Fuzzy Hash: 1322AD34E042199FDF14DFA4D989AEEBBB2FF48304F148456E801A73A4DB75AD02CB90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2376 4e718c0-4e718e8 2377 4e718ef-4e71918 2376->2377 2378 4e718ea 2376->2378 2379 4e7191a-4e71923 2377->2379 2380 4e71939 2377->2380 2378->2377 2381 4e71925-4e71928 2379->2381 2382 4e7192a-4e7192d 2379->2382 2383 4e7193c-4e71940 2380->2383 2384 4e71937 2381->2384 2382->2384 2385 4e71cf7-4e71d0e 2383->2385 2384->2383 2387 4e71945-4e71949 2385->2387 2388 4e71d14-4e71d18 2385->2388 2389 4e7194e-4e71952 2387->2389 2390 4e7194b-4e719a8 2387->2390 2391 4e71d4d-4e71d51 2388->2391 2392 4e71d1a-4e71d4a 2388->2392 2394 4e71954-4e71961 2389->2394 2395 4e7197b-4e7199f 2389->2395 2402 4e719ad-4e719b1 2390->2402 2403 4e719aa-4e71a1b 2390->2403 2396 4e71d53-4e71d5c 2391->2396 2397 4e71d72 2391->2397 2392->2391 2417 4e7196a-4e71978 2394->2417 2395->2385 2398 4e71d63-4e71d66 2396->2398 2399 4e71d5e-4e71d61 2396->2399 2400 4e71d75-4e71d7b 2397->2400 2408 4e71d70 2398->2408 2399->2408 2405 4e719b3-4e719d7 2402->2405 2406 4e719da-4e71a01 2402->2406 2410 4e71a20-4e71a24 2403->2410 2411 4e71a1d-4e71a7a 2403->2411 2405->2406 2431 4e71a03-4e71a09 2406->2431 2432 4e71a11-4e71a12 2406->2432 2408->2400 2414 4e71a26-4e71a4a 2410->2414 2415 4e71a4d-4e71a71 2410->2415 2420 4e71a7f-4e71a83 2411->2420 2421 4e71a7c-4e71ad8 2411->2421 2414->2415 2415->2385 2417->2395 2424 4e71a85-4e71aa9 2420->2424 2425 4e71aac-4e71acf 2420->2425 2433 4e71add-4e71ae1 2421->2433 2434 4e71ada-4e71b3c 2421->2434 2424->2425 2425->2385 2431->2432 2432->2385 2436 4e71ae3-4e71b07 2433->2436 2437 4e71b0a-4e71b22 2433->2437 2443 4e71b41-4e71b45 2434->2443 2444 4e71b3e-4e71ba0 2434->2444 2436->2437 2453 4e71b24-4e71b2a 2437->2453 2454 4e71b32-4e71b33 2437->2454 2446 4e71b47-4e71b6b 2443->2446 2447 4e71b6e-4e71b86 2443->2447 2455 4e71ba5-4e71ba9 2444->2455 2456 4e71ba2-4e71c04 2444->2456 2446->2447 2464 4e71b96-4e71b97 2447->2464 2465 4e71b88-4e71b8e 2447->2465 2453->2454 2454->2385 2458 4e71bd2-4e71bea 2455->2458 2459 4e71bab-4e71bcf 2455->2459 2466 4e71c06-4e71c68 2456->2466 2467 4e71c09-4e71c0d 2456->2467 2475 4e71bec-4e71bf2 2458->2475 2476 4e71bfa-4e71bfb 2458->2476 2459->2458 2464->2385 2465->2464 2477 4e71c6d-4e71c71 2466->2477 2478 4e71c6a-4e71cc3 2466->2478 2469 4e71c36-4e71c4e 2467->2469 2470 4e71c0f-4e71c33 2467->2470 2486 4e71c50-4e71c56 2469->2486 2487 4e71c5e-4e71c5f 2469->2487 2470->2469 2475->2476 2476->2385 2480 4e71c73-4e71c97 2477->2480 2481 4e71c9a-4e71cbd 2477->2481 2488 4e71cc5-4e71ce9 2478->2488 2489 4e71cec-4e71cef 2478->2489 2480->2481 2481->2385 2486->2487 2487->2385 2488->2489 2489->2385
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125853960.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e70000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4']q$4']q
                              • API String ID: 0-3120983240
                              • Opcode ID: 7ea92ffe4eb6b9de7f651d1371f789a427d800cb0a2e6fb4125f37b05555d4e7
                              • Instruction ID: dab545f328d94c2dbba4530c1bf3e0bbf2ad2848accb9abacb5df1f91553ee5b
                              • Opcode Fuzzy Hash: 7ea92ffe4eb6b9de7f651d1371f789a427d800cb0a2e6fb4125f37b05555d4e7
                              • Instruction Fuzzy Hash: 53F1BF34E01318DFDB28DFA4E5986ACBBB2FF49315F209169E506A7354DB356982CF01

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2501 54358b8-54358ca 2502 54358f4-54358f8 2501->2502 2503 54358cc-54358ed 2501->2503 2504 5435904-5435913 2502->2504 2505 54358fa-54358fc 2502->2505 2503->2502 2506 5435915 2504->2506 2507 543591f-543594b 2504->2507 2505->2504 2506->2507 2511 5435951-5435957 2507->2511 2512 5435b78-5435bb7 2507->2512 2513 5435a29-5435a2d 2511->2513 2514 543595d-5435963 2511->2514 2543 5435bba-5435bbf 2512->2543 2518 5435a50-5435a59 2513->2518 2519 5435a2f-5435a38 2513->2519 2514->2512 2517 5435969-5435976 2514->2517 2520 5435a08-5435a11 2517->2520 2521 543597c-5435985 2517->2521 2523 5435a5b-5435a7b 2518->2523 2524 5435a7e-5435a81 2518->2524 2519->2512 2522 5435a3e-5435a4e 2519->2522 2520->2512 2527 5435a17-5435a23 2520->2527 2521->2512 2528 543598b-54359a3 2521->2528 2526 5435a84-5435a8a 2522->2526 2523->2524 2524->2526 2526->2512 2530 5435a90-5435aa3 2526->2530 2527->2513 2527->2514 2531 54359a5 2528->2531 2532 54359af-54359c1 2528->2532 2530->2512 2534 5435aa9-5435ab9 2530->2534 2531->2532 2532->2520 2540 54359c3-54359c9 2532->2540 2534->2512 2536 5435abf-5435acc 2534->2536 2536->2512 2539 5435ad2-5435ae7 2536->2539 2539->2512 2549 5435aed-5435b10 2539->2549 2541 54359d5-54359db 2540->2541 2542 54359cb 2540->2542 2541->2512 2544 54359e1-5435a05 2541->2544 2542->2541 2545 5435bc1 2543->2545 2546 5435bd5-5435be1 2543->2546 2548 5435bc4-5435bc6 2545->2548 2550 5435be3 2546->2550 2551 5435bed-5435c09 2546->2551 2553 5435c0a-5435c10 2548->2553 2554 5435bc8-5435bd3 2548->2554 2549->2512 2558 5435b12-5435b1d 2549->2558 2550->2551 2553->2543 2560 5435c12-5435c2e 2553->2560 2554->2546 2554->2548 2561 5435b1f-5435b29 2558->2561 2562 5435b6e-5435b75 2558->2562 2565 5435c35-5435c37 2560->2565 2566 5435c30 call 5431070 2560->2566 2561->2562 2567 5435b2b-5435b41 2561->2567 2568 5435c39-5435c3f 2565->2568 2569 5435c4f-5435c51 2565->2569 2566->2565 2574 5435b43 2567->2574 2575 5435b4d-5435b66 2567->2575 2570 5435c43-5435c45 2568->2570 2571 5435c41 2568->2571 2590 5435c53 call 54360c0 2569->2590 2591 5435c53 call 54360d0 2569->2591 2592 5435c53 call 5436e70 2569->2592 2593 5435c53 call 54360c8 2569->2593 2594 5435c53 call 5436e9c 2569->2594 2570->2569 2571->2569 2573 5435c59-5435c5d 2576 5435ca8-5435cb8 2573->2576 2577 5435c5f-5435c76 2573->2577 2574->2575 2575->2562 2577->2576 2583 5435c78-5435c82 2577->2583 2585 5435c95-5435ca5 2583->2585 2586 5435c84-5435c93 2583->2586 2586->2585 2590->2573 2591->2573 2592->2573 2593->2573 2594->2573
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: (aq$d
                              • API String ID: 0-3557608343
                              • Opcode ID: f7f50c59623f548abafbdac37df7db91a89aaec8bb7e5c6ebb91b2ab35fa794c
                              • Instruction ID: b31e7709090ab81d49ff5de422394a08512844d8a28f2e5517d1b8ce104e73c5
                              • Opcode Fuzzy Hash: f7f50c59623f548abafbdac37df7db91a89aaec8bb7e5c6ebb91b2ab35fa794c
                              • Instruction Fuzzy Hash: E3D14A30600606DFCB14DF28C5859AABBF2FF89314B15C9AAD45A9B365DB30FD46CB90
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: (aq$Haq
                              • API String ID: 0-3785302501
                              • Opcode ID: 6647f86c370dd71d062b285d0cc68180392df62974b04449a5ee9ad52dc1f3b8
                              • Instruction ID: 6ab0e2ee342c4c67924d937cce09a89b493bc23514680d73f175c684d5b51137
                              • Opcode Fuzzy Hash: 6647f86c370dd71d062b285d0cc68180392df62974b04449a5ee9ad52dc1f3b8
                              • Instruction Fuzzy Hash: 3C51DC307042148FD729AF78D455AAE7BA2FF89704B1444AED4069B3A5CF36ED07CB91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: (aq$(aq
                              • API String ID: 0-3916115647
                              • Opcode ID: 84b0eeb91d5dd195ff5a1a408fb11b7adf39c93a29f7808a07b66f3fffd1cee9
                              • Instruction ID: 0ed88c313804a88b48768cd41ba09ee22176f0c9ba467a1e52d3a4ddf8e24aa0
                              • Opcode Fuzzy Hash: 84b0eeb91d5dd195ff5a1a408fb11b7adf39c93a29f7808a07b66f3fffd1cee9
                              • Instruction Fuzzy Hash: 31518F313041158FDB159F29D459AEE3BA6FF98700F1481AAE805CB3A5CF35DC52C791
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4']q$paq
                              • API String ID: 0-4101361271
                              • Opcode ID: 206c35e6ed7c429c661ff2ce317e893a82f44495179ad64200735c93107fdbe2
                              • Instruction ID: e8b2a34d6ec3126c5ecf01ba06a6905b0320919a2ca9c7d315dbcf957aa3e91e
                              • Opcode Fuzzy Hash: 206c35e6ed7c429c661ff2ce317e893a82f44495179ad64200735c93107fdbe2
                              • Instruction Fuzzy Hash: 6A41C470A403059FC718DF68D950BAFBBEBFF88300F148929C04997669DB75E906C7A1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 8$D
                              • API String ID: 0-1432357141
                              • Opcode ID: a6be915def403bac8bb6f0c145b1f6e6239a9669da5b01489268513621ee9845
                              • Instruction ID: 021a7204be78844fafc52cae7d6edd296cfd70e7d637e79e67a097859e922dda
                              • Opcode Fuzzy Hash: a6be915def403bac8bb6f0c145b1f6e6239a9669da5b01489268513621ee9845
                              • Instruction Fuzzy Hash: E63171B5945268CFDBA0DF64C984BACBBF1BB48305F5084DAD50EA7250DB745E8ACF00
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 5$=
                              • API String ID: 0-1952535518
                              • Opcode ID: e6b79a3dcdf29ab82bc60c8a9c41dff7bcf9fdea9f3b0100f5c6b65c9be0f1c9
                              • Instruction ID: fab254a65e97dff696cf0615001b710ab611e9f510d4bcc1ec91409b354a8c70
                              • Opcode Fuzzy Hash: e6b79a3dcdf29ab82bc60c8a9c41dff7bcf9fdea9f3b0100f5c6b65c9be0f1c9
                              • Instruction Fuzzy Hash: FA117C789012689FDBA0CF64C895BECBBB1BB49314F0084D9E40DA3250EB309E85DF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: +$E
                              • API String ID: 0-1007101098
                              • Opcode ID: 03a47f33abd3bc07b896131ee48aee94c421213e1e6f1d7a30f34faeefdead25
                              • Instruction ID: 8983a789bc4846ba505eb87d01b650017e9a8bfe3f356710f3ce1fccfdb61c79
                              • Opcode Fuzzy Hash: 03a47f33abd3bc07b896131ee48aee94c421213e1e6f1d7a30f34faeefdead25
                              • Instruction Fuzzy Hash: 2101C27494126ACFDB65DF54C995BACBBB1FB48304F1080EAA50EA7241DB711E81CF40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: $$D
                              • API String ID: 0-1079792385
                              • Opcode ID: 7350c3371f206196a6e9c4a7c7712b134ce8a4b30cefd4fe1654de68f64691fc
                              • Instruction ID: 8dbb4dc874efb3422e6b96365b36d5423c3cfa364badfff7dcfb8bbcc40b2b6e
                              • Opcode Fuzzy Hash: 7350c3371f206196a6e9c4a7c7712b134ce8a4b30cefd4fe1654de68f64691fc
                              • Instruction Fuzzy Hash: 0E11E274904158CFCBA0CB68C894BECBBF1BB49304F5485EAD50DA7291DB719E86CF01
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: $$D
                              • API String ID: 0-1079792385
                              • Opcode ID: d168b9ad51df76c0c81639257270ace5fbf8594d4c534dd5e2c648db4e0879d3
                              • Instruction ID: a8ca12ece3d2fb81487d416dbc3115855cde0c6297e034a938d38fb122b92685
                              • Opcode Fuzzy Hash: d168b9ad51df76c0c81639257270ace5fbf8594d4c534dd5e2c648db4e0879d3
                              • Instruction Fuzzy Hash: 82F092B5900258CFDB60CF58C984BACB7F2BB48304F5085EAD50EA7250DB719E8ACF40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: ,aq
                              • API String ID: 0-3092978723
                              • Opcode ID: 93c8e1f76c842b2dd16aa505e8d2c3e28731b21d2da10d33eead03fd49ae5175
                              • Instruction ID: 86e8da966979b8b19d8dbe9730698701a1c9578099eb5eebed2d3a784590c151
                              • Opcode Fuzzy Hash: 93c8e1f76c842b2dd16aa505e8d2c3e28731b21d2da10d33eead03fd49ae5175
                              • Instruction Fuzzy Hash: FF522C75A002288FDB24CF68C985BDDBBF6BF88700F1541D9E509A7361DA709E81CF61
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: (_]q
                              • API String ID: 0-188044275
                              • Opcode ID: a25a0684a0d45281feffd608d07f305f45797823ec8939ff605007b5ee4b1d18
                              • Instruction ID: 46773fb1016a317cf393500f9f6ba669b45e299ec9b87cdaa56e71f62de482cc
                              • Opcode Fuzzy Hash: a25a0684a0d45281feffd608d07f305f45797823ec8939ff605007b5ee4b1d18
                              • Instruction Fuzzy Hash: 1B22AE35A002049FDB14DF68D495AADB7F2FF88714F1484AAE806EB3A5CB75ED41CB50
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04FDEE87
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 8e3c8e03b8dedca45505def0db83b66ba0723f5b9bbf5b280ed099a186cee23a
                              • Instruction ID: 3905de21c587cf87e60733311a8cbcd66099500be6021a16c835bad5c6d5691a
                              • Opcode Fuzzy Hash: 8e3c8e03b8dedca45505def0db83b66ba0723f5b9bbf5b280ed099a186cee23a
                              • Instruction Fuzzy Hash: 38A1F570D00618DFDB24CFA9C8857EDBBB2FF09304F14956AE859AB240DB74A986CF45
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04FDEE87
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 13d21fed21f60a8a776fc93a842dac594e65386b27da606ff9956045aed554a4
                              • Instruction ID: d438fef140011b6c5209c6d5786f0e2cdc96190eecc1276406940140f204afd4
                              • Opcode Fuzzy Hash: 13d21fed21f60a8a776fc93a842dac594e65386b27da606ff9956045aed554a4
                              • Instruction Fuzzy Hash: 74A1F570D00618CFDB24CFA9C8457EDBBB2FF09304F14956AE859AB240DB74A986CF85
                              APIs
                              • CopyFileA.KERNEL32(?,?,?), ref: 04FC1343
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CopyFile
                              • String ID:
                              • API String ID: 1304948518-0
                              • Opcode ID: b8f11949a26c82c94e11186039f5ec2d5d44748aabcefeb3831f388380e6688b
                              • Instruction ID: 90e47ace30504236126de374870f9f3d0a959a3da684e7a9ba0a3a39e82c5042
                              • Opcode Fuzzy Hash: b8f11949a26c82c94e11186039f5ec2d5d44748aabcefeb3831f388380e6688b
                              • Instruction Fuzzy Hash: 4A612474D003198FDB10CFA9CA857EEBBB1FF09304F24812AE854A7281D774A996CF85
                              APIs
                              • CopyFileA.KERNEL32(?,?,?), ref: 04FC1343
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CopyFile
                              • String ID:
                              • API String ID: 1304948518-0
                              • Opcode ID: 42f4487c64fcde6bcc30e11bc402f6e671061eba2ce2c4ec0e7ded0e0411f2ee
                              • Instruction ID: 70798d5944e4cd9683858eb22f2de830a4a8c09edeaffc8cc3380c3af84c719e
                              • Opcode Fuzzy Hash: 42f4487c64fcde6bcc30e11bc402f6e671061eba2ce2c4ec0e7ded0e0411f2ee
                              • Instruction Fuzzy Hash: 4A610370D003199FDB10CFA9CA457EEBBB1FF09314F24812AE855A7281D774A996CF85
                              APIs
                              • RegSetValueExA.KERNELBASE(?,?,?,?,?,?), ref: 04FC1808
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 5a2b403b5b2d2b6ca0bd02e9074c9366a1d065d3206bea438736082ba2da2ebd
                              • Instruction ID: 8175f65990a3bf2c825e64a40eb9e6e072426363a684bb40f2e6e4f814e49fdf
                              • Opcode Fuzzy Hash: 5a2b403b5b2d2b6ca0bd02e9074c9366a1d065d3206bea438736082ba2da2ebd
                              • Instruction Fuzzy Hash: 9051E2B4D002199FDF14CFA9CA85B9EBBB1FF09304F14902AE818B7251DB34A956CF84
                              APIs
                              • RegSetValueExA.KERNELBASE(?,?,?,?,?,?), ref: 04FC1808
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 0131ee87edaf24feb2c3d32e2684f2985eaf22d751e28f375eb0939f99c90a89
                              • Instruction ID: 2fd0a8b6947ee3e392ca63fc33625f6f9b8c21a514439df64663ec3b0c017c40
                              • Opcode Fuzzy Hash: 0131ee87edaf24feb2c3d32e2684f2985eaf22d751e28f375eb0939f99c90a89
                              • Instruction Fuzzy Hash: 1A51C2B4D002199FDF14CFA9CA85B9DBBB1FF09304F14912AE818B7251DB34A956CF84
                              APIs
                              • RegOpenKeyExA.KERNELBASE(?,?,?,?,?), ref: 04FC1598
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: 656f1e050b04666c9e1179198340fcb6a1f0f7f95df62b70bd1791ccafb544cc
                              • Instruction ID: d8c2e268f5745084f7704e7ecc26173007b80e15913b24d0c4368ef37ab8086d
                              • Opcode Fuzzy Hash: 656f1e050b04666c9e1179198340fcb6a1f0f7f95df62b70bd1791ccafb544cc
                              • Instruction Fuzzy Hash: F151F3B4D002099FDF10CFA9DA85A9EBBB1FF09300F24942AE815B7251D734A952CF45
                              APIs
                              • RegOpenKeyExA.KERNELBASE(?,?,?,?,?), ref: 04FC1598
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: aeef88076178672a215a44d9cbe162a77b92409a89b4b4e9f44f70eeef961d2d
                              • Instruction ID: f626d6e264be7ac1c53fd5f71060ef372a581c31a5b11a350ec454f3eb5b32e1
                              • Opcode Fuzzy Hash: aeef88076178672a215a44d9cbe162a77b92409a89b4b4e9f44f70eeef961d2d
                              • Instruction Fuzzy Hash: 2D51E2B4D002099FDF10CFA9DA84A9EBBB1FF09300F24942AE819B7251D774A992CF45
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04FDF76B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: ef86ab0c1f44fd5bb9a3b507c1f95206f5ad1657d6a332c424deacd9f1a42744
                              • Instruction ID: 84f37135b9e285b879a0a66d25b69272b4f502e7e41ccc28a4b41e88d42a458e
                              • Opcode Fuzzy Hash: ef86ab0c1f44fd5bb9a3b507c1f95206f5ad1657d6a332c424deacd9f1a42744
                              • Instruction Fuzzy Hash: 51419BB5D012589FCB00CFA9D984AEEFBF1BB49310F24942AE819B7250D735AA45CB64
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04FDF76B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: 75b74c559feff42fe12578e4d3b2946eb6ae55bfb30d418c10da9b572632b3e5
                              • Instruction ID: 8536cb5fe7481d12fb6a961414f3872c416885552b064fa6fa0b2736a5a42160
                              • Opcode Fuzzy Hash: 75b74c559feff42fe12578e4d3b2946eb6ae55bfb30d418c10da9b572632b3e5
                              • Instruction Fuzzy Hash: 76419AB5D012589FCF00CFA9D984AEEFBF1BB49310F14942AE819B7210D739AA45CF64
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04FDF5E2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: a93f4151cf099c480aa115b7e6b2fe94bc4ae64b8c7f6f1b42a02f3911178999
                              • Instruction ID: bb89872b4777363988ff96a9fb598c47b3c5f6c56656d2d872092b0acc924a16
                              • Opcode Fuzzy Hash: a93f4151cf099c480aa115b7e6b2fe94bc4ae64b8c7f6f1b42a02f3911178999
                              • Instruction Fuzzy Hash: AA3199B9D002589BCF10CFA9D980ADEFBB5FB49310F14942AE819B7210D735A942CF68
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04FDF5E2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 9a672b55bbed2bc0ec64147e16ba22fca742f6daeec987008d4cc4e166b954dc
                              • Instruction ID: 1222d255243361e182607234cf464c0ae65cc306efc7f9bdab77712896126716
                              • Opcode Fuzzy Hash: 9a672b55bbed2bc0ec64147e16ba22fca742f6daeec987008d4cc4e166b954dc
                              • Instruction Fuzzy Hash: EF3188B9D042589FCF10CFA9D980A9EFBB5BF49310F14942AE819B7210D735A946CF64
                              APIs
                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 04FDFC2C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: f43071ca870fb1510ce2602f5ff18faa05b66e9ca09d82777525d709b38f9560
                              • Instruction ID: 76366135f18e4e1e98c689102ee761e1b0f9650869145bc1e65c05f82bb06a3f
                              • Opcode Fuzzy Hash: f43071ca870fb1510ce2602f5ff18faa05b66e9ca09d82777525d709b38f9560
                              • Instruction Fuzzy Hash: A531BBB5D012589FCB10CFA9D584AEEFBB1BF09310F14942AE819B7210D739A945CFA4
                              APIs
                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 04FDFC2C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 31c8493a01d629feefd59b5d72c154314578fbc709dd1e8810842b14a9945f81
                              • Instruction ID: e823a1a4c3178a2347d0c86a91dfd527f8bf0d38b19b94906c2bdcf1f9f057e4
                              • Opcode Fuzzy Hash: 31c8493a01d629feefd59b5d72c154314578fbc709dd1e8810842b14a9945f81
                              • Instruction Fuzzy Hash: 0131AAB5D002589FCB10DFA9D584AEEFBB1BF49310F14942AE815B7210D739A945CFA4
                              APIs
                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0290FCFC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2110785855.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2900000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: c5e2f6f0d02d8b39801e7695f38b45f978706c9f44ced7987d82159e3738661c
                              • Instruction ID: b44b73179dbe2553dd922be4f2e59802c0588c998cfd756604a02c89fda7d9ea
                              • Opcode Fuzzy Hash: c5e2f6f0d02d8b39801e7695f38b45f978706c9f44ced7987d82159e3738661c
                              • Instruction Fuzzy Hash: 6C3198B4D012589FCB10CFA9D984A9EFBB5FF49310F24942AE819B7210D735A945CF94
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 04FDF087
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: c3f06d6e9c812ebf51704b2cab911613e0098fd415ca26c232aa6becea1589ea
                              • Instruction ID: ab4b1a67fe07092b4aa020870a32193fa37e711c5f56504d0257033ba08ac133
                              • Opcode Fuzzy Hash: c3f06d6e9c812ebf51704b2cab911613e0098fd415ca26c232aa6becea1589ea
                              • Instruction Fuzzy Hash: 5341BCB5D002589FDB10DFA9D984AEEFBF1BF49314F14802AE419B7240D739A985CF64
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 04FDF087
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: 94daaf5fda1a2bba634593f72df6dcbba1aae899946e02a9ef921f1ab412722b
                              • Instruction ID: 5aff40caebf1ba5ee66007efaf2e3c6632060fc5db10437325b1c2b69d4583b2
                              • Opcode Fuzzy Hash: 94daaf5fda1a2bba634593f72df6dcbba1aae899946e02a9ef921f1ab412722b
                              • Instruction Fuzzy Hash: 4631AEB5D012589FDB10DFA9D984AEEFBF1BF49310F14802AE419B7240D739A985CFA4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: (aq
                              • API String ID: 0-600464949
                              • Opcode ID: 9c1911fc6789f151ff74b40a09f7b2545df093e8f32ecec6d5b0a241e784f10f
                              • Instruction ID: 7bfcca129766af9f9c5c1058f66082e7d6ca34733627f9b0c84896c58c3c3f81
                              • Opcode Fuzzy Hash: 9c1911fc6789f151ff74b40a09f7b2545df093e8f32ecec6d5b0a241e784f10f
                              • Instruction Fuzzy Hash: B4A1A2313442009FD7159F65D899E6A7BB3FF89710F1580AAE5069B3B1CB36EC02DB91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4']q
                              • API String ID: 0-1259897404
                              • Opcode ID: 66c233d32141dab949155c94f2e81ae32e37c132cc32e643824b32ba8970d0cb
                              • Instruction ID: e17240b2c9a59e5663ea75d64657d1f02da33c5d33c0c7158f1501dc5650ea4c
                              • Opcode Fuzzy Hash: 66c233d32141dab949155c94f2e81ae32e37c132cc32e643824b32ba8970d0cb
                              • Instruction Fuzzy Hash: 3AA1F874B10218DFCB04EFA4D999A9DBBB2FF88310F158159E406AB375DB74AD42CB90
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4']q
                              • API String ID: 0-1259897404
                              • Opcode ID: 338fd6e172cf063808371a2bb235061b86e007f3346944c3ea97167516e81d7e
                              • Instruction ID: c712a6101b3d0edf6bfd7e5b0342bf034b0eb1fba94daf458e99653319d81eaa
                              • Opcode Fuzzy Hash: 338fd6e172cf063808371a2bb235061b86e007f3346944c3ea97167516e81d7e
                              • Instruction Fuzzy Hash: 10A1E974B10218DFCB04EFA4D999A9DBBB2FF88300F158159E406AB375DB74AD46CB50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: (aq
                              • API String ID: 0-600464949
                              • Opcode ID: 19bdb4d5c6ec4724faf3ff8620ebff1465fbabd136184df38abbd066ed8d911a
                              • Instruction ID: 7a8b1a1c3cc9991430f396232e089c7d58c0a352f49402e7683e97f40eb9945c
                              • Opcode Fuzzy Hash: 19bdb4d5c6ec4724faf3ff8620ebff1465fbabd136184df38abbd066ed8d911a
                              • Instruction Fuzzy Hash: F251F331A006568FCB10CF28C5849AAFBB1FF85321F1585A9E515AB291C730FC52CBD0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: ,aq
                              • API String ID: 0-3092978723
                              • Opcode ID: 7eae3bd5b9b43ba4957b5f9f8d1fd1c411f7f79068e59bfafd69030ba76dcf5a
                              • Instruction ID: 402839d061fb98e078942dc90585bace03921cc25221ae74298adfc309631c2a
                              • Opcode Fuzzy Hash: 7eae3bd5b9b43ba4957b5f9f8d1fd1c411f7f79068e59bfafd69030ba76dcf5a
                              • Instruction Fuzzy Hash: 74519E357001158FCB04DF69D990AAEFBE6EF89311B258069E906DB3A5DB31EC02CB91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: paq
                              • API String ID: 0-3273118895
                              • Opcode ID: 7125ee661d8408a4f2a1ab2f27974170d94c8f858a4d8f9100e1cefcd32b05ff
                              • Instruction ID: a28753f657f0b1afc1e5ae3ee2b670e76feaa1b65e798f3eef32410ca701ce28
                              • Opcode Fuzzy Hash: 7125ee661d8408a4f2a1ab2f27974170d94c8f858a4d8f9100e1cefcd32b05ff
                              • Instruction Fuzzy Hash: C9514C76600100AFCB459FA8C944D697FF7FF8C31471680E8E2099B276DA36DC22EB51
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4']q
                              • API String ID: 0-1259897404
                              • Opcode ID: 100a2b022cee0aaacffd894872007b264a2519509dadb015c0921b2839355932
                              • Instruction ID: 8b5378f36fef74e0831f19bebb7b28957bd996c97915705d19febf84ecffd992
                              • Opcode Fuzzy Hash: 100a2b022cee0aaacffd894872007b264a2519509dadb015c0921b2839355932
                              • Instruction Fuzzy Hash: 5A416430B106189FCB04AB69C459AAEB7B7EFCC700F10811EE0469B3B4DF749D069B91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: paq
                              • API String ID: 0-3273118895
                              • Opcode ID: 90f633185e97db6c7f50f52e95bc07bf8d4d62f03f0aa92332658735dd090cbb
                              • Instruction ID: 2b732a882bbfcee65cf1cf2c8b310ee1db3b9f126b3b36a99688060487449769
                              • Opcode Fuzzy Hash: 90f633185e97db6c7f50f52e95bc07bf8d4d62f03f0aa92332658735dd090cbb
                              • Instruction Fuzzy Hash: 22410776600100AFCB4A9FA8D944D557FF3FF8C31471A8498E2099B276DA36DC22EB50
                              APIs
                              • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 04E51347
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125795635.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e50000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 155d5d86329e773e20cf7df7e9ed5764ab4728ff57f6e8cf8042b07ce28f6af5
                              • Instruction ID: 713792aecc926af51b6536895852614f6b5fa04f0bcd886277439183963c4c2e
                              • Opcode Fuzzy Hash: 155d5d86329e773e20cf7df7e9ed5764ab4728ff57f6e8cf8042b07ce28f6af5
                              • Instruction Fuzzy Hash: E031A9B8D002489FCB10CFA9D480AEEFBB1FF49310F14942AE815B7220D735A945CF94
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4']q
                              • API String ID: 0-1259897404
                              • Opcode ID: 488c6691b88e885b71257fb6d037a0ec9e296a25630ac992125df4db7f04a41a
                              • Instruction ID: 4ef1f153cd0cccb8679158047210db4f342650d15c7828db74b51ab183b0cc84
                              • Opcode Fuzzy Hash: 488c6691b88e885b71257fb6d037a0ec9e296a25630ac992125df4db7f04a41a
                              • Instruction Fuzzy Hash: 0A31BF72B001149FCF049F94D994E9A7BA2FF8D310F0540A9EA0A9B375DA71ED13CBA0
                              APIs
                              • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 04E51347
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125795635.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e50000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 1b2ecb89d86d34f06e0445ae65ae37a20cd1c2f82f55cb86a0fb2ecddd313552
                              • Instruction ID: 53c11af0af4ddcab4708e01763e1769ad5132b2f761ce7b3a329feab42213361
                              • Opcode Fuzzy Hash: 1b2ecb89d86d34f06e0445ae65ae37a20cd1c2f82f55cb86a0fb2ecddd313552
                              • Instruction Fuzzy Hash: 503197B8D002489FCB10CFA9D884AAEFBB5BF49310F14942AE819B7210D735A945CF94
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4']q
                              • API String ID: 0-1259897404
                              • Opcode ID: c8b2519b43c1c9e742eb7fe5403df94dcee85feae8b7bbea922a84960abaacb1
                              • Instruction ID: c6769ff547493e774de94722b3ecd338fa75cdaf762bfd26c38f6fb5a1932184
                              • Opcode Fuzzy Hash: c8b2519b43c1c9e742eb7fe5403df94dcee85feae8b7bbea922a84960abaacb1
                              • Instruction Fuzzy Hash: 4E213770B106185BD714AB55D459BBEB7A7EFC8710F14402FE006DB3A4CE749D06D7A1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: p<]q
                              • API String ID: 0-1327301063
                              • Opcode ID: 65b0f1b9f192b9105b8c0e42e0ace78e044641fa55dc6adec0d926664fd43a66
                              • Instruction ID: 696f589c65ed5b79e9651fc54e5fbf90268d6a17b9956cab83b92ff4c747c89e
                              • Opcode Fuzzy Hash: 65b0f1b9f192b9105b8c0e42e0ace78e044641fa55dc6adec0d926664fd43a66
                              • Instruction Fuzzy Hash: 53216D752082849FCB11CF29D891AEA7BE6BF8E214F0540A6FC55CB371CA75DC51CB60
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125853960.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e70000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4']q
                              • API String ID: 0-1259897404
                              • Opcode ID: d143881f533ba6ed7daf123a24bfeb1851e626441639a6bbf4b54055fb61f6de
                              • Instruction ID: 31c5287d5c09521310f208abce1ab6c86495d77b4b0b2679c8f06402052786d4
                              • Opcode Fuzzy Hash: d143881f533ba6ed7daf123a24bfeb1851e626441639a6bbf4b54055fb61f6de
                              • Instruction Fuzzy Hash: 13315730E04349CFDB19CFA9C8046EEBBB1EF45325F1090AAD125A7291D778BA85CF91
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: -
                              • API String ID: 0-2547889144
                              • Opcode ID: ec1411cc86bbb7a7c8efc102f9508136ea67832f12f311c58239bfcd73bea9de
                              • Instruction ID: e3aa371f9ea362748cfdaf20242daedb337fefa951188266cfb0d35ccf677fc4
                              • Opcode Fuzzy Hash: ec1411cc86bbb7a7c8efc102f9508136ea67832f12f311c58239bfcd73bea9de
                              • Instruction Fuzzy Hash: 4741D674A01268CFDB24EF19D888ADAB7F2FB89745F1044E5E809A7364D774AE84CF40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: ,aq
                              • API String ID: 0-3092978723
                              • Opcode ID: 00ed077e4f28fc7069bc612dda20132dea125e4c4096e650bfe971c42e8763e2
                              • Instruction ID: 332cfc72e0ccf12866a9c8f1cc623fc379c162f90ff09f8e636fe2411eaf5d0b
                              • Opcode Fuzzy Hash: 00ed077e4f28fc7069bc612dda20132dea125e4c4096e650bfe971c42e8763e2
                              • Instruction Fuzzy Hash: 0A11BF347001058FCB04DF69C994A6FBBB6EF89310F248069E901DB3A5D731EC02CB90
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: _
                              • API String ID: 0-701932520
                              • Opcode ID: cca15ed1df25ef8d21e177f2aea416d01c4617a479ec6e947d8b0717cf8da51e
                              • Instruction ID: e21aac3bc9704fac9fa783489659d6b40a46c891af6c80fe26fa1957e4b28750
                              • Opcode Fuzzy Hash: cca15ed1df25ef8d21e177f2aea416d01c4617a479ec6e947d8b0717cf8da51e
                              • Instruction Fuzzy Hash: 9521EF74902229CFEB69DF64D848BAAB7F5FB08305F0094E5E909A3294D7B45F84CF40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: >
                              • API String ID: 0-325317158
                              • Opcode ID: 7a0c098675563ea6e2ae79969aae5759325d20e47974ca2971b1b38ba7de54a6
                              • Instruction ID: f5f6fd21de50824c92d7cca0c12742c4edfaff9970c639b2d95414f33f852124
                              • Opcode Fuzzy Hash: 7a0c098675563ea6e2ae79969aae5759325d20e47974ca2971b1b38ba7de54a6
                              • Instruction Fuzzy Hash: 6E11B378D41269CFDB64CFA4C895BEDBBB1BB48300F0084EAD91AA7240EB315E85DF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: a
                              • API String ID: 0-3904355907
                              • Opcode ID: 969bf2cc98ce3a5b752dc249afaefe8e886d6731f94d31d54a879f7ada6154a7
                              • Instruction ID: b69153653f0ee363a6dff5c972f15009d0f41de4cb0675cf11557d4b56858e3e
                              • Opcode Fuzzy Hash: 969bf2cc98ce3a5b752dc249afaefe8e886d6731f94d31d54a879f7ada6154a7
                              • Instruction Fuzzy Hash: 1011DD74A05228CFDB68DF28D998BAAB7B1FB09300F0440E9D50DA3754DA34AF81CF02
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: +
                              • API String ID: 0-2126386893
                              • Opcode ID: 9897f8112ab18228fd11edb743ae0ffd4738b4af9cda16e98fbeb885b4480daa
                              • Instruction ID: b9fad2ba1d49d525bcd5b36e1b948dbde42bef3f8338e0fe66ba66a01d0418d3
                              • Opcode Fuzzy Hash: 9897f8112ab18228fd11edb743ae0ffd4738b4af9cda16e98fbeb885b4480daa
                              • Instruction Fuzzy Hash: 6A01C074A4022ADFCB65DF54C991BECBBB1BB48304F1080EAA909A7241DB716E81CF40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: ~
                              • API String ID: 0-1707062198
                              • Opcode ID: 45863e09bd8507b64b2456648c91dbb1a1cb3fc8989b925ded3f15f91b0d548e
                              • Instruction ID: 02d8f00dd2d15d99a5520d5b6898d8697c17d6a346f6f3a109b8f1d2bb98ad45
                              • Opcode Fuzzy Hash: 45863e09bd8507b64b2456648c91dbb1a1cb3fc8989b925ded3f15f91b0d548e
                              • Instruction Fuzzy Hash: 1AF0E774945368CFDB28CF18EA597D9B7B1FB04305F0056E9D109A22A0D7741A86CF92
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: +
                              • API String ID: 0-2126386893
                              • Opcode ID: 6cc7b065ec2276235321c18391537245b70aa04640e7ad09218822d52b698d41
                              • Instruction ID: 6323205eee48d86a13c5f577f20ae2b0d2dbe6f738648140356666f534543754
                              • Opcode Fuzzy Hash: 6cc7b065ec2276235321c18391537245b70aa04640e7ad09218822d52b698d41
                              • Instruction Fuzzy Hash: 42F09274901219DFDB60DF54C995BACBBB1BB48304F1080D9A949A7350E7715E81CF00
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Te]q
                              • API String ID: 0-52440209
                              • Opcode ID: 9e9ec9468821900f37230a697e6768a2a50db6eeb6fff839e37f7cb56d734a76
                              • Instruction ID: 8c4be4ac712e5e21a13c2f23f9bdb617caa4d79c9ae8bb61da7e741052924acb
                              • Opcode Fuzzy Hash: 9e9ec9468821900f37230a697e6768a2a50db6eeb6fff839e37f7cb56d734a76
                              • Instruction Fuzzy Hash: B6F07474A053588FDB24DF28D894B9ABBB2FB89304F1041E9D44AA3354D7305E85DF92
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fe0782831e66203192d48d654fb9ec490f72999faf5a35c25de4a632d43a741f
                              • Instruction ID: 530cca4dcb3087ca43f63ee23a9714d29f9cc137037c566afbb86a7bd4daf71c
                              • Opcode Fuzzy Hash: fe0782831e66203192d48d654fb9ec490f72999faf5a35c25de4a632d43a741f
                              • Instruction Fuzzy Hash: C212D734A002198FCB14EF64C995BADB7B2FF89300F5185A9D44AAB365DB70ED86CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f37efd4e46036400dd9f0c12a81e9d4aa8438ee3f21860a16397366defd6fbe4
                              • Instruction ID: a86ae87ac26d48161ee9c12e499dbe99fd5fc525180a09546397c36c7d99bcf5
                              • Opcode Fuzzy Hash: f37efd4e46036400dd9f0c12a81e9d4aa8438ee3f21860a16397366defd6fbe4
                              • Instruction Fuzzy Hash: F0E17C35B002059FDB14DF68E694AAEBBF2FF88314F148469E9159B390DB35EC42CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d642fd0b4f1fe2d8ab1451726e083e33cc4173a31596782d4fb7a28220fa290a
                              • Instruction ID: 96b1c2211130e6f5c55f72f23d481460ce6f4af9479345296f24644b306fb6ed
                              • Opcode Fuzzy Hash: d642fd0b4f1fe2d8ab1451726e083e33cc4173a31596782d4fb7a28220fa290a
                              • Instruction Fuzzy Hash: 1CA16E3A540515EFCB0A8F94D944D95BBB2FF1D32470A80D5E6096F232C732E9A6EF41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 81721634ecbbe77ef7119dad07a5d32c8647bed109968a5ed6fba605805738d5
                              • Instruction ID: c44ee581b4a037745caf080e50b516ba244f3dc6f647773cfc25cb6f104636e2
                              • Opcode Fuzzy Hash: 81721634ecbbe77ef7119dad07a5d32c8647bed109968a5ed6fba605805738d5
                              • Instruction Fuzzy Hash: 4EB1F934B002148FCB14DF64C995BA9BBB2FF88310F1085A9E54AAB365DB75ED85CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0ef3a9d74fda9cfdf259a3e49df7fc459eec15b1da18fe2769b91b2203652c30
                              • Instruction ID: 6c35f3395136fa26a59f63c70a6e7088a773fdfad3d65b8b569b9461af501472
                              • Opcode Fuzzy Hash: 0ef3a9d74fda9cfdf259a3e49df7fc459eec15b1da18fe2769b91b2203652c30
                              • Instruction Fuzzy Hash: 3CA1EA34B002188FCB14DF64C995BADB7B2FF88300F5085A9D54AAB365DB74AD85CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a47de7a8f0675495db0950f7e14f793f1414f5c4feea598911b4f623382655e5
                              • Instruction ID: 6cfbcaf4dbcf041f6d362d290da974105cfe861cbccd8f4595655445b06f590d
                              • Opcode Fuzzy Hash: a47de7a8f0675495db0950f7e14f793f1414f5c4feea598911b4f623382655e5
                              • Instruction Fuzzy Hash: 78A1BD74A11608DFCB04EF64E5959DDBBB2FF89310F108569E842AB374DB35AD42CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 90d8c33e340102682b46244c12a78223948bccbd448ae012c164789293027d6b
                              • Instruction ID: 38fa046f2b39fb667e1abef6cc7bc04b5a7532d4b32790ef311879bacae06c5d
                              • Opcode Fuzzy Hash: 90d8c33e340102682b46244c12a78223948bccbd448ae012c164789293027d6b
                              • Instruction Fuzzy Hash: 30B10474A05218CFDB64EF65D855BADBBB2FB88304F1080E9D50AA7359DB306D82CF91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 482ad856e6b338a6a0df6ace347372be9e27c4d41521e45d8365b68240d1d84e
                              • Instruction ID: 6ec21f5cd922e77110e9b0933148e1c52352951b8ac429c56781482d2bd69c9d
                              • Opcode Fuzzy Hash: 482ad856e6b338a6a0df6ace347372be9e27c4d41521e45d8365b68240d1d84e
                              • Instruction Fuzzy Hash: C98118347502149FCB04DF69D499AAEB7B6FF88710F1040AAE506AB3A5CB35AD42CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 800c4024841b6eb8629cb2fbe43371beaff6536e1d189eb2422468b6a4afc9a3
                              • Instruction ID: dcc572034693d5c146fe2df2d0f75f4d4df8fbf40b396fdf326fae21380ee831
                              • Opcode Fuzzy Hash: 800c4024841b6eb8629cb2fbe43371beaff6536e1d189eb2422468b6a4afc9a3
                              • Instruction Fuzzy Hash: FF81E375A002188FCB14DF68C58899EBBF6FF48351B1585AAE816DB370DB31ED42CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 63a0fc747076ea5b6c74575e7a483bb5a8cbe56dd1623d3b4a24240676783f2e
                              • Instruction ID: 44584ad0d4801f5b6622310a53bfd8f9bc1002150f004442cfd118b42f3f979b
                              • Opcode Fuzzy Hash: 63a0fc747076ea5b6c74575e7a483bb5a8cbe56dd1623d3b4a24240676783f2e
                              • Instruction Fuzzy Hash: 2E71E074E0520CCFDB04DFE8E484AADBFB2FF88315F108469E416A7254DB346985CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9b2e5d1cbadac8a3509b07a0e41506f4f6b92a9281ca93f15d221319c76c5e62
                              • Instruction ID: 96d6d00e1b178134310138a1a068d38d417d3c86bd4091c853a9ca64d7aa3c0c
                              • Opcode Fuzzy Hash: 9b2e5d1cbadac8a3509b07a0e41506f4f6b92a9281ca93f15d221319c76c5e62
                              • Instruction Fuzzy Hash: 3861F8747502149FCB04DF65D499AADB7B6FF8C710F1081AAE406AB3B5CB35AD41CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6073768d740ace60d1bf4491960181781063e8e95c7d35764f3338a04cf35285
                              • Instruction ID: 79fd9336b4d03835796a2ae83f9495760ffc2e932f8bc5d79a1871bf4fbb9957
                              • Opcode Fuzzy Hash: 6073768d740ace60d1bf4491960181781063e8e95c7d35764f3338a04cf35285
                              • Instruction Fuzzy Hash: DD51E7747502149FCB04DF69D499AADB7B6FF88710F1081AAE406AB3B5CB35ED41CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: abee2ed9fdda35af76c5b36b0bca6e3734a36881bff0baa1d1a78ad8d3a7d6c5
                              • Instruction ID: bd4d80dd2598fdf7561f8fa9a2b130cf73efc8cbb96c2412cd0e0efcbceefba4
                              • Opcode Fuzzy Hash: abee2ed9fdda35af76c5b36b0bca6e3734a36881bff0baa1d1a78ad8d3a7d6c5
                              • Instruction Fuzzy Hash: 4F517E34B006099FCB14EF64E498AAE7BB6FFC8715F00811AE50297364DF759E46CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2d2f4a18971e5aa8397546f36b1627ebf7c936f9ba5f89b87b166522b19ad0af
                              • Instruction ID: 75f568e6a77ce7f93b5cb5215bc3029b46a41a1ddcea8dc997f35ebe87b5deec
                              • Opcode Fuzzy Hash: 2d2f4a18971e5aa8397546f36b1627ebf7c936f9ba5f89b87b166522b19ad0af
                              • Instruction Fuzzy Hash: D2419F31F147149FDB60CB68D54529BB7F2FF88710B0489AED45AD7BA0DA34E905CB81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c5dce7101c6f9daaada7ffc8e79f655f2ad95514aaa99ba1c676c120557e351c
                              • Instruction ID: b3f5f19933c2b32edb921d246e6ccdb1bce28ee6180a9cbc67e67cf2be582567
                              • Opcode Fuzzy Hash: c5dce7101c6f9daaada7ffc8e79f655f2ad95514aaa99ba1c676c120557e351c
                              • Instruction Fuzzy Hash: D751E374A01219CFDB24EF65D851BADB7B2FB88304F1080E9E559A3355DB306D82CF91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f112c896e87aebdb7a30f140ea841546e57031b1fae6245cab846af75536568a
                              • Instruction ID: 229d8966300ede46f40530b54a619e5841a752114cb8727bb1c5a55c45620b89
                              • Opcode Fuzzy Hash: f112c896e87aebdb7a30f140ea841546e57031b1fae6245cab846af75536568a
                              • Instruction Fuzzy Hash: 8341E770E01208DFDB18DFB9D5946DDBBB2AF89314F20916DD819AB395DB319942CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5544deaf10132501986d2a567da43388f6ec0a174b134cd8ef5ca3ed4a6450b7
                              • Instruction ID: 601e6b550c28a2d5dc81aaef5d8e84153e93cc82f5fdce3b988093f87733b773
                              • Opcode Fuzzy Hash: 5544deaf10132501986d2a567da43388f6ec0a174b134cd8ef5ca3ed4a6450b7
                              • Instruction Fuzzy Hash: B851C570E01208DFDB18DFB9D594A9DBBB2BF89305F20912ED805AB365DB31A946CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d82a2258c43caff43e2e0be5f8abbe8a675dad64d55f85235cff492739a70b05
                              • Instruction ID: faec2a2684920f8da87ec0a60a0dbfb63d6380af63db81ad83883d71dc6105d2
                              • Opcode Fuzzy Hash: d82a2258c43caff43e2e0be5f8abbe8a675dad64d55f85235cff492739a70b05
                              • Instruction Fuzzy Hash: D4418F31B002198FDB14DFA5DA446BEBBB2FF44309F10942AD505E7291E734E947CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d99daf770803c0e87115f95f3d2517db543c0f1e8c7ff4d944ca908ab733a6d1
                              • Instruction ID: 69a19469ec41b5a7c25203f7242434042193bb9b9c51141bacbe6cf54f7da671
                              • Opcode Fuzzy Hash: d99daf770803c0e87115f95f3d2517db543c0f1e8c7ff4d944ca908ab733a6d1
                              • Instruction Fuzzy Hash: 4E31E4366401049FCB09DF59D988EA9BBB2FF4C321F0680A9E5099B372C731ED56CB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6c05e708a5dee1428fb633e7e83e805a94277263ab441163f7297152bf6e36f3
                              • Instruction ID: fd1edc6edd5434f43d5bbf2ef154fdd0dcf409c90b090ae9f4625be5484f1bdf
                              • Opcode Fuzzy Hash: 6c05e708a5dee1428fb633e7e83e805a94277263ab441163f7297152bf6e36f3
                              • Instruction Fuzzy Hash: E1311D35A002199BDF14DF95D855AEEB7B6FF8C350F10806AD806B7360CB319D06CBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6f091d3e9bcc57ded44b56c2dc37baae39dfc4925e5536293df436680146f9b7
                              • Instruction ID: b0e1806fa82af8746e7b34c18b7a277741ffba1118e5806accf83809212223f5
                              • Opcode Fuzzy Hash: 6f091d3e9bcc57ded44b56c2dc37baae39dfc4925e5536293df436680146f9b7
                              • Instruction Fuzzy Hash: 2D31F474E45209CFCB05CFA9D948BEDBBF1BF89315F14916AE414A7261E730AA42CF60
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ac50172c27a5eb9ca352c64b85042f19145e401348ccb1e6f71b3283e98c4879
                              • Instruction ID: f0788e0ee218377b4379c08faf49c9e825464ee98b88cf42fce70353400aada3
                              • Opcode Fuzzy Hash: ac50172c27a5eb9ca352c64b85042f19145e401348ccb1e6f71b3283e98c4879
                              • Instruction Fuzzy Hash: 3031E735A112288FEB64DF14D995FA9B7B2FB48710F1042D9E909AB3E1D631ED82CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1fb88ee851c5d2bd755ccb423955e406c58476c00388efa3ffdbc13f45acbe3e
                              • Instruction ID: 1eabf892d85e5844b04325691ad6bd20386154a77272c063708afaeb9b1b5450
                              • Opcode Fuzzy Hash: 1fb88ee851c5d2bd755ccb423955e406c58476c00388efa3ffdbc13f45acbe3e
                              • Instruction Fuzzy Hash: BC31E734A112288FEB64DF24C995FA9B7B1FB58710F1041D9E909AB3E1D631ED81CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c2e31877657cc82809f4139acfd576cbdd56339bdcef819495b36292061f644b
                              • Instruction ID: ab22627b9bda2045baffdf66815d060ff9ecbf977b237e6b5cc0ffe4f541d786
                              • Opcode Fuzzy Hash: c2e31877657cc82809f4139acfd576cbdd56339bdcef819495b36292061f644b
                              • Instruction Fuzzy Hash: 99316D71E05208CFDB04DFA9E6846ACBBF2FB49304F1494E9D514A7265D7746943DF00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6796b01ac7a533d528b472a587592fac0ef70395b61de90b85d640f01bbc5d1d
                              • Instruction ID: 0a6ea9a54622e03808d32f6fe6767dc12ba9d17328c7a7cb3018f7e6c6efd0fe
                              • Opcode Fuzzy Hash: 6796b01ac7a533d528b472a587592fac0ef70395b61de90b85d640f01bbc5d1d
                              • Instruction Fuzzy Hash: C031D270E06218CFDB18DF69EA49BADB7F2FB89305F206169D409A7255E7746D82CF00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d163ee4c07b865c4527575d3fe6e3c6f8980bf6737c8bc1617ae0584ff98e836
                              • Instruction ID: b43d25a3d6278a96fd6a8d8f68db2e3763d4c014474c84781637d4eecee0ae39
                              • Opcode Fuzzy Hash: d163ee4c07b865c4527575d3fe6e3c6f8980bf6737c8bc1617ae0584ff98e836
                              • Instruction Fuzzy Hash: 4A21AF327062009FD728DB69A945AA6FBD9EFC4361F0584BBE10EC7261DA35E846C750
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0f9420acc39aa74145fe0351c1fd97526a11a594cc0ccd4dc09b571a05f9f849
                              • Instruction ID: a1cb686ac9383329064612942f2aff5bce7e827471cc69428ad15498d2d97865
                              • Opcode Fuzzy Hash: 0f9420acc39aa74145fe0351c1fd97526a11a594cc0ccd4dc09b571a05f9f849
                              • Instruction Fuzzy Hash: CD312674E012099FCB09DFA9D954AEEBBF2FF88310F00856AE415A73A4DE355942CF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: af4d6f7a31af63b04a44c4ab8371aa9c5136a7271e83b9b1feb3830511f8edaf
                              • Instruction ID: ee0c0b0662fb62468c768a857a003e8f422637ca16bf2c5c05dc0a05a74c09e6
                              • Opcode Fuzzy Hash: af4d6f7a31af63b04a44c4ab8371aa9c5136a7271e83b9b1feb3830511f8edaf
                              • Instruction Fuzzy Hash: F8314A313002099FDF248F55D889BEE7BA6FF88354F1481AAF8058B2B5CB75D895CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 899973c7e770c363064261ee8399e89d08be944ec36259f25636ed319962a617
                              • Instruction ID: 7e888edbc9d99868af94562aedd16af327d1e9cca5bf83eff27fe7d02525c9ba
                              • Opcode Fuzzy Hash: 899973c7e770c363064261ee8399e89d08be944ec36259f25636ed319962a617
                              • Instruction Fuzzy Hash: FD311474E012089FCB08DFA9D854AEEBBF6FF88310F10846AE416A7364DB355902CF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: accb407006f84c0a12773d0934dba72fcb38810bc5a241a3eda15f5cebb8eeda
                              • Instruction ID: 97e6ddf4e55c50a1c34504c1ddfe421aa14baa7bbed1fa4f19d97aaf50a2c0b3
                              • Opcode Fuzzy Hash: accb407006f84c0a12773d0934dba72fcb38810bc5a241a3eda15f5cebb8eeda
                              • Instruction Fuzzy Hash: 46410574A01219CFDB64EF24D851BAAB7B2FB88304F1080E9E54DA3355DB306E82DF91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1aa8657886a90571b62cd1030090634cc202c556e09e175de85a0089081ea8e0
                              • Instruction ID: abf6497950d45f65cb28a26572438fd5450e9fb81adf2144c5edc2b835ccc4dc
                              • Opcode Fuzzy Hash: 1aa8657886a90571b62cd1030090634cc202c556e09e175de85a0089081ea8e0
                              • Instruction Fuzzy Hash: 66216774B00A0ACFCB04EF69D5558AEB7B5FF8D700B10416AD50597370DB749A46CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ed9586be1fd17d59031bfc30973e7a50de3e93d7f0b6a9a2e8a8f2fceeb149af
                              • Instruction ID: d54ac512abef23bdb34e447e46a34f7aff7d864d21be8b1768dce3c0b00f9c35
                              • Opcode Fuzzy Hash: ed9586be1fd17d59031bfc30973e7a50de3e93d7f0b6a9a2e8a8f2fceeb149af
                              • Instruction Fuzzy Hash: B921C031B042158B8B109E69E9868FFB3B6FBC826171045B7E419D7764DA35DD06CB60
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 63abd99d72dc3f5aca4e6c725228865fb15c5d347ef35e90c48addb056a8d4d0
                              • Instruction ID: 342f7c200694d5b7efeb9b89e5ba50112da1eaf67db77161669a7f5a1ee38c86
                              • Opcode Fuzzy Hash: 63abd99d72dc3f5aca4e6c725228865fb15c5d347ef35e90c48addb056a8d4d0
                              • Instruction Fuzzy Hash: 61212A71E00209DFDB50DF74C909BEFBBF5AB88390F1090A6D51AD72A0E634DA56CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2102810573.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b8d000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 38f2b7d51428970ae2f9bc8c58dbb54c8173efb2f8a57d71570311c47bebd85f
                              • Instruction ID: 52536b82a2c0597093ddea8dc3e3d763e9effe27a3ff06385578ea29b0873c39
                              • Opcode Fuzzy Hash: 38f2b7d51428970ae2f9bc8c58dbb54c8173efb2f8a57d71570311c47bebd85f
                              • Instruction Fuzzy Hash: B4210771504244DFCB15EF14D9D4F26BFA5FB84314F24C5AAE9094B2A6C33AD806D7B2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 263f15f6fb787ac6ec1ce66ee0b304afd7099361504324aa773fe1eec3c282eb
                              • Instruction ID: 8dff7f4f2063900aefc65c3199ef4a946dcbda5eec87cc1786f8034e9a4389d4
                              • Opcode Fuzzy Hash: 263f15f6fb787ac6ec1ce66ee0b304afd7099361504324aa773fe1eec3c282eb
                              • Instruction Fuzzy Hash: 66214C31A00209EFCB148FA8D5549EE7BB6EB8C320F149129E815B7390DA76AC42CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b8e36d7043cb7710d99e99b466b4d5a9f7585e56b85706d7430436603a7ff0d8
                              • Instruction ID: f151d97abcbe866e63ba3da08b85471e95d7fff66a665bc6e0a916af5ce40f85
                              • Opcode Fuzzy Hash: b8e36d7043cb7710d99e99b466b4d5a9f7585e56b85706d7430436603a7ff0d8
                              • Instruction Fuzzy Hash: 7E213B36A40104DFCB05DFA9D988D99BBB6FF4C320B0680A9E6199B372C731E915DF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c038215defa1775e79638d75d2656d03f74616b2c007acb9862224aa20ce4775
                              • Instruction ID: 2e7aa03437b41617da5a41349d84edcfdca2508755485ad8519546c03cb0a293
                              • Opcode Fuzzy Hash: c038215defa1775e79638d75d2656d03f74616b2c007acb9862224aa20ce4775
                              • Instruction Fuzzy Hash: 55215E31A00208DFCB158FA8D554AEE7BB6FF8C320F149129E815B7390DA75AC42CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5f0199c9033b0c1de03aae703f764e70373bda147384272e89b7a46ecdb11020
                              • Instruction ID: 294ecfc88f58a6f11340174c245d5aa7850e5662c98c20b80a86be0dfddacd14
                              • Opcode Fuzzy Hash: 5f0199c9033b0c1de03aae703f764e70373bda147384272e89b7a46ecdb11020
                              • Instruction Fuzzy Hash: D42180307143048FC711EF29D895AAEBBB6EF8A310F14456AE542A7371DB30ED05CB61
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 55ea550c97d7c9bfb4018957aaec37c2ab28fbe04268b698db5fbccd9a18f4ef
                              • Instruction ID: 595ddb870a6774b793319b1af36be43f1bb3a6eb80b8ffebc723619a6e7fec22
                              • Opcode Fuzzy Hash: 55ea550c97d7c9bfb4018957aaec37c2ab28fbe04268b698db5fbccd9a18f4ef
                              • Instruction Fuzzy Hash: 1C21F431A002099FDF04DFA4D685ADDB7F2FF8C300F2145A9E405AB2A1DB76AD45CBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 76188c2d69470f92c57e2137ea683a314d072bf99e15c7f1238d20d3a551de8f
                              • Instruction ID: 69ebdb4f58b6cbb07609ae6a0eccfd563f2500170946349661dd23cc4fa2aa2d
                              • Opcode Fuzzy Hash: 76188c2d69470f92c57e2137ea683a314d072bf99e15c7f1238d20d3a551de8f
                              • Instruction Fuzzy Hash: DA215C31B002198FCB14DF69DA44AAEB7F2FF88709F00952DD905A7390E730A802CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6559a120f1377ca737442c9a7d1340ec44cbabb21638964b37dca8e0c415c464
                              • Instruction ID: 9a2e9e458205ab33e3b6abafdec6d0ddc9ef3e4b557b122c1c5ef98b832ff730
                              • Opcode Fuzzy Hash: 6559a120f1377ca737442c9a7d1340ec44cbabb21638964b37dca8e0c415c464
                              • Instruction Fuzzy Hash: 7521D4706102059FD714AB68E945BAF7BEAEF84304F008579D00AD7695DF7AAD068B90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 97ed7a60d71a60db756f5f2224519fea5cdc2e849d66d73b2294c9d27f4d9672
                              • Instruction ID: 25380e118a3e51d0d561627e3662e1e13b7f2a53de9000bab84c412ec629eea7
                              • Opcode Fuzzy Hash: 97ed7a60d71a60db756f5f2224519fea5cdc2e849d66d73b2294c9d27f4d9672
                              • Instruction Fuzzy Hash: AD214A70E00209CFCB04DFA9C5856AEBBF5FB48304F10D56AC828A7392D735A982CF91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2a9f92393780d5bc23029eee6e1a6cc19fb6cabea04df5250dd534b240a5075a
                              • Instruction ID: af9966f0cdf413478a1bb9eefbd37de163e1ae5f5d863d67a1682f14f002e144
                              • Opcode Fuzzy Hash: 2a9f92393780d5bc23029eee6e1a6cc19fb6cabea04df5250dd534b240a5075a
                              • Instruction Fuzzy Hash: 3E215474B0060ACFCB04EF65D5859EEBBB5FF8D700B10456AD50597330DB74AA06CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 967a2ee80c8d122c8166e7897c0f56aa3bc806e177c2070ae721af52a1c3e3a9
                              • Instruction ID: 6d3757718f5c8165fe02735a968eda6d169d7c4e7cc55e66b13032dc5474d0cb
                              • Opcode Fuzzy Hash: 967a2ee80c8d122c8166e7897c0f56aa3bc806e177c2070ae721af52a1c3e3a9
                              • Instruction Fuzzy Hash: 9E211531A402099FDF14DF64D685AEEB7F2BF48300F2145A9D401AB2A2DB76AD45CBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 39c45e8d8f253b57c1e7df86d99e952d3ccd7a455cdabd31640a5a5bc17e2d0d
                              • Instruction ID: 18efa765400eb5a99db22f3fb11651221b05a4c66f81f56a1886b36b65f2166f
                              • Opcode Fuzzy Hash: 39c45e8d8f253b57c1e7df86d99e952d3ccd7a455cdabd31640a5a5bc17e2d0d
                              • Instruction Fuzzy Hash: 1E116D303406019BD7249B15E9D9BAAB7A3FFC8704F14866DE50A5B7A1CA76EC42C780
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 256e4c48537a2c6e2ec013391dc850afb5946194b9211b6c7c106e364dadce72
                              • Instruction ID: 807dfff66cc6b809720cceb0e4ce4d2ce6ffaa0fa5690411692d8e395f72fada
                              • Opcode Fuzzy Hash: 256e4c48537a2c6e2ec013391dc850afb5946194b9211b6c7c106e364dadce72
                              • Instruction Fuzzy Hash: E5116775B012158FCB14CF69D9958AAF7B6FF8861072140AAE9059B325DA31EC02CBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 850ee8fcabeed0f36637b2acd71b712cf0671851582144b0243b902cfe5bcd17
                              • Instruction ID: e04c0fad67d9938fe8e347d1b912e54ebeed519fae04718e6c43acc4194e208b
                              • Opcode Fuzzy Hash: 850ee8fcabeed0f36637b2acd71b712cf0671851582144b0243b902cfe5bcd17
                              • Instruction Fuzzy Hash: 6421F471A002099FDF14DF64D685ADEB7F2FF48300F2145A9D405AB3A6DB76AD41CBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2102810573.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_b8d000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1781d51d3c0a58e683f989cdfd1912650fe53241b83e0546abf5ec14856bbfd4
                              • Instruction ID: 28c11a4ef17dbce20cd7cb8ac7845d49953a9a3c4158bb78dfe912a6bc760914
                              • Opcode Fuzzy Hash: 1781d51d3c0a58e683f989cdfd1912650fe53241b83e0546abf5ec14856bbfd4
                              • Instruction Fuzzy Hash: E721A4755093808FCB12DF14D994B15BFB1FB85314F2885DBD8458B6A7C33AD81ACB62
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 35317ff4e9f5a572e6e74947a4a9fc4364643b59b181aaf677e607ba96b2f68c
                              • Instruction ID: b2a46e5ffcaff94b4039690bf7f8fe2861559498f67aff0532290c30459edf09
                              • Opcode Fuzzy Hash: 35317ff4e9f5a572e6e74947a4a9fc4364643b59b181aaf677e607ba96b2f68c
                              • Instruction Fuzzy Hash: 3F113A35B106048FC714EF29D885AAEB7B6FF89310F14856AE506A7370DB34ED05CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 94d29ebeeb73f536d1df17255da0f7a2f95f4027f2a86528d9761021a89a4d66
                              • Instruction ID: f217ce7b40288e007bc5d04d5617c0c16161bf97c3a2a72a936cf47fe5825200
                              • Opcode Fuzzy Hash: 94d29ebeeb73f536d1df17255da0f7a2f95f4027f2a86528d9761021a89a4d66
                              • Instruction Fuzzy Hash: 1D211475D08209DFCB00DFEAD8486EEBBF6BF89304F518866D115A3281EB785A45CF91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 25dd6dc359fca84eb55a159484abc9ab4597f5b5e61a13e46f9636570b5a3d0b
                              • Instruction ID: e0a36c3d8f185d5c9632191c8cb8aba07caa1d7cd28aa1b1497d7d2b4e9553f7
                              • Opcode Fuzzy Hash: 25dd6dc359fca84eb55a159484abc9ab4597f5b5e61a13e46f9636570b5a3d0b
                              • Instruction Fuzzy Hash: 75214775D082098FCB00CFA9D8546EEBBF2BF89305F01886AD515A3291EB385A09CF91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7dd8aa76c3eb81d7533448f7890c43927f90d6bddc2cea5d53b06555924f3ed7
                              • Instruction ID: 623b26d4051255f5244ce7cc007cc29674c75cc5b923ba8c993982e5bd89f682
                              • Opcode Fuzzy Hash: 7dd8aa76c3eb81d7533448f7890c43927f90d6bddc2cea5d53b06555924f3ed7
                              • Instruction Fuzzy Hash: B0110E31B002149FDB209B7CDA55BBE7BF2BF88311F144029E905DB380EA75D902CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bff06f5bbdec31f9fcfc4a46d9feb4001955fdc69f2290990e7a4de606f27e67
                              • Instruction ID: e2a17b5fc8a318aff74ee2e550d3191a2ec168059507262183dbf31cb0cab925
                              • Opcode Fuzzy Hash: bff06f5bbdec31f9fcfc4a46d9feb4001955fdc69f2290990e7a4de606f27e67
                              • Instruction Fuzzy Hash: 2711CE31B002159FCB209F7CDA15BBA7BF2BF88311F144069F505DB280EA75D842CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 32171f44ee4f04d75c44166b9965ee12112339bfd86685b10f31a8f7f40400a0
                              • Instruction ID: 523ebb1aa7093098b8b21631e517dc579f45aff6b8a95c8d2729300f7aea5f9f
                              • Opcode Fuzzy Hash: 32171f44ee4f04d75c44166b9965ee12112339bfd86685b10f31a8f7f40400a0
                              • Instruction Fuzzy Hash: 50215078A42219AFCB04DFA8D694AADB7B2BF49300F114059E805EB371DB35AD41CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7718392e16763edf4241aa02ca1d0e14c158dd1f3d7766583704e87f8297f729
                              • Instruction ID: 1db813dbf9934d233af0b5a13de128862551f660bee4d9f14922f43285217908
                              • Opcode Fuzzy Hash: 7718392e16763edf4241aa02ca1d0e14c158dd1f3d7766583704e87f8297f729
                              • Instruction Fuzzy Hash: 3D11C0B6A00118EBDB15DF95D884CDEBBF9FF4C750B058166E515E7220E630AE1ACBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f502c922ebf50fc48d181d2337694c67ce63c019bc5177c7bd6da6f11547ab62
                              • Instruction ID: 1973ba4f31c1f5667e1098546a217ffd3270f787e179cb5fd2ceff9424939f5b
                              • Opcode Fuzzy Hash: f502c922ebf50fc48d181d2337694c67ce63c019bc5177c7bd6da6f11547ab62
                              • Instruction Fuzzy Hash: 5B01D8336042586FDB54DEECD040BEABFF5EB55324F2484ABE484C7290D631E991C750
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 711a63f1d9fee0aa9bc1466f8a1f971f1d885381aacbd2bef9ee076863e405d5
                              • Instruction ID: e803d07e767d98a7eef3aa6265727398eb0f2e40907f7bf568095ab40e678d43
                              • Opcode Fuzzy Hash: 711a63f1d9fee0aa9bc1466f8a1f971f1d885381aacbd2bef9ee076863e405d5
                              • Instruction Fuzzy Hash: FD11A575108294EFCB16CF65DC849EA7FA5FF8E215B0440AAF8568B165C771C856CB10
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6420afb325943241914fa1a2aaa0039accb1927d0318a42fe06bb89c6ea83076
                              • Instruction ID: b68e12c94fbb165acdccf51dd18ed255cce498b43b2bfa453631c8e4ddb3f548
                              • Opcode Fuzzy Hash: 6420afb325943241914fa1a2aaa0039accb1927d0318a42fe06bb89c6ea83076
                              • Instruction Fuzzy Hash: 77110776D05219DFDB20CF15CD40BE9B7FABB49304F0480E6A51DA7251E7709A86CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c9c4decc25d50f65a347bd0f79119a7b7520dec63e0b1ce21083aef17458e06b
                              • Instruction ID: 12b6989f4b8722712580ffb18f5f604ffcdda67a446921f66df06c603b02f6fa
                              • Opcode Fuzzy Hash: c9c4decc25d50f65a347bd0f79119a7b7520dec63e0b1ce21083aef17458e06b
                              • Instruction Fuzzy Hash: 8501617650510CEFCF01CFD4D900BADBBB9FB45211F148599E80957262DA73DA10EB51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 186dcb3833b8d053dc7092dba6dc90efc7d587399348c7d07225b3eaffe67416
                              • Instruction ID: ca73023a074a09739a1673fbc0208b0eea615431abd26210805ce6f883a551d5
                              • Opcode Fuzzy Hash: 186dcb3833b8d053dc7092dba6dc90efc7d587399348c7d07225b3eaffe67416
                              • Instruction Fuzzy Hash: 9E018436340314AFDB148F59EC84FAE77A9FB89721F10806AFA04DB290C6B1D8018750
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d3d056ed545c8b54bad1d5e9ed670963c38f43df128c2b3d7f37eb4f4e8b96f6
                              • Instruction ID: 317b5ec24ad06f583765c890a8d6e82d5d56f2e4febcc56be4fe31e9106a9318
                              • Opcode Fuzzy Hash: d3d056ed545c8b54bad1d5e9ed670963c38f43df128c2b3d7f37eb4f4e8b96f6
                              • Instruction Fuzzy Hash: E311DEB6A00118AFDB15DF95D884CDEBBF9FF8C350B058166E515E7320E630AE05CBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 574275cb714208244323c131ce9afd68caf6f4e94fe3ea5c9f0383dff48b7a9b
                              • Instruction ID: 3180dcb2c95cda319ce9bc0e90b21ee2a9cd42bb81a13cff8ace891e493d813b
                              • Opcode Fuzzy Hash: 574275cb714208244323c131ce9afd68caf6f4e94fe3ea5c9f0383dff48b7a9b
                              • Instruction Fuzzy Hash: 7C21E274A052188FDB64EF28E984B9AB7F1FB48305F1040E9E549A3358CB359EC6CF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3f291d5f6cb2387b309a629c17319507323b57039850153aea78a27abb716bd3
                              • Instruction ID: bc67fbfcc14c8ca38bc72d962edec89464676f3702814729ba5dceb5057e537c
                              • Opcode Fuzzy Hash: 3f291d5f6cb2387b309a629c17319507323b57039850153aea78a27abb716bd3
                              • Instruction Fuzzy Hash: 65012D339092885FC702DF64CC84AD9BFB6EF03204F0485DAD8809B263E675D915D751
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fa6b2033075dd7f3c6b65b059c84abe242a5914f6441b2939f2d9b98bcc61d14
                              • Instruction ID: 4b7eaaf0a5f90f8e78916079dadcc24e83c2bcb2925b8bfbdf4eca2809dc4b60
                              • Opcode Fuzzy Hash: fa6b2033075dd7f3c6b65b059c84abe242a5914f6441b2939f2d9b98bcc61d14
                              • Instruction Fuzzy Hash: AB01AD317007009FC7299B34C859ABA7BA2EFC9364F0446AED5568B7B2CB75D843D790
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4a606f85f1a2ab450d1b80f20cf3f8e1b308772661c5655618dbe3b354f44d8f
                              • Instruction ID: ec61f6db0eafd86b152662d932157145197cb9578be56ff382f61eb7cf1f7329
                              • Opcode Fuzzy Hash: 4a606f85f1a2ab450d1b80f20cf3f8e1b308772661c5655618dbe3b354f44d8f
                              • Instruction Fuzzy Hash: FB11D470A051188FDB64EF64D954BA9BBF2FB89305F5050A9D10DA7360EE706D86CF01
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e88986add8639e9a44a2039b1360ebddca71ea52bd08e2d920c80283b3ae0ed7
                              • Instruction ID: 905a9fd4bc3df6a899e98645bb3b0c8a41c83440fde9d0798d8a66b3cb0d8b0e
                              • Opcode Fuzzy Hash: e88986add8639e9a44a2039b1360ebddca71ea52bd08e2d920c80283b3ae0ed7
                              • Instruction Fuzzy Hash: D2119274E01209DFCB44DFA9D588AAEBBF4FB48301F1081AAD819E7355D734AA51CF91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4ff874044db144a7ac8c7c860955247766a86f6b13986f3d7f2f00375458c377
                              • Instruction ID: 40ba63a2f0b26ef499d5a9900d38099226359a0a456fbd89158048b34175a394
                              • Opcode Fuzzy Hash: 4ff874044db144a7ac8c7c860955247766a86f6b13986f3d7f2f00375458c377
                              • Instruction Fuzzy Hash: 4F11037294422EDFEB20CF25CD80FEDB7BABB48304F1484E5A109A7250EA749A85CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 629080e66c65b26dac8c16b66255964b4553d7fd7024c31028ac4aca177e0114
                              • Instruction ID: 2fe9d9065d2b734e0a46ba5e7170e75615643ed5254eee22d92c55869fdbb6c7
                              • Opcode Fuzzy Hash: 629080e66c65b26dac8c16b66255964b4553d7fd7024c31028ac4aca177e0114
                              • Instruction Fuzzy Hash: AD117C30E0420CCBDB18DF6AD944BDEB7B6EB89311F0090B9E519A3245EB706E86CF45
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 388d57aa1bde8adc37af3eaded2895240067e0a1dd92a861bdc4763faab32cf3
                              • Instruction ID: 29706e96e5248d232986b739fdd983090a0ef9228642ebfa15047203d98b81da
                              • Opcode Fuzzy Hash: 388d57aa1bde8adc37af3eaded2895240067e0a1dd92a861bdc4763faab32cf3
                              • Instruction Fuzzy Hash: 780116353012109FCB2A6B34D419ABE3BA6FFC966571540AAE806CB370DF35D802CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0ecd1966663801ab545e550658372c095163afca8754596a093bf4051b7ba56b
                              • Instruction ID: e9bfc997516f36a0b811f7a43c3f69d745436208d9fbe5f3d26bfa2ded2d9438
                              • Opcode Fuzzy Hash: 0ecd1966663801ab545e550658372c095163afca8754596a093bf4051b7ba56b
                              • Instruction Fuzzy Hash: EA018C75B01210CFCB14CF28D6958AAB7F1BF8821072580E6E805DB371CA31DC01CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b53ccb1caf209cdbf71bebc7849ca7ababb3424c96585543a30133b62ef8ec7a
                              • Instruction ID: 0d8a6307c632551997eaee8723a83a7b85b0b7084aefb20cf87882e38a165d79
                              • Opcode Fuzzy Hash: b53ccb1caf209cdbf71bebc7849ca7ababb3424c96585543a30133b62ef8ec7a
                              • Instruction Fuzzy Hash: 3B012B32D482588FDB04DB94DA565EE7BB2EB8D204F145497D041F73A6C7351C07CBA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a5b5927b5825cdd08b0d8843aedc8912f4c0e1ddea65cd4abeab424604c1de9d
                              • Instruction ID: 55dc58bf66cdd9b00f19357540b967b4d4739521cd282e4814a93d3c02d45754
                              • Opcode Fuzzy Hash: a5b5927b5825cdd08b0d8843aedc8912f4c0e1ddea65cd4abeab424604c1de9d
                              • Instruction Fuzzy Hash: FF110630A012188BCB64EFA8D9547EDBBF2FB89305F4090A9904AAB254DB746D86CF41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d571510061b8198a119cb56ef75dd7edd16e401f1df13985739ab62c72cb09ff
                              • Instruction ID: 71e13affa982918364d423144731edd230d11e98fde1ad7c1cfe3986aeaba855
                              • Opcode Fuzzy Hash: d571510061b8198a119cb56ef75dd7edd16e401f1df13985739ab62c72cb09ff
                              • Instruction Fuzzy Hash: 9101D677409108FFCB01CF94DC41AADBB75FB66301F4584A6E8149B262E236E912EB92
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c42d5fd25dd08b2187c77d82159f92ebef1a3dcaed9485e829d044818e5c4058
                              • Instruction ID: cb7ab4ff84bce5a891cf50888a0f39e9ff7b32c2e378228452a981798f854c19
                              • Opcode Fuzzy Hash: c42d5fd25dd08b2187c77d82159f92ebef1a3dcaed9485e829d044818e5c4058
                              • Instruction Fuzzy Hash: 70019E307007049FC7189A24C445B7B77A3EBC9364F10866ED5568B7B4CB75EC42DB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ff9cb5963710c3dbd1be7693cc22643eb8630330782b95a3f66ed1d449741735
                              • Instruction ID: ea3de76c4d4badda20675b47527151c5d651bc6762958f62dd8425c4569a9c5d
                              • Opcode Fuzzy Hash: ff9cb5963710c3dbd1be7693cc22643eb8630330782b95a3f66ed1d449741735
                              • Instruction Fuzzy Hash: 67F0F472C482689FD701FF78A6A05CC3FA4EF45210B0540FAC80887206E5696E0BC7E1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 707ee0add9729caa271cc376fac37cc9db06b3cbd6a82202b2b8c46b09d6c67a
                              • Instruction ID: e0bf6e644c0ab20dcc6486064c2726eda285e35d7527fc50e26b75137af2cc33
                              • Opcode Fuzzy Hash: 707ee0add9729caa271cc376fac37cc9db06b3cbd6a82202b2b8c46b09d6c67a
                              • Instruction Fuzzy Hash: CC112730A0520CCFCB28DF64EA89BDDB7B1FB49315F2019A9E446A3241DB74AD82CF45
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 519af40efdb466ca17cb5289cc924c1bb5cfa9a4d2b4755e9e093e92da182ff1
                              • Instruction ID: 5df39a2130b4ff6090572ab3d4617cab43d52bd06f80c6291a07a53c30d1d8c2
                              • Opcode Fuzzy Hash: 519af40efdb466ca17cb5289cc924c1bb5cfa9a4d2b4755e9e093e92da182ff1
                              • Instruction Fuzzy Hash: 9FF0505170D2E22FDB32416C9C515DB6F75EF46550B4540AFE845CB241C5544D0BC393
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ed010774b90427c2bccffaa674e79f2e224ecaf28609c96ce10a88799bf3431e
                              • Instruction ID: d54bf2be35ffc4a107d6b121b50e4641aecc4ab34b9f09b6fcb98a07061edd48
                              • Opcode Fuzzy Hash: ed010774b90427c2bccffaa674e79f2e224ecaf28609c96ce10a88799bf3431e
                              • Instruction Fuzzy Hash: 6E11C570906218CFDB61DF64D944BADB7B2FB48308F1184EAD509A3345CB306E86CF91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a06b877c930052d8f97fe43ea9f0b2020493b8b9c418b216a6644ff9543b60e2
                              • Instruction ID: 146a8b8e157c1ce15c1a31f9d131bb03c9290c8a05a32466abea6701774aba4b
                              • Opcode Fuzzy Hash: a06b877c930052d8f97fe43ea9f0b2020493b8b9c418b216a6644ff9543b60e2
                              • Instruction Fuzzy Hash: DA0186753406149FC709DB24E558D5AB7A2EFCC711B108129E90A8B7A0CF76ED03CBD5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 936f211d934b985e54ea7ea60b49729b0e6a14cc72e3836f55d06a85c84c4afe
                              • Instruction ID: c7fd97a24f9ab576e741658762813b7d4be94706f17b90a41522549bbaf93f36
                              • Opcode Fuzzy Hash: 936f211d934b985e54ea7ea60b49729b0e6a14cc72e3836f55d06a85c84c4afe
                              • Instruction Fuzzy Hash: D501A4B63007009FC715EB15D494DAA77B5EF89760F114099E946CB372DA72DC43DB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 05937bfb7bff45af8635bb9da7714bf52578297df384620e1834d8c59cd24d36
                              • Instruction ID: 4870555cd2777206bebde4890006cc0c1ca70c4903f73879fcc0e583f75145d7
                              • Opcode Fuzzy Hash: 05937bfb7bff45af8635bb9da7714bf52578297df384620e1834d8c59cd24d36
                              • Instruction Fuzzy Hash: C9012DB0E04245DFCB14DFBA8A452EDBFF5AB48304F54D46AC418A3225E7309641CF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 010106b03b88e34e5390015d8674b37a4f9f10d58ea52197c94be9253b06dd5f
                              • Instruction ID: daaa6db72c8f024dcaf60da506e90bb8bb97742ab622fd90ebe5260764003019
                              • Opcode Fuzzy Hash: 010106b03b88e34e5390015d8674b37a4f9f10d58ea52197c94be9253b06dd5f
                              • Instruction Fuzzy Hash: 3701FBB1D05209DFCB54EFA8D5442EDBBB4EF48305F1091AAD819A7250E7315A62CB51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 46738829a3b8e2c596ca913def1ffb61a126dd5c234f794a9fcba4388e79c1ce
                              • Instruction ID: cdeb8d77dd2fa6e4cdd4ab31cacc7cde68cbebf83aced6ef6e76b34e62d74cb4
                              • Opcode Fuzzy Hash: 46738829a3b8e2c596ca913def1ffb61a126dd5c234f794a9fcba4388e79c1ce
                              • Instruction Fuzzy Hash: F2F0F0328451089FDB00EBF8D9457DD7BF9EF46309F1045E9C808A3261EB319A44CBA2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 54783ba42a30dcc5c964cb1f43206ec5a33dc52ed69db65271ac53eca653f125
                              • Instruction ID: 3c8781bd4520faa9c3fdee0fe9ff329cf8b07207afac374fa951faef7fb298eb
                              • Opcode Fuzzy Hash: 54783ba42a30dcc5c964cb1f43206ec5a33dc52ed69db65271ac53eca653f125
                              • Instruction Fuzzy Hash: E5018175340614AFC7089B25E518E1AB7A2EFCC711B108129E90A8B7A0CF76EC03CBE5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2fcea5f2032c772312b42450d1ac82854526ee7cf6ee2aceb1309c74f60c6831
                              • Instruction ID: 3a28a01a40b562cb9b76f6f0554c400ab4c1fb6cbb3f64e419f4cdfa1a45e6a6
                              • Opcode Fuzzy Hash: 2fcea5f2032c772312b42450d1ac82854526ee7cf6ee2aceb1309c74f60c6831
                              • Instruction Fuzzy Hash: 34010C70D05249CFDB54DFAAC5452EEBFF5EB88304F54D56AC418A7261DB305542CF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5aaba0bcbbbb539a155d389489a413f5266c08d4c0ca09e90ee5b910ebc542c7
                              • Instruction ID: 7e7eb2a21f3049f45fc7e583b9fa9aed192c09c853cd3ce0c930b4b2ac473c30
                              • Opcode Fuzzy Hash: 5aaba0bcbbbb539a155d389489a413f5266c08d4c0ca09e90ee5b910ebc542c7
                              • Instruction Fuzzy Hash: EB11E674A062188FCB60DF64D6547AEBBF1FF49304F1090A9D58AA3354DB341E85CF41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3a133e112c341f1f2bc165be4112f2710da6d2eb34d4d9b43a26bc3419c264dd
                              • Instruction ID: accfb5709b703497957f45b55290d23ea293461540706b756fcd32361d0b2c36
                              • Opcode Fuzzy Hash: 3a133e112c341f1f2bc165be4112f2710da6d2eb34d4d9b43a26bc3419c264dd
                              • Instruction Fuzzy Hash: D5F02B32B101096BCB149B15D8859BEBB76EFC8260F048067ED29C7371DE349E07C781
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 86279694d360fd1c1ad3c8a59c7e9a44e3fd25396d7363bf4652aba738b049d4
                              • Instruction ID: 29fe8b54c801ccf7c6468eb7fd0d0db4d959c65e265f3d4640a572c04a9dbc93
                              • Opcode Fuzzy Hash: 86279694d360fd1c1ad3c8a59c7e9a44e3fd25396d7363bf4652aba738b049d4
                              • Instruction Fuzzy Hash: 68F02B357001046BDB14A619D854ABAB7AAEBCC234F008067E915D7330DA709D078790
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b997bcf730b3159045887231cd4731fdb4705be6483cce42330fffc3329107d8
                              • Instruction ID: a8713c5eeedbb52fa75a9acf16618cc8f6be95fcd90ad5d3900560df3b5231d2
                              • Opcode Fuzzy Hash: b997bcf730b3159045887231cd4731fdb4705be6483cce42330fffc3329107d8
                              • Instruction Fuzzy Hash: CDF02462F4D2908FE32602285D10B69AFA2CFD6205F0945EFD045CF2B6EA9BA803C351
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4b8b24c5164fe5af999f3d1d7b3483872b68054cd4f178577bc709f4db4310ad
                              • Instruction ID: cd8c8f00b34dd8e4558177872e705574ebcf1d9663a75efc0d7d43fa288cd14a
                              • Opcode Fuzzy Hash: 4b8b24c5164fe5af999f3d1d7b3483872b68054cd4f178577bc709f4db4310ad
                              • Instruction Fuzzy Hash: D1112330D04248CFDB10CF69E688B9CBBF2FF0A309F0484A9E518A7295D7B56896DF05
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 76c056e7afb6d17ab157372a00789e7c46559a3adff670ac6fbe1f8991dbc09d
                              • Instruction ID: ecd1075b433df4c656ac2771abdab61ccb500b1bec03d9f433df500835a6d494
                              • Opcode Fuzzy Hash: 76c056e7afb6d17ab157372a00789e7c46559a3adff670ac6fbe1f8991dbc09d
                              • Instruction Fuzzy Hash: C7F02432F042119FE32486189900B2FFBAAEBC9720F0044BEE409DB350DA72AC42C3D0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5d309dd6b67205b91387a6047266bb049821bec660b2b66fbc953f2ca9f3386b
                              • Instruction ID: 174d37cf4e586490e458bd69c5cb6fcf2e5ad60b8c720ed2e85652241a8534df
                              • Opcode Fuzzy Hash: 5d309dd6b67205b91387a6047266bb049821bec660b2b66fbc953f2ca9f3386b
                              • Instruction Fuzzy Hash: 9D016DB29442189FDF21CF60CC40FEDBBB9BB45314F1482C6E509AB291D775AA86CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e3fd03fbc2f3d1eb1646a843444d81a4e7092eb06e74378f2a449cdc29953ec2
                              • Instruction ID: 04029dfe2bf12e3d543b16309f629e31c8b9985224f2fe4e8419efc6c5830990
                              • Opcode Fuzzy Hash: e3fd03fbc2f3d1eb1646a843444d81a4e7092eb06e74378f2a449cdc29953ec2
                              • Instruction Fuzzy Hash: 3A01DA74D05108CFCB14DF99E591BADBBF2FB48348F11846AE51AA3354DB30A842CF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0b33c1243cf65442bede8159f63b0090a62d1d0309705b3a7df58ef9bc41919b
                              • Instruction ID: 829aaf1e48e1042be6c5837527585d85c9c7a0813c3e7a971e0d85656d42a5e2
                              • Opcode Fuzzy Hash: 0b33c1243cf65442bede8159f63b0090a62d1d0309705b3a7df58ef9bc41919b
                              • Instruction Fuzzy Hash: 4C0114B0D01208DFCB44DFA8D5442EEBBF4EB08305F1085AAE819A7240E7359A52CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9acaea4b8d610549f0a9c77d7e08e2040754598af772819b4eca3a2a8f0120a0
                              • Instruction ID: 8fdc2462addf4db8482146208a9cb6addff8a968efe54cd224732eee16d37a08
                              • Opcode Fuzzy Hash: 9acaea4b8d610549f0a9c77d7e08e2040754598af772819b4eca3a2a8f0120a0
                              • Instruction Fuzzy Hash: AA112730904219CFDB64EF28D848BAABBB1FB49305F1040E5D55993698DB755E85DF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bc75f48eb753c9e2ee1f8da3f012cb8adf45b32d51f034eb0a30a4bf87265525
                              • Instruction ID: 6df2cffd6623f5965700dd7c6c1a7476a86929ebc384e1650cc006a49890bef3
                              • Opcode Fuzzy Hash: bc75f48eb753c9e2ee1f8da3f012cb8adf45b32d51f034eb0a30a4bf87265525
                              • Instruction Fuzzy Hash: 68012C31C0474A9BCF02DFA4C8105EDBB75BF49310F04C95AE998B7262D731A665DB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f15558068cf5c25744a5928f26e6e37641ca36f336e1b2cc9aa05bca970df9a9
                              • Instruction ID: 7353b427d9bc9c70d844a595bebb94d336616b0bbfdcd09b0dd6dcc9b1f41107
                              • Opcode Fuzzy Hash: f15558068cf5c25744a5928f26e6e37641ca36f336e1b2cc9aa05bca970df9a9
                              • Instruction Fuzzy Hash: A311A274905218CFDB60EF68D984B9DB7B2FB48308F1180EAD509A3345CB306E86CF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0508e30e5f3aeee6ec1556f241cbb5eb3ea41f05eb1f7e9ba6d8d7b835ae1163
                              • Instruction ID: 4b968644d7ce5ad28422b46c780b6e006c46f1f14dca5c7a9309cb369d6ad3ec
                              • Opcode Fuzzy Hash: 0508e30e5f3aeee6ec1556f241cbb5eb3ea41f05eb1f7e9ba6d8d7b835ae1163
                              • Instruction Fuzzy Hash: 64119075A002688FCBA5DF28DC94AA9B7F5AB4C301F9051EAD40AA7261DF309E85CF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f13d22587f0dabdc642f39362ab66cbf4a86afc9f04b07b9a04c5e03ccb0a2ca
                              • Instruction ID: b9559bccb8013eab9c2877c7aac27a21762b7051c2dc17b91031e725cb0b5e8f
                              • Opcode Fuzzy Hash: f13d22587f0dabdc642f39362ab66cbf4a86afc9f04b07b9a04c5e03ccb0a2ca
                              • Instruction Fuzzy Hash: 56F0BE363043808FC7158F29E8C4C8A7BB9FF8A62130540AAF905CB321DA35DC06C750
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3a17d00bfedc9fd58f31d6a637e8fbef3c14e42452f8e00bfd3bb248ff4d1219
                              • Instruction ID: ea00018da1076f1f58ed92ac75aebc1cf35d6d7671cc426ad7770591b536a1db
                              • Opcode Fuzzy Hash: 3a17d00bfedc9fd58f31d6a637e8fbef3c14e42452f8e00bfd3bb248ff4d1219
                              • Instruction Fuzzy Hash: 61F06DB2C002098FCF40DFA88A4A6EFBBF1EF58341F108466C118E2151E339861BCFA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c7135c65eaffca6a2301846194488a70d4742d77e9a000b257af56bf68fb3284
                              • Instruction ID: e6dd1f3b69874fe1f60b78256fe02cf73ac662ede6afd34145962b071c01e027
                              • Opcode Fuzzy Hash: c7135c65eaffca6a2301846194488a70d4742d77e9a000b257af56bf68fb3284
                              • Instruction Fuzzy Hash: 2C11F334901229CFEB69EF54D848B9AB7F9FB08704F0090E5E509A3394D674AF80CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b84bb0a950b4200390a44dbdeab05f1cdaead8c1b14335ce89216a3485dddc54
                              • Instruction ID: c94939728129e211f8eb1093e4afe3d563c919d56814b0e487969125d09656fa
                              • Opcode Fuzzy Hash: b84bb0a950b4200390a44dbdeab05f1cdaead8c1b14335ce89216a3485dddc54
                              • Instruction Fuzzy Hash: 3911E574A062188FCB50DF64DA547AEBBF2FF89304F1090E9A58AA3344DB345E81CF41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 62eada63d7d5f67ab0be02753eb8021864fa170cceaf56cbdc7f23b44366d4a7
                              • Instruction ID: f284ea1285437f46995a11cc4a9913aab0685855f0e534185840ca3b7a897953
                              • Opcode Fuzzy Hash: 62eada63d7d5f67ab0be02753eb8021864fa170cceaf56cbdc7f23b44366d4a7
                              • Instruction Fuzzy Hash: 3DF030727012154BC7159A19F984DCBBF6EEED0664710853AD0098B22AEA759E0BC790
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1d45e363fcd46ccccca5343c8b3a4c0f8356f8ad1067fb05bc084f0c605d673c
                              • Instruction ID: 3a73f6a829c64a0e34c2878091d5b58a4cf6aefb35eec035967a30c4b468b174
                              • Opcode Fuzzy Hash: 1d45e363fcd46ccccca5343c8b3a4c0f8356f8ad1067fb05bc084f0c605d673c
                              • Instruction Fuzzy Hash: 06F0C432D0020AABCF01EF99D8009EEBB75FF89320F04C519E95827251D732A6A6DF91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0ea7b9760ad14061694b7c9a6ca3992a86a80c823a17452bfab950fb53fcb290
                              • Instruction ID: 5b130b84eed144663c99a470b10503024e6170bf5e1c6b89246b823d8e695eb9
                              • Opcode Fuzzy Hash: 0ea7b9760ad14061694b7c9a6ca3992a86a80c823a17452bfab950fb53fcb290
                              • Instruction Fuzzy Hash: 1AF05E753002049FC714DB29D454D7A77AAEFC9721F104069F946CB370CA72EC42DB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 509766502c18608c333cb68633b632fc16efae59e94ffbb428ec29819f30506c
                              • Instruction ID: 000130e2e50d6c934768cd1ed27c388ba0778727dd04af65e0b21522c272eacc
                              • Opcode Fuzzy Hash: 509766502c18608c333cb68633b632fc16efae59e94ffbb428ec29819f30506c
                              • Instruction Fuzzy Hash: DD01123190129AEFDF20DF54C840B99B7B1FF89314F108985E55A73210CBB0AACACF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 20d2b77783a0aca170f5d15420bb2b7eb6ac7636e616d00d13af4c55a1b31842
                              • Instruction ID: 31424b0ba552a8559343f06bf7a3d769728769129d0a51bbcfc144b0f9384214
                              • Opcode Fuzzy Hash: 20d2b77783a0aca170f5d15420bb2b7eb6ac7636e616d00d13af4c55a1b31842
                              • Instruction Fuzzy Hash: E9F08C35808148AFC744DBA8DD12BADBFB8EB49311F14C09AEC94A7352C636DB11DB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2331cec3987dac98f64b5e9ac7aa07e36beb0829fc7abeb5ec0365dead8b54e3
                              • Instruction ID: 061bc3d29878452eaa87da6d139e9172e355f96d1abbd884faec265fa239b67f
                              • Opcode Fuzzy Hash: 2331cec3987dac98f64b5e9ac7aa07e36beb0829fc7abeb5ec0365dead8b54e3
                              • Instruction Fuzzy Hash: 9FF05836944108AFCB00DF98D850BEDBBB5FB49311F18C09AE85857361D632DA51EB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 548eaf3df5a1b020f1cced6a97739019020534d3919593ef8372bae73ff2582a
                              • Instruction ID: 15257068cb8973ddb54275e612ae610ce7d8aced2e273bb68cea7c3e03d1c9b6
                              • Opcode Fuzzy Hash: 548eaf3df5a1b020f1cced6a97739019020534d3919593ef8372bae73ff2582a
                              • Instruction Fuzzy Hash: 4CF08C35908108AFC705DB98D841BEDFBB5EF88311F04C0AAD85493382D631AA12DBD0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f605c4435822fab6d41aa7572c980ba69bfd50e6d671d1b1140b196f6e79b539
                              • Instruction ID: 5848baef2d2f48af2e3404d5fdec92790559730a8e423886ba45af55124d117a
                              • Opcode Fuzzy Hash: f605c4435822fab6d41aa7572c980ba69bfd50e6d671d1b1140b196f6e79b539
                              • Instruction Fuzzy Hash: 7AF01C31E0520CAFC740EB9CD8557EDFBF4EB49315F10C2AA9818A3351E6369A41CF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c9328d77b363753edc18af4b970c725ec5b960f5370dc295ae96d7a4aa23e7d0
                              • Instruction ID: 0fc1fd008b037b5c668130e6e6f1d5929c154fa5ee800d70eb5bd9015dfa5b95
                              • Opcode Fuzzy Hash: c9328d77b363753edc18af4b970c725ec5b960f5370dc295ae96d7a4aa23e7d0
                              • Instruction Fuzzy Hash: CEF08232A08119CBDB04DF94C955AEEBBF3AB8C300F24556AD001B7394CB751D01CBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4f4cd1f0eb0fa1fb6d9eef0fd777d33fa610ab10ae48d7bbd4d3a29ee8b8639a
                              • Instruction ID: a0533c61a2e1e2daab890d1e48f402391734df727e21011370ce85d867ed90fc
                              • Opcode Fuzzy Hash: 4f4cd1f0eb0fa1fb6d9eef0fd777d33fa610ab10ae48d7bbd4d3a29ee8b8639a
                              • Instruction Fuzzy Hash: DF018878D012688FDB68DF28D988ADEB7F2FF88304F1040E99519A3354DA359E91CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5e5c0dcd6a2b94ca2d02478d55b25e44d0dc5f0ea77aa388231dae5a79326300
                              • Instruction ID: 7f35aea6f0d76cca6e90d83bf2171eb2f8cf7f9d7ca0d64e5eca1d2d936d8e01
                              • Opcode Fuzzy Hash: 5e5c0dcd6a2b94ca2d02478d55b25e44d0dc5f0ea77aa388231dae5a79326300
                              • Instruction Fuzzy Hash: 30017AB48011A9CFDB61CFA4C945BECBBB1BB48304F0084DA980AA6250D7715A86CF00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a1dffa62aabb9b7e775f68c9bbecb8beac900fd29d2a3fd676d117cc3d065ee0
                              • Instruction ID: 0140de3aeb5072d64d0a823c9939db6ce9ac9cbae71784b655408c6fa5b3f68d
                              • Opcode Fuzzy Hash: a1dffa62aabb9b7e775f68c9bbecb8beac900fd29d2a3fd676d117cc3d065ee0
                              • Instruction Fuzzy Hash: 54F01C3640410CEBCF01DF98DD51BDDBBB5FB49315F148459E80426262D7729A61EB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e07bfba3c646fa10317d0052dd5f5a9083b36db045fc19049db3dd9fbcbce033
                              • Instruction ID: 44b036e5fb6b72576fb83928f4303606e914fe4299c7ba934e8dc6c220a9ece5
                              • Opcode Fuzzy Hash: e07bfba3c646fa10317d0052dd5f5a9083b36db045fc19049db3dd9fbcbce033
                              • Instruction Fuzzy Hash: A901BDB1905218CFDB60CF99D994BDABBFAFB48305F0040E6E249A7280E7749A85CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d7abbd28e31eda149c1a4fa87b1a59a07609c705726a5ba4cc00bbec95a5010a
                              • Instruction ID: a03022dd9d06be730870d8ffdb829fed5de2dc9df12b24991c71347dc749d61d
                              • Opcode Fuzzy Hash: d7abbd28e31eda149c1a4fa87b1a59a07609c705726a5ba4cc00bbec95a5010a
                              • Instruction Fuzzy Hash: 97F0C970A01148CFD748DF59E884B9DBBF2FF88306F5080A9E409A7358DA34AD86CF41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 90ef240601c8e6a413bd0e64036370a7132aedc372153ca2483989bb5d0742c2
                              • Instruction ID: 784c111f0d958d5563bf887adc8c2dc5dd8a30c8c037b0dad2381328220ff450
                              • Opcode Fuzzy Hash: 90ef240601c8e6a413bd0e64036370a7132aedc372153ca2483989bb5d0742c2
                              • Instruction Fuzzy Hash: FA01F630901108CFEB00DF58E994B9C7BF2FB88315F1040A9E519A7284CB74AD86CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c1e4f51eab2db90ebb350a9e3472986fdda6b26adf1032dcb5b31c6fbe04abf0
                              • Instruction ID: 726c8541dd7ac2e8c2bd8fc8978118bfe6a78b5769a679c1502f6cf4d5b2db74
                              • Opcode Fuzzy Hash: c1e4f51eab2db90ebb350a9e3472986fdda6b26adf1032dcb5b31c6fbe04abf0
                              • Instruction Fuzzy Hash: 74F0F270E151089FCB54DBACE5946ECBBB1EB49314F24D1A9D81993302E636AA03EF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a60ad67205b938b12c7d2eb05b29f23a45f35713edc93d13b01fe6008291e014
                              • Instruction ID: 5936415c0a96dcb533215f3a8621c7d107d7b9e30ea4025892bd4c1cd88b33ac
                              • Opcode Fuzzy Hash: a60ad67205b938b12c7d2eb05b29f23a45f35713edc93d13b01fe6008291e014
                              • Instruction Fuzzy Hash: C8F08C36B04100CFD704DF7AAA8065677A3FF8A314B1980EAD2088B266DA34ED53CB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 69613e7ff4ba42c3c22339f89ab5ede6e77a73a06da4a7ca7e2ed54c583e7330
                              • Instruction ID: 7f2c33a9956f19d12e72d9e74d8aa08c37b8bc3e1e402b2a6051a7ec246d298e
                              • Opcode Fuzzy Hash: 69613e7ff4ba42c3c22339f89ab5ede6e77a73a06da4a7ca7e2ed54c583e7330
                              • Instruction Fuzzy Hash: C901B275901259CFCB54DF55C984BA8BBF2BB98304F1484E5D40DA3250D7719E86CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8dfad88c2feb07ba27178f4769d2cdd3b94df571995a86c0e6dd60cb1a42adc3
                              • Instruction ID: 88a9fbf46ea15c13b658fe67a1e024b3fb482b09177f9e684932051f2309ba42
                              • Opcode Fuzzy Hash: 8dfad88c2feb07ba27178f4769d2cdd3b94df571995a86c0e6dd60cb1a42adc3
                              • Instruction Fuzzy Hash: 07E0DF72808208DFC700EB98E9427EDFB75FB41318F1080A9D80863342CA73EE02CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2575fad395060a7977474d6ff6085c50e1aa3c05852f855a3e3512dbd6e0d32b
                              • Instruction ID: e50663bc8ed50ac015582f8e44a0e4747310b35f0487b56d558cb354aa83003e
                              • Opcode Fuzzy Hash: 2575fad395060a7977474d6ff6085c50e1aa3c05852f855a3e3512dbd6e0d32b
                              • Instruction Fuzzy Hash: F4E0923650C1089FD704DB98E8437ECB7B4EB46324F20809AC80463342DA32A941CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 94356c3f3b37a384633c9e8df92f486b9ed3959d058de16785e01f33bd48da5b
                              • Instruction ID: d9345f90a0ff1d6bf1a8bb940243926955b0b9d5c5f526a1bb8a42b282e833bf
                              • Opcode Fuzzy Hash: 94356c3f3b37a384633c9e8df92f486b9ed3959d058de16785e01f33bd48da5b
                              • Instruction Fuzzy Hash: BCE0CD3170A0327BA760145DBD922ABD3D9EFC8958B51827FFC45D7354DD60CC0B4682
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b6e3a0d17005061bf26f9f07c0d392c1f86f63cd95d7d433a8ce090c4e943e4c
                              • Instruction ID: 225173ca6f4456756c52cd6ea360fa10b29fd3efb7653050065bc5a426116217
                              • Opcode Fuzzy Hash: b6e3a0d17005061bf26f9f07c0d392c1f86f63cd95d7d433a8ce090c4e943e4c
                              • Instruction Fuzzy Hash: 57F0B274940059CFDB24DF58EA84B98BBB1FB48309F0044A9E509A7745DB74ADC6DF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c2f14cb06d9cf49c84b75f152ac5b32e4a032fb68b6b8124f62afa674e9d75ce
                              • Instruction ID: 4946d3330c1234017d525f9a2abef333cfe4b99511c418746abf34083386d82b
                              • Opcode Fuzzy Hash: c2f14cb06d9cf49c84b75f152ac5b32e4a032fb68b6b8124f62afa674e9d75ce
                              • Instruction Fuzzy Hash: F1F0EC34905248CFDB54DF58E888B9C77B2EB44315F1040A9E509A7754DB34ADC6CF41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: abec692d4a7cd9f663f30a54cc1721c98ebd8135b8e0a374842b6e9a34013cd4
                              • Instruction ID: 0675b2e171152ce5c24b97402f5e4c160ca3495a3235b377d6b8b763c82e42e8
                              • Opcode Fuzzy Hash: abec692d4a7cd9f663f30a54cc1721c98ebd8135b8e0a374842b6e9a34013cd4
                              • Instruction Fuzzy Hash: B1F0E730A4021DCFDB20DF14EA85B99BBB1FB48305F1040E9E609A3754DB34AD82DF51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 10d0470e9c95f791329cfd55a976a300473758c3451717dc594df8fcee14aacc
                              • Instruction ID: 362f9e297f2e78c7058de2c37a91bbb99dfc2fab14a795b752f6b7b9128c2cb6
                              • Opcode Fuzzy Hash: 10d0470e9c95f791329cfd55a976a300473758c3451717dc594df8fcee14aacc
                              • Instruction Fuzzy Hash: C9F0C430A0111CCFDB14DF58EA85BAD77F2EB4830AF5040A9E509A7344D734AD868F52
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 033b2a9a77546ff29ad8474bd6eb21e2f53ea531aab2fe0215c3df037bce344b
                              • Instruction ID: 11a5ef96dadb3ebd813c821876b67f39f9c012f753be5ce63c6966ebda451e9f
                              • Opcode Fuzzy Hash: 033b2a9a77546ff29ad8474bd6eb21e2f53ea531aab2fe0215c3df037bce344b
                              • Instruction Fuzzy Hash: 96E0D8319041549FC300EB98D9413FCBBB8EB0731AF1440A9D88597381D532EA02CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a273b875bd6edb46f18d7676bf69632043e100d1f087cabf66ed93651da2c395
                              • Instruction ID: 359c0afd43ca2e16fc634eff503f88c70dee9c89070fb0dcfcfaff72d4979f4b
                              • Opcode Fuzzy Hash: a273b875bd6edb46f18d7676bf69632043e100d1f087cabf66ed93651da2c395
                              • Instruction Fuzzy Hash: FCF03971A08218AFCB19CBA8E0986DDBFF7EB84321F14C099D00A96250DB751A81CB84
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2de875d3c7c131b263bc05137b2c34923740d87c2101a05ba4c2829ada4d764f
                              • Instruction ID: 3aa3122f38e3c60c1bda75cf6c38419b79644814f46d8e65d26bb59a24fb4d30
                              • Opcode Fuzzy Hash: 2de875d3c7c131b263bc05137b2c34923740d87c2101a05ba4c2829ada4d764f
                              • Instruction Fuzzy Hash: 56E0D83614C1048FC340C7E8C5116EC7BE1DF45235F6487DDD86DC7382D9268A02D640
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 510afd121fb2fb95a0e3f65e186e7eb4d19a06025291c82974927fac4a0abcb3
                              • Instruction ID: f99d69ce13a2fde41651a779a126e26f9530af0f959aca7f94209c7c76dbea9c
                              • Opcode Fuzzy Hash: 510afd121fb2fb95a0e3f65e186e7eb4d19a06025291c82974927fac4a0abcb3
                              • Instruction Fuzzy Hash: 6BF0393590420CEBC704DF98D8817ECFBB5FB48308F2481A9D81897342DA32AA12DB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 176caaddc9e1861347b0abbe00810f26f523223b8d7c517f821380f8c6ade5c8
                              • Instruction ID: b3e36b35c1a5f16297e6ec692d605bc495ad899dab68daeed97878e62667f7b9
                              • Opcode Fuzzy Hash: 176caaddc9e1861347b0abbe00810f26f523223b8d7c517f821380f8c6ade5c8
                              • Instruction Fuzzy Hash: 4AF03976908208DFDF15CFD0D859AEEBBB6FB48304F108014E51266295D7B84586CB82
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dc5a4ee0d12d43ec60697f3ad7525cbe77b2f460548f481e1701cb8bf2dbbbfd
                              • Instruction ID: d885ee06b5971e8716b75cf04d5bde6073ede2da1bd583447ca506a923f6b1cd
                              • Opcode Fuzzy Hash: dc5a4ee0d12d43ec60697f3ad7525cbe77b2f460548f481e1701cb8bf2dbbbfd
                              • Instruction Fuzzy Hash: 1FE0483130021A5BC7149A1AFD84C4BFB9EEFC0364710C539E10A87225DEB5ED09C7D0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 025a15eebf50e28681afa48312befe80c1095d80d16cdda45992d30e688aeace
                              • Instruction ID: 78024f1bed122b7f07a40fa246a3d224e22dcc0f29016086ed93e5cbdaf4ee29
                              • Opcode Fuzzy Hash: 025a15eebf50e28681afa48312befe80c1095d80d16cdda45992d30e688aeace
                              • Instruction Fuzzy Hash: 35F039B4D0524CEFCB91EBA8A9442ACBBF4AB45300F4091AAD818A3251DA369A46DF51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dc05d25e2a2b9298d54b15dd5d6b742f81293b76ce8c148e7a4ad01d0a68938c
                              • Instruction ID: 880e429f772ac072a1d1415f5bcd7b655db30554c914deadad8812dc9048e32b
                              • Opcode Fuzzy Hash: dc05d25e2a2b9298d54b15dd5d6b742f81293b76ce8c148e7a4ad01d0a68938c
                              • Instruction Fuzzy Hash: E9E0C974E45108AFCB44DFA8D5956DCBFB1EB49314F20C1A9D818A3311D736AA43DF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 168b85fddfdea38812526bfc633fe8882ee44c275552e04959ae00a45f10a5b1
                              • Instruction ID: 3e90b48af72692cf818dba3ef92bfb98ff300b720aa306e6de9750e300545be0
                              • Opcode Fuzzy Hash: 168b85fddfdea38812526bfc633fe8882ee44c275552e04959ae00a45f10a5b1
                              • Instruction Fuzzy Hash: A4E02071C451448FD701EFB46D556DD7FB6DF42304F2045D5D4009B1A2EA355B02DF51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 189cdb5814fb4990356478fbe828fe75496ad7f1bf8b69a8dffe8d6dea72015b
                              • Instruction ID: 2d961e704033a92d0abdde2cee8bfbf593ca306743879d8faa7f9ba02bf13cec
                              • Opcode Fuzzy Hash: 189cdb5814fb4990356478fbe828fe75496ad7f1bf8b69a8dffe8d6dea72015b
                              • Instruction Fuzzy Hash: EFE0ED32B00114CFD704DF6AE580A5673E7EB89715F5584A9D20987669DA74FC438B80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fd6b2805be29d49ab1c7d668b307b1ccd3e1036f6b71671b4dac178b29861a14
                              • Instruction ID: d082fe1804d32d608034cc5a1b7be51abd71c5f4a3fdfbda5cd8149d69f300dc
                              • Opcode Fuzzy Hash: fd6b2805be29d49ab1c7d668b307b1ccd3e1036f6b71671b4dac178b29861a14
                              • Instruction Fuzzy Hash: 0AF012B4D05204AFCB00DF64D5405ACFFB0EB46320F14D29AD85456392D6359652DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9a70da4b754283c893db30aaf59499b5b539d7b9f9a314260a90ab2488e96c7f
                              • Instruction ID: fd04340dfcd5a1abd423a41bcf9121ced8fcf0811ac907bc9c446d52f6e89094
                              • Opcode Fuzzy Hash: 9a70da4b754283c893db30aaf59499b5b539d7b9f9a314260a90ab2488e96c7f
                              • Instruction Fuzzy Hash: E4F0A974C08208DFC700CF98D485AADBFF8FB09304F10C0AAD896973A1CA31AA00DF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 33bb975b23b9ed42272f025bf4771f2da7a0410157f6532ee3f9c70ecbf7892d
                              • Instruction ID: d0ad9975c2503b16e371b7ee3d47b7a8de6d2a96985ec21a95db470894e1282c
                              • Opcode Fuzzy Hash: 33bb975b23b9ed42272f025bf4771f2da7a0410157f6532ee3f9c70ecbf7892d
                              • Instruction Fuzzy Hash: B8E0483590920CDBC704DF98D9427ADBB74FB45315F149199D80467352DA32D911CF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 07e97727ee702d784bff18f224361eba588eb8e1f9405c51882e3d146a0164f8
                              • Instruction ID: e0e4ed289a9b01e7ca3fb68c43ea61bee2eee4ee83f0e9483f886d3760575326
                              • Opcode Fuzzy Hash: 07e97727ee702d784bff18f224361eba588eb8e1f9405c51882e3d146a0164f8
                              • Instruction Fuzzy Hash: FDF01D34D00218CFDB14CF25D58479DB7F2FB09309F0090E9D518A7245CB7469829F04
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e91bf3f32246b45b3be4915bba8065ef2a4c37855cc233c2a24062854361fe10
                              • Instruction ID: d474d7acd73a998ebc32d9b15db9eb6815e897faf0cad5053b429a6e4f5138b2
                              • Opcode Fuzzy Hash: e91bf3f32246b45b3be4915bba8065ef2a4c37855cc233c2a24062854361fe10
                              • Instruction Fuzzy Hash: 80E0DF7195A204CFCB01AFB4D9446EC3FB0EB02306F2451E9C80813322C2326A4ADB00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5729b326ac8af6ed497bc8b4e29161bb6a8f716516330a4b646de94d7bc152d4
                              • Instruction ID: 5969f73e1be31c4ab975ff9c71bb3b403f6af01fa24e10ff04f19372ce925431
                              • Opcode Fuzzy Hash: 5729b326ac8af6ed497bc8b4e29161bb6a8f716516330a4b646de94d7bc152d4
                              • Instruction Fuzzy Hash: 67F07F70D44258CFCB60CF29E98479CBBF1FB49315F1089AAE41AA3221DB70A981CF00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2ec8c0d3bdcc31e6dc5cb30f7be3ecc73c462fcaa6617edfeba60efd149d0879
                              • Instruction ID: 875ca89fa1b1e5b1aa1f384eaf0889cdfc33b9cd09e557e8df91538b62498ec6
                              • Opcode Fuzzy Hash: 2ec8c0d3bdcc31e6dc5cb30f7be3ecc73c462fcaa6617edfeba60efd149d0879
                              • Instruction Fuzzy Hash: 0CE03934808108AFCB44DF99C801AACBFB8AB49300F10C09AAC5893252C6329B11DF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 48e83becc8ebcd1293aa6bf65353309fdef23aa7c1ae4d4a71f4e6e8931854d8
                              • Instruction ID: 94382af0d3b0a376ae9f2d05af506c8a484b87309ba4ec2bd111193ccdc32dfe
                              • Opcode Fuzzy Hash: 48e83becc8ebcd1293aa6bf65353309fdef23aa7c1ae4d4a71f4e6e8931854d8
                              • Instruction Fuzzy Hash: 1AF0C935D04208EFCB05DF95D950AACBBB5FB49310F14C099EC5457351C632DA61EF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 071abaa4e17f1fae0d7cd60351700cf264b7416d6882798213393e922477b4bb
                              • Instruction ID: 7777a92d20dfe5c5315e49308cfb121c41f0a2e24844fac49e2b12ee0a29d0e4
                              • Opcode Fuzzy Hash: 071abaa4e17f1fae0d7cd60351700cf264b7416d6882798213393e922477b4bb
                              • Instruction Fuzzy Hash: BAE0E53990820CEBCF05DF94D940AADBF7AFB49310F10D499EC0927262C7739A61EB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 071abaa4e17f1fae0d7cd60351700cf264b7416d6882798213393e922477b4bb
                              • Instruction ID: e1d0beffd9f74587b37d4e652bb4d5381d2644244a7157e1b4f4f1223aed06a0
                              • Opcode Fuzzy Hash: 071abaa4e17f1fae0d7cd60351700cf264b7416d6882798213393e922477b4bb
                              • Instruction Fuzzy Hash: 34E0E535918108EBCF05DF94E9449ADBF7AFB49315F10C499EC0927262C7329A61EB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bd54ba45eda326984caa8f2dd3f9eb3c6aba1282c1734be1f3ccd49d30684afd
                              • Instruction ID: ed7bd64caeb3b1da2dc732e8f5e304381117272dd7deb6eeb58b8ce62928c6e7
                              • Opcode Fuzzy Hash: bd54ba45eda326984caa8f2dd3f9eb3c6aba1282c1734be1f3ccd49d30684afd
                              • Instruction Fuzzy Hash: 62E0D8711093025FC71A8B28F980D8A7F65DFC0214B05CA7AE4564B535E778ED4AC780
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c94a7e5b7609a87f747a4768a6bf8ed3f8563308ee419c6f0a7d8a91f7dcbb85
                              • Instruction ID: 07858202e8f9d5fc1353ee63b95bf12e44247c7b6263090b845fc7c1337e6e38
                              • Opcode Fuzzy Hash: c94a7e5b7609a87f747a4768a6bf8ed3f8563308ee419c6f0a7d8a91f7dcbb85
                              • Instruction Fuzzy Hash: ABE086313803245BF71466A54A02FE2329AAB8D654F2014AAE6055B3D8DA71E803C795
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 23cb15465f435fa93670e49e51b955b955926d8647f9117c8a108d5557395f9c
                              • Instruction ID: 28c52609c8ce7757578ddd9853361e816b0495fb7d1fc55ffccc5873e61793d0
                              • Opcode Fuzzy Hash: 23cb15465f435fa93670e49e51b955b955926d8647f9117c8a108d5557395f9c
                              • Instruction Fuzzy Hash: 4EE0D870D15208EFCB51EBF8D5042EC7FF0EB05225F109699D854E22A1E631AA51CB00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 31ef473d61521af21d18d4ade833e73ae2ad8e0793686dedd43a7ddca70dcfa8
                              • Instruction ID: b3b3c71440d9cda79aaa17fa91d242e77ed75ed1ce9286ada2d22085f2f834bd
                              • Opcode Fuzzy Hash: 31ef473d61521af21d18d4ade833e73ae2ad8e0793686dedd43a7ddca70dcfa8
                              • Instruction Fuzzy Hash: 09F017B4908328CFDB25DF28D988789B7FAFB04304F0056E9D409A3290CB345A86CF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e2eb3c2a1768eff6f98332d53ba9e028196b47eb2214936473be9bcd6373747c
                              • Instruction ID: a76a2a7d2eeab53624464ff2ae8a32f15a066d70241143fc1f0eba9d9faedebf
                              • Opcode Fuzzy Hash: e2eb3c2a1768eff6f98332d53ba9e028196b47eb2214936473be9bcd6373747c
                              • Instruction Fuzzy Hash: 99E06DB4955104DFCB84EBB8D54869CBFB0EF09224F2082E9D818973A2E7319A41DB00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f9e390392153b4ec5fea3af088b2c7694f0b3d033837582914cd62a3541dc4ca
                              • Instruction ID: 405b1f8e320d14d2bbbacfbd7257024d5c4778e4915ce2b69c29874bb587ea68
                              • Opcode Fuzzy Hash: f9e390392153b4ec5fea3af088b2c7694f0b3d033837582914cd62a3541dc4ca
                              • Instruction Fuzzy Hash: 6EE0D834D0011CEFCBA4FFB4D9443ECBBF49B05701F1050B99808A3251EA325A05CB51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6adfd2b218800c09b27830e14e83611a5b2c1b5114ed8ff259ebf70428ce7ace
                              • Instruction ID: fe1c168d0f813429778b5c772128cf4d029537a23d6c2cbcff571464356f1011
                              • Opcode Fuzzy Hash: 6adfd2b218800c09b27830e14e83611a5b2c1b5114ed8ff259ebf70428ce7ace
                              • Instruction Fuzzy Hash: 59E0C274E15208EFCB44DFA8D548ADCBBF4EB49301F1091E9E819A7321D631EA11DF01
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ec5a45d4ef1afe2c87385726c09a39ddc554a279b91f8d496c3131e7323d5aca
                              • Instruction ID: e2fac04720cbc654f323346e161fb0e040d42cd83ef083d3564b2c1ef2f0eaea
                              • Opcode Fuzzy Hash: ec5a45d4ef1afe2c87385726c09a39ddc554a279b91f8d496c3131e7323d5aca
                              • Instruction Fuzzy Hash: 6FE0D83090C204DFC700DFA8D6449A87BB8AB06301F2050DDD40957322D731E902EB51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e22d8453a250c3f24b184af2c3b3804153e0cff8ba31c115c6d0ecadde465cd2
                              • Instruction ID: 9b3d7e058c238fc2ac7521cbbd86aabbac6bc4def842998aa9633e77ea15adbb
                              • Opcode Fuzzy Hash: e22d8453a250c3f24b184af2c3b3804153e0cff8ba31c115c6d0ecadde465cd2
                              • Instruction Fuzzy Hash: 27E0C974D04208EFCB44DFE8D84469CBBF5FB49310F10C0AA9819A3351D636AA52DF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e22d8453a250c3f24b184af2c3b3804153e0cff8ba31c115c6d0ecadde465cd2
                              • Instruction ID: aa27b5723ab5afa9112b9929ff80b87affdabf0640426367e65c7a3074424b46
                              • Opcode Fuzzy Hash: e22d8453a250c3f24b184af2c3b3804153e0cff8ba31c115c6d0ecadde465cd2
                              • Instruction Fuzzy Hash: D7E0C978D0420CEFCB45EFA8D84469CBFF5FB48310F10C0A99819A3351D6329A51DF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e22d8453a250c3f24b184af2c3b3804153e0cff8ba31c115c6d0ecadde465cd2
                              • Instruction ID: 924b7f7cfcd91676e7366d85197b49d2a37c72438a650e206a56056719fa5d59
                              • Opcode Fuzzy Hash: e22d8453a250c3f24b184af2c3b3804153e0cff8ba31c115c6d0ecadde465cd2
                              • Instruction Fuzzy Hash: 06E0C974D04208EFCB44DFA9D94469DBFF5FB48310F10C0A99818A3351D6329E51DF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e22d8453a250c3f24b184af2c3b3804153e0cff8ba31c115c6d0ecadde465cd2
                              • Instruction ID: 2d93b1b900ebaf17cd5b84e02d0577f1461a202f019a5ac14dfb5494a8430c28
                              • Opcode Fuzzy Hash: e22d8453a250c3f24b184af2c3b3804153e0cff8ba31c115c6d0ecadde465cd2
                              • Instruction Fuzzy Hash: 7FE0C974D04208EFCB44DFA8D84469CBBF5FB48310F10C0A99818A3351D632AA51DF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 15f49d8e2d78e6d9e422c47112b9deca280fd4130ff078f192c5045518bc1b7a
                              • Instruction ID: f795749c7dfcabf3ff74473b342db37cdc0513ca327f1133e79e6e2b7659f614
                              • Opcode Fuzzy Hash: 15f49d8e2d78e6d9e422c47112b9deca280fd4130ff078f192c5045518bc1b7a
                              • Instruction Fuzzy Hash: F2E01274D04208EFCB44EFA8D44469CFBF4FB48300F10C4A9981893351D6319A51CF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: feab5ead6ff042b656987095cf2c2878b899e450422ce03abe088028739ef50c
                              • Instruction ID: a3a73fcb46c9106d214a078ddb68bf98d963c875090a1334460a90bd33c0b5e6
                              • Opcode Fuzzy Hash: feab5ead6ff042b656987095cf2c2878b899e450422ce03abe088028739ef50c
                              • Instruction Fuzzy Hash: 24E09230904308DFCB44DFA8DA8979CBFF1AB0930AF1084ADC808A7752E7329B45CB00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 55897520277ee3ebea7f7e1862571872d44355613fa2057cbbcf22e299913122
                              • Instruction ID: 94ee81ac7a53efc81dceb05eb695608884f81bb5e25558cef91e0b3c327b6437
                              • Opcode Fuzzy Hash: 55897520277ee3ebea7f7e1862571872d44355613fa2057cbbcf22e299913122
                              • Instruction Fuzzy Hash: 9AE086729462489FC702EBF49E4868E7BB69F06301F1045EBD804A7172FA365B54DF52
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 32db1af8df471c7ac1f3f0c5bb91b53f408676a68249f69c90743247e1775fec
                              • Instruction ID: 4010a7f6a75cf3cbeabd63b7638fdf70db76018402bbca48904cbebe48eae8f7
                              • Opcode Fuzzy Hash: 32db1af8df471c7ac1f3f0c5bb91b53f408676a68249f69c90743247e1775fec
                              • Instruction Fuzzy Hash: 3BE04FB4A55104DFCB44EFA8E5846DC7FF1EF09311F2086A9D808D7321E6319A41DB00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 34fa9971087aff3d95c85bc01216cfd485d473d57a6ec27a830373e218b76b37
                              • Instruction ID: 924ed88d90f3d3075fc163c4512efeb0e47fc5933704bf7dc9ef96c25f4ca09e
                              • Opcode Fuzzy Hash: 34fa9971087aff3d95c85bc01216cfd485d473d57a6ec27a830373e218b76b37
                              • Instruction Fuzzy Hash: FFE0E574E04208EFCB54DFA8D9446ACBBF4EB49304F24C0E9981CA3351D632AA42DF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 34fa9971087aff3d95c85bc01216cfd485d473d57a6ec27a830373e218b76b37
                              • Instruction ID: f3b3a7cae8ab32c638f3deb7d2cb7dd884b02d3e63266e0ee67609c0850bf6a5
                              • Opcode Fuzzy Hash: 34fa9971087aff3d95c85bc01216cfd485d473d57a6ec27a830373e218b76b37
                              • Instruction Fuzzy Hash: 6FE0E574E04208EFCB44DFA8D9446ACBBF5EB49304F20C0E9981CA3351D732AA42DF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 298dc0e17cc54023c00204346bf195384b3595d1a2940e3c616d7aa52a1e594e
                              • Instruction ID: 5feb3c7a5373b9f4359e853596d3eb1549dc6213c359139f112f2ca07f343098
                              • Opcode Fuzzy Hash: 298dc0e17cc54023c00204346bf195384b3595d1a2940e3c616d7aa52a1e594e
                              • Instruction Fuzzy Hash: 01E0C974D04208EFC744DFA9D94469CBBF4BB48700F10C0A9981893351D632AA11CF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fb0453c08d7e795775c87a93549ec9482b5e949b2b104b53e18a22ec114a5ee6
                              • Instruction ID: f28e91cb3a1c0b9f119c30ec121cd06e77d0326227292354ef2de9c4bc95d791
                              • Opcode Fuzzy Hash: fb0453c08d7e795775c87a93549ec9482b5e949b2b104b53e18a22ec114a5ee6
                              • Instruction Fuzzy Hash: DCE0E574D08208EFCB04DF98D840AACBBB5EB49311F10C0AA9C5463352D632AA51DF91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b64451a20bfd5990692ae44406aeb940e3f8b30fdf7ba227d43c71e574bac175
                              • Instruction ID: 24b6bfe809718b52efbc2947634357454ee04b1392bc228c9a63f2350c8a6dfc
                              • Opcode Fuzzy Hash: b64451a20bfd5990692ae44406aeb940e3f8b30fdf7ba227d43c71e574bac175
                              • Instruction Fuzzy Hash: 1EE02631909204DFC704DBE8DE122ACBFB0EF06216F0484DAC81957792E6338F81CB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cdb367aaf3f19cac694c5e27dc2e652e755b1b07cefbfbc3f7f68037a2779ec4
                              • Instruction ID: d693a08943fed90ec69a6407dd819893fe413756311d5d5774ad373d74df6183
                              • Opcode Fuzzy Hash: cdb367aaf3f19cac694c5e27dc2e652e755b1b07cefbfbc3f7f68037a2779ec4
                              • Instruction Fuzzy Hash: 76E01A74D0520CEFCB54EFA8D94429CBBF5EB49300F5081A9D808A3351D6359A82DF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 382e49234005b475451c83c03939f8b758732b56d7b10a1a728eb4edf1de3684
                              • Instruction ID: 023a9a8de8721aadb5376a68664a8257a0dd9bc523b55970d384ee3e4822fe22
                              • Opcode Fuzzy Hash: 382e49234005b475451c83c03939f8b758732b56d7b10a1a728eb4edf1de3684
                              • Instruction Fuzzy Hash: 31E0E5B4D15208DFCB54EFA8D94829CBBB1FB89304F50C2AED808A7251DB359A82DF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f2ac4c2cd1c319eb4ce732f2bde94489099b094b51d585ef88323417fc07dc81
                              • Instruction ID: b794c099b26ad1d68664618eb8ae29cb87a5a90cc8e60fb77d62103883019a79
                              • Opcode Fuzzy Hash: f2ac4c2cd1c319eb4ce732f2bde94489099b094b51d585ef88323417fc07dc81
                              • Instruction Fuzzy Hash: B6E0D8346492489FD701DF70E95069D7FB5DF45214F0184DAD8089B285D9355F059B81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8f51a4b1cd55c6191cc953f833d5202630f50767a98492a06e00fff533fd0e4a
                              • Instruction ID: 8a2d309a31e3296af52c20e8b3d91016fea89333d793cf51110000121addb31d
                              • Opcode Fuzzy Hash: 8f51a4b1cd55c6191cc953f833d5202630f50767a98492a06e00fff533fd0e4a
                              • Instruction Fuzzy Hash: CEE01A74D04208EFCB04DF98D945AACFBB8EB49310F14C1AEDC5867352D632AA52EF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 84742439c71cd9296d1fc438717dc3edd899db7a786ec6d7ebdb9791a2ac2357
                              • Instruction ID: aaee772c0f3aa32078853e9b1f31147c9538acbc32bb23282546818186cd4a8b
                              • Opcode Fuzzy Hash: 84742439c71cd9296d1fc438717dc3edd899db7a786ec6d7ebdb9791a2ac2357
                              • Instruction Fuzzy Hash: A4E04F74908108AFC705DF94D8419ADBFB9AB45311F10C1A9A84467352C6329B51DB95
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3476080444bbb9fa69e75ba68ac2dc72b23e779c0b3429738f00b00c0b645337
                              • Instruction ID: 4ab36fddeee7cb84aea6672a594b8ec2c8a87908a396e1b8b25a765f099e1570
                              • Opcode Fuzzy Hash: 3476080444bbb9fa69e75ba68ac2dc72b23e779c0b3429738f00b00c0b645337
                              • Instruction Fuzzy Hash: 3FE0C27240E2849FC725D77898447EDBB68AB43210F401AADC565262F2D6728A51CB41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 87901338aea5cd294746f498c2171ff85ece0102b3579c0e1a3673c5c18190ad
                              • Instruction ID: 98f2bea59659bb890815b92ff00474a994c8d08b9b4813c9988a6c2d61b23d42
                              • Opcode Fuzzy Hash: 87901338aea5cd294746f498c2171ff85ece0102b3579c0e1a3673c5c18190ad
                              • Instruction Fuzzy Hash: C9E04F30904208DFC744EFACC84569CBBF4AB08205F1084A9880893352E7329A41CB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a9d3d5bcc371e6033ee5cab0302cb4f253ddac8f6aa7ab21df3c8c9d6149866a
                              • Instruction ID: fe53709cf4cfd5689dd806dad0115090563b472d4830e599064f5070d043d48a
                              • Opcode Fuzzy Hash: a9d3d5bcc371e6033ee5cab0302cb4f253ddac8f6aa7ab21df3c8c9d6149866a
                              • Instruction Fuzzy Hash: D1E01A74D0420CEFC704DF98D4406ACBBB5FB49304F10C5A9981853351CA329A02CF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a5f3c110a93edf71420b70faeb5aa6daa94bcb3630ac72051d553f39f165f866
                              • Instruction ID: e05ee39fc4f1f58329dc7de53b15ae6f511f20f936069634f1d9964b07d90897
                              • Opcode Fuzzy Hash: a5f3c110a93edf71420b70faeb5aa6daa94bcb3630ac72051d553f39f165f866
                              • Instruction Fuzzy Hash: E9E04F74D09208DFC700DFA9E4445ACBFB8FF49305F1080EAD84557361CA329A00DF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bbb605dfa3e2ff53c45516f4d75c98daf5b073f460095113ec91de4c0a24a180
                              • Instruction ID: 4feae3d0d9c7d83afc4bbeea30e8c7305472790bdcd595a6cc887122cf3346c4
                              • Opcode Fuzzy Hash: bbb605dfa3e2ff53c45516f4d75c98daf5b073f460095113ec91de4c0a24a180
                              • Instruction Fuzzy Hash: F6E048701093469FC716DB14E940D9BBB65EFD0214B04CA6BE44A4B935E778ED49C781
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a450cddfb96132d6afe7034e669e48d15bb5555c342ab0620f1f5640818bdf84
                              • Instruction ID: 2935e30cca5d7b465783db2e0aeac14a26d27d69ba53be2cd6c8bb7f9fb06fbf
                              • Opcode Fuzzy Hash: a450cddfb96132d6afe7034e669e48d15bb5555c342ab0620f1f5640818bdf84
                              • Instruction Fuzzy Hash: 4CF0F874A052188FD754EF14D484B8ABBF1EF89305F2080E9E54DA7358DA305DC6CF41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3613ab25f4052596f70a9b4399606aec41cdf1ac0b0d53637014d11a6d362384
                              • Instruction ID: 0547a6d8c0c3d1ffe734900fc3dd852c025dad16fe0429c65bf8559be136cf14
                              • Opcode Fuzzy Hash: 3613ab25f4052596f70a9b4399606aec41cdf1ac0b0d53637014d11a6d362384
                              • Instruction Fuzzy Hash: 37E0EC70E55108DFCB51EFB8D5486EC7FF4EB09312F1091A9E909E3361E632AA61DB01
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c22213dd740958092fb7b0a3676ae4a49d8ee57637b89a2686fe36d064059af1
                              • Instruction ID: 2193756a8d4b1738a9e8cfe2f03d8de72b2bd79d2e2c3f2b3fa9a474ff180171
                              • Opcode Fuzzy Hash: c22213dd740958092fb7b0a3676ae4a49d8ee57637b89a2686fe36d064059af1
                              • Instruction Fuzzy Hash: CDE046B4A54208DFCB44EFA8D94869CBBF8AF09301F2081A9D80893322E631AA40DB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 82d40992254f45d9e83d65f9f32438810520d6dea9aef88019c5be5965cd442f
                              • Instruction ID: cf56ee6cf9ec9ac82fa5c72f922146cc842c8a88ed33de17687e98a4e2d95b2c
                              • Opcode Fuzzy Hash: 82d40992254f45d9e83d65f9f32438810520d6dea9aef88019c5be5965cd442f
                              • Instruction Fuzzy Hash: 63E04F30905108DFC740DFACD9456ACBBF4AB08204F1080AD880893352E632AA42CB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4be4c596565db5693f93de7dbaf91fef55ae172dcfdc87421648d6744090cbf0
                              • Instruction ID: cb14ea9ff4e8c126b4a4f3553f25628477d52f6d7d3e898811ece6f7ea3d09c9
                              • Opcode Fuzzy Hash: 4be4c596565db5693f93de7dbaf91fef55ae172dcfdc87421648d6744090cbf0
                              • Instruction Fuzzy Hash: BFE08C70905108DFC704DFA8E6489ACBBB4EB0A301F2091D8D80827322DB31EE16DB51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: daae2abbdbd4a1978a102fe9d00b74a7f1e51fc427a17db45a8df42605aa9738
                              • Instruction ID: e381e68c64f25a6492b9a64b153007ce63a87677bd0739a0fcd6cca5e4e62c3f
                              • Opcode Fuzzy Hash: daae2abbdbd4a1978a102fe9d00b74a7f1e51fc427a17db45a8df42605aa9738
                              • Instruction Fuzzy Hash: 28E01A34D08108AFC704DFA8D4406ACBBB9EB49311F10C0ED981857352DA329A02DF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fd95b0cfa6a0ac1d5fbbb73298389ec6500114f769b92060b2b58a5f5a58a518
                              • Instruction ID: 994e6d26ee99534df15a0968eb095d734b56c98c5b885b9f9c504e7591bf2deb
                              • Opcode Fuzzy Hash: fd95b0cfa6a0ac1d5fbbb73298389ec6500114f769b92060b2b58a5f5a58a518
                              • Instruction Fuzzy Hash: D2E012718411089FC701EBF89944A9D77F9AB46200F5045E5D90597171EE71AA10DB61
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 480785bbf8f408a517995da4f1eed870b9d6f54671f19fca359c06c3463ea540
                              • Instruction ID: c97d6638e40fa5be6d28591ffa092d1c48fcc23743d98b73bcfa68b2f3a65f57
                              • Opcode Fuzzy Hash: 480785bbf8f408a517995da4f1eed870b9d6f54671f19fca359c06c3463ea540
                              • Instruction Fuzzy Hash: 3CE0C234908108DFC704EF94D8406ACBBB8FB45300F10C0A8CC0823352CA73AE02DB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 480785bbf8f408a517995da4f1eed870b9d6f54671f19fca359c06c3463ea540
                              • Instruction ID: ea4dbb69b9bd50575f92e5612d2f5d8d074015e8c5e3cb77be6391d8ecb74531
                              • Opcode Fuzzy Hash: 480785bbf8f408a517995da4f1eed870b9d6f54671f19fca359c06c3463ea540
                              • Instruction Fuzzy Hash: 55E0C23890820CDBC704DF94E8416ACBBB8FB45300F10D098C80823352CA32DE02CF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 480785bbf8f408a517995da4f1eed870b9d6f54671f19fca359c06c3463ea540
                              • Instruction ID: 74fc652b94b1463028d304b334f036ca6b6d2707f261b1aa8a260d94c4c68eb9
                              • Opcode Fuzzy Hash: 480785bbf8f408a517995da4f1eed870b9d6f54671f19fca359c06c3463ea540
                              • Instruction Fuzzy Hash: 75E0C238909108DBC704DF94D8415ACBBB8FB46310F10C49DC80823352CA729E52CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c7c2d3941605bdc63fb99bade996aeb174303705eab1e5bae1e70560e495fab1
                              • Instruction ID: 20264ef5ee0ac48a4ddae9ec1542fe578538cce58afbf7fc2a76e0f65eefa919
                              • Opcode Fuzzy Hash: c7c2d3941605bdc63fb99bade996aeb174303705eab1e5bae1e70560e495fab1
                              • Instruction Fuzzy Hash: 4ED02B317097514FD712863D79148D67BD69FCD21030442A7F046DB269FA20DC038B82
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bd21bf0d067456c1874a98e417735400af2427a258e89376b8a510054fbdfb9f
                              • Instruction ID: bfe0163d2ff5dd30f068d6feea8ccc87ba3ae16b0f056393e758122f78e6533e
                              • Opcode Fuzzy Hash: bd21bf0d067456c1874a98e417735400af2427a258e89376b8a510054fbdfb9f
                              • Instruction Fuzzy Hash: 1BE0EC70D15208DFC751EFB8D9496ACBBB8EB05201F5091A9D908A3251E671AA50DB41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9536985bd090257f783f93bc672a96bdbbf17135086348a96b6187fcd0db8a63
                              • Instruction ID: d83a23adeb5a54df02c5073e3c2f9d7fa318935cb5ea307c329e6311158c8aa3
                              • Opcode Fuzzy Hash: 9536985bd090257f783f93bc672a96bdbbf17135086348a96b6187fcd0db8a63
                              • Instruction Fuzzy Hash: B4E08C34E0520CDFC754EFB8D9087DCBBB8AB05301F1050A98808A3251EA31AA50CB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f9ea9417c9451c3491ec3c633408e8249098b47a2a30e6ccb89ef5dbef2bf0f5
                              • Instruction ID: 431f483aa8a4687cf73956e990457189ceffadd07d4fc62a73ba3d3cc8776e27
                              • Opcode Fuzzy Hash: f9ea9417c9451c3491ec3c633408e8249098b47a2a30e6ccb89ef5dbef2bf0f5
                              • Instruction Fuzzy Hash: CCE04674E26108DFCB94EFB8D9487DCBBB0EB05301F1090A9C808A3261EB315A51CB00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 13de16693348e0d7b167639925bf9cbab4665ad8f046945eb8ea1f446defc9f9
                              • Instruction ID: c0f1b3ad2392b61a972438dcae92e940933944729c03c6105cae995cf789085f
                              • Opcode Fuzzy Hash: 13de16693348e0d7b167639925bf9cbab4665ad8f046945eb8ea1f446defc9f9
                              • Instruction Fuzzy Hash: 51E0C23084110CDFD701EFF89A05A8D7BB99B45304F0055A5C900AB160EE31AA10EB92
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: af8926eba94e2a17cb72791cb7e13a83768cf3abf8237261758ae77a1c8fc15b
                              • Instruction ID: 0bf7f866cf9b5b75e46054bb96a849f95e22bd0defbffb1a7aad1210c91b96ea
                              • Opcode Fuzzy Hash: af8926eba94e2a17cb72791cb7e13a83768cf3abf8237261758ae77a1c8fc15b
                              • Instruction Fuzzy Hash: 06E08C34908208DFC704EF94D8405ACBFB9BB85300F1080EC880863352CA329E02CB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d66f7fd1cc3a052c612dc02771707ba001af78c191bd306c5103af67c7061da9
                              • Instruction ID: a03c4a2b942b688a1ecf9f95f987f605ba96869abf05ed6c46dd4d66878165e6
                              • Opcode Fuzzy Hash: d66f7fd1cc3a052c612dc02771707ba001af78c191bd306c5103af67c7061da9
                              • Instruction Fuzzy Hash: 38E0C270809108DFC740DBA8C8012ACBFB8BB49201F1480DDC84957352DB32DE41CF80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d66f7fd1cc3a052c612dc02771707ba001af78c191bd306c5103af67c7061da9
                              • Instruction ID: 82a8976ccfe688c35451f25e26ba9f95d89630bea2f36aad73f661227678a680
                              • Opcode Fuzzy Hash: d66f7fd1cc3a052c612dc02771707ba001af78c191bd306c5103af67c7061da9
                              • Instruction Fuzzy Hash: C2E0C230808108DFC700DBE8C8012ACBFB8EF0A205F1084D9C81853352EA32DE42CB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e70a450360512fb4ef224079b7bd7d2a34510523f10ab0e3e751c0562a26ccd5
                              • Instruction ID: 793c65a9968f97e4280c5020c072e9d37b205aab573d112c156ae551205a200d
                              • Opcode Fuzzy Hash: e70a450360512fb4ef224079b7bd7d2a34510523f10ab0e3e751c0562a26ccd5
                              • Instruction Fuzzy Hash: 2CD0A76270051817DB017626E4267FE3752DBE4610F10803FD1458B7E1CF798D0357D9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dc7e861e1bdff096f7651f0b2a3d0c2014c58d7ce265b5ce09ade4252472f244
                              • Instruction ID: 7d5be8712bf819862c52b879783d919d8e049edbc912303d9903dba2371ef65e
                              • Opcode Fuzzy Hash: dc7e861e1bdff096f7651f0b2a3d0c2014c58d7ce265b5ce09ade4252472f244
                              • Instruction Fuzzy Hash: 24F0FF74D01A288FCB64CF54DD54BAABBF1BF49316F0051EAD459A3261EB301E81CF05
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1f122aa3105a5daf1aca01faad98a5d66850d2196f2e421b2fa561355817e699
                              • Instruction ID: c3af33ee4428522bdc2f82d07c1965e5a9451ee1d28ae82b268500dc85680a43
                              • Opcode Fuzzy Hash: 1f122aa3105a5daf1aca01faad98a5d66850d2196f2e421b2fa561355817e699
                              • Instruction Fuzzy Hash: B7F0C270E00218DFEB14CF59DA84B9CBBF2FB09305F0090A9E958A7294DB756D82CF05
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a75dc2d1770f4936f86f13717e26ac74e7021c15b0ec07b7315265fc17a06498
                              • Instruction ID: fa726cfa733970f5d92b836b3eeff4c336d1faec38006325534140a6cca8bb9f
                              • Opcode Fuzzy Hash: a75dc2d1770f4936f86f13717e26ac74e7021c15b0ec07b7315265fc17a06498
                              • Instruction Fuzzy Hash: 1BE0C230904148DFC740DBA8C9002ACFFB8EB06305F1080DDD84853392DA32EE02DB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 060c290925a2e72dc55a9cb46da5ce2d4154053bf4bb871fe2d0218267fba7a3
                              • Instruction ID: 3482b280a999777ed3a4ca91e6edf0294f6b3ac64e5643dc110568b04781b762
                              • Opcode Fuzzy Hash: 060c290925a2e72dc55a9cb46da5ce2d4154053bf4bb871fe2d0218267fba7a3
                              • Instruction Fuzzy Hash: E8E01234B4120CEFDB04DFB4EA41B6DB7F9DB44214F1185EAD8089B244EE316F05A781
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: aa22789e8026773e3925ed22702a10a595d0bf2291a7afc83a07cd771ed90ca6
                              • Instruction ID: f036d8f550a036a6ec383159fcd71887ce18bebf31f63feb0ec4846f99f13972
                              • Opcode Fuzzy Hash: aa22789e8026773e3925ed22702a10a595d0bf2291a7afc83a07cd771ed90ca6
                              • Instruction Fuzzy Hash: A0E01230A0520DEFCB04EFA4EA1169D77F9EB48304F1081E9D408D7345EA316F009B91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6d4fdd27289a2795734e695acc0fa9c6a72b1b64286e73fd80259f408e024dc4
                              • Instruction ID: 87e7b3f7f2f0c9de7e391753beb82ce3554a1cbdaeb838c16c95376a6d8410c8
                              • Opcode Fuzzy Hash: 6d4fdd27289a2795734e695acc0fa9c6a72b1b64286e73fd80259f408e024dc4
                              • Instruction Fuzzy Hash: 49D0A93140A208DFC315EBA4C8047AD736DFB03201F8028ACD61823222CA728A10CB92
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8d0608222ab16c54df13b2df622d729afd165bdf96ecb2a53dbd3d380e89020c
                              • Instruction ID: d9553f02e17f54e9b336f5effa6299ed4acf9cdd77b872976ac9c64dfdb6e95c
                              • Opcode Fuzzy Hash: 8d0608222ab16c54df13b2df622d729afd165bdf96ecb2a53dbd3d380e89020c
                              • Instruction Fuzzy Hash: 96D012311057069BC719DB1CF940D8BBB99EFC4310B04CE39A4464B538EBB4ED49CB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2545465ae529e1671e93b875cf01f625738b435bf724f7b99d25efc198873145
                              • Instruction ID: b0f6db63d2e24be8273422c2746f8a2fba5096eaecdc5b424ec6e1a76c7b7303
                              • Opcode Fuzzy Hash: 2545465ae529e1671e93b875cf01f625738b435bf724f7b99d25efc198873145
                              • Instruction Fuzzy Hash: 57E012750093809FC3025B54EC517597F719F56205F0A8096D9488A163CB214926DB51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3fe2f8f7dc7639f3e3f49010824a0f4d2fc7c24ec1403df95c52ffefdff8c87c
                              • Instruction ID: 7a3ea62686200432209a3ff0ce9c7bdb00ba5120346b6399b87a160a2285a40c
                              • Opcode Fuzzy Hash: 3fe2f8f7dc7639f3e3f49010824a0f4d2fc7c24ec1403df95c52ffefdff8c87c
                              • Instruction Fuzzy Hash: 12D02231B011206B4B48A2ADA5005E6FBD9CFC9290B008072EA0DCB366FE32CD0383E0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d0df96a75a58f7acb6bd3fd40df50727d66428c09b99755ad22cd36bdd8eff23
                              • Instruction ID: 6126fa5d5c5d321dd46a51d6a2172320cc064040112d7f43aff85caf0c3139c3
                              • Opcode Fuzzy Hash: d0df96a75a58f7acb6bd3fd40df50727d66428c09b99755ad22cd36bdd8eff23
                              • Instruction Fuzzy Hash: 71E0E530A41219CFD7A8EB24E9947AE77B1EB88714F0040E9D64A63644DA346DC1DF41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dac1b060625445c5e929aeaa2684d256875acfb2267b276f901969df60be2208
                              • Instruction ID: 8dc462d75a8b2ce874263cf43eb47db98e7578abc6929f62064c19b066c6d3f3
                              • Opcode Fuzzy Hash: dac1b060625445c5e929aeaa2684d256875acfb2267b276f901969df60be2208
                              • Instruction Fuzzy Hash: E3E0E570A0011A8FD764AB50E9847ADBBB1EB85304F0080EAA62A73744DE345E86DF51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 238e910c8f7d52da7018042be55b46f52eb81e487577be6f0b3f979fe9987216
                              • Instruction ID: f65ab749ed60a8f499821e773641b5c9c8cb39ec8ffa2854aa1dd750cba98b61
                              • Opcode Fuzzy Hash: 238e910c8f7d52da7018042be55b46f52eb81e487577be6f0b3f979fe9987216
                              • Instruction Fuzzy Hash: BAE0E570A01118CBE714EF64DC54B99B7B2FB8C304F0082E9D81A63745CB306E51CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f602fca00c9d0e0dd7de49aae0277166fbae5cd46c3689d473fbe2b3de65f223
                              • Instruction ID: 76d27c35ac23de2fb2ddbd0b684c644a118c46e746ac455bc7b9a488fe25ff51
                              • Opcode Fuzzy Hash: f602fca00c9d0e0dd7de49aae0277166fbae5cd46c3689d473fbe2b3de65f223
                              • Instruction Fuzzy Hash: E2E01A78A04218CBD754EF64D8467D8B7F2EB88304F1080EAD61A63385CB346E858F51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ed1ecbeb041524c936c2f9f3d48729e4704994965082544ed5d9e53e8f2a0b46
                              • Instruction ID: 41fbe034943440c5077c883fc3802a36264b10a264b2148824d63557bd4615a2
                              • Opcode Fuzzy Hash: ed1ecbeb041524c936c2f9f3d48729e4704994965082544ed5d9e53e8f2a0b46
                              • Instruction Fuzzy Hash: 1AE0E534A00118CBD714EB25E854B9DB7F5EB48305F10C4E9E45AA3245CA306D929F50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e435ae937cf9fbca6e621cc48b763975bf1697f53d1130ae29a50e40d4118136
                              • Instruction ID: ed92aba9b944ef1dbffb34ca7e0a34608ee9a8cd364a8c7639a971eab665cef8
                              • Opcode Fuzzy Hash: e435ae937cf9fbca6e621cc48b763975bf1697f53d1130ae29a50e40d4118136
                              • Instruction Fuzzy Hash: C3D0A73300D30486E211E719C54E366BBEC670621FF10EC0D590D62463CA67E054CA40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 55dd9cf007fd2a53efbcdba94fde43ddd985eef97571bd61cc5f87557d9053bc
                              • Instruction ID: b769c695ae63439e4a44cd56cf5379f8c902d119e5c8978108972a1a4ca8d2d7
                              • Opcode Fuzzy Hash: 55dd9cf007fd2a53efbcdba94fde43ddd985eef97571bd61cc5f87557d9053bc
                              • Instruction Fuzzy Hash: 1DD0A9317005064B8B298A29B60089673E29B8C6003004225E00ACB318FA20ED034B80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0dd6600b1c870a9d74707f3af5380ffa36cf51c614d7dfef5e63109cdd198f05
                              • Instruction ID: 104fad3084656812aa84c25b923753b5e895aae55d88bfde3b3e35856c21e9db
                              • Opcode Fuzzy Hash: 0dd6600b1c870a9d74707f3af5380ffa36cf51c614d7dfef5e63109cdd198f05
                              • Instruction Fuzzy Hash: 96E01775A04108DBCF01DFD0E4059AEBBB6FB48314F008014F6166B369CA349946DF81
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 42dab6213fb2dc17290666e34fb7533bc8c3718986d0223062ddaa3b6cfc4325
                              • Instruction ID: e97a79980a94f5545874dc88a7d3d6d303380a39191409630311f1aa01f17140
                              • Opcode Fuzzy Hash: 42dab6213fb2dc17290666e34fb7533bc8c3718986d0223062ddaa3b6cfc4325
                              • Instruction Fuzzy Hash: 24D0173890824D8BE720EFB6E06A75EBBF0FF04734F2002299021937D2DA3018828F21
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6ed85ac57c30e1be38cd78db6c806c2befc3e434c2ded428dca8a72cdc7cd450
                              • Instruction ID: be43de6b89366768571d7769355e990d8e62c3634fce7a1ac308bf2b75e907b6
                              • Opcode Fuzzy Hash: 6ed85ac57c30e1be38cd78db6c806c2befc3e434c2ded428dca8a72cdc7cd450
                              • Instruction Fuzzy Hash: C7E0EC7580521ACFDF50CF50C888BECBBB5BB48305F2180A9C41993251E7345AC5CF00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 269dac461a675202bd5c5ab8be84f1aad3070974df49be934e68bcc41e3c37e8
                              • Instruction ID: 4f45872fcd76d577ba1a401681f011c6d6ec7a50cef54336add997543c4861df
                              • Opcode Fuzzy Hash: 269dac461a675202bd5c5ab8be84f1aad3070974df49be934e68bcc41e3c37e8
                              • Instruction Fuzzy Hash: F8C08C3304E204CAC110A75A994C378B3EC730A21BF50AC02550D124238E629054CA80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1c71470da24f39734d44c4d04a5c4015bb79505f6465aa933ef70cadeaa0279f
                              • Instruction ID: 051c464267def8f56ad8fdcfc1a91298feb4fc773b9151a1a1818cbfb05b0b58
                              • Opcode Fuzzy Hash: 1c71470da24f39734d44c4d04a5c4015bb79505f6465aa933ef70cadeaa0279f
                              • Instruction Fuzzy Hash: 86D0C97504C2849FD702CB29DC10C827F75EF0622530641E2F5868B633C221E824DB99
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 28a4a55b8a24ba4e3f6423101a51ef3aed5d985011ca6588b39fe50365848a58
                              • Instruction ID: 736bed1b636a0db8ccbbdcb4e3c8a524a1f52d1ae96406219612dea6b5b7d220
                              • Opcode Fuzzy Hash: 28a4a55b8a24ba4e3f6423101a51ef3aed5d985011ca6588b39fe50365848a58
                              • Instruction Fuzzy Hash: 85C08C7004A6148EC21072D5680C3707BECE70630AF806864610D42022CAB9A460CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 886e871182183a93489d9b860e1dab7f74ef652049f72e1a9ae3d0e2ddf834c6
                              • Instruction ID: 04c3a3aca23bdb97ce904806dbab1b78a3b7ab46820383a8c85187df9820e454
                              • Opcode Fuzzy Hash: 886e871182183a93489d9b860e1dab7f74ef652049f72e1a9ae3d0e2ddf834c6
                              • Instruction Fuzzy Hash: DAC04CB5605700DFEB29DB1096459FE7B67F7D5305750842BE4034A668CB368C63EB42
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c50a1717e40ed204f444898b50e31d5c6124b9c5242e857d8bb2dfb2283d38e8
                              • Instruction ID: b8f5816241cb1bcd915ac70a5017fca809794c057d3182a0ebe73b1fc88c227a
                              • Opcode Fuzzy Hash: c50a1717e40ed204f444898b50e31d5c6124b9c5242e857d8bb2dfb2283d38e8
                              • Instruction Fuzzy Hash: ABC08C35000108AFA300EB65D885C817BA8EB182343008061F5084B231C232E851CA40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4898ef2687677f06ebf2787d50c77fc3d7f73ef751a873040f8fab6e5519dc75
                              • Instruction ID: 07700762395befe9d5ad6af7bda7cae81596da2f04c27bbd7e8f20e4b7943475
                              • Opcode Fuzzy Hash: 4898ef2687677f06ebf2787d50c77fc3d7f73ef751a873040f8fab6e5519dc75
                              • Instruction Fuzzy Hash: 82B09235389550BAEA1156099F4FFE93C05A300742F1014887102AA8D2D28A212260E6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 04c6e0ccfba240cad5e7695f4f07263e9373f92285ffede7620a3c476cf4f9bf
                              • Instruction ID: 753fc11bb04e060a2ad187a1816a7650e0d30b2cdb0b57f8dc2bac7c6812a328
                              • Opcode Fuzzy Hash: 04c6e0ccfba240cad5e7695f4f07263e9373f92285ffede7620a3c476cf4f9bf
                              • Instruction Fuzzy Hash: 02D092B4A047298FCB20DF54D9A0BDABBF1BB04741F11A1D9D858A7381E7309F81CE12
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b28a25bc98b5f7d56ce5190bd9ed704f7302c477506b17a08ba1b79d8cd11e6e
                              • Instruction ID: 257b3d82623e3784cbbb37e627fcb57dac6a033367a560713822f07e51ca320b
                              • Opcode Fuzzy Hash: b28a25bc98b5f7d56ce5190bd9ed704f7302c477506b17a08ba1b79d8cd11e6e
                              • Instruction Fuzzy Hash: 08C08C30208209CBC3046F94F5487AE37A1EB80319F2060BCE32727288EF342C82ABD1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7f91745a772798a1780ff86e045724fdefae32cb9f55f8044e43f2eb9ef59fc9
                              • Instruction ID: fc0a37d66e711b92a7e0ef12a8bcdfd9c397f2f67e7e374a227797a584d6e7c0
                              • Opcode Fuzzy Hash: 7f91745a772798a1780ff86e045724fdefae32cb9f55f8044e43f2eb9ef59fc9
                              • Instruction Fuzzy Hash: 94C00276E5001A9A8B00DAD9E4508DCB774EB94321B004066E224A6104D63015268B50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                              • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                              • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                              • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 64ce1d453eeb159fbf47efbdebb8bf9a47782278d4f4fc9bcca44c5de3ea41af
                              • Instruction ID: c7644f353692e9198fd5738967a47198075e342ae1b2de46d2a8c3b31b00f5ce
                              • Opcode Fuzzy Hash: 64ce1d453eeb159fbf47efbdebb8bf9a47782278d4f4fc9bcca44c5de3ea41af
                              • Instruction Fuzzy Hash: C8C08C30208108CBD3046BA0E2487AA36A1EBC0708F0040B8A30632298DA3408869BA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7d5278d08e6e1f72a3b1dc9deb40e010ac15326b7138a88b9a19d04ebf5623e5
                              • Instruction ID: 3c45382f2c19683c93112098eaf7c834740f870d446a6ea3b70c92614480a386
                              • Opcode Fuzzy Hash: 7d5278d08e6e1f72a3b1dc9deb40e010ac15326b7138a88b9a19d04ebf5623e5
                              • Instruction Fuzzy Hash: 4FB09232000308AB8600AB84EC04866BF69AB99700B40C026E609862228B32A822DAA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0a765325cdeeb0fe7ea43b6e6c08968fb2ff26e4c9c9a55238d50db81451974b
                              • Instruction ID: 3afc7c924843229fa920c4e15eb928dae01364747fdf2a2136e3c169bf32677d
                              • Opcode Fuzzy Hash: 0a765325cdeeb0fe7ea43b6e6c08968fb2ff26e4c9c9a55238d50db81451974b
                              • Instruction Fuzzy Hash: A1A012716041005F9B09DE00DB0A41AB612D7D0341701C426A0064102487361C21E510
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7fffedd0a13a4036f79e662423423495af7d87bedf686cd39f7dc62e72a6455a
                              • Instruction ID: 8f9c0af2b5ec5b789d436395eacc2d900eb4a0b345cc0bce240b87d6ff66f0c4
                              • Opcode Fuzzy Hash: 7fffedd0a13a4036f79e662423423495af7d87bedf686cd39f7dc62e72a6455a
                              • Instruction Fuzzy Hash: 53A002325805159AEF106F50AB0E7443D55FB45B01F55C090661595082899A4E409951
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 57701fc5e992c7898b32dd72a3d6d9cef9c9db8ed30fd43a42c0d225b4bf0f31
                              • Instruction ID: 377c6f20a049c306f88f3de4f72bd4f54eab0cd677f54f12dff65376fc8ddbe2
                              • Opcode Fuzzy Hash: 57701fc5e992c7898b32dd72a3d6d9cef9c9db8ed30fd43a42c0d225b4bf0f31
                              • Instruction Fuzzy Hash:
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128278539.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_5430000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: (aq$,aq
                              • API String ID: 0-1929014441
                              • Opcode ID: e2eb92d5a05d1b932663e5b2a9616e8b17544fb6c48f54a9017473f61c1b38f2
                              • Instruction ID: 84e2921b76f4bc71daa45b388e36f4b98c585281730cad2bb1db5434f1f1903b
                              • Opcode Fuzzy Hash: e2eb92d5a05d1b932663e5b2a9616e8b17544fb6c48f54a9017473f61c1b38f2
                              • Instruction Fuzzy Hash: FBD10A34A00205CFDB14DF69C585AAABBF2BF88315F29D5AAE415AB371DB34EC41CB50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2110785855.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2900000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4']q$4']q
                              • API String ID: 0-3120983240
                              • Opcode ID: e9b5965500e92b3c761991b38dea4258f54fb99f96eced343423afac6c1b5206
                              • Instruction ID: ba31365125606e48df90edc7fdc8090a88418a73a0d80b441eb2ba2477371a2f
                              • Opcode Fuzzy Hash: e9b5965500e92b3c761991b38dea4258f54fb99f96eced343423afac6c1b5206
                              • Instruction Fuzzy Hash: 56713B70A442098FD708EFABE894A9A7BF2FF89708F14C569D014A7279DF349806CF41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2110785855.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2900000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: 4']q$4']q
                              • API String ID: 0-3120983240
                              • Opcode ID: 02758df39176758a7b7e054e22b7dc489913012019321d063665ad9270542161
                              • Instruction ID: 4d7d37a4449f8d202250b180fedec1e975de2f62dfceefa081e25ebaf4009974
                              • Opcode Fuzzy Hash: 02758df39176758a7b7e054e22b7dc489913012019321d063665ad9270542161
                              • Instruction Fuzzy Hash: 84712B70A442098FD708EFABE984A9A7BF2FF89708F14C529D114A7279DF349906CF41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125795635.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e50000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Z$`
                              • API String ID: 0-573633162
                              • Opcode ID: 167b46f80cba52a7f2e88bfedcef0f671f261e3c2515e99aeb2b9054638112c8
                              • Instruction ID: da129f6b2979b97d22b7af8240ec9839f38119afef0c6f108b71d9fbf8413b80
                              • Opcode Fuzzy Hash: 167b46f80cba52a7f2e88bfedcef0f671f261e3c2515e99aeb2b9054638112c8
                              • Instruction Fuzzy Hash: 72317CB1E056188BDB58DF6B8C4869AFAF7AFC9301F14D1FA840CA6264EB3419859F11
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: \Vl
                              • API String ID: 0-682378881
                              • Opcode ID: b93d13fafe0bcbd3f8a9b66bf7bc71ed8a053a23ace3b6dd3326a4b13c78805c
                              • Instruction ID: 462dc1d48b05902e5fca4189f0d4eaddb23828250009e3b1726bdc07465ecc8d
                              • Opcode Fuzzy Hash: b93d13fafe0bcbd3f8a9b66bf7bc71ed8a053a23ace3b6dd3326a4b13c78805c
                              • Instruction Fuzzy Hash: 87E1E470D00229DFEB60CFA8C980BDDBBB1FF49304F1095AAD409A7250EB74A985CF55
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: 325b7b28596b1f0e73844b75a161f03fe8eef99f163607cecf5d1930007037a2
                              • Instruction ID: b0c4b491cb5f6ea21bccb4138c23547967dabb10c25e13ba264926dd52aa917e
                              • Opcode Fuzzy Hash: 325b7b28596b1f0e73844b75a161f03fe8eef99f163607cecf5d1930007037a2
                              • Instruction Fuzzy Hash: 09E1E074E05228DFDB64DF25C988BA9BBF2FB48305F1461EAD409A7250DB346E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: 8f164b2d4788089421086fc7decb6a17ca8b3a723acd13cae83fff949612ccf8
                              • Instruction ID: ab949688cf866f60ef30427f7e0f93ccc658f4cfb141fbd2d2161bc20430bc31
                              • Opcode Fuzzy Hash: 8f164b2d4788089421086fc7decb6a17ca8b3a723acd13cae83fff949612ccf8
                              • Instruction Fuzzy Hash: 76E1E174E05228DFDB64DF25C988BA9BBF2FB48305F1461EAD009A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: f326acfea70bb589d495bd26dec439cc46e7f1c0f53118adca53171faf8fe4d8
                              • Instruction ID: 000560de3f2314d86fa098f90ef248b7ee912b7fd8ec71ce7304ba79c1587c30
                              • Opcode Fuzzy Hash: f326acfea70bb589d495bd26dec439cc46e7f1c0f53118adca53171faf8fe4d8
                              • Instruction Fuzzy Hash: 59D1B174D05228DFDB64DF25C988BA9BBF2FB48305F1461EAD409A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: e2f33095f596794b299892b2e6506e7df80ceb0381972d93f0ffdf9b9a38572e
                              • Instruction ID: e017653325dafa5d26a688596ba2c4eb2ab256a3e2b07a6e092775640ca3bea8
                              • Opcode Fuzzy Hash: e2f33095f596794b299892b2e6506e7df80ceb0381972d93f0ffdf9b9a38572e
                              • Instruction Fuzzy Hash: 39D1C274D45229DFDB64DF25C988BA9BBF2FB48309F1461EAD009A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: b4df4ff4f5f55ca943e94f5445093c56b84a82da98529775cdd57eb5150a08f1
                              • Instruction ID: 6ff69b7846eacbd0c3eceb375dbe852d23146721ac570f37616e548e0b59a958
                              • Opcode Fuzzy Hash: b4df4ff4f5f55ca943e94f5445093c56b84a82da98529775cdd57eb5150a08f1
                              • Instruction Fuzzy Hash: 2DD1C1B0D05228DFDB64CF25C988BA9BBF2FB48305F1461EAD409A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: 2b609206b4f13fb78e641268d7c29280a99e4be170dd756598b144eab65eb21a
                              • Instruction ID: 6ff69b7846eacbd0c3eceb375dbe852d23146721ac570f37616e548e0b59a958
                              • Opcode Fuzzy Hash: 2b609206b4f13fb78e641268d7c29280a99e4be170dd756598b144eab65eb21a
                              • Instruction Fuzzy Hash: 2DD1C1B0D05228DFDB64CF25C988BA9BBF2FB48305F1461EAD409A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: 15cf2a172d9dd14e5f6e9d7be7d3253a2fea48615b389aa09c81b150996e772b
                              • Instruction ID: f2dfa850c93f740b8b260ec0feb07e99f81b8ff0c42faa24741a153dfd3bc099
                              • Opcode Fuzzy Hash: 15cf2a172d9dd14e5f6e9d7be7d3253a2fea48615b389aa09c81b150996e772b
                              • Instruction Fuzzy Hash: 9FD1C2B4D45228DFDB64DF25C988BA9BBF2FB48305F1461EAD009A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: 62e6e066c5079ef076091d3a63f69a541866525e2cdf91bc62f6f694078df123
                              • Instruction ID: 5eecf145fe336565cf4c524999dac9b7bfd3ff3da419444be60414af61364f65
                              • Opcode Fuzzy Hash: 62e6e066c5079ef076091d3a63f69a541866525e2cdf91bc62f6f694078df123
                              • Instruction Fuzzy Hash: B5D1C274D05228DFDB64DF25C988BA9BBF2FB48305F1461EAD409A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: ed012e1f2696f9db6fc4df235876d53ff76ac36f7804deb7b5f31cf8d983d2df
                              • Instruction ID: b76c879edaa92976513c76688fba7e236af261b2230d5c73dd7d520c3116ff28
                              • Opcode Fuzzy Hash: ed012e1f2696f9db6fc4df235876d53ff76ac36f7804deb7b5f31cf8d983d2df
                              • Instruction Fuzzy Hash: 1BD1D2B4D05229DFDB65DF25C988BA9BBF2FB08305F1461EAD409A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: d044cf56b1efc5b659098440c499da2ce5a1f956d74c29d0c8b9c7ba4582b4d1
                              • Instruction ID: d3e8bd0a8d089e5e601246bdf79c894cdc7a875748731062d5a3ad1b7715a433
                              • Opcode Fuzzy Hash: d044cf56b1efc5b659098440c499da2ce5a1f956d74c29d0c8b9c7ba4582b4d1
                              • Instruction Fuzzy Hash: 63C1C174D45228DFDB65DF25C988BA9BBF2FB48309F1461EAD009A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: 4f713af291d282427abccd5791bb9412070c6f158084c234e029681fad2356d3
                              • Instruction ID: 77d025775b28899651febea24380b29791ae32959284ce20b60af97237531a4c
                              • Opcode Fuzzy Hash: 4f713af291d282427abccd5791bb9412070c6f158084c234e029681fad2356d3
                              • Instruction Fuzzy Hash: 39C1C1B4D05228DFDB65DF25D988BA9BBF2FB48305F1461EAD009A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: e453c1fb8a07a91b9fa30a820d9d3d6439ebca9c8a05ec28fe7f2471df603a72
                              • Instruction ID: d2b8830dacd647fc8dfa60aeadad1b57e2634e1c32517b859db4c782712b5413
                              • Opcode Fuzzy Hash: e453c1fb8a07a91b9fa30a820d9d3d6439ebca9c8a05ec28fe7f2471df603a72
                              • Instruction Fuzzy Hash: 82C1C1B4D05228DFDB65DF25D988BA9BBF2FB48305F1461EAD009A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: PH]q
                              • API String ID: 0-3168235125
                              • Opcode ID: c2daf96c87da5bfca9eaf66a98ebc428ca947d4dc80c2395411375918030041e
                              • Instruction ID: 8ea4ab7a3abc094ce76c038db68361115b593dcd9921de98968096dc3a799c07
                              • Opcode Fuzzy Hash: c2daf96c87da5bfca9eaf66a98ebc428ca947d4dc80c2395411375918030041e
                              • Instruction Fuzzy Hash: 96C1B0B4D05228DFDB65DF25D988BA9BBF2FB48305F1461EAD009A7250DB746E82CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Te]q
                              • API String ID: 0-52440209
                              • Opcode ID: e73f5cbded38240e67e7133f8668f4ad000b41bd982555eed64ce2c7404444b3
                              • Instruction ID: 8eabffd81bf1bc3aa3e90982efa68452c51fccd347aef3a66c09038c49ea43e3
                              • Opcode Fuzzy Hash: e73f5cbded38240e67e7133f8668f4ad000b41bd982555eed64ce2c7404444b3
                              • Instruction Fuzzy Hash: FEA1D770E05218CFDB14DFA9DA84BEDBBF2FB89305F20906AD449A7255E7316986CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: Te]q
                              • API String ID: 0-52440209
                              • Opcode ID: f4e89e279d3a24b7257c6663a930843cbc59214b3c90a6a4a89049b39eb18fa3
                              • Instruction ID: b69e15c2ea6966fad8c1fbebd2de597dfca9427095c06fc355b2de862c57b82a
                              • Opcode Fuzzy Hash: f4e89e279d3a24b7257c6663a930843cbc59214b3c90a6a4a89049b39eb18fa3
                              • Instruction Fuzzy Hash: 92A10970E05218CFDB14CFA9DA84BDDBBF2FB89305F20906AD449A7255E7356986CF04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: n
                              • API String ID: 0-2013832146
                              • Opcode ID: 3925989bb57299f0c4c237b154c7eebff24ba3b63f11712e499a3c6802fb3370
                              • Instruction ID: 2f39b6cbfd0cbe7df7b04ff6108720d197aaf7d1b03af43af28fd8586d53d1c8
                              • Opcode Fuzzy Hash: 3925989bb57299f0c4c237b154c7eebff24ba3b63f11712e499a3c6802fb3370
                              • Instruction Fuzzy Hash: 3E4170B1E04A588BEB1CCF6B8D4069EFBF7AFC9301F14D1B9841CAA255EB3055468F41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7c614ae29ebcdfb7f7c6a3b743437b103292813b35a050894fe81a9559d66da0
                              • Instruction ID: 57291ab4e74d2437a54d593875fe5c4d8a99233a51d4a826b0b2e66e6305ee1a
                              • Opcode Fuzzy Hash: 7c614ae29ebcdfb7f7c6a3b743437b103292813b35a050894fe81a9559d66da0
                              • Instruction Fuzzy Hash: CF129371E006198FDB14CFAEC98069EFBF2BF88304F24D569D419AB21AD734A946CF50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 22b25a5a63ef9281d88ce855af078274b5218678979df5f432fd3fe7cd518330
                              • Instruction ID: c4c42c9316f88544ffb197a28116177765adf0dd4c65150f9dcf2ee5b5316aaa
                              • Opcode Fuzzy Hash: 22b25a5a63ef9281d88ce855af078274b5218678979df5f432fd3fe7cd518330
                              • Instruction Fuzzy Hash: 7EB14971D05208CFDB14EFA9D984BADBBF2FF49304F10906AD149A7294DB346986CF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128637962.00000000055A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055A0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55a0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 03344cfe1fb1e90a92c9a12665bd8132dbcc29bb0fe86614155e4c86a3df1184
                              • Instruction ID: f1574e54b863caeb637795e845a7350ebc418f518ec4cfed24436c0ef7665251
                              • Opcode Fuzzy Hash: 03344cfe1fb1e90a92c9a12665bd8132dbcc29bb0fe86614155e4c86a3df1184
                              • Instruction Fuzzy Hash: E1B13971E05208CFDB14EFA9D984BADBBF2FB49304F109069D14AA7295DB346986CF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0c8329669eff83db1f664c8ccd96fb303c185e5783da6bc7fd861081666e5005
                              • Instruction ID: 7e7592b495b9611b1dc6cfba9ab5a5b41577bf864db7f5d76e8bd3d04edccbc8
                              • Opcode Fuzzy Hash: 0c8329669eff83db1f664c8ccd96fb303c185e5783da6bc7fd861081666e5005
                              • Instruction Fuzzy Hash: 0C813870E05208CFDB04EFA6EA547ADBBF2FF89385F109029E419A7295DB346846CF05
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 883c7631f260781274dd2b4bc31fbc9606fc790457127b77722384c5481a25e0
                              • Instruction ID: fcf8f544e1ae7a3cf7110a8e98600802f62b007b30bede1492a212178e210702
                              • Opcode Fuzzy Hash: 883c7631f260781274dd2b4bc31fbc9606fc790457127b77722384c5481a25e0
                              • Instruction Fuzzy Hash: EA812A70E05209CFDB04EFA5EA547ADBBF2FF89385F109029E419A7295DB346846DF04
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3adf4130bbbfde71c40d7e2dfa69354e6a6db76f09ab667da798c6a3364a3a08
                              • Instruction ID: 7abafecb69ba1a0273ed874febf1dd989c562f1110586a5e5bf24eb2003bc1b2
                              • Opcode Fuzzy Hash: 3adf4130bbbfde71c40d7e2dfa69354e6a6db76f09ab667da798c6a3364a3a08
                              • Instruction Fuzzy Hash: 1481F370D04258CFDB24DFE5C884BADBBB6BF4A304F1094A9D40AAB251DB70998ACF41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126100127.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4ec0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4251c1550c0a12dcdec3fc7c4da7e175cee005cfc9388e2713cf837f3bcf64d5
                              • Instruction ID: 6d3464dc966c7b3e94f6a3147a0d167cdd2052f19b0866e9dbfd59e041963d48
                              • Opcode Fuzzy Hash: 4251c1550c0a12dcdec3fc7c4da7e175cee005cfc9388e2713cf837f3bcf64d5
                              • Instruction Fuzzy Hash: 8F51A9B1E016199BDB18CFABC94069EFBF3AFC8310F14C17AD918AB264DB3059468F50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2110785855.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2900000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6d89e94e35615495fa536fc29f2b32d36d597a9363310b06b1ec790028aee9a9
                              • Instruction ID: f233f50e640610d1baf77d002582cbb7bb6c91fe13b90af480f41b2f3e7dd6ee
                              • Opcode Fuzzy Hash: 6d89e94e35615495fa536fc29f2b32d36d597a9363310b06b1ec790028aee9a9
                              • Instruction Fuzzy Hash: 9D516DB1D056698BEB68CF1B8D447DAFAF3AFC8301F04C0FA845CA6265DB705AC59E40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2110785855.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2900000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ea414229bc127f7dff1d057b7a0e4f0f516b451458841ec10c79242a40f33bc5
                              • Instruction ID: e3b16a9e20366edad9f9ed81c13380ac98b55dcee2f1e3de7a502d07d628e73c
                              • Opcode Fuzzy Hash: ea414229bc127f7dff1d057b7a0e4f0f516b451458841ec10c79242a40f33bc5
                              • Instruction Fuzzy Hash: EA41D0B0D0434C9FDB24DFA9C895A9DBBF1FB49304F20912AE819A7290DB749985CF85
                              Memory Dump Source
                              • Source File: 00000000.00000002.2110785855.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2900000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 358a8d1d32719bccdaa8fb8461a64ac2bbf885d75d37799eba379548e359cbc9
                              • Instruction ID: 782d1886d91f7c991bc6fca1f64ebac0a0ab7d52952ad952397078238b6c7e90
                              • Opcode Fuzzy Hash: 358a8d1d32719bccdaa8fb8461a64ac2bbf885d75d37799eba379548e359cbc9
                              • Instruction Fuzzy Hash: F4513E71D01A598BE76DCF2B8D447DAFAF3AFC9300F14C1FA845CA6665DB700A869E40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3ccf4835108f71a598821e37df3d0b8eae5458632ddd5aacd6b275436262f2e4
                              • Instruction ID: a1afee2b28d657a0ecc8a1e49ef00c5068704e88c63f8f1d0648350e4b7ce99f
                              • Opcode Fuzzy Hash: 3ccf4835108f71a598821e37df3d0b8eae5458632ddd5aacd6b275436262f2e4
                              • Instruction Fuzzy Hash: 4B41DBB5D042599FCB10CFA9D584AEEFBF4AF09310F24902AE415B7241C738AA85CFA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7cba4a718bf4a9055d0efb06de35104694a3fa03406129ac614847fd17af8a62
                              • Instruction ID: f9475813f5bcde77db0d0e051e0d8563fd7b5a1eb2ed0a0853c8cd3093164b45
                              • Opcode Fuzzy Hash: 7cba4a718bf4a9055d0efb06de35104694a3fa03406129ac614847fd17af8a62
                              • Instruction Fuzzy Hash: 3D410EB9C042599FCB10CFA9D580AEEFBF0BF09310F14802AE415B7241D738AA85CFA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e98aa06b887f5d87afed1db39cb582cf983e89c95a9a992069508283918ec1e6
                              • Instruction ID: 56e6e921943d389266663cc0c6554ebd13fac45df866753532582c4b367d1cd6
                              • Opcode Fuzzy Hash: e98aa06b887f5d87afed1db39cb582cf983e89c95a9a992069508283918ec1e6
                              • Instruction Fuzzy Hash: BB318770E05219CFCB14DFA9EA447EDBBF6FB89304F109469D109A3244EB30A986CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d492d6e479073d2244ebcbd21bc693947d898fdfa8dff54b2c5ee38eb8fb913a
                              • Instruction ID: 87c5aa4c2a680dc717691dcefdb54c09d122f3f6f632be7002b4bfa92c59b6cd
                              • Opcode Fuzzy Hash: d492d6e479073d2244ebcbd21bc693947d898fdfa8dff54b2c5ee38eb8fb913a
                              • Instruction Fuzzy Hash: 1641CA71D056188BEB28DF6AC8587DABBF6BF88300F04C4EAD51CA7254EB745A85CF41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126544298.0000000004FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fc0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e65b50315df72b10c764f956b01ff90af6852ed30a09c575885e6348862e1043
                              • Instruction ID: 32005ae501db4d324f7bea1ab0066bb109821c663384365cbbb80bbfa8f565b5
                              • Opcode Fuzzy Hash: e65b50315df72b10c764f956b01ff90af6852ed30a09c575885e6348862e1043
                              • Instruction Fuzzy Hash: 25310575E05209CFDB18DFA9E6847ACBBF2FF89306F105069D516A3254D774A982DF00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125795635.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e50000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b925d6b43f5b8c9ed0fb4ba49884000821dc53c7f414e67b6332735eaffc6fc5
                              • Instruction ID: 0ae92c6d1cff0184820bee58bae7d25049883869d0c7581b3f381d1efae36b08
                              • Opcode Fuzzy Hash: b925d6b43f5b8c9ed0fb4ba49884000821dc53c7f414e67b6332735eaffc6fc5
                              • Instruction Fuzzy Hash: 9C31C671E016188FDB18CF6BC9406DDFBF2AF89300F14D0AAD849AB264DB706A85CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.2128696251.00000000055B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_55b0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cc029713d91ce306a4db8024b557c5e3ae41c8e839aca7d86a6b60dbef9d48bd
                              • Instruction ID: e571450623e7fc44996dc9742b697366294b677359f594def8538fbe84527667
                              • Opcode Fuzzy Hash: cc029713d91ce306a4db8024b557c5e3ae41c8e839aca7d86a6b60dbef9d48bd
                              • Instruction Fuzzy Hash: 2E310D71D057989BEB19CF678C1829ABFF7BFC5300F08C0EA9458AA265D7744A86CF11
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1c8cf1f89e99fdbd90e4ca5d2985372dd5508a374f3655ac1e9f138d17a5bd89
                              • Instruction ID: c63d9257159c2b48b26a54ca221c88ba709f57fe4261007c4869303ef36615f1
                              • Opcode Fuzzy Hash: 1c8cf1f89e99fdbd90e4ca5d2985372dd5508a374f3655ac1e9f138d17a5bd89
                              • Instruction Fuzzy Hash: D321DDB5D002189BCB14CFA9D981AEEBBF5FF49310F14902AE909B7210CB35A941CFA5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 92ed9e251c7769c84dad111e68906cd51dc8e839b01b42b0113356dc4da39755
                              • Instruction ID: 1d16da08e3dc493beacafb56084c54b8a03d25eac79d36c8bf070c61d2f435b9
                              • Opcode Fuzzy Hash: 92ed9e251c7769c84dad111e68906cd51dc8e839b01b42b0113356dc4da39755
                              • Instruction Fuzzy Hash: B121BDB5D042189BCB14DFA9D980AEEBBF5BF49310F14905AD819B7210CB35A945CFA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125795635.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e50000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4cbb59863d630f50cf6ad27b65527fd22d022c1d63f984a12bf3b1a0e68d70f7
                              • Instruction ID: 2396fbc77ac3f07cd2706afbf9b88c6822007df9c86617eeb0a5649813e6fbf5
                              • Opcode Fuzzy Hash: 4cbb59863d630f50cf6ad27b65527fd22d022c1d63f984a12bf3b1a0e68d70f7
                              • Instruction Fuzzy Hash: 0B317AB1E016188BEB18CF5BCD4578AFAF7BFC9304F14C1A9D44CA6264DB740A858F11
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fc02ecf1665f1083974e5f7873862c0b1f4a7eadcf55f800b1e264311abf56fe
                              • Instruction ID: 37a17bfd995e0cd78c27ea0674c4bdf4484862ca5582005f047be16d3e63cb5c
                              • Opcode Fuzzy Hash: fc02ecf1665f1083974e5f7873862c0b1f4a7eadcf55f800b1e264311abf56fe
                              • Instruction Fuzzy Hash: DB21A271E056188BEB18CFABD8447DEBBB7AFC8300F14C06AD808AA254DB7559468F55
                              Memory Dump Source
                              • Source File: 00000000.00000002.2125795635.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4e50000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1af704e08611baa8313941a461be792c983b52d8cf13b2af36a6527ce4b205e8
                              • Instruction ID: 99edba23788412a63fb8e6a8c1d5d519b9da0665c7ce46bc05f2129d33202ced
                              • Opcode Fuzzy Hash: 1af704e08611baa8313941a461be792c983b52d8cf13b2af36a6527ce4b205e8
                              • Instruction Fuzzy Hash: 6E21C871E056188BEB1CCF6B89402DDFBF3AFC9300F14D0AAD848AA264DA305A568F44
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b99954d68d86b26a8db383016dde0b8709e1d99d02ed7a06b2a05b39b9c6f434
                              • Instruction ID: 30ad9a59b6bd093749f12c891ae7918f27835e84871c9007e8a725eff5d2a813
                              • Opcode Fuzzy Hash: b99954d68d86b26a8db383016dde0b8709e1d99d02ed7a06b2a05b39b9c6f434
                              • Instruction Fuzzy Hash: 4F21C9B1E05618CBEB18CFABD9447DEBAF7AFC8300F18C16AD809A6254DB7409468F55
                              Memory Dump Source
                              • Source File: 00000000.00000002.2126594772.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_4fd0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 764e32c0b8498cd30b7bfb35e6399ee6f52b5b02b0a847e7af5979d881e9ac67
                              • Instruction ID: baa71ab1dac958f1ee67d897b48cfb9402610b09c873e9405b6060c9239be407
                              • Opcode Fuzzy Hash: 764e32c0b8498cd30b7bfb35e6399ee6f52b5b02b0a847e7af5979d881e9ac67
                              • Instruction Fuzzy Hash: D511B771D056588BEB18CFABC84479EBAF7AFC9310F18C07AC408AB255EB745546CF91
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID: Te]q
                              • API String ID: 0-52440209
                              • Opcode ID: 48e0a625f0fb4e757c8b681ff9900846bd4e9586976e373f38f8be2de95f5d9e
                              • Instruction ID: eb8b2708bc07a40d5890643724fb77d55b852dbf3462b164c1e11ca1b50dd14e
                              • Opcode Fuzzy Hash: 48e0a625f0fb4e757c8b681ff9900846bd4e9586976e373f38f8be2de95f5d9e
                              • Instruction Fuzzy Hash: 7991BE38B01154CFD794CF68E598B6A77F3FB98318F2584A5D0069B365CB389D8ACB10
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID: Te]q
                              • API String ID: 0-52440209
                              • Opcode ID: 0540bfab7b91ffcf3a31ee2c5efed439dd8848d66c0bbc40145cd8f46b5f5cc5
                              • Instruction ID: fc7fd59076867ecacc9161fc2c4be0e3463b5eb1e4056482cdaa16684e24cb99
                              • Opcode Fuzzy Hash: 0540bfab7b91ffcf3a31ee2c5efed439dd8848d66c0bbc40145cd8f46b5f5cc5
                              • Instruction Fuzzy Hash: 0A91AE38B01154CFD794DF68E598B6A77F3FB98318F2584A5D0069B365CB38AD8ACB10
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 960509e71c7e11d624021b998fccd3b154dcfebcf2ec46b796a0549127d6f44e
                              • Instruction ID: e48df3aca957e12d1bee5d74e2a30665428001bddce264c86f3769a4fcb30a59
                              • Opcode Fuzzy Hash: 960509e71c7e11d624021b998fccd3b154dcfebcf2ec46b796a0549127d6f44e
                              • Instruction Fuzzy Hash: A9D19D31E041698FEB25CBA8C8806ADFBF1FB98318F648569D455E7302D734ED4ACB90
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID: Ddq
                              • API String ID: 0-562783569
                              • Opcode ID: 1380041695d8f93ea7173fa7d705ea4827185004b423eb84d496f8b1660fffac
                              • Instruction ID: d440b273fe116d0c008a9372ee01c3fdfd866fc5ab82e347d735cddb680e64b7
                              • Opcode Fuzzy Hash: 1380041695d8f93ea7173fa7d705ea4827185004b423eb84d496f8b1660fffac
                              • Instruction Fuzzy Hash: 8191B274A002149FCB14EF69D594E59BBF2FF98718F128169D805AB369DB31EC05CF90
                              Strings
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID: Ddq
                              • API String ID: 0-562783569
                              • Opcode ID: 524ab7a4d03734d5ed4276f1ca0dd5fef92fc955b992fc1ee5ea4e4dfc2a49de
                              • Instruction ID: fa812c765671662219209bab8bbba831b7ca27a4e61f78744a52a24761df0bbd
                              • Opcode Fuzzy Hash: 524ab7a4d03734d5ed4276f1ca0dd5fef92fc955b992fc1ee5ea4e4dfc2a49de
                              • Instruction Fuzzy Hash: 6B61A074A006149FCB14DF29E594A59BBF2FF88318B12C2A9D815EB369DB31EC05CF90
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2c3cb7ca01247a27e63f4c73c38bfa0d8128e680c9c70da2c82dd8d105938ef5
                              • Instruction ID: 1c0faa6ee6e42f325df8c2efe2d6475ce24cc2745114722f7aa03553b74ccc6f
                              • Opcode Fuzzy Hash: 2c3cb7ca01247a27e63f4c73c38bfa0d8128e680c9c70da2c82dd8d105938ef5
                              • Instruction Fuzzy Hash: 9F41E6386481548FD3058B38D8947997FB2EF87714F4682A6D4858B766C636DC4FCB90
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342094230.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_138d000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e847543d907ba3add35f633e3a0d789d8f20b94f1cc58fbb9910dc7c9196f251
                              • Instruction ID: 2765af81d4ffc1c0e9e116aed7c2960de51784e1a6b090a6287035060e57c777
                              • Opcode Fuzzy Hash: e847543d907ba3add35f633e3a0d789d8f20b94f1cc58fbb9910dc7c9196f251
                              • Instruction Fuzzy Hash: 3021F471544304DFDB05EF98D9C0B26BF65FB88318F20C56AD9090B296C33AD415C6B2
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ec1cdf4af8acba102072843352b98e3186cf7b469d739043800326bace789843
                              • Instruction ID: c12c672dc587bfd754947b9e1e6505ae3b7a664c24c7909bb7347f26c48bb7d7
                              • Opcode Fuzzy Hash: ec1cdf4af8acba102072843352b98e3186cf7b469d739043800326bace789843
                              • Instruction Fuzzy Hash: 0D01C0303402185FD308EABE8C94B6F6ADEBFC9B14F114479A009DB3A4CD64DC0183A0
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342094230.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_138d000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                              • Instruction ID: 22739303c626b3ec6732a3628411d2006f930496705ae70dce0297f421f47f48
                              • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                              • Instruction Fuzzy Hash: E2119D76504240CFDB16DF58D5C4B16BF72FB84328F24C5AAD9090A256C336D55ACBA2
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a84ce4d3d6766a182f78f33a55d294aeb09e5ddae10bfb7161873a09c0a94b5b
                              • Instruction ID: c402cad426931deec90bf62fd8d931b7061b5d4914607684672db89f6df7592d
                              • Opcode Fuzzy Hash: a84ce4d3d6766a182f78f33a55d294aeb09e5ddae10bfb7161873a09c0a94b5b
                              • Instruction Fuzzy Hash: 8401712051E3C48FD313873458287613FB25F57218F4E80E7D0A89B6A7D6358C5ACB12
                              Memory Dump Source
                              • Source File: 00000002.00000002.3348515617.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_5820000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6595f1ca9ad4dd8439455458efb02f1bf82441386ec1dcce80ca7d23d8c421c7
                              • Instruction ID: c5abc057de3969fafb3c8149127440609a08dfc12c42eb73eb429cca9440514d
                              • Opcode Fuzzy Hash: 6595f1ca9ad4dd8439455458efb02f1bf82441386ec1dcce80ca7d23d8c421c7
                              • Instruction Fuzzy Hash: F7113C74D04218DFDB00DFAAD04976EBFB2FB44309F2080A5D806E7745EB755A85CB41
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9103132d871e634d979fcedb8f08093125c1b640ccba114ae20942c44a0354b4
                              • Instruction ID: d6b1edd64acbec20772052a90d11c3c6dab2a485882f8e9f63173ef290f2ef24
                              • Opcode Fuzzy Hash: 9103132d871e634d979fcedb8f08093125c1b640ccba114ae20942c44a0354b4
                              • Instruction Fuzzy Hash: 160119387101159FDB95AB68C468A7D7BF6FF8A318B5200AAE406DB361DF348C46CF11
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ab7511bb9bf511e3353c5bd0e65a227f43f72753956c3f15586d25e36e5871ce
                              • Instruction ID: 9f3d357e6385928ce84418c1c7cee49dd58f8f2d759b24e7f77c3483d305a778
                              • Opcode Fuzzy Hash: ab7511bb9bf511e3353c5bd0e65a227f43f72753956c3f15586d25e36e5871ce
                              • Instruction Fuzzy Hash: 28F034387000148FCB95AB78C468A2C7BE6FF89308B0200AAE40ADB364DF318C45CF02
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: abaa51bdfc3aee37afb8f28f6f51c37a62677de85837a4d563efe569184c3c29
                              • Instruction ID: 857409aaf3bbe6292da46f7f4009940a58ae3713e647e805ecf84e19e9775892
                              • Opcode Fuzzy Hash: abaa51bdfc3aee37afb8f28f6f51c37a62677de85837a4d563efe569184c3c29
                              • Instruction Fuzzy Hash: AFF06D347450508FC35ADBB8A0A89E57FF5AF8D31472641E7E84ACB766CE359C038B81
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 90cc2d361ef2a88184b4113a7e289fce7e7333b4cd3e162a49856050587f15d1
                              • Instruction ID: d661856e600d3cb5f17f34c2170debac675c263b4f449d6241ac7e35a156d891
                              • Opcode Fuzzy Hash: 90cc2d361ef2a88184b4113a7e289fce7e7333b4cd3e162a49856050587f15d1
                              • Instruction Fuzzy Hash: A3F01C34600119CFDB04EB74E4546BDB262EB94328F108266ED62973E4CB34DC09DB41
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bc84d42190f3db5bb839c5c2a2f47b20a2958ff0348fbf9f597c156c7212b335
                              • Instruction ID: 54507d412ad1ef38992368cc36acc30965a6fff8538ef1be9bda12d438fa740e
                              • Opcode Fuzzy Hash: bc84d42190f3db5bb839c5c2a2f47b20a2958ff0348fbf9f597c156c7212b335
                              • Instruction Fuzzy Hash: A2E04F3095D3C19FC7A38B7894650D4BFB26F4322434A00CFE580894A7D26A48A5C795
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 480d95dd2022615e0ec0fc53326112b4f23abe6f8267b51bcb3aeaa3d2353498
                              • Instruction ID: e7e164a1a9b6088f67049a0f57d58bf4ed69cd8afd8df8f4fc8483d63bea0116
                              • Opcode Fuzzy Hash: 480d95dd2022615e0ec0fc53326112b4f23abe6f8267b51bcb3aeaa3d2353498
                              • Instruction Fuzzy Hash: 82E0C23164B3808FCB133BB064180583FA9AB03325B0904A3E405CB205EA3A4D868BAA
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a22525aab0bc18c4517110bac83d05f099f3f3916d709fbf945fab8d07429ea6
                              • Instruction ID: 5643248339b411a2098b4109774ce6dd6ab24109cc4e3ebc417289c9e413199f
                              • Opcode Fuzzy Hash: a22525aab0bc18c4517110bac83d05f099f3f3916d709fbf945fab8d07429ea6
                              • Instruction Fuzzy Hash: 17E09A30A20014CBE3209B2AE008B6233D7AB98328F59C022D02D5676AD730DC89CF00
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 76b432635729a52fcaf764abed3bb42696d06f839936a1b2834d7302c6492d27
                              • Instruction ID: 84b83bb31b0bc1f3103663fed0ae272f072a55215f1853b4f1e2d4f13bd19432
                              • Opcode Fuzzy Hash: 76b432635729a52fcaf764abed3bb42696d06f839936a1b2834d7302c6492d27
                              • Instruction Fuzzy Hash: AFF01578A10104CFC7A4DF54E058AA87BF2FB8C718F5140A5D5068B7A5C735AC09CF11
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5ebbd1f94987e3cb444a6164c35ec230c537b4abba3645bc015c9f17256855c4
                              • Instruction ID: 8f5d3acdb769ff921c1860bf0cb563cefa9d1c84f06c397ccbda3c88bc0c5b60
                              • Opcode Fuzzy Hash: 5ebbd1f94987e3cb444a6164c35ec230c537b4abba3645bc015c9f17256855c4
                              • Instruction Fuzzy Hash: 32E046343410248FC344AB7CE15895677EAAB8C225B2200AAE90AC7369CA32EC018B91
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 77c2ac5ab5446c178b7e5e3b647701d3a39540ffca692c7d3aa1e042a5fc41f8
                              • Instruction ID: 7902b1d0b6681101e63703a3bbaac12d01db86f95697f27a7d8f56719d6d4ae7
                              • Opcode Fuzzy Hash: 77c2ac5ab5446c178b7e5e3b647701d3a39540ffca692c7d3aa1e042a5fc41f8
                              • Instruction Fuzzy Hash: D4D02E208083C08FCB026734A4103D83FB0AF83338F0A88DAC0828B6A3F52E186BC751
                              Memory Dump Source
                              • Source File: 00000002.00000002.3348515617.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_5820000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3d9703cc86af0445fe4e65558d4c314103978ce61b88614e9128e1ebb6a697bb
                              • Instruction ID: 16f388a5272e21c79061cb1af3a2e063bd91802e3ddbcf76ca500e3b044dbee9
                              • Opcode Fuzzy Hash: 3d9703cc86af0445fe4e65558d4c314103978ce61b88614e9128e1ebb6a697bb
                              • Instruction Fuzzy Hash: 77D0A7747021149BDF106B98DC58B5C76B3FB58300F4040A8E50B93394CE374D894F01
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7eab1d71f248910c81f13b3670916f3b516ad3854f96a710f07fcf7c1d053966
                              • Instruction ID: b899e28b9d982b4294c4929be866788d4c83070e7b217c33147a4bf61e15b614
                              • Opcode Fuzzy Hash: 7eab1d71f248910c81f13b3670916f3b516ad3854f96a710f07fcf7c1d053966
                              • Instruction Fuzzy Hash: BCD0C732904120CBD7348F15D444294B3A4BB74306B5B4465C64E77111D731ED5ACB40
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4f2e072bdcc4be41d922e7e95d352983c6dae6d8101c7a2997408a9f151b7507
                              • Instruction ID: e0d818b1b467bbb4bfdc6adad726f04d5252455166d2b91440de00606ce1ffb3
                              • Opcode Fuzzy Hash: 4f2e072bdcc4be41d922e7e95d352983c6dae6d8101c7a2997408a9f151b7507
                              • Instruction Fuzzy Hash: 9DC08CB82012228BC7497728F11162D751AEBA1208B008128C04A5735DCF2A8D0E9382
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5c43670c418dd78b708b6417cd640a1163defa306ffdcb6fcc4eb935baec51c4
                              • Instruction ID: 0edcd5579ab11b39abdc564576e9dd47fa6ee8d2257966202e3b23cd3c50021e
                              • Opcode Fuzzy Hash: 5c43670c418dd78b708b6417cd640a1163defa306ffdcb6fcc4eb935baec51c4
                              • Instruction Fuzzy Hash: 14C048B090E2C08FCB125BB08A694913FB09D4B20631944E6C0C28A0ABD5255446EB06
                              Memory Dump Source
                              • Source File: 00000002.00000002.3348515617.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_5820000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d200006d66dfcaf3ad5dd5c1c75a4ffe651a9ea33eed7fff1a75258716443a08
                              • Instruction ID: 308734e347fe5fbfc39d01466d26648a0473cab39bdc6a53ba3d68073832f9aa
                              • Opcode Fuzzy Hash: d200006d66dfcaf3ad5dd5c1c75a4ffe651a9ea33eed7fff1a75258716443a08
                              • Instruction Fuzzy Hash: 93B01230240208CFC200DB5DD444C0033FCAF49A0434000D0F1098B731C721FC00CA40
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8d3b0226ef98158d950f17004896a877071f28a379d92f37867666a7e734f221
                              • Instruction ID: 69503aa6ba2791a468142ff099e4422e00b3dbd84521a9b1769c7355ba9d7fee
                              • Opcode Fuzzy Hash: 8d3b0226ef98158d950f17004896a877071f28a379d92f37867666a7e734f221
                              • Instruction Fuzzy Hash: 0FA022F000220CCFC2A03BA0FC0F00ABB2CEA00302F800022F00E8200B8F33A8008B80
                              Memory Dump Source
                              • Source File: 00000002.00000002.3348515617.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_5820000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0ea0f02e797b0000fdb7bd3622ca0bfcbf8c4a202b3a9bc0ed88dc49c1ffb6c6
                              • Instruction ID: d41a1980f508209814a447d480fa6e120207e39a4305eab8da48b5d5d085553a
                              • Opcode Fuzzy Hash: 0ea0f02e797b0000fdb7bd3622ca0bfcbf8c4a202b3a9bc0ed88dc49c1ffb6c6
                              • Instruction Fuzzy Hash: 7DA0223008BB0C83820232BA220803033AC88000283C000B88B0C08A302C33E8E08082
                              Memory Dump Source
                              • Source File: 00000002.00000002.3342468925.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_2_2_2d20000_InstallUtil.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 88fc5cc6793f7c60674ce807deb14200046d02b2e18250a1e1f18766d95e8c78
                              • Instruction ID: ce0cc7e1b26e2046b19b3986012c98123a72d52fd6c76480942bd15add95e720
                              • Opcode Fuzzy Hash: 88fc5cc6793f7c60674ce807deb14200046d02b2e18250a1e1f18766d95e8c78
                              • Instruction Fuzzy Hash: 2390023144860C8B8D5067D57519555B75C9745615B804051B50D426065AA6A41147D5