Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO# EB202329720241007_Hardy_Process^^^^.pif.exe

Overview

General Information

Sample name:PO# EB202329720241007_Hardy_Process^^^^.pif.exe
Analysis ID:1528611
MD5:6145c8269f1675712b844d8ac1980287
SHA1:7f37641603386f8b96edcf91a4d32d3f4a5d40cd
SHA256:93548239884f6d9f3ea7240dbf34beaa81bcd4f3c122454e81d9e1e433c804f0
Tags:exeuser-threatcat_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Obfuscated command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Dosfuscation Activity
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • PO# EB202329720241007_Hardy_Process^^^^.pif.exe (PID: 6728 cmdline: "C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe" MD5: 6145C8269F1675712B844D8AC1980287)
    • InstallUtil.exe (PID: 7136 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • conhost.exe (PID: 2256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wpappx.exe (PID: 7016 cmdline: "C:\Users\user\AppData\Roaming\wpappx.exe" MD5: 6145C8269F1675712B844D8AC1980287)
    • InstallUtil.exe (PID: 6752 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • conhost.exe (PID: 6832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wpappx.exe (PID: 3052 cmdline: "C:\Users\user\AppData\Roaming\wpappx.exe" MD5: 6145C8269F1675712B844D8AC1980287)
    • InstallUtil.exe (PID: 1104 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • conhost.exe (PID: 280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1807903081.0000000002F87000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x5ed0:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x1406:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
0000000A.00000002.2446396240.0000000005770000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    0000000A.00000002.2435244126.000000000412C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000001.00000002.1814780379.0000000000B60000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
      • 0x85708:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
      • 0x88c3e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
      00000000.00000002.1824668881.0000000005DA0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Click to see the 20 entries
        SourceRuleDescriptionAuthorStrings
        10.2.InstallUtil.exe.41544e8.4.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          10.2.InstallUtil.exe.5770000.10.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            8.2.InstallUtil.exe.3d444e8.6.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5da0000.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

                System Summary

                barindex
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\wpappx.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe, ProcessId: 6728, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wpappx
                Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe", CommandLine: "C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe, NewProcessName: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe, OriginalFileName: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe", ProcessId: 6728, ProcessName: PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-08T04:28:37.021260+020028573451Malware Command and Control Activity Detected192.168.2.44973989.238.176.550600TCP
                2024-10-08T04:28:58.400411+020028573451Malware Command and Control Activity Detected192.168.2.44974789.238.176.550600TCP
                2024-10-08T04:29:19.782484+020028573451Malware Command and Control Activity Detected192.168.2.44987989.238.176.550600TCP
                2024-10-08T04:29:41.289415+020028573451Malware Command and Control Activity Detected192.168.2.45001089.238.176.550600TCP
                2024-10-08T04:30:02.663221+020028573451Malware Command and Control Activity Detected192.168.2.45001189.238.176.550600TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: cdn.glitch.globalVirustotal: Detection: 5%Perma Link
                Source: https://cdn.glitch.globalVirustotal: Detection: 6%Perma Link
                Source: C:\Users\user\AppData\Roaming\wpappx.exeReversingLabs: Detection: 34%
                Source: C:\Users\user\AppData\Roaming\wpappx.exeVirustotal: Detection: 33%Perma Link
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeReversingLabs: Detection: 34%
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeVirustotal: Detection: 33%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\wpappx.exeJoe Sandbox ML: detected
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeJoe Sandbox ML: detected
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.0000000002DF7000.00000004.00000800.00020000.00000000.sdmp, PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1825930591.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1817667483.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.0000000003FFC000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2048461368.0000000003230000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2140570961.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2125157304.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.0000000002DF7000.00000004.00000800.00020000.00000000.sdmp, PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1825930591.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1817667483.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.0000000003FFC000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2048461368.0000000003230000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2140570961.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2125157304.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_05D9D3D0
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_05EB1A78
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_05EB1A70
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 4x nop then jmp 05EF5973h0_2_05EF55E0
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 4x nop then jmp 05EF5973h0_2_05EF55D1
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 4x nop then jmp 05EFD510h0_2_05EFD458
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 4x nop then jmp 05EFD510h0_2_05EFD450
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 4x nop then jmp 05EF61A9h0_2_05EF6148
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 4x nop then jmp 05EF61A9h0_2_05EF6336
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h4_2_0643D3D0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h4_2_06551A70
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h4_2_06551A78
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 0659D510h4_2_0659D458
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 0659D510h4_2_0659D450
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 06595973h4_2_065955D1
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 06595973h4_2_065955E0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 065961A9h4_2_06596336
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 065961A9h4_2_06596148
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 065961A9h4_2_06596138
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h7_2_0602D3D0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h7_2_06141A70
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h7_2_06141A78
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 0618D510h7_2_0618D458
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 0618D510h7_2_0618D450
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 06185973h7_2_061855D1
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 06185973h7_2_061855E0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 061861A9h7_2_06186336
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 061861A9h7_2_06186138
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4x nop then jmp 061861A9h7_2_06186148

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2857345 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.4:49747 -> 89.238.176.5:50600
                Source: Network trafficSuricata IDS: 2857345 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.4:49739 -> 89.238.176.5:50600
                Source: Network trafficSuricata IDS: 2857345 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.4:49879 -> 89.238.176.5:50600
                Source: Network trafficSuricata IDS: 2857345 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.4:50010 -> 89.238.176.5:50600
                Source: Network trafficSuricata IDS: 2857345 - Severity 1 - ETPRO MALWARE Win32/zgRAT CnC Checkin : 192.168.2.4:50011 -> 89.238.176.5:50600
                Source: unknownDNS query: name: puritylgs.duckdns.org
                Source: global trafficTCP traffic: 192.168.2.4:49739 -> 89.238.176.5:50600
                Source: Joe Sandbox ViewASN Name: M247GB M247GB
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: cdn.glitch.global
                Source: global trafficDNS traffic detected: DNS query: puritylgs.duckdns.org
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2048461368.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2125157304.0000000002B0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: InstallUtil.exe, 00000008.00000002.2922615312.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://archive.torproject.org/tor-package-archive/torbrowser/13.0.9/tor-expert-bundle-windows-i686-
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2048461368.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2125157304.0000000002B0D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.glitch.global
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2125157304.0000000002B01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.glitch.global/65e86a4d-1443-41a6-ac6d-f084c1191eff/Vyciz.mp4xC
                Source: wpappx.exe, 00000004.00000002.2048461368.0000000002EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.glitch.global/65e86a4d-1443-41a6-ac6d-f084c1191eff/Vyciz.mp4xC&
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1817667483.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2140570961.0000000003DFB000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354

                System Summary

                barindex
                Source: 00000000.00000002.1807903081.0000000002F87000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 00000001.00000002.1814780379.0000000000B60000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 00000000.00000002.1817667483.0000000004094000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 00000004.00000002.2048461368.00000000033BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 00000007.00000002.2140570961.0000000003C82000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 00000007.00000002.2125157304.0000000002F78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 00000004.00000002.2065435853.000000000456D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: initial sampleStatic PE information: Filename: PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EB0C28 NtWriteVirtualMemory,0_2_05EB0C28
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EB08E0 NtAllocateVirtualMemory,0_2_05EB08E0
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EB0A58 NtCreateThreadEx,0_2_05EB0A58
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EB0C21 NtWriteVirtualMemory,0_2_05EB0C21
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EB08D8 NtAllocateVirtualMemory,0_2_05EB08D8
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EB0A50 NtCreateThreadEx,0_2_05EB0A50
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EFECF0 NtProtectVirtualMemory,0_2_05EFECF0
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EFECE8 NtProtectVirtualMemory,0_2_05EFECE8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_06550C28 NtWriteVirtualMemory,4_2_06550C28
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_06550A58 NtCreateThreadEx,4_2_06550A58
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_065508E0 NtAllocateVirtualMemory,4_2_065508E0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_06550C21 NtWriteVirtualMemory,4_2_06550C21
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_06550A50 NtCreateThreadEx,4_2_06550A50
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_065508D8 NtAllocateVirtualMemory,4_2_065508D8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659ECF0 NtProtectVirtualMemory,4_2_0659ECF0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659ECE8 NtProtectVirtualMemory,4_2_0659ECE8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_06140C28 NtWriteVirtualMemory,7_2_06140C28
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_06140A58 NtCreateThreadEx,7_2_06140A58
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_061408E0 NtAllocateVirtualMemory,7_2_061408E0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_06140C21 NtWriteVirtualMemory,7_2_06140C21
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_06140A50 NtCreateThreadEx,7_2_06140A50
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_061408D8 NtAllocateVirtualMemory,7_2_061408D8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0618ECF0 NtProtectVirtualMemory,7_2_0618ECF0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0618ECE8 NtProtectVirtualMemory,7_2_0618ECE8
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027CC1640_2_027CC164
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C159C0_2_027C159C
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C8A900_2_027C8A90
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C09B80_2_027C09B8
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C1EE00_2_027C1EE0
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C0C980_2_027C0C98
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027CAD670_2_027CAD67
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C22180_2_027C2218
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C52A00_2_027C52A0
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C43F80_2_027C43F8
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C50C50_2_027C50C5
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C169A0_2_027C169A
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C44080_2_027C4408
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C8A800_2_027C8A80
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C4FED0_2_027C4FED
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C1F910_2_027C1F91
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027CDC700_2_027CDC70
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027CDC600_2_027CDC60
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C0CD20_2_027C0CD2
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C0C890_2_027C0C89
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_027C0D490_2_027C0D49
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D36CC00_2_05D36CC0
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D36CBB0_2_05D36CBB
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D3579B0_2_05D3579B
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D357A00_2_05D357A0
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D300400_2_05D30040
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D3003B0_2_05D3003B
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D3724F0_2_05D3724F
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D9E8D80_2_05D9E8D8
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D900400_2_05D90040
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D900070_2_05D90007
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EA212F0_2_05EA212F
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EA5B500_2_05EA5B50
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EA24670_2_05EA2467
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EA37480_2_05EA3748
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EBC4580_2_05EBC458
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EB26880_2_05EB2688
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EBC44B0_2_05EBC44B
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EBD6C70_2_05EBD6C7
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EBD6D80_2_05EBD6D8
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EB267A0_2_05EB267A
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EFA1400_2_05EFA140
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EFBB880_2_05EFBB88
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EFEA500_2_05EFEA50
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EF9A180_2_05EF9A18
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EF9D6D0_2_05EF9D6D
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EFAFA00_2_05EFAFA0
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EFAF900_2_05EFAF90
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EFC8400_2_05EFC840
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EFBB780_2_05EFBB78
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EFEA400_2_05EFEA40
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05EF9A090_2_05EF9A09
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_060C07190_2_060C0719
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_060C07280_2_060C0728
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_060C01380_2_060C0138
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_060C01480_2_060C0148
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_0614E9C00_2_0614E9C0
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_0614CAE80_2_0614CAE8
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_061300060_2_06130006
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_061300400_2_06130040
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_0614F8780_2_0614F878
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_00BEA4541_2_00BEA454
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014AC1644_2_014AC164
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A159C4_2_014A159C
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A09B84_2_014A09B8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A8A904_2_014A8A90
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014AAD674_2_014AAD67
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A0C984_2_014A0C98
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A1EE04_2_014A1EE0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A43F84_2_014A43F8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A22184_2_014A2218
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A52A04_2_014A52A0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A44084_2_014A4408
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A169A4_2_014A169A
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A8A804_2_014A8A80
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A0D494_2_014A0D49
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014ADC604_2_014ADC60
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014ADC704_2_014ADC70
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A0CD24_2_014A0CD2
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A0C894_2_014A0C89
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_014A1F914_2_014A1F91
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_063200014_2_06320001
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_063D6CC04_2_063D6CC0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_063D72474_2_063D7247
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_063D57A04_2_063D57A0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_063D57904_2_063D5790
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_063D001E4_2_063D001E
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_063D00404_2_063D0040
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_063D6CB14_2_063D6CB1
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_063D65F04_2_063D65F0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_063D69F04_2_063D69F0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_064300404_2_06430040
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_064300064_2_06430006
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0643E8D84_2_0643E8D8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0654212F4_2_0654212F
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_065437484_2_06543748
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_065424674_2_06542467
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_065526884_2_06552688
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0655B5E04_2_0655B5E0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0655267A4_2_0655267A
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0655C4584_2_0655C458
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0655C4484_2_0655C448
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0655B5D14_2_0655B5D1
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0655F2104_2_0655F210
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0655F2014_2_0655F201
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0655F8004_2_0655F800
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0655F8024_2_0655F802
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659EA504_2_0659EA50
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_06599A184_2_06599A18
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659BB884_2_0659BB88
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659A1404_2_0659A140
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659AF904_2_0659AF90
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659AFA04_2_0659AFA0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_06599D6D4_2_06599D6D
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659EA404_2_0659EA40
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_06599A094_2_06599A09
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659BB784_2_0659BB78
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_065923D84_2_065923D8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659C8404_2_0659C840
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_065911184_2_06591118
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_067EE9C04_2_067EE9C0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_067ECAE84_2_067ECAE8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_067EF8784_2_067EF878
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_067D00404_2_067D0040
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_067D00074_2_067D0007
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028DC1647_2_028DC164
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D159C7_2_028D159C
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D8A907_2_028D8A90
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D09B87_2_028D09B8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D1EE07_2_028D1EE0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D0C987_2_028D0C98
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028DAD677_2_028DAD67
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D52A07_2_028D52A0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D22187_2_028D2218
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D43F87_2_028D43F8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D169A7_2_028D169A
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D44087_2_028D4408
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D1F917_2_028D1F91
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D0C897_2_028D0C89
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D0CD27_2_028D0CD2
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028DDC607_2_028DDC60
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028DDC707_2_028DDC70
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_028D0D497_2_028D0D49
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_05FC6CC07_2_05FC6CC0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_05FC57A07_2_05FC57A0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_05FC6CB17_2_05FC6CB1
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_05FC00407_2_05FC0040
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_05FC00067_2_05FC0006
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_05FC57907_2_05FC5790
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_05FC72477_2_05FC7247
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_060200067_2_06020006
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_060200407_2_06020040
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0602E8D87_2_0602E8D8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0613212F7_2_0613212F
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_061337487_2_06133748
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_061324677_2_06132467
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_061426887_2_06142688
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0614B5E07_2_0614B5E0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0614267A7_2_0614267A
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0614C4587_2_0614C458
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0614C4487_2_0614C448
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0614B5D17_2_0614B5D1
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0614F2107_2_0614F210
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0614F2017_2_0614F201
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0614F8007_2_0614F800
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0614F8027_2_0614F802
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_06189A187_2_06189A18
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0618EA507_2_0618EA50
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0618BB887_2_0618BB88
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0618A1407_2_0618A140
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0618AF937_2_0618AF93
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0618AFA07_2_0618AFA0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_06189D6D7_2_06189D6D
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_06189A097_2_06189A09
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0618EA407_2_0618EA40
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0618BB787_2_0618BB78
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_061823D87_2_061823D8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0618C8407_2_0618C840
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_063DF8787_2_063DF878
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_063DE9C07_2_063DE9C0
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_063DCAE87_2_063DCAE8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_063C00067_2_063C0006
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_063C00407_2_063C0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A92B888_2_02A92B88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A938D08_2_02A938D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A970408_2_02A97040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A94AB68_2_02A94AB6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A94A808_2_02A94A80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A94A9D8_2_02A94A9D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A92AF18_2_02A92AF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A94A348_2_02A94A34
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A94A078_2_02A94A07
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A94A1A8_2_02A94A1A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A93A158_2_02A93A15
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A94A698_2_02A94A69
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A94A508_2_02A94A50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A92B888_2_02A92B88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A938D08_2_02A938D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A949F28_2_02A949F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A9395D8_2_02A9395D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A93EBD8_2_02A93EBD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A93E878_2_02A93E87
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A936908_2_02A93690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A9560E8_2_02A9560E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A93FD08_2_02A93FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_05064DB08_2_05064DB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_050695B88_2_050695B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_05068D318_2_05068D31
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_05068D6F8_2_05068D6F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_05068D808_2_05068D80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_05064DA08_2_05064DA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_050695A88_2_050695A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_05068F0F8_2_05068F0F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_050696EF8_2_050696EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_05064B918_2_05064B91
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_050B10208_2_050B1020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_050B20C88_2_050B20C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_050B13578_2_050B1357
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_050E39F18_2_050E39F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_050E1C388_2_050E1C38
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_050FEEC88_2_050FEEC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_050F62B08_2_050F62B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_050F68F08_2_050F68F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_053C704010_2_053C7040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_053C38D010_2_053C38D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_053C2B8810_2_053C2B88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_053C3FD010_2_053C3FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_053C3EBD10_2_053C3EBD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_053C3E8710_2_053C3E87
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_053C395D10_2_053C395D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_053C703910_2_053C7039
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_053C2B7810_2_053C2B78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_053C38D010_2_053C38D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_053C2B8810_2_053C2B88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_053C3A1510_2_053C3A15
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_056D68E010_2_056D68E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_056D68F010_2_056D68F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_056D60B910_2_056D60B9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_056D5AD010_2_056D5AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_056D5AD010_2_056D5AD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_056D62B010_2_056D62B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_05754DB010_2_05754DB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_057595B810_2_057595B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_05758D6F10_2_05758D6F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_05758D3110_2_05758D31
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_05754DA010_2_05754DA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_057595A810_2_057595A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_05758D8010_2_05758D80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_05758F0F10_2_05758F0F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_057596EF10_2_057596EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_05754B8710_2_05754B87
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_057F102010_2_057F1020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_057F20C810_2_057F20C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_057F135710_2_057F1357
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 10_2_05821C3810_2_05821C38
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000000.1670102950.00000000004C2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePO# EB202329720241007_Hardy_Process^^^^.exep( vs PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.0000000002DF7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1825930591.0000000005F70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1817667483.00000000039F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePO# EB202329720241007_Hardy_Process^^^^.exep( vs PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1817667483.00000000039F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1817667483.00000000039F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1822347169.000000000591A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePO# EB202329720241007_Hardy_Process^^^^.exep( vs PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.0000000002A1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807147952.0000000000A7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeBinary or memory string: OriginalFilenamePO# EB202329720241007_Hardy_Process^^^^.exep( vs PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: 00000000.00000002.1807903081.0000000002F87000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 00000001.00000002.1814780379.0000000000B60000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 00000000.00000002.1817667483.0000000004094000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 00000004.00000002.2048461368.00000000033BA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 00000007.00000002.2140570961.0000000003C82000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 00000007.00000002.2125157304.0000000002F78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 00000004.00000002.2065435853.000000000456D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                Source: classification engineClassification label: mal100.troj.evad.winEXE@12/3@3/1
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeFile created: C:\Users\user\AppData\Roaming\wpappx.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\16904c6276731aa3
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2256:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6832:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:280:120:WilError_03
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeReversingLabs: Detection: 34%
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeVirustotal: Detection: 33%
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeFile read: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe "C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe"
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\wpappx.exe "C:\Users\user\AppData\Roaming\wpappx.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\wpappx.exe "C:\Users\user\AppData\Roaming\wpappx.exe"
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wininet.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.0000000002DF7000.00000004.00000800.00020000.00000000.sdmp, PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1825930591.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1817667483.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.0000000003FFC000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2048461368.0000000003230000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2140570961.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2125157304.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.0000000002DF7000.00000004.00000800.00020000.00000000.sdmp, PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1825930591.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1817667483.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.0000000003FFC000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2048461368.0000000003230000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2140570961.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2125157304.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, --.cs.Net Code: _0003 System.AppDomain.Load(byte[])
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.3b0c030.3.raw.unpack, --.cs.Net Code: _0003 System.AppDomain.Load(byte[])
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5d40000.6.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5d40000.6.raw.unpack, ListDecorator.cs.Net Code: Read
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5d40000.6.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5d40000.6.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5d40000.6.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5f70000.8.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                Source: unknownProcess created: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe "C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe"
                Source: Yara matchFile source: 10.2.InstallUtil.exe.41544e8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.InstallUtil.exe.5770000.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.InstallUtil.exe.3d444e8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.5da0000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.2446396240.0000000005770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2435244126.000000000412C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1824668881.0000000005DA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2125157304.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2928192880.0000000003D44000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2048461368.0000000002F28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1807903081.0000000002A38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2922615312.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PO# EB202329720241007_Hardy_Process^^^^.pif.exe PID: 6728, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7136, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wpappx.exe PID: 7016, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wpappx.exe PID: 3052, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6752, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 1104, type: MEMORYSTR
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05C82EA7 push esp; retf 0_2_05C82EA8
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D3D1D7 pushfd ; ret 0_2_05D3D1E9
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D3234B pushfd ; retf 0_2_05D32351
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_05D9A291 push eax; ret 0_2_05D9A294
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_06131860 push eax; ret 0_2_06131861
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_0613714C push cs; ret 0_2_0613714F
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeCode function: 0_2_061331B0 push edx; iretd 0_2_061331B7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_00B60175 push ecx; retf 1_2_00B60176
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_06322EA7 push esp; retf 4_2_06322EA8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_063DD1D6 pushfd ; ret 4_2_063DD1E9
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0643A291 push eax; ret 4_2_0643A294
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_065418B0 push es; ret 4_2_06541960
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0654F9F0 push es; ret 4_2_0654FA00
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659B779 push es; ret 4_2_0659B7A4
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659CF96 push es; iretd 4_2_0659CF98
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_0659E136 push es; iretd 4_2_0659E174
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_067D1860 push eax; ret 4_2_067D1861
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_067D714C push cs; ret 4_2_067D714F
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 4_2_067D31B0 push edx; iretd 4_2_067D31B7
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_05F12EA7 push esp; retf 7_2_05F12EA8
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_05FCD1D6 pushfd ; ret 7_2_05FCD1E9
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0602A291 push eax; ret 7_2_0602A294
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_061318B0 push es; ret 7_2_06131960
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0613F9F0 push es; ret 7_2_0613FA00
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0618B779 push es; ret 7_2_0618B7A4
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_0618CF97 push es; iretd 7_2_0618CF98
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_063C1860 push eax; ret 7_2_063C1861
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_063C714C push cs; ret 7_2_063C714F
                Source: C:\Users\user\AppData\Roaming\wpappx.exeCode function: 7_2_063C31B0 push edx; iretd 7_2_063C31B7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A918E7 push eax; retf 8_2_02A918ED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02A931B5 push 63E803ACh; iretd 8_2_02A931BA
                Source: 0.2.PO# EB202329720241007_Hardy_Process^^^^.pif.exe.59b0000.5.raw.unpack, lQLmXMbHl8njJme4f0k.csHigh entropy of concatenated method names: 'RtlInitUnicodeString', 'LdrLoadDll', 'RtlZeroMemory', 'NtQueryInformationProcess', 'zFfbkJquEn', 'NtProtectVirtualMemory', 'Ihel4LWr9OlsDUXcCTi', 'DXLNrhWfGTQi3CMsqcC', 'GfcVLgWWi3LHIkuvgCg', 'vt335oW6qAJUHkS11q6'
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeFile created: C:\Users\user\AppData\Roaming\wpappx.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run wpappxJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run wpappxJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: PO# EB202329720241007_Hardy_Process^^^^.pif.exe PID: 6728, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wpappx.exe PID: 7016, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wpappx.exe PID: 3052, type: MEMORYSTR
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.0000000002A38000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2048461368.0000000002F28000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2125157304.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000008.00000002.2922615312.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeMemory allocated: 2780000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeMemory allocated: 29F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeMemory allocated: 27F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 1100000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2DD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 4DD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeMemory allocated: 1400000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeMemory allocated: 2EE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeMemory allocated: 1400000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeMemory allocated: 28D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeMemory allocated: 2B00000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeMemory allocated: 2940000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 27C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2AC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 27C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2C50000 memory reserve | memory write watch
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2ED0000 memory reserve | memory write watch
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 4ED0000 memory reserve | memory write watch
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 2026Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 7830Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5740Thread sleep time: -25825441703193356s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 3804Thread sleep count: 2026 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 3804Thread sleep count: 7830 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5928Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                Source: InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0VMware|VIRTUAL|A M I|Xen4win32_process.handle='{0}'
                Source: wpappx.exe, 00000007.00000002.2125157304.0000000002B91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                Source: InstallUtil.exe, 00000008.00000002.2922615312.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmGuestLib.dllDselect * from Win32_ComputerSystem
                Source: InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                Source: PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807147952.0000000000AB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllj
                Source: InstallUtil.exe, 00000001.00000002.1817174501.0000000003FD0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000001.00000002.1817174501.0000000003DD5000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2444965514.0000000005510000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: qQXKlhGqeMuRaBW9e5O
                Source: wpappx.exe, 00000004.00000002.2044541117.00000000012B2000.00000004.00000020.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2123213483.0000000000D27000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000008.00000002.2919734175.0000000000C41000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\AppData\Roaming\wpappx.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: D00000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeThread created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe EIP: B60000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeThread created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe EIP: 700000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeThread created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe EIP: D00000Jump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: B60000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 700000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: D00000Jump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeQueries volume information: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeQueries volume information: C:\Users\user\AppData\Roaming\wpappx.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeQueries volume information: C:\Users\user\AppData\Roaming\wpappx.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\wpappx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Command and Scripting Interpreter
                1
                Scheduled Task/Job
                311
                Process Injection
                1
                Masquerading
                OS Credential Dumping21
                Security Software Discovery
                Remote Services1
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Scheduled Task/Job
                1
                Registry Run Keys / Startup Folder
                1
                Scheduled Task/Job
                1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop ProtocolData from Removable Media1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt1
                DLL Side-Loading
                1
                Registry Run Keys / Startup Folder
                31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                DLL Side-Loading
                311
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture11
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets12
                System Information Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Obfuscated Files or Information
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528611 Sample: PO# EB202329720241007_Hardy... Startdate: 08/10/2024 Architecture: WINDOWS Score: 100 35 puritylgs.duckdns.org 2->35 37 cdn.glitch.global 2->37 39 Multi AV Scanner detection for domain / URL 2->39 41 Suricata IDS alerts for network traffic 2->41 43 Malicious sample detected (through community Yara rule) 2->43 47 8 other signatures 2->47 8 wpappx.exe 14 2 2->8         started        11 PO# EB202329720241007_Hardy_Process^^^^.pif.exe 16 4 2->11         started        14 wpappx.exe 2 2->14         started        signatures3 45 Uses dynamic DNS services 35->45 process4 file5 49 Multi AV Scanner detection for dropped file 8->49 51 Machine Learning detection for dropped file 8->51 53 Writes to foreign memory regions 8->53 16 InstallUtil.exe 3 8->16         started        29 C:\Users\user\AppData\Roaming\wpappx.exe, PE32 11->29 dropped 31 C:\Users\user\...\wpappx.exe:Zone.Identifier, ASCII 11->31 dropped 55 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->55 57 Creates a thread in another existing process (thread injection) 11->57 19 InstallUtil.exe 4 11->19         started        59 Allocates memory in foreign processes 14->59 21 InstallUtil.exe 14->21         started        signatures6 process7 dnsIp8 33 puritylgs.duckdns.org 89.238.176.5, 49739, 49747, 49879 M247GB United Kingdom 16->33 23 conhost.exe 16->23         started        25 conhost.exe 19->25         started        27 conhost.exe 21->27         started        process9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                PO# EB202329720241007_Hardy_Process^^^^.pif.exe34%ReversingLabs
                PO# EB202329720241007_Hardy_Process^^^^.pif.exe33%VirustotalBrowse
                PO# EB202329720241007_Hardy_Process^^^^.pif.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\wpappx.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\wpappx.exe34%ReversingLabs
                C:\Users\user\AppData\Roaming\wpappx.exe33%VirustotalBrowse
                No Antivirus matches
                SourceDetectionScannerLabelLink
                puritylgs.duckdns.org4%VirustotalBrowse
                cdn.glitch.global5%VirustotalBrowse
                SourceDetectionScannerLabelLink
                https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
                https://stackoverflow.com/q/2152978/233540%URL Reputationsafe
                https://github.com/mgravell/protobuf-net0%VirustotalBrowse
                https://github.com/mgravell/protobuf-neti0%VirustotalBrowse
                https://cdn.glitch.global/65e86a4d-1443-41a6-ac6d-f084c1191eff/Vyciz.mp4xC2%VirustotalBrowse
                https://github.com/mgravell/protobuf-netJ0%VirustotalBrowse
                https://cdn.glitch.global6%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                puritylgs.duckdns.org
                89.238.176.5
                truetrueunknown
                cdn.glitch.global
                unknown
                unknowntrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://cdn.glitch.global/65e86a4d-1443-41a6-ac6d-f084c1191eff/Vyciz.mp4xC&wpappx.exe, 00000004.00000002.2048461368.0000000002EE1000.00000004.00000800.00020000.00000000.sdmptrue
                  unknown
                  https://github.com/mgravell/protobuf-netPO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://github.com/mgravell/protobuf-netiPO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://stackoverflow.com/q/14436606/23354InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://github.com/mgravell/protobuf-netJPO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1817667483.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2140570961.0000000003DFB000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://cdn.glitch.globalPO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2048461368.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2125157304.0000000002B0D000.00000004.00000800.00020000.00000000.sdmptrueunknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000004.00000002.2048461368.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2125157304.0000000002B0D000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://stackoverflow.com/q/11564914/23354;PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://stackoverflow.com/q/2152978/23354PO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1824377543.0000000005D40000.00000004.08000000.00040000.00000000.sdmp, wpappx.exe, 00000004.00000002.2065435853.00000000041BE000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003FE6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000A.00000002.2435244126.0000000003F6E000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://cdn.glitch.global/65e86a4d-1443-41a6-ac6d-f084c1191eff/Vyciz.mp4xCPO# EB202329720241007_Hardy_Process^^^^.pif.exe, 00000000.00000002.1807903081.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, wpappx.exe, 00000007.00000002.2125157304.0000000002B01000.00000004.00000800.00020000.00000000.sdmptrueunknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  89.238.176.5
                  puritylgs.duckdns.orgUnited Kingdom
                  9009M247GBtrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1528611
                  Start date and time:2024-10-08 04:27:07 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 7m 58s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:13
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@12/3@3/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 88%
                  • Number of executed functions: 469
                  • Number of non-executed functions: 41
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 151.101.2.132, 151.101.66.132, 151.101.130.132, 151.101.194.132
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, j.sni.global.fastly.net, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  TimeTypeDescription
                  03:28:13AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run wpappx C:\Users\user\AppData\Roaming\wpappx.exe
                  03:28:21AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run wpappx C:\Users\user\AppData\Roaming\wpappx.exe
                  22:28:36API Interceptor218092x Sleep call for process: InstallUtil.exe modified
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  puritylgs.duckdns.orgPO_DIT1209240001212092900007^^.pif.exeGet hashmaliciousUnknownBrowse
                  • 89.238.176.6
                  REV-New Order 20240717^^^^^^^^^^^^^^^^^^.pif.exeGet hashmaliciousPureLog StealerBrowse
                  • 193.187.91.208
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  M247GBNEW INVOICE.exeGet hashmaliciousFormBookBrowse
                  • 45.150.55.15
                  Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                  • 172.111.244.100
                  Urgent Purchase Order (P.O.) No.477764107102024.vbsGet hashmaliciousRemcosBrowse
                  • 172.111.244.100
                  na.elfGet hashmaliciousMirai, OkiruBrowse
                  • 38.206.46.29
                  17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exeGet hashmaliciousRemcosBrowse
                  • 185.236.203.101
                  na.rtfGet hashmaliciousRemcosBrowse
                  • 185.236.203.101
                  file.dllGet hashmaliciousMatanbuchusBrowse
                  • 193.109.85.31
                  file.dllGet hashmaliciousMatanbuchusBrowse
                  • 193.109.85.31
                  Booking_0106.exeGet hashmaliciousAgentTeslaBrowse
                  • 172.86.66.70
                  DSpWOKW7zn.rtfGet hashmaliciousRemcosBrowse
                  • 185.236.203.101
                  No context
                  No context
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  File Type:CSV text
                  Category:modified
                  Size (bytes):425
                  Entropy (8bit):5.353683843266035
                  Encrypted:false
                  SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                  MD5:859802284B12C59DDBB85B0AC64C08F0
                  SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                  SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                  SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                  Process:C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):688640
                  Entropy (8bit):6.762817122635475
                  Encrypted:false
                  SSDEEP:12288:9PDyLTOntK+KZxfKjfFh76v3wd1QOmyAKJMMK/y8MsT1:9LgTOnYjxijfFh77d1QOpJU/5
                  MD5:6145C8269F1675712B844D8AC1980287
                  SHA1:7F37641603386F8B96EDCF91A4D32D3F4A5D40CD
                  SHA-256:93548239884F6D9F3EA7240DBF34BEAA81BCD4F3C122454E81D9E1E433C804F0
                  SHA-512:434D634928458C55A3B27D7B686D2BA20F77432C323B540EA9464FB3B61C51079C6E60F5A4A01D8EF1E60A2208FB189A85CF130DB760E43D5C1DF893F3DE0DD9
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 34%
                  • Antivirus: Virustotal, Detection: 33%, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....p.g.................v.............. ........@.. ....................................`.....................................W.......`............................................................................ ............... ..H............text....t... ...v.................. ..`.rsrc...`............x..............@..@.reloc..............................@..B.......................H........]...6..........D...TH............................................(....*.0........... ....=......x0l..;......;......eYE............................................'...1...;...E...O...Y...c...m...w.......8`.... ....YE....V...`...j...t...~.................... -...YE................................. ....YE....................................8..... ....=..... ....YE........................................................ .... Y...YE....................................&...
                  Process:C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):6.762817122635475
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  • Win32 Executable (generic) a (10002005/4) 49.78%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  • DOS Executable Generic (2002/1) 0.01%
                  File name:PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                  File size:688'640 bytes
                  MD5:6145c8269f1675712b844d8ac1980287
                  SHA1:7f37641603386f8b96edcf91a4d32d3f4a5d40cd
                  SHA256:93548239884f6d9f3ea7240dbf34beaa81bcd4f3c122454e81d9e1e433c804f0
                  SHA512:434d634928458c55a3b27d7b686d2ba20f77432c323b540ea9464fb3b61c51079c6e60f5a4a01d8ef1e60a2208fb189a85cf130db760e43d5c1df893f3de0dd9
                  SSDEEP:12288:9PDyLTOntK+KZxfKjfFh76v3wd1QOmyAKJMMK/y8MsT1:9LgTOnYjxijfFh77d1QOpJU/5
                  TLSH:7BE4E6BEED0F7D6ED64D0EBA508A5848C7BCA42941C3972993435DE87203B2E578235F
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....p.g.................v............... ........@.. ....................................`................................
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x4a94e6
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x67047080 [Mon Oct 7 23:36:32 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xa948c0x57.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x660.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000xa74ec0xa7600d2cab939301db50d1530cbb9e301815fFalse0.5255787901418969data6.7681380739989025IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0xaa0000x6600x800feaebdf2a9641fe2c5d09a189ef3aec6False0.32958984375data4.580827930290116IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xac0000xc0x20043c76f64735256763bde26c10d79a07dFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0xaa0a00x40cdata0.3581081081081081
                  RT_MANIFEST0xaa4ac0x1b4XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (433), with no line terminators0.5642201834862385
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-10-08T04:28:37.021260+02002857345ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.44973989.238.176.550600TCP
                  2024-10-08T04:28:58.400411+02002857345ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.44974789.238.176.550600TCP
                  2024-10-08T04:29:19.782484+02002857345ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.44987989.238.176.550600TCP
                  2024-10-08T04:29:41.289415+02002857345ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.45001089.238.176.550600TCP
                  2024-10-08T04:30:02.663221+02002857345ETPRO MALWARE Win32/zgRAT CnC Checkin1192.168.2.45001189.238.176.550600TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 8, 2024 04:28:36.998100996 CEST4973950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:28:37.002922058 CEST506004973989.238.176.5192.168.2.4
                  Oct 8, 2024 04:28:37.002988100 CEST4973950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:28:37.015937090 CEST4973950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:28:37.021159887 CEST506004973989.238.176.5192.168.2.4
                  Oct 8, 2024 04:28:37.021260023 CEST4973950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:28:37.026607037 CEST506004973989.238.176.5192.168.2.4
                  Oct 8, 2024 04:28:58.031554937 CEST4973950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:28:58.036489010 CEST506004973989.238.176.5192.168.2.4
                  Oct 8, 2024 04:28:58.036604881 CEST4973950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:28:58.041409016 CEST506004973989.238.176.5192.168.2.4
                  Oct 8, 2024 04:28:58.361759901 CEST506004973989.238.176.5192.168.2.4
                  Oct 8, 2024 04:28:58.361905098 CEST4973950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:28:58.380660057 CEST4973950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:28:58.385694981 CEST506004973989.238.176.5192.168.2.4
                  Oct 8, 2024 04:28:58.387968063 CEST4974750600192.168.2.489.238.176.5
                  Oct 8, 2024 04:28:58.392925024 CEST506004974789.238.176.5192.168.2.4
                  Oct 8, 2024 04:28:58.393033981 CEST4974750600192.168.2.489.238.176.5
                  Oct 8, 2024 04:28:58.395493984 CEST4974750600192.168.2.489.238.176.5
                  Oct 8, 2024 04:28:58.400348902 CEST506004974789.238.176.5192.168.2.4
                  Oct 8, 2024 04:28:58.400410891 CEST4974750600192.168.2.489.238.176.5
                  Oct 8, 2024 04:28:58.405169010 CEST506004974789.238.176.5192.168.2.4
                  Oct 8, 2024 04:29:19.770091057 CEST506004974789.238.176.5192.168.2.4
                  Oct 8, 2024 04:29:19.770251036 CEST4974750600192.168.2.489.238.176.5
                  Oct 8, 2024 04:29:19.770451069 CEST4974750600192.168.2.489.238.176.5
                  Oct 8, 2024 04:29:19.771608114 CEST4987950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:29:19.775233984 CEST506004974789.238.176.5192.168.2.4
                  Oct 8, 2024 04:29:19.776426077 CEST506004987989.238.176.5192.168.2.4
                  Oct 8, 2024 04:29:19.776514053 CEST4987950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:29:19.777633905 CEST4987950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:29:19.782404900 CEST506004987989.238.176.5192.168.2.4
                  Oct 8, 2024 04:29:19.782484055 CEST4987950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:29:19.787270069 CEST506004987989.238.176.5192.168.2.4
                  Oct 8, 2024 04:29:41.160428047 CEST506004987989.238.176.5192.168.2.4
                  Oct 8, 2024 04:29:41.160522938 CEST4987950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:29:41.160691023 CEST4987950600192.168.2.489.238.176.5
                  Oct 8, 2024 04:29:41.165404081 CEST506004987989.238.176.5192.168.2.4
                  Oct 8, 2024 04:29:41.278708935 CEST5001050600192.168.2.489.238.176.5
                  Oct 8, 2024 04:29:41.283618927 CEST506005001089.238.176.5192.168.2.4
                  Oct 8, 2024 04:29:41.283708096 CEST5001050600192.168.2.489.238.176.5
                  Oct 8, 2024 04:29:41.284513950 CEST5001050600192.168.2.489.238.176.5
                  Oct 8, 2024 04:29:41.289352894 CEST506005001089.238.176.5192.168.2.4
                  Oct 8, 2024 04:29:41.289414883 CEST5001050600192.168.2.489.238.176.5
                  Oct 8, 2024 04:29:41.294296026 CEST506005001089.238.176.5192.168.2.4
                  Oct 8, 2024 04:30:02.644900084 CEST506005001089.238.176.5192.168.2.4
                  Oct 8, 2024 04:30:02.649701118 CEST5001050600192.168.2.489.238.176.5
                  Oct 8, 2024 04:30:02.650109053 CEST5001050600192.168.2.489.238.176.5
                  Oct 8, 2024 04:30:02.652318954 CEST5001150600192.168.2.489.238.176.5
                  Oct 8, 2024 04:30:02.654949903 CEST506005001089.238.176.5192.168.2.4
                  Oct 8, 2024 04:30:02.657248974 CEST506005001189.238.176.5192.168.2.4
                  Oct 8, 2024 04:30:02.657386065 CEST5001150600192.168.2.489.238.176.5
                  Oct 8, 2024 04:30:02.658210039 CEST5001150600192.168.2.489.238.176.5
                  Oct 8, 2024 04:30:02.663156986 CEST506005001189.238.176.5192.168.2.4
                  Oct 8, 2024 04:30:02.663220882 CEST5001150600192.168.2.489.238.176.5
                  Oct 8, 2024 04:30:02.668128014 CEST506005001189.238.176.5192.168.2.4
                  Oct 8, 2024 04:30:04.985654116 CEST5001150600192.168.2.489.238.176.5
                  Oct 8, 2024 04:30:04.990956068 CEST506005001189.238.176.5192.168.2.4
                  Oct 8, 2024 04:30:04.991019964 CEST5001150600192.168.2.489.238.176.5
                  Oct 8, 2024 04:30:04.996239901 CEST506005001189.238.176.5192.168.2.4
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 8, 2024 04:27:58.944983006 CEST6079053192.168.2.41.1.1.1
                  Oct 8, 2024 04:28:36.859030962 CEST6398153192.168.2.41.1.1.1
                  Oct 8, 2024 04:28:36.995460987 CEST53639811.1.1.1192.168.2.4
                  Oct 8, 2024 04:29:41.161436081 CEST5593353192.168.2.41.1.1.1
                  Oct 8, 2024 04:29:41.277702093 CEST53559331.1.1.1192.168.2.4
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Oct 8, 2024 04:27:58.944983006 CEST192.168.2.41.1.1.10x1181Standard query (0)cdn.glitch.globalA (IP address)IN (0x0001)false
                  Oct 8, 2024 04:28:36.859030962 CEST192.168.2.41.1.1.10xe9caStandard query (0)puritylgs.duckdns.orgA (IP address)IN (0x0001)false
                  Oct 8, 2024 04:29:41.161436081 CEST192.168.2.41.1.1.10xbee1Standard query (0)puritylgs.duckdns.orgA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 8, 2024 04:27:59.112066984 CEST1.1.1.1192.168.2.40x1181No error (0)cdn.glitch.globalj.sni.global.fastly.netCNAME (Canonical name)IN (0x0001)false
                  Oct 8, 2024 04:28:36.995460987 CEST1.1.1.1192.168.2.40xe9caNo error (0)puritylgs.duckdns.org89.238.176.5A (IP address)IN (0x0001)false
                  Oct 8, 2024 04:29:41.277702093 CEST1.1.1.1192.168.2.40xbee1No error (0)puritylgs.duckdns.org89.238.176.5A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:22:27:58
                  Start date:07/10/2024
                  Path:C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\PO# EB202329720241007_Hardy_Process^^^^.pif.exe"
                  Imagebase:0x4c0000
                  File size:688'640 bytes
                  MD5 hash:6145C8269F1675712B844D8AC1980287
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.1807903081.0000000002F87000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1824668881.0000000005DA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.1817667483.0000000004094000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1807903081.0000000002A38000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:true

                  Target ID:1
                  Start time:22:28:11
                  Start date:07/10/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                  Imagebase:0x790000
                  File size:42'064 bytes
                  MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000001.00000002.1814780379.0000000000B60000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                  Reputation:moderate
                  Has exited:true

                  Target ID:2
                  Start time:22:28:11
                  Start date:07/10/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:4
                  Start time:22:28:21
                  Start date:07/10/2024
                  Path:C:\Users\user\AppData\Roaming\wpappx.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\wpappx.exe"
                  Imagebase:0xb40000
                  File size:688'640 bytes
                  MD5 hash:6145C8269F1675712B844D8AC1980287
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000004.00000002.2048461368.00000000033BA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.2048461368.0000000002F28000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000004.00000002.2065435853.000000000456D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 34%, ReversingLabs
                  • Detection: 33%, Virustotal, Browse
                  Reputation:low
                  Has exited:true

                  Target ID:7
                  Start time:22:28:30
                  Start date:07/10/2024
                  Path:C:\Users\user\AppData\Roaming\wpappx.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\wpappx.exe"
                  Imagebase:0x730000
                  File size:688'640 bytes
                  MD5 hash:6145C8269F1675712B844D8AC1980287
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000007.00000002.2125157304.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000007.00000002.2140570961.0000000003C82000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000007.00000002.2125157304.0000000002F78000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Reputation:low
                  Has exited:true

                  Target ID:8
                  Start time:22:28:35
                  Start date:07/10/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                  Imagebase:0x430000
                  File size:42'064 bytes
                  MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000008.00000002.2928192880.0000000003D44000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000008.00000002.2922615312.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:moderate
                  Has exited:false

                  Target ID:9
                  Start time:22:28:35
                  Start date:07/10/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:10
                  Start time:22:28:43
                  Start date:07/10/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                  Imagebase:0x900000
                  File size:42'064 bytes
                  MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000A.00000002.2446396240.0000000005770000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000A.00000002.2435244126.000000000412C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000A.00000002.2430967730.0000000002F50000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:moderate
                  Has exited:true

                  Target ID:11
                  Start time:22:28:43
                  Start date:07/10/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:12.9%
                    Dynamic/Decrypted Code Coverage:95%
                    Signature Coverage:10.3%
                    Total number of Nodes:301
                    Total number of Limit Nodes:11
                    execution_graph 54350 5eb2648 54351 5eb265d 54350->54351 54355 5eb267a 54351->54355 54360 5eb2688 54351->54360 54352 5eb2673 54356 5eb2688 54355->54356 54357 5eb2711 54356->54357 54358 5eb0358 VirtualProtect 54356->54358 54359 5eb0350 VirtualProtect 54356->54359 54357->54352 54358->54356 54359->54356 54361 5eb26b2 54360->54361 54362 5eb2711 54361->54362 54363 5eb0358 VirtualProtect 54361->54363 54364 5eb0350 VirtualProtect 54361->54364 54362->54352 54363->54361 54364->54361 54365 5eb71b8 54366 5eb71cd 54365->54366 54383 5eb8d2a 54366->54383 54386 5eb8957 54366->54386 54389 5eb7c10 54366->54389 54392 5eb9271 54366->54392 54395 5eb8a39 54366->54395 54398 5eb90fa 54366->54398 54401 5eb913b 54366->54401 54406 5eb8004 54366->54406 54409 5eb7c40 54366->54409 54412 5eb90e0 54366->54412 54415 5eb8a80 54366->54415 54418 5eb8ae3 54366->54418 54421 5eb864d 54366->54421 54424 5eb87ed 54366->54424 54427 5eb8ea8 54366->54427 54384 5eb7d45 54383->54384 54432 5ebae20 54384->54432 54387 5eb7d45 54386->54387 54388 5ebae20 2 API calls 54387->54388 54388->54387 54390 5eb7c15 54389->54390 54391 5ebae20 2 API calls 54390->54391 54391->54390 54393 5eb7cb2 54392->54393 54393->54392 54394 5ebae20 2 API calls 54393->54394 54394->54393 54396 5eb7d45 54395->54396 54397 5ebae20 2 API calls 54396->54397 54397->54396 54399 5eb7d45 54398->54399 54400 5ebae20 2 API calls 54399->54400 54400->54399 54402 5eb9141 54401->54402 54445 5eb1e88 54402->54445 54449 5eb1e7c 54402->54449 54407 5eb7d45 54406->54407 54408 5ebae20 2 API calls 54407->54408 54408->54407 54410 5eb7c6a 54409->54410 54411 5ebae20 2 API calls 54410->54411 54411->54410 54413 5eb7d45 54412->54413 54414 5ebae20 2 API calls 54413->54414 54414->54413 54416 5eb7d45 54415->54416 54417 5ebae20 2 API calls 54416->54417 54417->54416 54419 5eb7d45 54418->54419 54420 5ebae20 2 API calls 54419->54420 54420->54419 54422 5eb7d45 54421->54422 54423 5ebae20 2 API calls 54422->54423 54423->54422 54425 5eb7d45 54424->54425 54425->54424 54426 5ebae20 2 API calls 54425->54426 54426->54425 54429 5eb8eae 54427->54429 54428 5eb8f69 54429->54428 54453 5eb20c0 54429->54453 54457 5eb20b4 54429->54457 54433 5ebae45 54432->54433 54437 5eb1be0 54433->54437 54441 5eb1bd4 54433->54441 54438 5eb1c3c CopyFileA 54437->54438 54440 5eb1d6d 54438->54440 54442 5eb1c3c CopyFileA 54441->54442 54444 5eb1d6d 54442->54444 54446 5eb1ee7 RegOpenKeyExA 54445->54446 54448 5eb1fc2 54446->54448 54450 5eb1ee7 RegOpenKeyExA 54449->54450 54452 5eb1fc2 54450->54452 54454 5eb2125 RegSetValueExA 54453->54454 54456 5eb2232 54454->54456 54458 5eb2125 RegSetValueExA 54457->54458 54460 5eb2232 54458->54460 54461 5eb3338 54462 5eb332a 54461->54462 54464 5eb3342 54461->54464 54466 5eb346e 54462->54466 54468 5eb3490 54466->54468 54467 5eb3333 54468->54467 54469 5eb0358 VirtualProtect 54468->54469 54470 5eb0350 VirtualProtect 54468->54470 54469->54468 54470->54468 54286 27c42f8 54287 27c4312 54286->54287 54288 27c4322 54287->54288 54293 5d99f71 54287->54293 54296 5d929e6 54287->54296 54300 5d96d83 54287->54300 54303 5d96c0c 54287->54303 54307 5d9d0a8 54293->54307 54297 5d92a05 54296->54297 54299 5d9d0a8 VirtualProtect 54297->54299 54298 5d92a30 54299->54298 54302 5d9d0a8 VirtualProtect 54300->54302 54301 5d901d7 54302->54301 54304 5d96c2b 54303->54304 54306 5d9d0a8 VirtualProtect 54304->54306 54305 5d96c52 54306->54305 54309 5d9d0cf 54307->54309 54311 5d9d588 54309->54311 54312 5d9d5d1 VirtualProtect 54311->54312 54314 5d901d7 54312->54314 54315 5d9e750 54316 5d9e794 VirtualAlloc 54315->54316 54318 5d9e801 54316->54318 54471 5ebbb30 54472 5ebbb45 54471->54472 54473 5ebbb5b 54472->54473 54476 5ebbbef 54472->54476 54481 5ebbcbe 54472->54481 54478 5ebbbfe 54476->54478 54477 5ebbbcd 54477->54473 54478->54477 54486 5ebcf58 54478->54486 54492 5ebcf49 54478->54492 54482 5ebbbcd 54481->54482 54483 5ebbcc6 54481->54483 54482->54473 54483->54482 54484 5ebcf49 8 API calls 54483->54484 54485 5ebcf58 8 API calls 54483->54485 54484->54482 54485->54482 54487 5ebcf6d 54486->54487 54498 5ebd3b0 54487->54498 54502 5ebd0e4 54487->54502 54506 5ebd0b7 54487->54506 54488 5ebcf8f 54488->54477 54493 5ebcf6d 54492->54493 54495 5ebd3b0 8 API calls 54493->54495 54496 5ebd0b7 8 API calls 54493->54496 54497 5ebd0e4 8 API calls 54493->54497 54494 5ebcf8f 54494->54477 54495->54494 54496->54494 54497->54494 54500 5ebd3d7 54498->54500 54499 5ebd56e 54499->54488 54500->54499 54510 5ebd678 54500->54510 54504 5ebd3d7 54502->54504 54503 5ebd56e 54503->54488 54504->54503 54505 5ebd678 8 API calls 54504->54505 54505->54504 54507 5ebd0bb 54506->54507 54508 5ebd56e 54507->54508 54509 5ebd678 8 API calls 54507->54509 54508->54488 54509->54507 54511 5ebd69d 54510->54511 54521 5ebdafb 54511->54521 54526 5ebdb04 54511->54526 54530 5ebdbf7 54511->54530 54538 5ebdd91 54511->54538 54542 5ebd822 54511->54542 54546 5ebd78e 54511->54546 54550 5ebdb8e 54511->54550 54556 5ebdd3a 54511->54556 54522 5ebdb41 54521->54522 54560 5eb0a58 54522->54560 54564 5eb0a50 54522->54564 54523 5ebdb6f 54527 5ebd7c7 54526->54527 54568 5eb0c28 54527->54568 54572 5eb0c21 54527->54572 54531 5ebdc01 54530->54531 54576 5ebe0a1 54531->54576 54590 5ebe0b0 54531->54590 54604 5ebe0f8 54531->54604 54532 5ebd7c7 54536 5eb0c28 NtWriteVirtualMemory 54532->54536 54537 5eb0c21 NtWriteVirtualMemory 54532->54537 54536->54532 54537->54532 54539 5ebd7c7 54538->54539 54540 5eb0c28 NtWriteVirtualMemory 54539->54540 54541 5eb0c21 NtWriteVirtualMemory 54539->54541 54540->54539 54541->54539 54543 5ebd7c7 54542->54543 54544 5eb0c28 NtWriteVirtualMemory 54543->54544 54545 5eb0c21 NtWriteVirtualMemory 54543->54545 54544->54543 54545->54543 54547 5ebd7ba 54546->54547 54548 5eb0c28 NtWriteVirtualMemory 54547->54548 54549 5eb0c21 NtWriteVirtualMemory 54547->54549 54548->54547 54549->54547 54670 5eb08d8 54550->54670 54674 5eb08e0 54550->54674 54551 5ebd7c7 54552 5eb0c28 NtWriteVirtualMemory 54551->54552 54553 5eb0c21 NtWriteVirtualMemory 54551->54553 54552->54551 54553->54551 54557 5ebd7c7 54556->54557 54558 5eb0c28 NtWriteVirtualMemory 54557->54558 54559 5eb0c21 NtWriteVirtualMemory 54557->54559 54558->54557 54559->54557 54561 5eb0aa1 NtCreateThreadEx 54560->54561 54563 5eb0b64 54561->54563 54563->54523 54565 5eb0a58 NtCreateThreadEx 54564->54565 54567 5eb0b64 54565->54567 54567->54523 54569 5eb0c74 NtWriteVirtualMemory 54568->54569 54571 5eb0d0d 54569->54571 54571->54527 54573 5eb0c28 NtWriteVirtualMemory 54572->54573 54575 5eb0d0d 54573->54575 54575->54527 54577 5ebe0aa 54576->54577 54577->54532 54618 5ebe43b 54577->54618 54622 5ebe950 54577->54622 54626 5ebe250 54577->54626 54630 5ebe412 54577->54630 54634 5ebe633 54577->54634 54638 5ebe168 54577->54638 54642 5ebe778 54577->54642 54646 5ebe159 54577->54646 54650 5ebe23a 54577->54650 54654 5ebe5ca 54577->54654 54658 5ebe3cb 54577->54658 54591 5ebe0c2 54590->54591 54591->54532 54593 5ebe43b 2 API calls 54591->54593 54594 5ebe3cb 2 API calls 54591->54594 54595 5ebe5ca 2 API calls 54591->54595 54596 5ebe23a 2 API calls 54591->54596 54597 5ebe159 2 API calls 54591->54597 54598 5ebe778 2 API calls 54591->54598 54599 5ebe168 2 API calls 54591->54599 54600 5ebe633 2 API calls 54591->54600 54601 5ebe412 2 API calls 54591->54601 54602 5ebe250 2 API calls 54591->54602 54603 5ebe950 2 API calls 54591->54603 54592 5ebe131 54592->54532 54593->54592 54594->54592 54595->54592 54596->54592 54597->54592 54598->54592 54599->54592 54600->54592 54601->54592 54602->54592 54603->54592 54605 5ebe10f 54604->54605 54607 5ebe43b 2 API calls 54605->54607 54608 5ebe3cb 2 API calls 54605->54608 54609 5ebe5ca 2 API calls 54605->54609 54610 5ebe23a 2 API calls 54605->54610 54611 5ebe159 2 API calls 54605->54611 54612 5ebe778 2 API calls 54605->54612 54613 5ebe168 2 API calls 54605->54613 54614 5ebe633 2 API calls 54605->54614 54615 5ebe412 2 API calls 54605->54615 54616 5ebe250 2 API calls 54605->54616 54617 5ebe950 2 API calls 54605->54617 54606 5ebe131 54606->54532 54607->54606 54608->54606 54609->54606 54610->54606 54611->54606 54612->54606 54613->54606 54614->54606 54615->54606 54616->54606 54617->54606 54619 5ebe1fb 54618->54619 54662 5eff594 54619->54662 54666 5eff5a0 54619->54666 54623 5ebe1fb 54622->54623 54624 5eff594 CreateProcessA 54623->54624 54625 5eff5a0 CreateProcessA 54623->54625 54624->54623 54625->54623 54627 5ebe1fb 54626->54627 54628 5eff594 CreateProcessA 54627->54628 54629 5eff5a0 CreateProcessA 54627->54629 54628->54627 54629->54627 54631 5ebe1fb 54630->54631 54632 5eff594 CreateProcessA 54631->54632 54633 5eff5a0 CreateProcessA 54631->54633 54632->54631 54633->54631 54635 5ebe1fb 54634->54635 54636 5eff594 CreateProcessA 54635->54636 54637 5eff5a0 CreateProcessA 54635->54637 54636->54635 54637->54635 54639 5ebe19b 54638->54639 54640 5eff594 CreateProcessA 54639->54640 54641 5eff5a0 CreateProcessA 54639->54641 54640->54639 54641->54639 54643 5ebe1fb 54642->54643 54644 5eff594 CreateProcessA 54643->54644 54645 5eff5a0 CreateProcessA 54643->54645 54644->54643 54645->54643 54647 5ebe19b 54646->54647 54648 5eff594 CreateProcessA 54647->54648 54649 5eff5a0 CreateProcessA 54647->54649 54648->54647 54649->54647 54651 5ebe1fb 54650->54651 54651->54650 54652 5eff594 CreateProcessA 54651->54652 54653 5eff5a0 CreateProcessA 54651->54653 54652->54651 54653->54651 54655 5ebe1fb 54654->54655 54656 5eff594 CreateProcessA 54655->54656 54657 5eff5a0 CreateProcessA 54655->54657 54656->54655 54657->54655 54659 5ebe1fb 54658->54659 54660 5eff594 CreateProcessA 54659->54660 54661 5eff5a0 CreateProcessA 54659->54661 54660->54659 54661->54659 54664 5eff620 CreateProcessA 54662->54664 54665 5eff81c 54664->54665 54668 5eff620 CreateProcessA 54666->54668 54669 5eff81c 54668->54669 54671 5eb08e0 NtAllocateVirtualMemory 54670->54671 54673 5eb09af 54671->54673 54673->54551 54675 5eb092c NtAllocateVirtualMemory 54674->54675 54677 5eb09af 54675->54677 54677->54551 54319 5efecf0 54320 5efed3f NtProtectVirtualMemory 54319->54320 54322 5efedb7 54320->54322 54323 5ef6b70 54324 5ef6b85 54323->54324 54327 5ef6cac 54324->54327 54329 5ef6ca3 54327->54329 54328 5ef6e27 54329->54327 54329->54328 54332 5eb2460 54329->54332 54337 5eb2450 54329->54337 54333 5eb2475 54332->54333 54342 5efb860 54333->54342 54346 5efb85a 54333->54346 54334 5eb2490 54334->54329 54338 5eb2460 54337->54338 54340 5efb85a SleepEx 54338->54340 54341 5efb860 SleepEx 54338->54341 54339 5eb2490 54339->54329 54340->54339 54341->54339 54343 5efb8a4 SleepEx 54342->54343 54345 5efb904 54343->54345 54345->54334 54347 5efb860 SleepEx 54346->54347 54349 5efb904 54347->54349 54349->54334 54678 25fd030 54679 25fd048 54678->54679 54680 25fd0a3 54679->54680 54682 5d9dc70 54679->54682 54683 5d9dcc9 54682->54683 54686 5d9e200 54683->54686 54684 5d9dcfe 54687 5d9e22d 54686->54687 54688 5d9d0a8 VirtualProtect 54687->54688 54690 5d9e3c3 54687->54690 54689 5d9e3b4 54688->54689 54689->54684 54690->54684
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,jq$4$$fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq
                    • API String ID: 0-2524271925
                    • Opcode ID: f91ffddcfc817e17d8c3d0b50bff150b35e46241ff243a8261b578dfc899ebb8
                    • Instruction ID: 9ce5ae850338cf5b1f8d6f5cc56887abcc564dcef926288de5a1c3882aa1865d
                    • Opcode Fuzzy Hash: f91ffddcfc817e17d8c3d0b50bff150b35e46241ff243a8261b578dfc899ebb8
                    • Instruction Fuzzy Hash: CEB21779A00218CFDB14DFA4C884BADB7B6FF48704F149599E646AB2A5DB70EC81CF50
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,jq$4$$fq$$fq$$fq$$fq
                    • API String ID: 0-2005009869
                    • Opcode ID: f867e8ac98ff1073e82e0ea86e79941908380b42ba5143fe42f85d821aa86a09
                    • Instruction ID: 8e7c675068a6a6ce3c363374580ba5918bd0609ca07f915d62c399f15442235e
                    • Opcode Fuzzy Hash: f867e8ac98ff1073e82e0ea86e79941908380b42ba5143fe42f85d821aa86a09
                    • Instruction Fuzzy Hash: FA222C79A00214CFEB24DFA4C994BADB7B2FF48304F149099E549AB2A5DB70ED81CF50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 637 27c8a90-27c8ab1 638 27c8ab8-27c8b9f 637->638 639 27c8ab3 637->639 641 27c8ba5-27c8ce6 call 27c4e50 638->641 642 27c92a1-27c92c9 638->642 639->638 688 27c8cec-27c8d47 641->688 689 27c926a-27c9294 641->689 645 27c99cf-27c99d8 642->645 646 27c99de-27c99f5 645->646 647 27c92d7-27c92e1 645->647 649 27c92e8-27c93dc call 27c4e50 647->649 650 27c92e3 647->650 671 27c93de-27c93ea 649->671 672 27c9406 649->672 650->649 673 27c93ec-27c93f2 671->673 674 27c93f4-27c93fa 671->674 675 27c940c-27c942c 672->675 677 27c9404 673->677 674->677 680 27c948c-27c950c 675->680 681 27c942e-27c9487 675->681 677->675 702 27c950e-27c9561 680->702 703 27c9563-27c95a6 call 27c4e50 680->703 692 27c99cc 681->692 696 27c8d4c-27c8d57 688->696 697 27c8d49 688->697 699 27c929e 689->699 700 27c9296 689->700 692->645 701 27c917f-27c9185 696->701 697->696 699->642 700->699 704 27c8d5c-27c8d7a 701->704 705 27c918b-27c9207 call 27c3284 701->705 732 27c95b1-27c95ba 702->732 703->732 709 27c8d7c-27c8d80 704->709 710 27c8dd1-27c8de6 704->710 748 27c9254-27c925a 705->748 709->710 711 27c8d82-27c8d8d 709->711 713 27c8ded-27c8e03 710->713 714 27c8de8 710->714 715 27c8dc3-27c8dc9 711->715 719 27c8e0a-27c8e21 713->719 720 27c8e05 713->720 714->713 723 27c8d8f-27c8d93 715->723 724 27c8dcb-27c8dcc 715->724 721 27c8e28-27c8e3e 719->721 722 27c8e23 719->722 720->719 728 27c8e45-27c8e4c 721->728 729 27c8e40 721->729 722->721 726 27c8d99-27c8db1 723->726 727 27c8d95 723->727 731 27c8e4f-27c8eba 724->731 733 27c8db8-27c8dc0 726->733 734 27c8db3 726->734 727->726 728->731 729->728 735 27c8ebc-27c8ec8 731->735 736 27c8ece-27c9083 731->736 738 27c961a-27c9629 732->738 733->715 734->733 735->736 746 27c9085-27c9089 736->746 747 27c90e7-27c90fc 736->747 739 27c95bc-27c95e4 738->739 740 27c962b-27c96b3 738->740 743 27c95eb-27c9614 739->743 744 27c95e6 739->744 776 27c982c-27c9838 740->776 743->738 744->743 746->747 754 27c908b-27c909a 746->754 752 27c90fe 747->752 753 27c9103-27c9124 747->753 750 27c925c-27c9262 748->750 751 27c9209-27c9251 748->751 750->689 751->748 752->753 755 27c912b-27c914a 753->755 756 27c9126 753->756 758 27c90d9-27c90df 754->758 762 27c914c 755->762 763 27c9151-27c9171 755->763 756->755 760 27c909c-27c90a0 758->760 761 27c90e1-27c90e2 758->761 767 27c90aa-27c90cb 760->767 768 27c90a2-27c90a6 760->768 765 27c917c 761->765 762->763 769 27c9178 763->769 770 27c9173 763->770 765->701 771 27c90cd 767->771 772 27c90d2-27c90d6 767->772 768->767 769->765 770->769 771->772 772->758 777 27c983e-27c9899 776->777 778 27c96b8-27c96c1 776->778 793 27c989b-27c98ce 777->793 794 27c98d0-27c98fa 777->794 779 27c96ca-27c9820 778->779 780 27c96c3 778->780 798 27c9826 779->798 780->779 781 27c979f-27c97df 780->781 782 27c975a-27c979a 780->782 783 27c9715-27c9755 780->783 784 27c96d0-27c9710 780->784 781->798 782->798 783->798 784->798 802 27c9903-27c9996 793->802 794->802 798->776 806 27c999d-27c99bd 802->806 806->692
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: TJkq$Tefq$pjq$xbiq
                    • API String ID: 0-513662044
                    • Opcode ID: f67cdedb0b59697d1ce13f1084d765dfb2c29bc4209fa2453c32089992a0f752
                    • Instruction ID: 54de7a26d730ec82d42aeca0be557aa7a56d39b636faf6c3b453cdbde285845c
                    • Opcode Fuzzy Hash: f67cdedb0b59697d1ce13f1084d765dfb2c29bc4209fa2453c32089992a0f752
                    • Instruction Fuzzy Hash: 31A2E575A00228CFDB65CF69C984AD9BBB2FF89304F1581E9D509AB325DB319E81CF50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1066 5ea5b50-5ea5b6a 1067 5ea5b6c-5ea5b73 1066->1067 1068 5ea5b76-5ea5b82 1066->1068 1070 5ea5bde-5ea5be1 1068->1070 1071 5ea5b84-5ea5b91 1068->1071 1072 5ea5be3-5ea5be5 1070->1072 1073 5ea5bf4-5ea5bf7 1070->1073 1078 5ea5daf-5ea5de7 1071->1078 1079 5ea5b97-5ea5bc7 1071->1079 1077 5ea5bed 1072->1077 1075 5ea5bf9-5ea5c17 1073->1075 1076 5ea5c1d-5ea5c20 1073->1076 1075->1076 1085 5ea5dee-5ea5e39 1075->1085 1080 5ea5c26-5ea5c2c 1076->1080 1081 5ea5da5-5ea5dac 1076->1081 1077->1073 1078->1085 1107 5ea5bc9-5ea5bd2 1079->1107 1108 5ea5bd4-5ea5bd7 1079->1108 1080->1081 1083 5ea5c32-5ea5c3b 1080->1083 1088 5ea5c3d-5ea5c4c 1083->1088 1089 5ea5c73-5ea5c79 1083->1089 1117 5ea5e3b-5ea5e48 1085->1117 1118 5ea5e72-5ea5e74 1085->1118 1088->1089 1100 5ea5c4e-5ea5c67 1088->1100 1093 5ea5c7f-5ea5c88 1089->1093 1094 5ea5d84-5ea5d8a 1089->1094 1093->1094 1105 5ea5c8e-5ea5c9a 1093->1105 1094->1081 1097 5ea5d8c-5ea5d9c 1094->1097 1097->1081 1110 5ea5d9e-5ea5da3 1097->1110 1100->1089 1112 5ea5c69-5ea5c6c 1100->1112 1114 5ea5d38-5ea5d7c 1105->1114 1115 5ea5ca0-5ea5cc8 1105->1115 1107->1070 1108->1070 1110->1081 1112->1089 1114->1094 1115->1114 1129 5ea5cca-5ea5d07 1115->1129 1117->1118 1123 5ea5e4a-5ea5e70 1117->1123 1120 5ea62bf-5ea62c6 1118->1120 1123->1118 1135 5ea5e79-5ea5ead 1123->1135 1129->1114 1141 5ea5d09-5ea5d36 1129->1141 1143 5ea5eb3-5ea5ebc 1135->1143 1144 5ea5f50-5ea5f5f 1135->1144 1141->1094 1146 5ea5ec2-5ea5ed5 1143->1146 1147 5ea62c7-5ea62d2 1143->1147 1152 5ea5f9e 1144->1152 1153 5ea5f61-5ea5f77 1144->1153 1155 5ea5f3e-5ea5f4a 1146->1155 1156 5ea5ed7-5ea5ef0 1146->1156 1154 5ea5fa0-5ea5fa5 1152->1154 1161 5ea5f79-5ea5f95 1153->1161 1162 5ea5f97-5ea5f9c 1153->1162 1158 5ea5fe8-5ea6004 1154->1158 1159 5ea5fa7-5ea5fc8 1154->1159 1155->1143 1155->1144 1156->1155 1175 5ea5ef2-5ea5f00 1156->1175 1167 5ea600a-5ea6013 1158->1167 1168 5ea60cc-5ea60d5 1158->1168 1159->1158 1179 5ea5fca 1159->1179 1161->1154 1162->1154 1167->1147 1173 5ea6019-5ea6036 1167->1173 1171 5ea60db 1168->1171 1172 5ea62bd 1168->1172 1176 5ea60e9-5ea60f7 call 5ea3170 1171->1176 1177 5ea60e2-5ea60e4 1171->1177 1178 5ea6146-5ea6154 call 5ea3170 1171->1178 1172->1120 1199 5ea60ba-5ea60c6 1173->1199 1200 5ea603c-5ea6052 1173->1200 1175->1155 1187 5ea5f02-5ea5f06 1175->1187 1188 5ea60f9-5ea60ff 1176->1188 1189 5ea610f-5ea6112 1176->1189 1177->1120 1190 5ea616c-5ea616f 1178->1190 1191 5ea6156-5ea615c 1178->1191 1183 5ea5fcd-5ea5fe6 1179->1183 1183->1158 1187->1147 1194 5ea5f0c-5ea5f25 1187->1194 1195 5ea6103-5ea6105 1188->1195 1196 5ea6101 1188->1196 1201 5ea611b-5ea6129 call 5ea3170 1189->1201 1202 5ea6114-5ea6116 1189->1202 1203 5ea6200-5ea6211 call 5ea3170 1190->1203 1204 5ea6175-5ea6183 call 5ea3170 1190->1204 1197 5ea615e 1191->1197 1198 5ea6160-5ea6162 1191->1198 1194->1155 1224 5ea5f27-5ea5f3b call 5ea1fa0 1194->1224 1195->1189 1196->1189 1197->1190 1198->1190 1199->1167 1199->1168 1200->1199 1232 5ea6054-5ea6062 1200->1232 1216 5ea612b-5ea6131 1201->1216 1217 5ea6141 1201->1217 1202->1120 1214 5ea6229-5ea622c 1203->1214 1215 5ea6213-5ea6219 1203->1215 1218 5ea619b-5ea61ae call 5ea3170 1204->1218 1219 5ea6185-5ea618b 1204->1219 1214->1172 1229 5ea6232-5ea6243 call 5ea3170 1214->1229 1226 5ea621b 1215->1226 1227 5ea621d-5ea621f 1215->1227 1220 5ea6133 1216->1220 1221 5ea6135-5ea6137 1216->1221 1217->1120 1235 5ea61b0-5ea61b6 1218->1235 1236 5ea61c6-5ea61d3 1218->1236 1222 5ea618f-5ea6191 1219->1222 1223 5ea618d 1219->1223 1220->1217 1221->1217 1222->1218 1223->1218 1224->1155 1226->1214 1227->1214 1238 5ea625b-5ea626b call 5ea3170 1229->1238 1239 5ea6245-5ea624b 1229->1239 1232->1199 1243 5ea6064-5ea6068 1232->1243 1240 5ea61ba-5ea61bc 1235->1240 1241 5ea61b8 1235->1241 1236->1203 1251 5ea61d5-5ea61e3 call 5ea3170 1236->1251 1252 5ea626d-5ea6273 1238->1252 1253 5ea6283-5ea6290 1238->1253 1244 5ea624f-5ea6251 1239->1244 1245 5ea624d 1239->1245 1240->1236 1241->1236 1243->1147 1249 5ea606e-5ea6097 1243->1249 1244->1238 1245->1238 1249->1199 1271 5ea6099-5ea60b7 call 5ea1fa0 1249->1271 1259 5ea61fb 1251->1259 1260 5ea61e5-5ea61eb 1251->1260 1256 5ea6277-5ea6279 1252->1256 1257 5ea6275 1252->1257 1253->1172 1265 5ea6292-5ea62a3 call 5ea3170 1253->1265 1256->1253 1257->1253 1259->1120 1262 5ea61ef-5ea61f1 1260->1262 1263 5ea61ed 1260->1263 1262->1259 1263->1259 1269 5ea62bb 1265->1269 1270 5ea62a5-5ea62ab 1265->1270 1269->1120 1272 5ea62af-5ea62b1 1270->1272 1273 5ea62ad 1270->1273 1271->1199 1272->1269 1273->1269
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: Plfq$$fq
                    • API String ID: 0-502218747
                    • Opcode ID: 66724850d883826ff41b356028633cbcaf1db3874003c8b9af8c0f59ad143c22
                    • Instruction ID: 94c3f65fdbf78ba25e4e7fce8cee403919ff0ef588037561418b25ec858603ef
                    • Opcode Fuzzy Hash: 66724850d883826ff41b356028633cbcaf1db3874003c8b9af8c0f59ad143c22
                    • Instruction Fuzzy Hash: 4C323575B002048FDB14DF79C588A6A7BF6BF89304B2594A9E546CF3A5EB30EC41CB61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1278 27c0c98-27c0d0f 1280 27c0d16-27c0d2e 1278->1280 1281 27c0d11 1278->1281 1283 27c129f-27c12b8 1280->1283 1284 27c0d34-27c0eb5 1280->1284 1281->1280 1286 27c133e-27c1386 1283->1286 1287 27c12be-27c12de 1283->1287 1342 27c0eef-27c0ef1 1284->1342 1343 27c0eb7-27c0eed 1284->1343 1299 27c1398-27c13a0 1286->1299 1300 27c1388-27c1393 1286->1300 1292 27c157e 1287->1292 1293 27c12e4-27c12ec 1287->1293 1298 27c1583-27c158c 1292->1298 1293->1292 1296 27c12f2-27c1309 1293->1296 1296->1292 1301 27c130f-27c1339 call 27c0218 1296->1301 1302 27c158e 1298->1302 1303 27c1599 1298->1303 1305 27c13c2 1299->1305 1306 27c13a2-27c13c0 1299->1306 1304 27c1438-27c1482 1300->1304 1301->1298 1302->1303 1312 27c159a 1303->1312 1317 27c1488-27c14b4 1304->1317 1318 27c1513-27c157c 1304->1318 1309 27c13c9-27c13cb 1305->1309 1306->1309 1314 27c13cd-27c13d5 1309->1314 1315 27c13d7-27c13f7 1309->1315 1312->1312 1314->1304 1315->1304 1320 27c13f9-27c1402 1315->1320 1317->1292 1325 27c14ba-27c14c1 1317->1325 1318->1298 1320->1292 1324 27c1408-27c1436 1320->1324 1324->1304 1324->1320 1325->1292 1327 27c14c7-27c14d3 1325->1327 1327->1292 1328 27c14d9-27c14e5 1327->1328 1328->1292 1330 27c14eb-27c1511 1328->1330 1330->1298 1344 27c0ef7-27c0f01 1342->1344 1345 27c0ef3-27c0ef5 1342->1345 1343->1342 1347 27c0f03-27c0f19 1344->1347 1345->1347 1349 27c0f1f-27c0f27 1347->1349 1350 27c0f1b-27c0f1d 1347->1350 1352 27c0f29-27c0f2e 1349->1352 1350->1352 1354 27c0f45-27c0f73 1352->1354 1355 27c0f30-27c0f3f 1352->1355 1358 27c0fa8-27c0fb2 1354->1358 1359 27c0f75-27c0f82 1354->1359 1355->1354 1360 27c0fbb-27c1047 1358->1360 1361 27c0fb4 1358->1361 1359->1358 1363 27c0f84-27c0f91 1359->1363 1373 27c1049-27c1088 1360->1373 1374 27c108a-27c1098 1360->1374 1361->1360 1367 27c0f97-27c0fa2 1363->1367 1368 27c0f93-27c0f95 1363->1368 1367->1358 1368->1358 1377 27c10a3-27c10df 1373->1377 1374->1377 1394 27c10e5 call 27c1ee0 1377->1394 1395 27c10e5 call 27c1f91 1377->1395 1381 27c10eb-27c11aa 1386 27c11ac-27c11d6 1381->1386 1387 27c11d8-27c11f4 1381->1387 1386->1387 1389 27c11f6 1387->1389 1390 27c1202-27c1203 1387->1390 1389->1390 1390->1283 1394->1381 1395->1381
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: LRfq$\sfq
                    • API String ID: 0-373085665
                    • Opcode ID: 17326e91fd773a1ecbbd0ce8022565d5c7555f440353889813b66a7cd0025e20
                    • Instruction ID: 43f4c3110859dfcdbba7a57d063f0ee896d0b2970b8689ce82d3b0000f3586a2
                    • Opcode Fuzzy Hash: 17326e91fd773a1ecbbd0ce8022565d5c7555f440353889813b66a7cd0025e20
                    • Instruction Fuzzy Hash: D0325A74E0022A8FDB54DF79D894AAEB7F2FF88300F518669D40AEB255DB309945CF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1636 5efbb88-5efbba9 1637 5efbbab 1636->1637 1638 5efbbb0-5efbc85 call 5efc4c0 1636->1638 1637->1638 1644 5efbc87-5efbc92 1638->1644 1645 5efbc94 1638->1645 1646 5efbc9e-5efbd70 1644->1646 1645->1646 1655 5efbd82-5efbdad 1646->1655 1656 5efbd72-5efbd78 1646->1656 1657 5efc423-5efc43f 1655->1657 1656->1655 1658 5efc445-5efc460 1657->1658 1659 5efbdb2-5efbddb 1657->1659 1662 5efbde5-5efbedb 1659->1662 1668 5efbeed-5efc045 1662->1668 1669 5efbedd-5efbee3 1662->1669 1677 5efc09e-5efc0a5 1668->1677 1678 5efc047-5efc04b 1668->1678 1669->1668 1679 5efc250-5efc26c 1677->1679 1680 5efc04d-5efc04e 1678->1680 1681 5efc053-5efc099 1678->1681 1682 5efc0aa-5efc198 1679->1682 1683 5efc272-5efc296 1679->1683 1684 5efc2e0-5efc32f 1680->1684 1681->1684 1708 5efc19e-5efc249 1682->1708 1709 5efc24c-5efc24d 1682->1709 1690 5efc2dd-5efc2de 1683->1690 1691 5efc298-5efc2da 1683->1691 1698 5efc341-5efc38c 1684->1698 1699 5efc331-5efc337 1684->1699 1690->1684 1691->1690 1701 5efc38e-5efc404 1698->1701 1702 5efc405-5efc420 1698->1702 1699->1698 1701->1702 1702->1657 1708->1709 1709->1679
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: fkq$8
                    • API String ID: 0-3236039973
                    • Opcode ID: 9cbb13259c39d38d6d22845d170cdc01c5c5e425134043355120b854489c3b06
                    • Instruction ID: 9db03cb775c424da1fce8e3316e22327be6c1a0cea04b4c215bd2c35e893806c
                    • Opcode Fuzzy Hash: 9cbb13259c39d38d6d22845d170cdc01c5c5e425134043355120b854489c3b06
                    • Instruction Fuzzy Hash: 3242E375D006298FDB64DF69C850AD9B7B2FF89300F1086EAD54DA7254EB30AE85CF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1871 27c0c89-27c0c8a 1872 27c0c8c 1871->1872 1873 27c0c8e 1871->1873 1872->1873 1874 27c0c90 1873->1874 1875 27c0c92 1873->1875 1874->1875 1876 27c0c94 1875->1876 1877 27c0c96-27c0d0f 1875->1877 1876->1877 1879 27c0d16-27c0d2e 1877->1879 1880 27c0d11 1877->1880 1882 27c129f-27c12b8 1879->1882 1883 27c0d34-27c0eb5 1879->1883 1880->1879 1885 27c133e-27c1386 1882->1885 1886 27c12be-27c12de 1882->1886 1941 27c0eef-27c0ef1 1883->1941 1942 27c0eb7-27c0eed 1883->1942 1898 27c1398-27c13a0 1885->1898 1899 27c1388-27c1393 1885->1899 1891 27c157e 1886->1891 1892 27c12e4-27c12ec 1886->1892 1897 27c1583-27c158c 1891->1897 1892->1891 1895 27c12f2-27c1309 1892->1895 1895->1891 1900 27c130f-27c1339 call 27c0218 1895->1900 1901 27c158e 1897->1901 1902 27c1599 1897->1902 1904 27c13c2 1898->1904 1905 27c13a2-27c13c0 1898->1905 1903 27c1438-27c1482 1899->1903 1900->1897 1901->1902 1911 27c159a 1902->1911 1916 27c1488-27c14b4 1903->1916 1917 27c1513-27c157c 1903->1917 1908 27c13c9-27c13cb 1904->1908 1905->1908 1913 27c13cd-27c13d5 1908->1913 1914 27c13d7-27c13f7 1908->1914 1911->1911 1913->1903 1914->1903 1919 27c13f9-27c1402 1914->1919 1916->1891 1924 27c14ba-27c14c1 1916->1924 1917->1897 1919->1891 1923 27c1408-27c1436 1919->1923 1923->1903 1923->1919 1924->1891 1926 27c14c7-27c14d3 1924->1926 1926->1891 1927 27c14d9-27c14e5 1926->1927 1927->1891 1929 27c14eb-27c1511 1927->1929 1929->1897 1943 27c0ef7-27c0f01 1941->1943 1944 27c0ef3-27c0ef5 1941->1944 1942->1941 1946 27c0f03-27c0f19 1943->1946 1944->1946 1948 27c0f1f-27c0f27 1946->1948 1949 27c0f1b-27c0f1d 1946->1949 1951 27c0f29-27c0f2e 1948->1951 1949->1951 1953 27c0f45-27c0f73 1951->1953 1954 27c0f30-27c0f3f 1951->1954 1957 27c0fa8-27c0fb2 1953->1957 1958 27c0f75-27c0f82 1953->1958 1954->1953 1959 27c0fbb-27c1047 1957->1959 1960 27c0fb4 1957->1960 1958->1957 1962 27c0f84-27c0f91 1958->1962 1972 27c1049-27c1088 1959->1972 1973 27c108a-27c1098 1959->1973 1960->1959 1966 27c0f97-27c0fa2 1962->1966 1967 27c0f93-27c0f95 1962->1967 1966->1957 1967->1957 1976 27c10a3-27c10df 1972->1976 1973->1976 1993 27c10e5 call 27c1ee0 1976->1993 1994 27c10e5 call 27c1f91 1976->1994 1980 27c10eb-27c11aa 1985 27c11ac-27c11d6 1980->1985 1986 27c11d8-27c11f4 1980->1986 1985->1986 1988 27c11f6 1986->1988 1989 27c1202-27c1203 1986->1989 1988->1989 1989->1882 1993->1980 1994->1980
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: LRfq$\sfq
                    • API String ID: 0-373085665
                    • Opcode ID: d0f4913b7783cf3cad2131a1c3b2698e09e365b6b8635fb96c5a6fb6de0c8315
                    • Instruction ID: fa590aafac28c8be1b78c953680ec6ba5663376ca9444438067120831916219e
                    • Opcode Fuzzy Hash: d0f4913b7783cf3cad2131a1c3b2698e09e365b6b8635fb96c5a6fb6de0c8315
                    • Instruction Fuzzy Hash: C8E15A75E0022A8FDB54DF79D884AAEB7F2BF88310F11CA69D405EB259DB309945CF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2121 27c0cd2-27c0ce8 2123 27c0cea-27c0cf4 2121->2123 2124 27c0cf5-27c0d0f 2121->2124 2125 27c0d16-27c0d2e 2124->2125 2126 27c0d11 2124->2126 2128 27c129f-27c12b8 2125->2128 2129 27c0d34-27c0eb5 2125->2129 2126->2125 2131 27c133e-27c1386 2128->2131 2132 27c12be-27c12de 2128->2132 2187 27c0eef-27c0ef1 2129->2187 2188 27c0eb7-27c0eed 2129->2188 2144 27c1398-27c13a0 2131->2144 2145 27c1388-27c1393 2131->2145 2137 27c157e 2132->2137 2138 27c12e4-27c12ec 2132->2138 2143 27c1583-27c158c 2137->2143 2138->2137 2141 27c12f2-27c1309 2138->2141 2141->2137 2146 27c130f-27c1339 call 27c0218 2141->2146 2147 27c158e 2143->2147 2148 27c1599 2143->2148 2150 27c13c2 2144->2150 2151 27c13a2-27c13c0 2144->2151 2149 27c1438-27c1482 2145->2149 2146->2143 2147->2148 2157 27c159a 2148->2157 2162 27c1488-27c14b4 2149->2162 2163 27c1513-27c157c 2149->2163 2154 27c13c9-27c13cb 2150->2154 2151->2154 2159 27c13cd-27c13d5 2154->2159 2160 27c13d7-27c13f7 2154->2160 2157->2157 2159->2149 2160->2149 2165 27c13f9-27c1402 2160->2165 2162->2137 2170 27c14ba-27c14c1 2162->2170 2163->2143 2165->2137 2169 27c1408-27c1436 2165->2169 2169->2149 2169->2165 2170->2137 2172 27c14c7-27c14d3 2170->2172 2172->2137 2173 27c14d9-27c14e5 2172->2173 2173->2137 2175 27c14eb-27c1511 2173->2175 2175->2143 2189 27c0ef7-27c0f01 2187->2189 2190 27c0ef3-27c0ef5 2187->2190 2188->2187 2192 27c0f03-27c0f19 2189->2192 2190->2192 2194 27c0f1f-27c0f27 2192->2194 2195 27c0f1b-27c0f1d 2192->2195 2197 27c0f29-27c0f2e 2194->2197 2195->2197 2199 27c0f45-27c0f73 2197->2199 2200 27c0f30-27c0f3f 2197->2200 2203 27c0fa8-27c0fb2 2199->2203 2204 27c0f75-27c0f82 2199->2204 2200->2199 2205 27c0fbb-27c1047 2203->2205 2206 27c0fb4 2203->2206 2204->2203 2208 27c0f84-27c0f91 2204->2208 2218 27c1049-27c1088 2205->2218 2219 27c108a-27c1098 2205->2219 2206->2205 2212 27c0f97-27c0fa2 2208->2212 2213 27c0f93-27c0f95 2208->2213 2212->2203 2213->2203 2222 27c10a3-27c10df 2218->2222 2219->2222 2239 27c10e5 call 27c1ee0 2222->2239 2240 27c10e5 call 27c1f91 2222->2240 2226 27c10eb-27c11aa 2231 27c11ac-27c11d6 2226->2231 2232 27c11d8-27c11f4 2226->2232 2231->2232 2234 27c11f6 2232->2234 2235 27c1202-27c1203 2232->2235 2234->2235 2235->2128 2239->2226 2240->2226
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: LRfq$\sfq
                    • API String ID: 0-373085665
                    • Opcode ID: f86a0044e795dbc7aa49a5eef695bbf6619a65b4517f6640f7de6d74e0b87af7
                    • Instruction ID: a3821412aa144c0b6c3bf5ec777e7838aeec6f366ce6408f71893e484d074805
                    • Opcode Fuzzy Hash: f86a0044e795dbc7aa49a5eef695bbf6619a65b4517f6640f7de6d74e0b87af7
                    • Instruction Fuzzy Hash: FED16C75E0022A8FDB54DF79D880AAEB7F2FF88304F118A69D405EB258DB309945CF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2241 27c0d49-27c0eb5 2260 27c0eef-27c0ef1 2241->2260 2261 27c0eb7-27c0eed 2241->2261 2262 27c0ef7-27c0f01 2260->2262 2263 27c0ef3-27c0ef5 2260->2263 2261->2260 2265 27c0f03-27c0f19 2262->2265 2263->2265 2267 27c0f1f-27c0f27 2265->2267 2268 27c0f1b-27c0f1d 2265->2268 2270 27c0f29-27c0f2e 2267->2270 2268->2270 2272 27c0f45-27c0f73 2270->2272 2273 27c0f30-27c0f3f 2270->2273 2276 27c0fa8-27c0fb2 2272->2276 2277 27c0f75-27c0f82 2272->2277 2273->2272 2278 27c0fbb-27c1047 2276->2278 2279 27c0fb4 2276->2279 2277->2276 2281 27c0f84-27c0f91 2277->2281 2291 27c1049-27c1088 2278->2291 2292 27c108a-27c1098 2278->2292 2279->2278 2285 27c0f97-27c0fa2 2281->2285 2286 27c0f93-27c0f95 2281->2286 2285->2276 2286->2276 2295 27c10a3-27c10df 2291->2295 2292->2295 2350 27c10e5 call 27c1ee0 2295->2350 2351 27c10e5 call 27c1f91 2295->2351 2299 27c10eb-27c11aa 2304 27c11ac-27c11d6 2299->2304 2305 27c11d8-27c11f4 2299->2305 2304->2305 2307 27c11f6 2305->2307 2308 27c1202-27c12b8 2305->2308 2307->2308 2314 27c133e-27c1386 2308->2314 2315 27c12be-27c12de 2308->2315 2323 27c1398-27c13a0 2314->2323 2324 27c1388-27c1393 2314->2324 2318 27c157e 2315->2318 2319 27c12e4-27c12ec 2315->2319 2322 27c1583-27c158c 2318->2322 2319->2318 2321 27c12f2-27c1309 2319->2321 2321->2318 2325 27c130f-27c1339 call 27c0218 2321->2325 2326 27c158e 2322->2326 2327 27c1599 2322->2327 2329 27c13c2 2323->2329 2330 27c13a2-27c13c0 2323->2330 2328 27c1438-27c1482 2324->2328 2325->2322 2326->2327 2335 27c159a 2327->2335 2339 27c1488-27c14b4 2328->2339 2340 27c1513-27c157c 2328->2340 2332 27c13c9-27c13cb 2329->2332 2330->2332 2337 27c13cd-27c13d5 2332->2337 2338 27c13d7-27c13f7 2332->2338 2335->2335 2337->2328 2338->2328 2342 27c13f9-27c1402 2338->2342 2339->2318 2346 27c14ba-27c14c1 2339->2346 2340->2322 2342->2318 2345 27c1408-27c1436 2342->2345 2345->2328 2345->2342 2346->2318 2347 27c14c7-27c14d3 2346->2347 2347->2318 2348 27c14d9-27c14e5 2347->2348 2348->2318 2349 27c14eb-27c1511 2348->2349 2349->2322 2350->2299 2351->2299
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: LRfq$\sfq
                    • API String ID: 0-373085665
                    • Opcode ID: 11cd34f357f16063a69cffdba2598284f07a1148281be54e8135d2f225f931a8
                    • Instruction ID: 34b306a9ccee38a96f6d32e4e3d9a13de249a95cd4ab8eccfc942940bb1d32e1
                    • Opcode Fuzzy Hash: 11cd34f357f16063a69cffdba2598284f07a1148281be54e8135d2f225f931a8
                    • Instruction Fuzzy Hash: A1D15C75E0022A8FDB54DF79D884AAEB7F2BF88300F15CA69D405EB258DB309945DF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2524 5efbb78-5efbb80 2525 5efbb2a-5efbb2f 2524->2525 2526 5efbb82-5efbba9 2524->2526 2528 5efbbab 2526->2528 2529 5efbbb0-5efbc85 call 5efc4c0 2526->2529 2528->2529 2535 5efbc87-5efbc92 2529->2535 2536 5efbc94 2529->2536 2537 5efbc9e-5efbd70 2535->2537 2536->2537 2546 5efbd82-5efbdad 2537->2546 2547 5efbd72-5efbd78 2537->2547 2548 5efc423-5efc43f 2546->2548 2547->2546 2549 5efc445-5efc460 2548->2549 2550 5efbdb2-5efbddb 2548->2550 2553 5efbde5-5efbedb 2550->2553 2559 5efbeed-5efc045 2553->2559 2560 5efbedd-5efbee3 2553->2560 2568 5efc09e-5efc0a5 2559->2568 2569 5efc047-5efc04b 2559->2569 2560->2559 2570 5efc250-5efc26c 2568->2570 2571 5efc04d-5efc04e 2569->2571 2572 5efc053-5efc099 2569->2572 2573 5efc0aa-5efc198 2570->2573 2574 5efc272-5efc296 2570->2574 2575 5efc2e0-5efc32f 2571->2575 2572->2575 2599 5efc19e-5efc249 2573->2599 2600 5efc24c-5efc24d 2573->2600 2581 5efc2dd-5efc2de 2574->2581 2582 5efc298-5efc2da 2574->2582 2589 5efc341-5efc38c 2575->2589 2590 5efc331-5efc337 2575->2590 2581->2575 2582->2581 2592 5efc38e-5efc404 2589->2592 2593 5efc405-5efc420 2589->2593 2590->2589 2592->2593 2593->2548 2599->2600 2600->2570
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: fkq$h
                    • API String ID: 0-2877906129
                    • Opcode ID: 586aec54a72ba06b60a5be19870e1c9e54fb61fca8b8cfb781e3f10f02548c50
                    • Instruction ID: 64638f8e4c8cb393c1a86b6db204a47e275aeaab74090b8be4624ce5b574bd9d
                    • Opcode Fuzzy Hash: 586aec54a72ba06b60a5be19870e1c9e54fb61fca8b8cfb781e3f10f02548c50
                    • Instruction Fuzzy Hash: A6610671D006298BEB64DF6AC840BD9FBB6BF88310F14D2EAD54CA7254EB305A85CF50
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 2
                    • API String ID: 0-450215437
                    • Opcode ID: c9bdaa3de416af1b14e9e554f4a67afead5e82105a61902837b3d275af2ef65a
                    • Instruction ID: 20cf2e254e4dd5f3f0a9b25bd39e278faec332c55e1eb36af3dc71a23e18f1c7
                    • Opcode Fuzzy Hash: c9bdaa3de416af1b14e9e554f4a67afead5e82105a61902837b3d275af2ef65a
                    • Instruction Fuzzy Hash: BEC2B1B4E002288FCB65DF69C984B9DBBB6FB89304F1081E9D509AB355DB309E85CF54
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: LRfq
                    • API String ID: 0-2333822924
                    • Opcode ID: ed143766453591f9691ea7e376b349f96537698d2ddf28aa3cfe7ba3adf5b916
                    • Instruction ID: 3df993869f6f6be64bf8c49483e005068bc4c437b5b4f5d482ee118ebb1aa312
                    • Opcode Fuzzy Hash: ed143766453591f9691ea7e376b349f96537698d2ddf28aa3cfe7ba3adf5b916
                    • Instruction Fuzzy Hash: DFF19B71E041298FDB14CF68C890BADBBF2BF84314F6985ADD059AB296D734AD81CF50
                    APIs
                    • NtCreateThreadEx.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 05EB0B52
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: CreateThread
                    • String ID:
                    • API String ID: 2422867632-0
                    • Opcode ID: 9ed7c4e392e5c995eae0dc0410b7f85721ad6f75437d32d2a3568170b89d8172
                    • Instruction ID: 12508e0b4937620deea94750190003f7560f0e97ad02877435f8e5392e171b3b
                    • Opcode Fuzzy Hash: 9ed7c4e392e5c995eae0dc0410b7f85721ad6f75437d32d2a3568170b89d8172
                    • Instruction Fuzzy Hash: 1F5189B9D042499FCF10CFA9D980ADEFBF1BB19314F24A02AE818B7210D735A955DF58
                    APIs
                    • NtCreateThreadEx.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 05EB0B52
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: CreateThread
                    • String ID:
                    • API String ID: 2422867632-0
                    • Opcode ID: 28e832f9168471ce019d5e4221b8c7b40cf1263c8f76af9c26999c6f6611b66b
                    • Instruction ID: 1e4bdf428e2de1b760329a4c939f220d7a5ce202b7d389b65557107df0673811
                    • Opcode Fuzzy Hash: 28e832f9168471ce019d5e4221b8c7b40cf1263c8f76af9c26999c6f6611b66b
                    • Instruction Fuzzy Hash: 814189B9D042489FCF10CFA9D9809DEFBF1BB19314F20A02AE818B7210D735A955DF58
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: Tefq
                    • API String ID: 0-1066582953
                    • Opcode ID: df6a603d1b16c80ef83f811cc6a2022f9a2f84ff033a90ccd40c25e7b78648a7
                    • Instruction ID: da69903bda403d8cadf6531e1008a2728dcb64b593e7c98cf3d7b012ea716673
                    • Opcode Fuzzy Hash: df6a603d1b16c80ef83f811cc6a2022f9a2f84ff033a90ccd40c25e7b78648a7
                    • Instruction Fuzzy Hash: D102E374E05218CFEB68EF6AC844BADBBF2BF89300F1185AAD50DA7254DB705985CF40
                    APIs
                    • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 05EB0CFB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: MemoryVirtualWrite
                    • String ID:
                    • API String ID: 3527976591-0
                    • Opcode ID: db1c52ef317a968648cc525ab3d1f242f74236b8f27487315f17c1e6d35f437e
                    • Instruction ID: fa1f8f6b43b65d84d7c3db0eba2865b4682f23d708986a24e06daf7a91d70361
                    • Opcode Fuzzy Hash: db1c52ef317a968648cc525ab3d1f242f74236b8f27487315f17c1e6d35f437e
                    • Instruction Fuzzy Hash: 4A4197B5D012489FDF10CFA9D984ADEFBF1BB49314F20902AE819BB250D775A905CF64
                    APIs
                    • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 05EB0CFB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: MemoryVirtualWrite
                    • String ID:
                    • API String ID: 3527976591-0
                    • Opcode ID: d67043444ade448c4e5accb3d4b369fcf619757ee4e948f8006bc65cdac431a4
                    • Instruction ID: 99a2c6c1bfa8eb6c84df44a8cd421ba322e969d74aaf2209a53406810208e83b
                    • Opcode Fuzzy Hash: d67043444ade448c4e5accb3d4b369fcf619757ee4e948f8006bc65cdac431a4
                    • Instruction Fuzzy Hash: E441A7B4D012489FDF00CFA9D984ADEFBF1BB49310F20902AE819BB210D775A905CF64
                    APIs
                    • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 05EB099D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: AllocateMemoryVirtual
                    • String ID:
                    • API String ID: 2167126740-0
                    • Opcode ID: 88eeb31a8fa646a12a6dd1d4613ac95b8db5bfb46ef7363d9531219980967f09
                    • Instruction ID: e7a4947f1e25acd05f439ad08a7cc48c686146dd8681ccbc7816fc2cee314134
                    • Opcode Fuzzy Hash: 88eeb31a8fa646a12a6dd1d4613ac95b8db5bfb46ef7363d9531219980967f09
                    • Instruction Fuzzy Hash: 3F4198B5D042599FDF10CFA9D985ADEFBB1BB59320F10A02AE818B7310D775A901CF54
                    APIs
                    • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 05EB099D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: AllocateMemoryVirtual
                    • String ID:
                    • API String ID: 2167126740-0
                    • Opcode ID: 9c1651f04691c07b5240fa844667545b0941ceec04489dbc22b990ab8c2d7969
                    • Instruction ID: d22400682c3243aeca79f4cd07d648f5313298b38e6c122d04ccd8ce533f350d
                    • Opcode Fuzzy Hash: 9c1651f04691c07b5240fa844667545b0941ceec04489dbc22b990ab8c2d7969
                    • Instruction Fuzzy Hash: A44197B9D042599FDF10CFA9D984ADEFBB1BB49320F20A02AE818B7210D775A901CF54
                    APIs
                    • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05EFEDA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: MemoryProtectVirtual
                    • String ID:
                    • API String ID: 2706961497-0
                    • Opcode ID: 50202e08754af7155b6949ce0679dc7bc7f5e78bc823ade996322154a415abba
                    • Instruction ID: 706f77faa4f5e1aa2819234a5e265f9e67450e763bd100ced9b134a016aa97af
                    • Opcode Fuzzy Hash: 50202e08754af7155b6949ce0679dc7bc7f5e78bc823ade996322154a415abba
                    • Instruction Fuzzy Hash: 4941AAB5D002589FCF10CFA9D981ADEFBB5BB59320F10A02AE818B7310D735A905CF64
                    APIs
                    • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05EFEDA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: MemoryProtectVirtual
                    • String ID:
                    • API String ID: 2706961497-0
                    • Opcode ID: e10c4b44857f4b357d666ac2d5e6568434397f94a6c244e9811ffd16c15be79b
                    • Instruction ID: 05589b46ee870db7c173b3c3dc1cd3f19d6c0dc3044af68e02c25d9b9d7e0e0c
                    • Opcode Fuzzy Hash: e10c4b44857f4b357d666ac2d5e6568434397f94a6c244e9811ffd16c15be79b
                    • Instruction Fuzzy Hash: 354187B4D002599FCF10CFAAD980ADEFBB5BB49320F10A02AE919B7310D735A905CF64
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: PHfq
                    • API String ID: 0-2154135885
                    • Opcode ID: e7a243cf6af56532cab74b0c2006ec80a95389ba116f57afbb6be66f578d076f
                    • Instruction ID: 808cd02501bbbc4c55b8218f376a588c5a5910fe408be9dbd192019e26d81b51
                    • Opcode Fuzzy Hash: e7a243cf6af56532cab74b0c2006ec80a95389ba116f57afbb6be66f578d076f
                    • Instruction Fuzzy Hash: 51C1C870D05218CFEB24DF69D884BADBBF2BF89304F2090A9D589E7256EB705985CF14
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: PHfq
                    • API String ID: 0-2154135885
                    • Opcode ID: bd544de6a48379e16f841440beed9e8f61c55c48fdb01966a6a2e14834874818
                    • Instruction ID: a52cd23639770b0bbdce4b264e952fb5cb5650b97f37d88ca0bb775c0ab06633
                    • Opcode Fuzzy Hash: bd544de6a48379e16f841440beed9e8f61c55c48fdb01966a6a2e14834874818
                    • Instruction Fuzzy Hash: CDC1E970D05218CFEB24DF69D884BADBBF2BF89304F2490A9D189E7256EB744985CF14
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: Tefq
                    • API String ID: 0-1066582953
                    • Opcode ID: 71acb3f7f41f1afb3a11c4f84ca5c86d6f9ebaa842440f20d54b447e0f286a21
                    • Instruction ID: c0c6f5b60ade66e0afab83e788a72350848e80e476c8b6344aa7261c148f6b85
                    • Opcode Fuzzy Hash: 71acb3f7f41f1afb3a11c4f84ca5c86d6f9ebaa842440f20d54b447e0f286a21
                    • Instruction Fuzzy Hash: 5CA1D270E05218DFDB14DFA9D886BADBBF2FF89304F10906AE409A7255DB749989CF00
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: Tefq
                    • API String ID: 0-1066582953
                    • Opcode ID: 22fa0ba205aa18f4f9c600f4af6905d77f330f99f526d9dd4304ad580d3db340
                    • Instruction ID: 4cb458425d2cbeedec8584a6a3cbc7742d407178d2caf2bda11497b98a97d470
                    • Opcode Fuzzy Hash: 22fa0ba205aa18f4f9c600f4af6905d77f330f99f526d9dd4304ad580d3db340
                    • Instruction Fuzzy Hash: F9A1C170E05218DFDB14DFA9D885B9DBBF2BF89304F10806AE419A7355DB749985CF40
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: LRfq
                    • API String ID: 0-2333822924
                    • Opcode ID: a289721c6e483c12118d941a66f9e01fd8872286fe421b6014896246a3866ad8
                    • Instruction ID: 94f7ebe383eaf98cbf5bec17f940788ca55a1eb0772f17d52700a68477f35377
                    • Opcode Fuzzy Hash: a289721c6e483c12118d941a66f9e01fd8872286fe421b6014896246a3866ad8
                    • Instruction Fuzzy Hash: CC916E30E041198FDB14CF68C990BADB7B2BF84314F69C5ADD049AB286D734AD81CF94
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: \sfq
                    • API String ID: 0-3800904836
                    • Opcode ID: 6d92b46d321f56a779262783c3da619263d31e3e3c01d88e2bcf75e45cf031dd
                    • Instruction ID: ce853214a0229f9619872fc6b7e08e709ca47f0b2e8f6c741d0113341cd3891e
                    • Opcode Fuzzy Hash: 6d92b46d321f56a779262783c3da619263d31e3e3c01d88e2bcf75e45cf031dd
                    • Instruction Fuzzy Hash: 9481E8B8E4010ADFDF14DFA9E5849BEBBF1BF48314F206659D402EB290DB319941CB60
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: PHfq
                    • API String ID: 0-2154135885
                    • Opcode ID: 682ffbb44d48b2c0686e8009bcede8bc3209576f6c6594c045a360f492ecd6e3
                    • Instruction ID: 05ec03cd6fa902fbc89ad35fee482ccb0be61a1fbb0fbd774f8d319a9d636a59
                    • Opcode Fuzzy Hash: 682ffbb44d48b2c0686e8009bcede8bc3209576f6c6594c045a360f492ecd6e3
                    • Instruction Fuzzy Hash: DC81C870D05218CFEB24DFA9D884BADBBF2BF85308F20A069D189E7256DB754984CF05
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4|kq
                    • API String ID: 0-2733494808
                    • Opcode ID: 11d319775e0ca8ef54b7d2ba6ea698a1323e96bfd0fa4aa82ed8c2570053c1c3
                    • Instruction ID: bb0b3b0149963818efdec7e7e2ac853e4744968fcea20ee9d79ea3b0caf80d1d
                    • Opcode Fuzzy Hash: 11d319775e0ca8ef54b7d2ba6ea698a1323e96bfd0fa4aa82ed8c2570053c1c3
                    • Instruction Fuzzy Hash: 1471F5B4E052288FEB64CF69D844BEDBBF2BB89314F0090A9D14DAB251DB705E85CF11
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6c79c2540acf30d6e945e8a88c7fe4191a0d1704672dbe9c916694ecaecc31c2
                    • Instruction ID: 7024685beb0561c5d37fa417336130b0f17dd590187e2f10766b973045624ba8
                    • Opcode Fuzzy Hash: 6c79c2540acf30d6e945e8a88c7fe4191a0d1704672dbe9c916694ecaecc31c2
                    • Instruction Fuzzy Hash: DE32B5B4A042298FCB65DF28C984B99BBB6FF48304F1095D9E94DA7351DB30AE81CF54
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e2e2d132faa53b4210811c9e67206d39374b011d0b574e6a8b32c42dcf87bb50
                    • Instruction ID: 156272d9d50c8633116ac3656e0a749eb7565ed829cae52a3321b7b41ca82ada
                    • Opcode Fuzzy Hash: e2e2d132faa53b4210811c9e67206d39374b011d0b574e6a8b32c42dcf87bb50
                    • Instruction Fuzzy Hash: F9D11474E04218CFEB54DFA9D884BEEBBB2FF48305F1090AAD149AB294DB745985CF11
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8130fe4cd570a7389232d6eb3584d1b1e69aa516bad93956082db2f10905ebb0
                    • Instruction ID: c67062ae806692c91a236f065356c534702ee8e0a64604ce832010852fc76282
                    • Opcode Fuzzy Hash: 8130fe4cd570a7389232d6eb3584d1b1e69aa516bad93956082db2f10905ebb0
                    • Instruction Fuzzy Hash: 00D11374E04218CFEB54DFA5D844BEEBBB2FF48305F0090AAD249AB294DB745985CF15
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c881d6313e9b2ebae6003538440a7fb01dea9b4724696bee174ef4ab99723981
                    • Instruction ID: ba3fe8b71edd38cb3b891f538408623a5bf1759b40ef129893e529bfd5ac0ef2
                    • Opcode Fuzzy Hash: c881d6313e9b2ebae6003538440a7fb01dea9b4724696bee174ef4ab99723981
                    • Instruction Fuzzy Hash: 85C1E070E09219CFEB54DF69D944BEEBBB2BF89305F20A0A9D049A7245DB745E81CF01
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3528e35e152739d78bffac9005dc76113c0ee6735a5e5ab42e5f1d96509bffd2
                    • Instruction ID: af1efe4a6afa7769f60a88361525ef0f4cbff3805f4f97588aedcd58cea37ec2
                    • Opcode Fuzzy Hash: 3528e35e152739d78bffac9005dc76113c0ee6735a5e5ab42e5f1d96509bffd2
                    • Instruction Fuzzy Hash: 7BC1F170E09219CFEB54DF69D944BEEBBB2BF89305F20A0A9D049A7245DB745E81CF01
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 18d3c1ab1a144fd99d4c8d92d47db3feec397e2c510db12599aa9cc55c055ebc
                    • Instruction ID: 6c334a7274d5883a976b23ea193c8e014688e9e16b9cf93b28d4ed8c01fb9482
                    • Opcode Fuzzy Hash: 18d3c1ab1a144fd99d4c8d92d47db3feec397e2c510db12599aa9cc55c055ebc
                    • Instruction Fuzzy Hash: E0916036F106158FC754DB69D890A9EB7E3AFC8710F298179E409DB3A6DB30DC018B90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 826d2419e50d5958638921e97d7721c15d4cb1dda3cda9ccf61d84c66c4b18a9
                    • Instruction ID: 80949bf7e735736a8c9901a97adb99fc6c7f3fe7af4e12dad7a4a39350dc5861
                    • Opcode Fuzzy Hash: 826d2419e50d5958638921e97d7721c15d4cb1dda3cda9ccf61d84c66c4b18a9
                    • Instruction Fuzzy Hash: 5E612F36F105258FD754DB69CC80B5EB3E3AFD4711F1A8168E4099B36ADE34EC419B90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 36d9e055deff52ff4d8c9942966863990cd53223283ae4075bdd8cb596dfa27f
                    • Instruction ID: 1f38adaf12fec3704500218309809e37558fdbc35f7db11ed4e41dc1f2a50f3b
                    • Opcode Fuzzy Hash: 36d9e055deff52ff4d8c9942966863990cd53223283ae4075bdd8cb596dfa27f
                    • Instruction Fuzzy Hash: 0D81E870E00209DFDB44DFA9D584AAEBBF6FF88300F149029E555AB364DB34A945CF60
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7601039b16b8dcb31a98076b70fbf4a8775ee6485fd3fc8f4cbe746555b42fe7
                    • Instruction ID: 1aedbea49619b265b70f7e99766311cd895f282ccc0176a82eebeca64af5a233
                    • Opcode Fuzzy Hash: 7601039b16b8dcb31a98076b70fbf4a8775ee6485fd3fc8f4cbe746555b42fe7
                    • Instruction Fuzzy Hash: C171D870E00209DFDB44DFA9D584AAEBBF6FF88304F149029E519AB364DB74A945CF60

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 808 5ea82f0-5ea8318 810 5ea831a-5ea8361 808->810 811 5ea8366-5ea8374 808->811 860 5ea87bd-5ea87c4 810->860 812 5ea8383 811->812 813 5ea8376-5ea8381 call 5ea5e10 811->813 814 5ea8385-5ea838c 812->814 813->814 817 5ea8392-5ea8396 814->817 818 5ea8475-5ea8479 814->818 821 5ea839c-5ea83a0 817->821 822 5ea87c5-5ea87ed 817->822 823 5ea847b-5ea848a call 5ea4028 818->823 824 5ea84cf-5ea84d9 818->824 825 5ea83b2-5ea8410 call 5ea5b50 call 5ea65b8 821->825 826 5ea83a2-5ea83ac 821->826 832 5ea87f4-5ea881e 822->832 839 5ea848e-5ea8493 823->839 827 5ea84db-5ea84ea call 5ea3748 824->827 828 5ea8512-5ea8538 824->828 870 5ea8883-5ea8897 825->870 871 5ea8416-5ea8470 825->871 826->825 826->832 843 5ea84f0-5ea850d 827->843 844 5ea8826-5ea883c 827->844 851 5ea853a-5ea8543 828->851 852 5ea8545 828->852 832->844 845 5ea848c 839->845 846 5ea8495-5ea84ca call 5ea7db8 839->846 843->860 868 5ea8844-5ea887c 844->868 845->839 846->860 859 5ea8547-5ea856f 851->859 852->859 876 5ea8640-5ea8644 859->876 877 5ea8575-5ea858e 859->877 868->870 871->860 878 5ea86be-5ea86c8 876->878 879 5ea8646-5ea865f 876->879 877->876 895 5ea8594-5ea85a3 call 5ea3170 877->895 882 5ea86ca-5ea86d4 878->882 883 5ea8725-5ea872e 878->883 879->878 903 5ea8661-5ea8670 call 5ea3170 879->903 893 5ea86da-5ea86ec 882->893 894 5ea86d6-5ea86d8 882->894 885 5ea8730-5ea875e call 5ea5360 call 5ea5380 883->885 886 5ea8766-5ea87b3 883->886 885->886 909 5ea87bb 886->909 899 5ea86ee-5ea86f0 893->899 894->899 911 5ea85bb-5ea85d0 895->911 912 5ea85a5-5ea85ab 895->912 907 5ea871e-5ea8723 899->907 908 5ea86f2-5ea86f6 899->908 918 5ea8688-5ea8693 903->918 919 5ea8672-5ea8678 903->919 907->882 907->883 914 5ea86f8-5ea8711 908->914 915 5ea8714-5ea8719 call 5ea1f70 908->915 909->860 924 5ea85d2-5ea85fe call 5ea44b0 911->924 925 5ea8604-5ea860d 911->925 920 5ea85af-5ea85b1 912->920 921 5ea85ad 912->921 914->915 915->907 918->870 930 5ea8699-5ea86bc 918->930 928 5ea867a 919->928 929 5ea867c-5ea867e 919->929 920->911 921->911 924->868 924->925 925->870 927 5ea8613-5ea863a 925->927 927->876 927->895 928->918 929->918 930->878 930->903
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: Hjq$Hjq$Hjq
                    • API String ID: 0-2296473396
                    • Opcode ID: 1a6d6518c2dc956e27a059bb275db5e4983ae71281fe4b5c5a0b4036190b412f
                    • Instruction ID: 1ba2df733d333bd4bd6549c99e72156b069e63776b0b82e173df857346261647
                    • Opcode Fuzzy Hash: 1a6d6518c2dc956e27a059bb275db5e4983ae71281fe4b5c5a0b4036190b412f
                    • Instruction Fuzzy Hash: 4E026E72A042048FDB25DFB5D494AAEBBF2FF88304F14952DE4869B391DB35AC45CB60

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 943 5ea9fa8-5ea9fd3 1057 5ea9fd5 call 5eaa4c8 943->1057 1058 5ea9fd5 call 5eaa4b1 943->1058 944 5ea9fdb-5ea9fe5 945 5eaa007-5eaa01d call 5ea9db0 944->945 946 5ea9fe7-5ea9fea 944->946 952 5eaa393-5eaa3a7 945->952 953 5eaa023-5eaa02f 945->953 1061 5ea9fec call 5eaa908 946->1061 1062 5ea9fec call 5eaa918 946->1062 1063 5ea9fec call 5eaa8bc 946->1063 1064 5ea9fec call 5eaa8c0 946->1064 1065 5ea9fec call 5eaa914 946->1065 948 5ea9ff2-5ea9ff4 948->945 950 5ea9ff6-5ea9ffe 948->950 950->945 963 5eaa3e7-5eaa3f0 952->963 954 5eaa160-5eaa167 953->954 955 5eaa035-5eaa038 953->955 958 5eaa16d-5eaa176 954->958 959 5eaa296-5eaa2d3 call 5ea97b8 call 5eac750 954->959 956 5eaa03b-5eaa044 955->956 961 5eaa04a-5eaa05e 956->961 962 5eaa488 956->962 958->959 964 5eaa17c-5eaa288 call 5ea97b8 call 5ea9d48 call 5ea97b8 958->964 1002 5eaa2d9-5eaa38a call 5ea97b8 959->1002 977 5eaa150-5eaa15a 961->977 978 5eaa064-5eaa0f9 call 5ea9db0 * 2 call 5ea97b8 call 5ea9d48 call 5ea9df0 call 5ea9e98 call 5ea9f00 961->978 968 5eaa48d-5eaa491 962->968 966 5eaa3f2-5eaa3f9 963->966 967 5eaa3b5-5eaa3be 963->967 1054 5eaa28a 964->1054 1055 5eaa293 964->1055 972 5eaa3fb-5eaa43e call 5ea97b8 966->972 973 5eaa447-5eaa44e 966->973 967->962 970 5eaa3c4-5eaa3d6 967->970 975 5eaa49c 968->975 976 5eaa493 968->976 989 5eaa3d8-5eaa3dd 970->989 990 5eaa3e6 970->990 972->973 979 5eaa473-5eaa486 973->979 980 5eaa450-5eaa460 973->980 987 5eaa49d 975->987 976->975 977->954 977->956 1034 5eaa0fb-5eaa113 call 5ea9e98 call 5ea97b8 call 5ea9a68 978->1034 1035 5eaa118-5eaa14b call 5ea9f00 978->1035 979->968 980->979 995 5eaa462-5eaa46a 980->995 987->987 1059 5eaa3e0 call 5eacef0 989->1059 1060 5eaa3e0 call 5eacee1 989->1060 990->963 995->979 1002->952 1034->1035 1035->977 1054->1055 1055->959 1057->944 1058->944 1059->990 1060->990 1061->948 1062->948 1063->948 1064->948 1065->948
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq$4'fq$4'fq
                    • API String ID: 0-3646979650
                    • Opcode ID: fe1f9e7334838b4ad7448f7184cff7f2de4e250ae07342e50a6f2feb41408cdf
                    • Instruction ID: e45be4f16c3c3c5906d6d7c6cf3af3c89077bda96b6a903953c5b623f57cbdce
                    • Opcode Fuzzy Hash: fe1f9e7334838b4ad7448f7184cff7f2de4e250ae07342e50a6f2feb41408cdf
                    • Instruction Fuzzy Hash: E2F1E935B10218CFCB04DFA4D998AADBBB2FF88304F519169E446AB365DB71EC42CB50
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1823685044.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5c80000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq$4'fq
                    • API String ID: 0-751858264
                    • Opcode ID: 07eacc42b303ff5eb19868c09bbb7a3ee473a5e90ad58fcb2921853650bbdeee
                    • Instruction ID: 63b5badbbd9600d81494012f79a0f2475e0bde2c10ae6067445180eb39bdd62a
                    • Opcode Fuzzy Hash: 07eacc42b303ff5eb19868c09bbb7a3ee473a5e90ad58fcb2921853650bbdeee
                    • Instruction Fuzzy Hash: 9C42F574E04209CFCF18EBA5D499ABEBBB2FF89309F14881AD512A7350DB345986CF51

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1716 5ea4859-5ea4894 1718 5ea489d-5ea48b0 call 5ea44e8 1716->1718 1719 5ea4896 1716->1719 1722 5ea48b6-5ea48c9 1718->1722 1723 5ea49f4-5ea49fb 1718->1723 1719->1718 1729 5ea48cb-5ea48d2 1722->1729 1730 5ea48d7-5ea48f1 1722->1730 1724 5ea4a01-5ea4a16 1723->1724 1725 5ea4c95-5ea4c9c 1723->1725 1736 5ea4a18-5ea4a1a 1724->1736 1737 5ea4a36-5ea4a3c 1724->1737 1727 5ea4d0b-5ea4d12 1725->1727 1728 5ea4c9e-5ea4ca7 1725->1728 1732 5ea4d18-5ea4d21 1727->1732 1733 5ea4dae-5ea4db5 1727->1733 1728->1727 1734 5ea4ca9-5ea4cbc 1728->1734 1735 5ea49ed 1729->1735 1751 5ea48f8-5ea4905 1730->1751 1752 5ea48f3-5ea48f6 1730->1752 1732->1733 1738 5ea4d27-5ea4d3a 1732->1738 1739 5ea4dd1-5ea4dd7 1733->1739 1740 5ea4db7-5ea4dc8 1733->1740 1734->1727 1756 5ea4cbe-5ea4d03 call 5ea19a0 1734->1756 1735->1723 1736->1737 1742 5ea4a1c-5ea4a33 1736->1742 1743 5ea4a42-5ea4a44 1737->1743 1744 5ea4b04-5ea4b08 1737->1744 1760 5ea4d3c-5ea4d4b 1738->1760 1761 5ea4d4d-5ea4d51 1738->1761 1746 5ea4de9-5ea4df2 1739->1746 1747 5ea4dd9-5ea4ddf 1739->1747 1740->1739 1762 5ea4dca 1740->1762 1742->1737 1743->1744 1755 5ea4a4a-5ea4a55 call 5ea4f98 1743->1755 1744->1725 1750 5ea4b0e-5ea4b10 1744->1750 1748 5ea4de1-5ea4de7 1747->1748 1749 5ea4df5-5ea4e6a 1747->1749 1748->1746 1748->1749 1831 5ea4e78 1749->1831 1832 5ea4e6c-5ea4e76 1749->1832 1750->1725 1757 5ea4b16-5ea4b1f 1750->1757 1758 5ea4907-5ea491b 1751->1758 1752->1758 1768 5ea4a5b-5ea4acb call 5ea19a0 * 4 1755->1768 1756->1727 1793 5ea4d05-5ea4d08 1756->1793 1764 5ea4c72-5ea4c78 1757->1764 1758->1735 1786 5ea4921-5ea4975 1758->1786 1760->1761 1766 5ea4d53-5ea4d55 1761->1766 1767 5ea4d71-5ea4d73 1761->1767 1762->1739 1771 5ea4c7a-5ea4c89 1764->1771 1772 5ea4c8b 1764->1772 1766->1767 1775 5ea4d57-5ea4d6e 1766->1775 1767->1733 1770 5ea4d75-5ea4d7b 1767->1770 1822 5ea4acd-5ea4adf call 5ea19a0 1768->1822 1823 5ea4ae2-5ea4b01 call 5ea19a0 1768->1823 1770->1733 1778 5ea4d7d-5ea4dab 1770->1778 1780 5ea4c8d-5ea4c8f 1771->1780 1772->1780 1775->1767 1778->1733 1780->1725 1784 5ea4b24-5ea4b32 call 5ea3170 1780->1784 1799 5ea4b4a-5ea4b64 1784->1799 1800 5ea4b34-5ea4b3a 1784->1800 1833 5ea4983-5ea4987 1786->1833 1834 5ea4977-5ea4979 1786->1834 1793->1727 1799->1764 1808 5ea4b6a-5ea4b6e 1799->1808 1802 5ea4b3e-5ea4b40 1800->1802 1803 5ea4b3c 1800->1803 1802->1799 1803->1799 1810 5ea4b8f 1808->1810 1811 5ea4b70-5ea4b79 1808->1811 1817 5ea4b92-5ea4bac 1810->1817 1814 5ea4b7b-5ea4b7e 1811->1814 1815 5ea4b80-5ea4b83 1811->1815 1820 5ea4b8d 1814->1820 1815->1820 1817->1764 1836 5ea4bb2-5ea4c33 call 5ea19a0 * 4 1817->1836 1820->1817 1822->1823 1823->1744 1837 5ea4e7d-5ea4e7f 1831->1837 1832->1837 1833->1735 1838 5ea4989-5ea49a1 1833->1838 1834->1833 1864 5ea4c4a-5ea4c70 call 5ea19a0 1836->1864 1865 5ea4c35-5ea4c47 call 5ea19a0 1836->1865 1839 5ea4e81-5ea4e84 1837->1839 1840 5ea4e86-5ea4e8b 1837->1840 1838->1735 1844 5ea49a3-5ea49af 1838->1844 1843 5ea4e91-5ea4ebe 1839->1843 1840->1843 1845 5ea49be-5ea49c4 1844->1845 1846 5ea49b1-5ea49b4 1844->1846 1849 5ea49cc-5ea49d5 1845->1849 1850 5ea49c6-5ea49c9 1845->1850 1846->1845 1852 5ea49d7-5ea49da 1849->1852 1853 5ea49e4-5ea49ea 1849->1853 1850->1849 1852->1853 1853->1735 1864->1725 1864->1764 1865->1864
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: $fq$$fq
                    • API String ID: 0-2537786760
                    • Opcode ID: 02d93bb9031c3bc28002be06d98da11141661425a1763ea3e56c912e2333bf59
                    • Instruction ID: 4aa4ca5f8ede356d4c1860e87661fe071e6164730d7bb2f4e24ec5a8c6bcba36
                    • Opcode Fuzzy Hash: 02d93bb9031c3bc28002be06d98da11141661425a1763ea3e56c912e2333bf59
                    • Instruction Fuzzy Hash: 2C129C35E006598FDF15DFA5C884AEDBBB2FF48308F148415E882AB395DBB4A946CF50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1995 5c818c0-5c818e8 1996 5c818ea 1995->1996 1997 5c818ef-5c81918 1995->1997 1996->1997 1998 5c81939 1997->1998 1999 5c8191a-5c81923 1997->1999 2002 5c8193c-5c81940 1998->2002 2000 5c8192a-5c8192d 1999->2000 2001 5c81925-5c81928 1999->2001 2004 5c81937 2000->2004 2001->2004 2003 5c81cf7-5c81d0e 2002->2003 2006 5c81d14-5c81d18 2003->2006 2007 5c81945-5c81949 2003->2007 2004->2002 2010 5c81d1a-5c81d4a 2006->2010 2011 5c81d4d-5c81d51 2006->2011 2008 5c8194b-5c819a8 2007->2008 2009 5c8194e-5c81952 2007->2009 2017 5c819aa-5c81a1b 2008->2017 2018 5c819ad-5c819b1 2008->2018 2013 5c8197b-5c81980 call 5ef2fc8 2009->2013 2014 5c81954-5c81978 2009->2014 2010->2011 2015 5c81d72 2011->2015 2016 5c81d53-5c81d5c 2011->2016 2028 5c81986-5c8199f 2013->2028 2014->2013 2021 5c81d75-5c81d7b 2015->2021 2019 5c81d5e-5c81d61 2016->2019 2020 5c81d63-5c81d66 2016->2020 2030 5c81a1d-5c81a7a 2017->2030 2031 5c81a20-5c81a24 2017->2031 2024 5c819da-5c81a01 2018->2024 2025 5c819b3-5c819d7 2018->2025 2027 5c81d70 2019->2027 2020->2027 2052 5c81a11-5c81a12 2024->2052 2053 5c81a03-5c81a09 2024->2053 2025->2024 2027->2021 2028->2003 2039 5c81a7c-5c81ad8 2030->2039 2040 5c81a7f-5c81a83 2030->2040 2033 5c81a4d-5c81a71 2031->2033 2034 5c81a26-5c81a4a 2031->2034 2033->2003 2034->2033 2050 5c81ada-5c81b3c 2039->2050 2051 5c81add-5c81ae1 2039->2051 2043 5c81aac-5c81acf 2040->2043 2044 5c81a85-5c81aa9 2040->2044 2043->2003 2044->2043 2062 5c81b3e-5c81ba0 2050->2062 2063 5c81b41-5c81b45 2050->2063 2055 5c81b0a-5c81b22 2051->2055 2056 5c81ae3-5c81b07 2051->2056 2052->2003 2053->2052 2074 5c81b32-5c81b33 2055->2074 2075 5c81b24-5c81b2a 2055->2075 2056->2055 2072 5c81ba2-5c81c04 2062->2072 2073 5c81ba5-5c81ba9 2062->2073 2065 5c81b6e-5c81b86 2063->2065 2066 5c81b47-5c81b6b 2063->2066 2085 5c81b88-5c81b8e 2065->2085 2086 5c81b96-5c81b97 2065->2086 2066->2065 2083 5c81c09-5c81c0d 2072->2083 2084 5c81c06-5c81c68 2072->2084 2077 5c81bab-5c81bcf 2073->2077 2078 5c81bd2-5c81bea 2073->2078 2074->2003 2075->2074 2077->2078 2096 5c81bfa-5c81bfb 2078->2096 2097 5c81bec-5c81bf2 2078->2097 2088 5c81c0f-5c81c33 2083->2088 2089 5c81c36-5c81c4e 2083->2089 2094 5c81c6a-5c81cc3 2084->2094 2095 5c81c6d-5c81c71 2084->2095 2085->2086 2086->2003 2088->2089 2105 5c81c5e-5c81c5f 2089->2105 2106 5c81c50-5c81c56 2089->2106 2107 5c81cec-5c81cef 2094->2107 2108 5c81cc5-5c81ce9 2094->2108 2099 5c81c9a-5c81cbd 2095->2099 2100 5c81c73-5c81c97 2095->2100 2096->2003 2097->2096 2099->2003 2100->2099 2105->2003 2106->2105 2107->2003 2108->2107
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1823685044.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5c80000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq$4'fq
                    • API String ID: 0-751858264
                    • Opcode ID: 8d6d7b66a91953f760e018e36205e1a185564a530ca8b20b23a78e11dae09dc8
                    • Instruction ID: e966734d8d8fee717aad61448d51fe8cc0c3c7be765d23dc2aa3d6937f72c028
                    • Opcode Fuzzy Hash: 8d6d7b66a91953f760e018e36205e1a185564a530ca8b20b23a78e11dae09dc8
                    • Instruction Fuzzy Hash: 6DF1D574E01208DFCB18EFA5E4996ECBBB2FF89319F24452AE446A7350DB355986CF10

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2418 5ea3e28-5ea3e3a 2419 5ea3f2e-5ea3f53 2418->2419 2420 5ea3e40-5ea3e42 2418->2420 2421 5ea3f5a-5ea3f7e 2419->2421 2420->2421 2422 5ea3e48-5ea3e54 2420->2422 2434 5ea3f85-5ea3fa9 2421->2434 2426 5ea3e68-5ea3e78 2422->2426 2427 5ea3e56-5ea3e62 2422->2427 2426->2434 2435 5ea3e7e-5ea3e8c 2426->2435 2427->2426 2427->2434 2439 5ea3fb0-5ea4017 2434->2439 2438 5ea3e92-5ea3e97 2435->2438 2435->2439 2475 5ea3e99 call 5ea3e1a 2438->2475 2476 5ea3e99 call 5ea4028 2438->2476 2477 5ea3e99 call 5ea4018 2438->2477 2478 5ea3e99 call 5ea3e28 2438->2478 2461 5ea401f-5ea4033 2439->2461 2462 5ea401a call 5ea4024 2439->2462 2441 5ea3e9f-5ea3ee8 2456 5ea3eea-5ea3f03 2441->2456 2457 5ea3f0b-5ea3f2b call 5ea1f70 2441->2457 2456->2457 2467 5ea403a-5ea4048 call 5ea3170 2461->2467 2468 5ea4035 call 5ea12c8 2461->2468 2462->2461 2471 5ea404a-5ea4050 2467->2471 2472 5ea4060-5ea4062 2467->2472 2468->2467 2473 5ea4052 2471->2473 2474 5ea4054-5ea4056 2471->2474 2473->2472 2474->2472 2475->2441 2476->2441 2477->2441 2478->2441
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq$Hjq
                    • API String ID: 0-2151573235
                    • Opcode ID: f32bc6a5ab922189f8d26cad3b58b20d2452a656c0641d7230d5b4281144aae0
                    • Instruction ID: c0d2b7f4b43d62355a6554f2ab4fe621189825e1ee5c2b512a9d8a264a52a421
                    • Opcode Fuzzy Hash: f32bc6a5ab922189f8d26cad3b58b20d2452a656c0641d7230d5b4281144aae0
                    • Instruction Fuzzy Hash: DD519D357002108FDB19AF78D49466E7BB2EF89304B10486DE5468B3A4CF35EC06CBA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2479 27c1cb0-27c1cdc 2484 27c1cde-27c1ce5 2479->2484 2485 27c1ce8 2479->2485 2519 27c1ce8 call 27c1e10 2485->2519 2520 27c1ce8 call 27c1cb0 2485->2520 2521 27c1ce8 call 27c1bf3 2485->2521 2522 27c1ce8 call 27c1ca3 2485->2522 2486 27c1cee-27c1cf0 2487 27c1cfc-27c1d16 2486->2487 2488 27c1cf2-27c1cf9 2486->2488 2490 27c1d1c-27c1d29 2487->2490 2491 27c1df9-27c1e09 2487->2491 2490->2491 2492 27c1d2f-27c1d39 2490->2492 2496 27c1e88-27c1e9b 2491->2496 2497 27c1e0b-27c1e12 2491->2497 2492->2491 2493 27c1d3f-27c1d49 2492->2493 2493->2491 2495 27c1d4f-27c1d6a 2493->2495 2498 27c1d6d-27c1d85 2495->2498 2507 27c1e9d-27c1ea1 2496->2507 2508 27c1ea2-27c1ea4 2496->2508 2500 27c1e19-27c1e1b 2497->2500 2523 27c1e13 call 27c1e2b 2497->2523 2498->2491 2501 27c1d87-27c1db3 2498->2501 2502 27c1e1d-27c1e20 2500->2502 2503 27c1e21-27c1e27 2500->2503 2501->2491 2504 27c1db5-27c1dc6 2501->2504 2504->2498 2506 27c1dc8-27c1dca 2504->2506 2509 27c1dcd-27c1dd2 2506->2509 2510 27c1eab-27c1ecd 2508->2510 2511 27c1ea6-27c1eaa 2508->2511 2509->2491 2512 27c1dd4-27c1dde 2509->2512 2517 27c1ecf-27c1ed3 2510->2517 2518 27c1ed4-27c1edb 2510->2518 2512->2509 2513 27c1de0-27c1df6 2512->2513 2519->2486 2520->2486 2521->2486 2522->2486 2523->2500
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: $\sfq
                    • API String ID: 0-1105643209
                    • Opcode ID: 074d1b79d9750aed143c62ad21caa5e36da95d2537bad2ff09b59ae38a82744f
                    • Instruction ID: 6bcc1af92f125df3bdf58467a45c80f653a2633ad8b2cc4e818a6344a399aec2
                    • Opcode Fuzzy Hash: 074d1b79d9750aed143c62ad21caa5e36da95d2537bad2ff09b59ae38a82744f
                    • Instruction Fuzzy Hash: A551CF71F400198FCB14DFAEE8806AEBBB6FB84311B64857EE618D7706D730E9518B80
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq$Hjq
                    • API String ID: 0-2151573235
                    • Opcode ID: b29ee0460b0335eec23fcd543b637f3cc1d97fc3c150489b6978120b1a191aae
                    • Instruction ID: 7e41e3f9eff2e173ba45f5801114fa52e18c618b0ffd410448bd19ab85bd9bac
                    • Opcode Fuzzy Hash: b29ee0460b0335eec23fcd543b637f3cc1d97fc3c150489b6978120b1a191aae
                    • Instruction Fuzzy Hash: 705128722047004FD725DF3AD48835B7BE2EFC0318F149929E48A8F791EA74E8448BA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq$(jq
                    • API String ID: 0-2294966697
                    • Opcode ID: 6aa15150b7b81889f7250bef91e5c8ed48eb0417bba40a22e507600bdb3b9587
                    • Instruction ID: 2400c61a1e354c9435da5bfec1635bc894d2bdc8a7020ebaf72335bd6c730e81
                    • Opcode Fuzzy Hash: 6aa15150b7b81889f7250bef91e5c8ed48eb0417bba40a22e507600bdb3b9587
                    • Instruction Fuzzy Hash: 2651AD327001148FDB189F39E894AAE3BA2FF89304F148469E8468F391CF35DD46CBA5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: X$s
                    • API String ID: 0-2768922426
                    • Opcode ID: 2992ed0f7b4b79426df44e5956f492d5e99a198f0d1bfeebf2b3208ecb4680b8
                    • Instruction ID: 95ba3c78437f84a674b22acfd18cd8a02a74e0438fd2d3b43a49865f67494d4a
                    • Opcode Fuzzy Hash: 2992ed0f7b4b79426df44e5956f492d5e99a198f0d1bfeebf2b3208ecb4680b8
                    • Instruction Fuzzy Hash: C631C3B4A042298FDBA4EF58D9847D9BBF1FB48309F1044EAA509A7390DB309E85CF50
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: K$V
                    • API String ID: 0-4033785428
                    • Opcode ID: d004102cacb7241c7375ee508194f9b6a3815a53621b4e6e172c2cfc14b22e3e
                    • Instruction ID: 9f4703987d8b8ecca8ba311d6906cbbe296bcda6b4d93fcf554ed94036a87019
                    • Opcode Fuzzy Hash: d004102cacb7241c7375ee508194f9b6a3815a53621b4e6e172c2cfc14b22e3e
                    • Instruction Fuzzy Hash: C411DF7080A2288FDBA5DF64C88ABEDBBB1BF49320F1451EAD449A3241CB704AC0CF04
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,jq
                    • API String ID: 0-1538246120
                    • Opcode ID: 3e9d408e5df6eec49ec5dd615dd73af5025d5e7ea46e78d53d75afa1fef56fa5
                    • Instruction ID: f0e56e9f7e9b42ddb9931ceb01f91a613b4f2f70f1b4b6d789e4bbd172f10a96
                    • Opcode Fuzzy Hash: 3e9d408e5df6eec49ec5dd615dd73af5025d5e7ea46e78d53d75afa1fef56fa5
                    • Instruction Fuzzy Hash: 3552FA75A002288FDB64DF69C981BDDBBF6BF88300F1541D9E549AB391DA309E81CF61
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: (_fq
                    • API String ID: 0-931642571
                    • Opcode ID: 2d7515c6ab30607357bc530ab6b9d1e6fe53c313f479f9119f01c68255260897
                    • Instruction ID: ac15089d2f215e60868eadf67dea1a17014f68723c63f4468260fcd93cc9b252
                    • Opcode Fuzzy Hash: 2d7515c6ab30607357bc530ab6b9d1e6fe53c313f479f9119f01c68255260897
                    • Instruction Fuzzy Hash: 07226E36A002149FDB04DF69D490AADBBF6FF88314F15806AE9469F395DB71ED40CBA0
                    APIs
                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 05EFF807
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: c8bd492970b508e67ac6b27684024bcfde27fbe9e0cb4ffa74ff92b8e709fce5
                    • Instruction ID: e7604c00ded3bcf4a5b69c16ea1a89a5c83b3ac56b041219720cbc8321c848d6
                    • Opcode Fuzzy Hash: c8bd492970b508e67ac6b27684024bcfde27fbe9e0cb4ffa74ff92b8e709fce5
                    • Instruction Fuzzy Hash: 01A136B1D00259DFEF20CFA9C945BEDBBB1BF09314F10A169D869A7290DB748985CF81
                    APIs
                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 05EFF807
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: ee66506cbf35974c83580ed1e59b8818a9fbca85c3ad8caad776cb8f014b2ad0
                    • Instruction ID: 7a65c16c5c97c9c27b19a0be851afc3a92cb8872944c0f384ddf3f057476b017
                    • Opcode Fuzzy Hash: ee66506cbf35974c83580ed1e59b8818a9fbca85c3ad8caad776cb8f014b2ad0
                    • Instruction Fuzzy Hash: A5A12571D00259DFDF20CFA9C845BEDBBB1BF09314F10A169E869A7290DB748985CF81
                    APIs
                    • CopyFileA.KERNEL32(?,?,?), ref: 05EB1D5B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: CopyFile
                    • String ID:
                    • API String ID: 1304948518-0
                    • Opcode ID: 63e2c206d5db47537fdbee86e8cd0af01270547be5fe46af6a4f76d787272db2
                    • Instruction ID: 1e881a651aa9fb9309e2ac28e8732a3d26f01112393874e2c9fac11f74ce4e95
                    • Opcode Fuzzy Hash: 63e2c206d5db47537fdbee86e8cd0af01270547be5fe46af6a4f76d787272db2
                    • Instruction Fuzzy Hash: 156146B0D00319DFEB18CFA9C9957EEBBF1BB09325F20A129D855A7280D7B48985CF41
                    APIs
                    • CopyFileA.KERNEL32(?,?,?), ref: 05EB1D5B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: CopyFile
                    • String ID:
                    • API String ID: 1304948518-0
                    • Opcode ID: ed96e5f18d87c4dd4f06c7526599eaf1aa4d461ae00583697095c7fcec8fa257
                    • Instruction ID: 3b3d7214af20e8f10b638ebb16f9d09649b83cad9657c89b8d270fa303974668
                    • Opcode Fuzzy Hash: ed96e5f18d87c4dd4f06c7526599eaf1aa4d461ae00583697095c7fcec8fa257
                    • Instruction Fuzzy Hash: B66145B0D00358DFEB18CFA9C8957EEBBF1BB09325F20A129D855A7280D7B49985CF41
                    APIs
                    • RegSetValueExA.KERNEL32(?,?,?,?,?,?), ref: 05EB2220
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: Value
                    • String ID:
                    • API String ID: 3702945584-0
                    • Opcode ID: 6177efee519a726f201407951991d6ac3ec2e54cd7b46eccf93eff6c73778871
                    • Instruction ID: 7b71ee4a46dbf6d2266d09549e4757619192a44fd54fc4ff140a497883b9d032
                    • Opcode Fuzzy Hash: 6177efee519a726f201407951991d6ac3ec2e54cd7b46eccf93eff6c73778871
                    • Instruction Fuzzy Hash: 6951EFB4D002199FEF10CFA9D985BDEBBB1BF09314F10A12AE958B7250DB749945CF44
                    APIs
                    • RegSetValueExA.KERNEL32(?,?,?,?,?,?), ref: 05EB2220
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: Value
                    • String ID:
                    • API String ID: 3702945584-0
                    • Opcode ID: 03b84266361ba8d89c1068963a2a33fa7ec6b8a387089e4ecd367f0e4980b4fb
                    • Instruction ID: 170c04aa1a62c21c3a4c355833e459bb463ad36e8a7b027e1e1bea2ab112cca1
                    • Opcode Fuzzy Hash: 03b84266361ba8d89c1068963a2a33fa7ec6b8a387089e4ecd367f0e4980b4fb
                    • Instruction Fuzzy Hash: 4B51EFB4D002199FEF20CFA9D985BDEBBF1BF49304F10A02AE958AB240DB749945CF44
                    APIs
                    • RegOpenKeyExA.KERNEL32(?,?,?,?,?), ref: 05EB1FB0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: Open
                    • String ID:
                    • API String ID: 71445658-0
                    • Opcode ID: 12857f68c51148ea24dd859a7f436db567b5aec971d4c2f4b073e8b4fa1c53d7
                    • Instruction ID: 6caf8293b0296d6b5c7e7a950cfa1ca990e0d4d33fd7a50877204730cb46ac96
                    • Opcode Fuzzy Hash: 12857f68c51148ea24dd859a7f436db567b5aec971d4c2f4b073e8b4fa1c53d7
                    • Instruction Fuzzy Hash: B05100B4D002199FEF14CFA9D985AEEBBF1BF09314F20A12AE859B7250D7749845CF44
                    APIs
                    • RegOpenKeyExA.KERNEL32(?,?,?,?,?), ref: 05EB1FB0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: Open
                    • String ID:
                    • API String ID: 71445658-0
                    • Opcode ID: e4f9618eb2a959c091efa1cac1800e4d221c62547c6dcad36fc15de39e039816
                    • Instruction ID: 3fb199bdab8dd228ddcffc14c973a7acca8fcb1b868fe503d11817ad96f214b0
                    • Opcode Fuzzy Hash: e4f9618eb2a959c091efa1cac1800e4d221c62547c6dcad36fc15de39e039816
                    • Instruction Fuzzy Hash: BC5100B4D002199FEF24CFA9D985ADEBBF1BF09314F20A02AE859B7250DB749841CF45
                    APIs
                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05EB03FC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: 5c1eec52fc0bf444237e0f70d2edaa0a52b04766b0f5c337937583ab7db484ce
                    • Instruction ID: 504b6466dba5031d68ffb4faa33f7e84b645244ae0adadd708ea1aeb2e67fd10
                    • Opcode Fuzzy Hash: 5c1eec52fc0bf444237e0f70d2edaa0a52b04766b0f5c337937583ab7db484ce
                    • Instruction Fuzzy Hash: B831DBB5D002589FDF10CFA9D984AEEFBB1BB19320F24902AE814B7210C779A945CF54
                    APIs
                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05EB03FC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: 672922d90d0d2e9725c65a571ea48a95b0d356d48c0dd5e1671d108d5c8b71d1
                    • Instruction ID: a7caee122ed82194052955e126eff9d86c5b3b7385866f4094995990b97d824d
                    • Opcode Fuzzy Hash: 672922d90d0d2e9725c65a571ea48a95b0d356d48c0dd5e1671d108d5c8b71d1
                    • Instruction Fuzzy Hash: E531CAB4D002589FDF10CFA9D984AEEFBB1BB49320F14902AE815B7210D775A945CF54
                    APIs
                    • VirtualProtect.KERNEL32(?,?,?,?), ref: 05D9D62C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824610975.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d90000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: c63e4a42c66e737101c6cc04964f875d56e210a57a130e454890f315573bf7b3
                    • Instruction ID: 998cbfbd5a21cad123ee81a6e5eb8972ede67223bb442216c3fac1afe012834f
                    • Opcode Fuzzy Hash: c63e4a42c66e737101c6cc04964f875d56e210a57a130e454890f315573bf7b3
                    • Instruction Fuzzy Hash: 3431A5B8D002489FCF14CFA9D980A9EFBB1BB49320F20A02AE818B7310D735A945CF54
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: fb859a16c1f4622b9c17a7b69d7a71526e44f6ee1fdf3e1f2a9a375991705ab6
                    • Instruction ID: b435c2022131888032ae77a8aaaf19e2134cef5b9a280761e802470f6c02035b
                    • Opcode Fuzzy Hash: fb859a16c1f4622b9c17a7b69d7a71526e44f6ee1fdf3e1f2a9a375991705ab6
                    • Instruction Fuzzy Hash: 7431CAB5D012589FCB10CFAAD981AEEFBF5AB49320F14942AE815B7340C739A945CF64
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 47aa3e3db064080ba18b4ac90fc1b26232bc5ed92169aa803919c7aa6fa8c1a8
                    • Instruction ID: 87a094705eba7558bab72369ae12d5729c0ed95f1699cc3ecd313f6033c0d6a9
                    • Opcode Fuzzy Hash: 47aa3e3db064080ba18b4ac90fc1b26232bc5ed92169aa803919c7aa6fa8c1a8
                    • Instruction Fuzzy Hash: B731CAB4D012589FCB10CFAAD980AEEFBF5BB49320F14942AE815B7340C739A945CF54
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: 5ac94d972474a3ee4a27691fbb395d41b626e348c59d1a0610d11a73e589090e
                    • Instruction ID: 2582252ab2451fd57352eac28635742cdb1fa506040b409a32231c1987712ce2
                    • Opcode Fuzzy Hash: 5ac94d972474a3ee4a27691fbb395d41b626e348c59d1a0610d11a73e589090e
                    • Instruction Fuzzy Hash: EFA1EC35B10218DFCB04DFA4D898AADBBB6FF88304F559569E446AB365DF30AC42CB50
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: \sfq
                    • API String ID: 0-3800904836
                    • Opcode ID: edf8ff5c19b36b78fb71abc8986a0b84b82fe1dfc1d7b23af5c254e738d357be
                    • Instruction ID: a6bcdef413d435b54c27d90f85738501c21597429ea56ac7f9128f97826e3ad6
                    • Opcode Fuzzy Hash: edf8ff5c19b36b78fb71abc8986a0b84b82fe1dfc1d7b23af5c254e738d357be
                    • Instruction Fuzzy Hash: C5510978E0020ADFDF10DFA9D980AEDBBB1BF88314F206659D401FB251DB359941CB64
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq
                    • API String ID: 0-3225323518
                    • Opcode ID: 063c7d9df578b8f4592cea9fbe33320960128398174757992a9cd7a1d718bba5
                    • Instruction ID: ed730fa28635c3a7c878caa5ac3c9582897c6f50e8d359108c889700407f40d4
                    • Opcode Fuzzy Hash: 063c7d9df578b8f4592cea9fbe33320960128398174757992a9cd7a1d718bba5
                    • Instruction Fuzzy Hash: 6F418E32604254AFCB099F68D854E597FB6FF89310B1580A5E605CF3B2CA32DC11DB61
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3916222277
                    • Opcode ID: 9220b3937789a979e68e92ece7604bfcc305d8d18bbb77d4bb8d6e63d5280669
                    • Instruction ID: 837932dc51d68dc49f8be20a0a3143eb7794d4be8085ca34af4f077ff10766ae
                    • Opcode Fuzzy Hash: 9220b3937789a979e68e92ece7604bfcc305d8d18bbb77d4bb8d6e63d5280669
                    • Instruction Fuzzy Hash: 3851BF71E042558FCB10CFA9D8806AEBBB2FF85311B69C57ED118DB646C330E952CB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: 98c4a42982735c126a5ec205cfd3bfcc71b65a0a0e937a1ac66987391a4bf81a
                    • Instruction ID: 3ff4f83c54a358c3ac95c8faedc93cf40ad4632285af8d2e14c4f46f90813dad
                    • Opcode Fuzzy Hash: 98c4a42982735c126a5ec205cfd3bfcc71b65a0a0e937a1ac66987391a4bf81a
                    • Instruction Fuzzy Hash: FF417035B102148FCB05AB78C494AAE77BBAFC9600F105569E042EF795CF74AC46CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: pjq
                    • API String ID: 0-551751012
                    • Opcode ID: a8bc3e219487bc260c4ca830bfc7b0526d67b792e1d016c3c462c7362231df7f
                    • Instruction ID: 2bd7d6b5418a6e34c4e1ed8ebc4d0c14bd754d97424d995c6284e18b2d8e2758
                    • Opcode Fuzzy Hash: a8bc3e219487bc260c4ca830bfc7b0526d67b792e1d016c3c462c7362231df7f
                    • Instruction Fuzzy Hash: A641C776600110AFCB469FA8D944D5A7FF6FF8C31471A8098E2099B376DB32DC21EB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: TJkq
                    • API String ID: 0-3106782265
                    • Opcode ID: 01a029cfeb8b9546c2f9ffdd25b8ce38a2d131909534b92a9a50ecfe9798db42
                    • Instruction ID: 30b2bdc16d2d8c38e05d4995411a42c05745bd95bd91ca14668548f0c2f0821e
                    • Opcode Fuzzy Hash: 01a029cfeb8b9546c2f9ffdd25b8ce38a2d131909534b92a9a50ecfe9798db42
                    • Instruction Fuzzy Hash: C951D1B4D01208DFCB54DFA9D5486AEBBF2FF88314F20842AE516A3350DB346986DF54
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq
                    • API String ID: 0-3225323518
                    • Opcode ID: 8ac53e3e31365f5b213be4d22ea3342ba84be1e98728abb65fed504d1275663f
                    • Instruction ID: eda68c039a37853ca2d512f373f2ffb698dc5272df7a6880d5c7ace695d91711
                    • Opcode Fuzzy Hash: 8ac53e3e31365f5b213be4d22ea3342ba84be1e98728abb65fed504d1275663f
                    • Instruction Fuzzy Hash: 9B41DE76A00616CFDB00DF68C48896AFBF1FF49324B259659D569AB381D730F852CBD0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: TJkq
                    • API String ID: 0-3106782265
                    • Opcode ID: 9015309eb994061856a5599f2ac0d605a77dc00c974e64c7b9cab5d6ab98df56
                    • Instruction ID: 3f0d7f6180aceef9ccb29d86b304d655613c3e365dd1f3be603dbf64ba4af9b0
                    • Opcode Fuzzy Hash: 9015309eb994061856a5599f2ac0d605a77dc00c974e64c7b9cab5d6ab98df56
                    • Instruction Fuzzy Hash: CA41A0B4D01208DFCB54DFA9D5486AEBBB2FF88314F20842AE516B3350DB346986DF54
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,jq
                    • API String ID: 0-1538246120
                    • Opcode ID: f8c0a36308dfd542f9ec90a669553416a383de7de136ac3248cc8900c310e3c8
                    • Instruction ID: 268b9516b6c15e7e51cdcae587046f6886a13bde3a91bdb6470255fb009740ba
                    • Opcode Fuzzy Hash: f8c0a36308dfd542f9ec90a669553416a383de7de136ac3248cc8900c310e3c8
                    • Instruction Fuzzy Hash: 84417B357002048FCB19EF79C8949AEBBF2EF85350B158469E9469F361DB30ED41CBA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: aa624fb3153ba13db30c8487a7387079fce407a310bdda066b4ab4f5a44ff798
                    • Instruction ID: b317a01b6eec96a44b94617d776aebd76d41351d79b0a58c700e091ddda99cf8
                    • Opcode Fuzzy Hash: aa624fb3153ba13db30c8487a7387079fce407a310bdda066b4ab4f5a44ff798
                    • Instruction Fuzzy Hash: 40415A723006109FD308DB79C999F2A7BA6AFC8704F105468E24A8F3A1DE75EC42C790
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: 82d95e681ebc1567b9778a02105dde14211d4339c99122f8c9a34459ebf4acd6
                    • Instruction ID: d783cf8eea3612d787c3f00c84b11ef54a8c232136f766ee4925fb7fcbcfe9d1
                    • Opcode Fuzzy Hash: 82d95e681ebc1567b9778a02105dde14211d4339c99122f8c9a34459ebf4acd6
                    • Instruction Fuzzy Hash: 15313B753006149FD308DB79C999F6A77A6AFC8704F105468E64A8F3A1DE71EC42C791
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq
                    • API String ID: 0-3225323518
                    • Opcode ID: 416dd4b7f60bd861e01bd290636d178d314f68b9b652e78f1ce749d8f184a590
                    • Instruction ID: 2adddbcb3c0d2778672abaa6413c3727b5234ec69d8f8873ad9b5d3eb5455cd0
                    • Opcode Fuzzy Hash: 416dd4b7f60bd861e01bd290636d178d314f68b9b652e78f1ce749d8f184a590
                    • Instruction Fuzzy Hash: 6021F2363041159FDB199F69E884AAE7B67EFC9324F54403AF945CB251DE71AC01C7A0
                    APIs
                    • VirtualAlloc.KERNEL32(?,?,?,?), ref: 05D9E7EF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824610975.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d90000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 1e50dffce2a963733c3a70c453e4a62109b886b40af94de71a0a925084b8a307
                    • Instruction ID: 7e22447b693f5ac3370057bb1be56aebaca4429762dd5088325ededccb46fbda
                    • Opcode Fuzzy Hash: 1e50dffce2a963733c3a70c453e4a62109b886b40af94de71a0a925084b8a307
                    • Instruction Fuzzy Hash: 5731A7B8D002589BCF14CFA9D880ADEFBB5EB49320F20942AE814B7310C735A945CF94
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: 10c9fa3d222af8577005c93c388ac158033037651246c484c5ca9bb628006b56
                    • Instruction ID: 0279621ca3ffed5821b2d10d39de1b35348b79a819e2285cd76f1fdd9e69ab22
                    • Opcode Fuzzy Hash: 10c9fa3d222af8577005c93c388ac158033037651246c484c5ca9bb628006b56
                    • Instruction Fuzzy Hash: 69317136A001049FCF089FA5D895D6DBBB7FF88310B0550A9EA469B361DE32EC52CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: Tefq
                    • API String ID: 0-1066582953
                    • Opcode ID: 2c38d68bac4cc2c5d16c44319d5297e8a4a15ba3a64fac8f21c07785aadaca44
                    • Instruction ID: 5198de97ca8ccefa8ada3ccf842dd1d14b862f173f8725f2830addfc19a0b8ed
                    • Opcode Fuzzy Hash: 2c38d68bac4cc2c5d16c44319d5297e8a4a15ba3a64fac8f21c07785aadaca44
                    • Instruction Fuzzy Hash: 5531D5707041409FCB459B79C498AAEBFF3EF85300B25449EE545EB3A5CE358C05CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1823685044.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5c80000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: f634f5124dd69956a145ce5a6af250e27a931cf366b6bd57d305dafff1180233
                    • Instruction ID: 47baf1ee3305af3df0f459409235df981408c8c5c5a1eeb1efb9cd7135a792fa
                    • Opcode Fuzzy Hash: f634f5124dd69956a145ce5a6af250e27a931cf366b6bd57d305dafff1180233
                    • Instruction Fuzzy Hash: 68318E74D04209CFDB05EFAAD4486FEBBB1FF45309F04886AD015A7291D7385A89CF91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: p<fq
                    • API String ID: 0-1940909823
                    • Opcode ID: 57b7a7a62644edc4379a6edd8da6df718b78462d5ec49450d5ae0c68991b1053
                    • Instruction ID: a431e5394bbb0320bada3f4eef433522dfbe41e92b98b8bf594ae30711af37ea
                    • Opcode Fuzzy Hash: 57b7a7a62644edc4379a6edd8da6df718b78462d5ec49450d5ae0c68991b1053
                    • Instruction Fuzzy Hash: 41213C763041949FDB06CF3AC840EAA7BEABF8A244B055095F885CB2A1DA71EC50DB20
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: p<fq
                    • API String ID: 0-1940909823
                    • Opcode ID: de1f57b5b50475f767821199145f1ad58fa56268ca27a4933b0d19081d41e8fb
                    • Instruction ID: fb53b2fec5e0adf811c6550645aac69830b90ed3f3632d53b5c049e38bbb4d20
                    • Opcode Fuzzy Hash: de1f57b5b50475f767821199145f1ad58fa56268ca27a4933b0d19081d41e8fb
                    • Instruction Fuzzy Hash: 2B215E763041949FDF06DF3AC884DAA7BEABF8A254B445055F885CB3B0DA71EC51DB20
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: Tefq
                    • API String ID: 0-1066582953
                    • Opcode ID: b3985c9815f608cca7a2cf35304841c22543af004f797ffb4404094d6cef6f23
                    • Instruction ID: d8de9b9a45d9dd91dece6d969e84660e953bed96d6ddf657e5af85ce99e0fe49
                    • Opcode Fuzzy Hash: b3985c9815f608cca7a2cf35304841c22543af004f797ffb4404094d6cef6f23
                    • Instruction Fuzzy Hash: 0B218E70B001518FCB05EB7DD4A8A9EBBF2EF89714B25449DE001AF3A5CE748C46CB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: Tefq
                    • API String ID: 0-1066582953
                    • Opcode ID: cf108703b488c91fa031caa65ea3da0fb3a3c9f2e4f5893448b96a10663bcbbc
                    • Instruction ID: 09ac356e5a848fd8252684e3a65735755b1b13ae2f0e7b0c8856f0c880f4ce14
                    • Opcode Fuzzy Hash: cf108703b488c91fa031caa65ea3da0fb3a3c9f2e4f5893448b96a10663bcbbc
                    • Instruction Fuzzy Hash: B1219D707001059FCB44EBB9C498AAEBBF7EF89700F61846DE506AB3A5CE749C458B90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,jq
                    • API String ID: 0-1538246120
                    • Opcode ID: fdc4b627c5ec39735c87a53e9849baeae06333ebb42fcb59c64401c7ba842fee
                    • Instruction ID: 34b68c055269e096b1b1be3105bccb76c15f359e219b5ccf17d6cb60c3355070
                    • Opcode Fuzzy Hash: fdc4b627c5ec39735c87a53e9849baeae06333ebb42fcb59c64401c7ba842fee
                    • Instruction Fuzzy Hash: 12115B79B001059FCB08EFB9C9949AEBBB6EF89341F158069E9419F365DB30ED01CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,jq
                    • API String ID: 0-1538246120
                    • Opcode ID: a652b92b00e91c8df3b34fc6d2fd72e55197bd0b4f8751a75c62a4140fe912a9
                    • Instruction ID: d5621083abf4004ddac6a1a2a074fb75d6e6911a6b9753806b519cd23ec03d33
                    • Opcode Fuzzy Hash: a652b92b00e91c8df3b34fc6d2fd72e55197bd0b4f8751a75c62a4140fe912a9
                    • Instruction Fuzzy Hash: 39116D79B00115CFCB04DFA9C994A6EBBB6AF94341F158069E941AF365DB30EC01CB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: \sfq
                    • API String ID: 0-3800904836
                    • Opcode ID: 611f0a08406d68a3269f0e3b3e849269594aca05f3e483a21498775b216d9a94
                    • Instruction ID: f0e8932eb93c2968e82d7d6c1503fadc86ac01edf079fc3e41d43bdc7e35b91d
                    • Opcode Fuzzy Hash: 611f0a08406d68a3269f0e3b3e849269594aca05f3e483a21498775b216d9a94
                    • Instruction Fuzzy Hash: AA01BCB13045218FD725CB3DD85092A3BF5AF8971032185FEE40ADB2B3DA61CC018BA0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: I
                    • API String ID: 0-3707901625
                    • Opcode ID: 1660b410fd928d7dc858ae657eaee246ae3e2abf97ebad7a15b09856aed2e311
                    • Instruction ID: 2b9a147f11495e1bd6137e41d109b29705d3ab141bc9e7ea097e216f2e3c1ca9
                    • Opcode Fuzzy Hash: 1660b410fd928d7dc858ae657eaee246ae3e2abf97ebad7a15b09856aed2e311
                    • Instruction Fuzzy Hash: 0A21AFB4A04628CFDBA0DF28CC88B9ABBB1FB49202F0045EBD50DA7250DB305E84CF11
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: o
                    • API String ID: 0-252678980
                    • Opcode ID: 973a89115ea6e7ed71293384b8110e1e43dc6fcfa2cae5d63f06ffe567e1a1d2
                    • Instruction ID: ab658d2510fa1585c87bd058dc60b45c0b0d33144f2e7c806d947c02d166c610
                    • Opcode Fuzzy Hash: 973a89115ea6e7ed71293384b8110e1e43dc6fcfa2cae5d63f06ffe567e1a1d2
                    • Instruction Fuzzy Hash: FB01EF74909218CFDB65DF64D88ABADBBB1BB0A314F1450EAD40DA3242C7314988CF15
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: o
                    • API String ID: 0-252678980
                    • Opcode ID: 99285391d8f35b10f9f0aa76631da75018d399b6592379a10576bc3a200326ea
                    • Instruction ID: 4820daa33e978f6ad0eeeb1fcf0e9bf173d2311ef6fbdc7984790f942f035209
                    • Opcode Fuzzy Hash: 99285391d8f35b10f9f0aa76631da75018d399b6592379a10576bc3a200326ea
                    • Instruction Fuzzy Hash: 42F0CF709152188FDBA0DF28C889B9DBBB1BF0A324F5041EAD41CE7292C7304D84CF11
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: .
                    • API String ID: 0-248832578
                    • Opcode ID: 506d6d4ccb5aea3d03ecec301982311cfb7edd9c3f21bf59d35d69ea81ec8b8b
                    • Instruction ID: ae1560e20335297974e02595818993f5180488ba747aff15516b4f8a7cf67b09
                    • Opcode Fuzzy Hash: 506d6d4ccb5aea3d03ecec301982311cfb7edd9c3f21bf59d35d69ea81ec8b8b
                    • Instruction Fuzzy Hash: 24D05BF46143188FDB50EF35D88465E7772F745300F10455AC15997344DE304D858F56
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 519d7348d783172f444773872d6ba911e4c43bf4c9ec7217d81fb67dc4ba0532
                    • Instruction ID: 9b1e3892bff5d85eee4a5c3fdd64fe820de0f3dd752580230851c02b0ccdb870
                    • Opcode Fuzzy Hash: 519d7348d783172f444773872d6ba911e4c43bf4c9ec7217d81fb67dc4ba0532
                    • Instruction Fuzzy Hash: 90120835A002188FCB14EF74C994BADB7B6BF89304F5195A8E48AAB355DF30ED85CB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 65c607e877fd6b5663d448708b853ea3ded6e02e02c1a670103a836efd719524
                    • Instruction ID: 73000bc4f668978fa990cd8de09a163428c5e8ffeadf77e384a5132635f996a0
                    • Opcode Fuzzy Hash: 65c607e877fd6b5663d448708b853ea3ded6e02e02c1a670103a836efd719524
                    • Instruction Fuzzy Hash: 65918D36B012049FDB19DFA5D485AADBBF2FF88315F14806AE5829B390CB35ED45CB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: de36b887f6cbf5068f843852d4d4ce1dd6bd8217881f959523763c3bddf6c478
                    • Instruction ID: d11fc853c9438b76aeb2daf3b58ff9d449f63f01c6a9aec09c3fc9171fc73a07
                    • Opcode Fuzzy Hash: de36b887f6cbf5068f843852d4d4ce1dd6bd8217881f959523763c3bddf6c478
                    • Instruction Fuzzy Hash: 0AA1F778E05219DFDB04DFA8D4866EEBBB2FF49314F10402AE546AB344DB349985CF61
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8d3a57725295dc0b47cef7a862196f0760b13aca934b3d1acb174a72eefc80b3
                    • Instruction ID: 5ae5206830a85dd03ce408018c0abf28b5778813df50463ab89e2b06d8e1639a
                    • Opcode Fuzzy Hash: 8d3a57725295dc0b47cef7a862196f0760b13aca934b3d1acb174a72eefc80b3
                    • Instruction Fuzzy Hash: E8A1E735B002148FDB14DF74C898BADBBB6BF89304F5195A8E48AAB355DB30AD85CF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 07a01677c1569b01d060f3ef51d48181d97fd7abb2e102bc1fa8dc49a21188fb
                    • Instruction ID: 9e49ae57ad53566791ce92e9a9cf9130b38abf5087c9ce0fde0f42242cc1b045
                    • Opcode Fuzzy Hash: 07a01677c1569b01d060f3ef51d48181d97fd7abb2e102bc1fa8dc49a21188fb
                    • Instruction Fuzzy Hash: 48A1C176E046698FDF11DFA1C440AFDBBB2FF48308F148016E892AB295DB74A946CF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80c29c5b40e7f5e39917b44210d8146287d7965680f5069504e12c3ebe35bd1f
                    • Instruction ID: 226303d10eb5d5c8529ba944f47eb4779cf65d89e89594cd90a57d748e7d5ace
                    • Opcode Fuzzy Hash: 80c29c5b40e7f5e39917b44210d8146287d7965680f5069504e12c3ebe35bd1f
                    • Instruction Fuzzy Hash: 028138357102149FCB04DF68D498AADBBB6FF89710F1091A9E546DF3A5CB74AC42CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0c20205b14077c4b83a370681391d431ea005de391757612ecdb55dbf5a061c7
                    • Instruction ID: 98eb1d134fa706a907016b6b5dfb7febd1ce071b85328314334076cc99fb9fbf
                    • Opcode Fuzzy Hash: 0c20205b14077c4b83a370681391d431ea005de391757612ecdb55dbf5a061c7
                    • Instruction Fuzzy Hash: 45A1AD35A11208DFCB04EFA4E4949AD7BB6FF89310F509569F842AB365DF30AD42DB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0bdd09cd0ee49741e67eabb8c621f7b7881156d57ee8fbe5199390ad4d91b80a
                    • Instruction ID: 3307c4d6bee9c8e03b570730d26e12cd826dd1cb54a18827058a62eaf0c83227
                    • Opcode Fuzzy Hash: 0bdd09cd0ee49741e67eabb8c621f7b7881156d57ee8fbe5199390ad4d91b80a
                    • Instruction Fuzzy Hash: AB812976A00514CFCB14DF68C48499EBBF6FF89314B199069E8469B365DB30FD42CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: df186204b4af15da04c5a6bc472a5d87ad36aa9287dd9e972a055f894372d495
                    • Instruction ID: 50226fb9515273935bbae5a63a9155605f53523c8b87f9161bc1ae9e8f6ed2c3
                    • Opcode Fuzzy Hash: df186204b4af15da04c5a6bc472a5d87ad36aa9287dd9e972a055f894372d495
                    • Instruction Fuzzy Hash: 3F711578D09218DFDB04DFA8D8466EEBBF2FF49314F10802AE546AB244DB349A45CF61
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fd09dd0e5a13bd31814a55f56b8d52b3595130ebb0a4a760cfe6523b51d5c387
                    • Instruction ID: 34564e1383a65d4dea05f2bc0a43f5c7e40bef7a844fb246de5b043e645f4c40
                    • Opcode Fuzzy Hash: fd09dd0e5a13bd31814a55f56b8d52b3595130ebb0a4a760cfe6523b51d5c387
                    • Instruction Fuzzy Hash: D8611835B102149FCB04DF68D498AADBBB6FF88700F1491A9E5469F365CB30EC42CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 12720b5a71843e42c528908cd5aa62a31294e3d85b6ee8948ccdaff53e61a874
                    • Instruction ID: c143104e978e34d9f3918e9cd3a74c24ffa4f2b977483c17b458b33528853c88
                    • Opcode Fuzzy Hash: 12720b5a71843e42c528908cd5aa62a31294e3d85b6ee8948ccdaff53e61a874
                    • Instruction Fuzzy Hash: 5071C374D09218DFDB20DFA9C98ABADBBF2FB45304F14806AD409AB255DBB4D984CF41
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 82401b4978f0c57cbf2a58363676d49ab4ecfe138f823d68f8e0b69951e75be9
                    • Instruction ID: 895000f32675a6125f9833a75aa97fa34e37b20426960d0b6353b919da75c854
                    • Opcode Fuzzy Hash: 82401b4978f0c57cbf2a58363676d49ab4ecfe138f823d68f8e0b69951e75be9
                    • Instruction Fuzzy Hash: A4519078D04219DFCB44DFA9D885AEDBBB2FF49300F10846AE456AB350DB749945CFA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 82dfd237c008387de74c6214ea0b874f3c46969581e401783fe9d03c536002aa
                    • Instruction ID: c16b4cd269336f4f623dc2f046a3f5af450e2aea9a52e93be5d2df9830c7d9ed
                    • Opcode Fuzzy Hash: 82dfd237c008387de74c6214ea0b874f3c46969581e401783fe9d03c536002aa
                    • Instruction Fuzzy Hash: 91517134B105099FCB04EF65E458AAEBBB6FFC8704F00812AF5429B364DF34A946CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 519ad217d491ba98af2b214a9455bc74328cb636702dfb90d81951b303d4ac93
                    • Instruction ID: c798afa35b9d5ed345f016e3b102b1d976c25b5d5d1dc51cd95a1bdb92a6f2bf
                    • Opcode Fuzzy Hash: 519ad217d491ba98af2b214a9455bc74328cb636702dfb90d81951b303d4ac93
                    • Instruction Fuzzy Hash: 90415A72B083948FC7069B38A8596AE3FB2DF86310F2505ADD545DB393EE344C0A87D1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0b6478c62a408b06844659ced8db41a517f92a10f2bb425063859a92df59225e
                    • Instruction ID: 4f59ea9175b5b38cbcab9a8cc9de81be1d8747946868f3cce596ab938225aabe
                    • Opcode Fuzzy Hash: 0b6478c62a408b06844659ced8db41a517f92a10f2bb425063859a92df59225e
                    • Instruction Fuzzy Hash: 3F519078D04219DFCB44DFA9D885AECBBB2FF49310F10846AE456AB350DB309945CB60
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 909f9828ad42697114c2d220b0f2d1d156f5f768d4f62d36fadab988236cdb49
                    • Instruction ID: e7ee7b94316e8e3ea0cdf957030f6850d20683852485096a331e54802ba0d282
                    • Opcode Fuzzy Hash: 909f9828ad42697114c2d220b0f2d1d156f5f768d4f62d36fadab988236cdb49
                    • Instruction Fuzzy Hash: F1519178D04219DFCB44DFA9E885AACBBF2FF49314F10846AE456AB360DB309945CF60
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d927fe450c7202f1e4d21d52259e60be5a2e3cc2b7edc9d0fd20fe75ca6f1c5d
                    • Instruction ID: 3bc85863f3985f41be0f7209a65e4ec9af144afe3a6486815fbdeb5dc485e723
                    • Opcode Fuzzy Hash: d927fe450c7202f1e4d21d52259e60be5a2e3cc2b7edc9d0fd20fe75ca6f1c5d
                    • Instruction Fuzzy Hash: AD51C370E01208DFDB58DFB9D995A9DBBF2BF89305F20802AE406AB364DB319941CF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8c3cb2439bf549dfcf501c70f6f1ccc803f0cba48b44302a1e653053fd08bdc8
                    • Instruction ID: b6a356abe578446e43b4eacedfc2d13b98fc97d0c95bf0c9126563f0da748343
                    • Opcode Fuzzy Hash: 8c3cb2439bf549dfcf501c70f6f1ccc803f0cba48b44302a1e653053fd08bdc8
                    • Instruction Fuzzy Hash: EF31C4767006009BDB15EB38D494A7A77A7EFC9325324A829E49ACF351EF30EC42C790
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 96f13c389466e823a78aed98bba59dbb7bfc07018de478a33ee2078d331ced66
                    • Instruction ID: 5676fad03449edd8cf4e5c19b4f3c4713b57d8febb7a1403f4934dc54e5042a3
                    • Opcode Fuzzy Hash: 96f13c389466e823a78aed98bba59dbb7bfc07018de478a33ee2078d331ced66
                    • Instruction Fuzzy Hash: 8241C670D01208DFDB58DFB9D994A9DBBB2BF89305F20852AD41AAB364DB319941CF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e77c6de832fac858bb239986f1b404cb21349f37ac3c88e479be2728597a73e2
                    • Instruction ID: 9a0044e84fcae62107234903e61a8513487e458b6881929de515e4aeab1203dc
                    • Opcode Fuzzy Hash: e77c6de832fac858bb239986f1b404cb21349f37ac3c88e479be2728597a73e2
                    • Instruction Fuzzy Hash: 5A31D2366101049FDB05DF69D888EA9BBB2FF48724B1680A9F5099F372CB31EC55DB80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f200047aeea8b3d75e8c0ed1c9541bee750e1804d973487bf7127bd459089600
                    • Instruction ID: 5684c31ad5188e02ea13649a166953f852e459ce6d688aadb2d24606174d2f9f
                    • Opcode Fuzzy Hash: f200047aeea8b3d75e8c0ed1c9541bee750e1804d973487bf7127bd459089600
                    • Instruction Fuzzy Hash: D8419072A002158FDB18CFB5D944ABEBBB2FF44754F0085AAE496EB254D730E945CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c6f941dd65501f3bdd7776b8beaf27244de31d417026b80e38533077370b588d
                    • Instruction ID: c62d125b31044e3d5d86911993d5664847b6c283cc205d314c638a9ed6e3da51
                    • Opcode Fuzzy Hash: c6f941dd65501f3bdd7776b8beaf27244de31d417026b80e38533077370b588d
                    • Instruction Fuzzy Hash: 0041D4B0E15208DFDB44EFA9D945BEEBBF2BF88340F10802AE405A7360D7B499408F50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 70762224e8aaa08522dcb2d32ce1b53391631559887e620f85d50a6e7cb7a477
                    • Instruction ID: f3e542776919002a978bbc85157c92d4d88f9d1a78237a9760560dedcbd5bddf
                    • Opcode Fuzzy Hash: 70762224e8aaa08522dcb2d32ce1b53391631559887e620f85d50a6e7cb7a477
                    • Instruction Fuzzy Hash: 5C318F3AA001089BDF04DFA4D855BEEB7B2FF88310F109125E955BB394DB31AD51CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: adf2fd8f0bffc1560dbfbd0e541d736c73d04e474b7fdc578010f2a814cec10a
                    • Instruction ID: 363929dfce217eaea771692e0ea3f2d873c465b3cb96c5a71874bbfea6cbe489
                    • Opcode Fuzzy Hash: adf2fd8f0bffc1560dbfbd0e541d736c73d04e474b7fdc578010f2a814cec10a
                    • Instruction Fuzzy Hash: 2A41D4B4D09219DFDB20DFA9C84ABADBBF2FF48304F14816AD409A7255DBB49980CF40
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1bc662e1f24bdb901fa543d2ec3ef031fcb6a9b4e1880d7524f1df2bec6b5468
                    • Instruction ID: d13968feb503a8d52b908d19aca25f363f4bc424d9efe6642d227d7c50779d56
                    • Opcode Fuzzy Hash: 1bc662e1f24bdb901fa543d2ec3ef031fcb6a9b4e1880d7524f1df2bec6b5468
                    • Instruction Fuzzy Hash: AF31D2B4E0420ADFDB04DFAAD8856EEBBF2FB88304F108466D519A7354D77899468F50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3fed5ae85eff8c1c3f8d39ae066a40e6cb00fb3332febee6380aa780c3b9353c
                    • Instruction ID: 3c924eea0dffd5c8bd39ac377c726162b0b9e03aafb683510fb9f4ac31255641
                    • Opcode Fuzzy Hash: 3fed5ae85eff8c1c3f8d39ae066a40e6cb00fb3332febee6380aa780c3b9353c
                    • Instruction Fuzzy Hash: D4318E35700211DFCB299F35D48496ABBB6FF89309B10486DE8868B3A5DF31EC46CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: eaf6bb27db14429473892801f03f91f21f6a88144b5248e4864aba35ea54d1be
                    • Instruction ID: 834b7c43cda5657db7af6adda9e78fc8e46af30aeaf6592acccc33fe16e5a379
                    • Opcode Fuzzy Hash: eaf6bb27db14429473892801f03f91f21f6a88144b5248e4864aba35ea54d1be
                    • Instruction Fuzzy Hash: BA218575B00619CFCB00EF78C5849AEB7B5EF89600B10452AD546DB324EF70A946CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a165e296de6d71e7dfff1e7f3a299cde20add015148afe1dfb433b8bbaf03e7d
                    • Instruction ID: 021a25dbcf0c7e9f6112e94d934747ee6468ca8eea85fb64b1763efbf26cea69
                    • Opcode Fuzzy Hash: a165e296de6d71e7dfff1e7f3a299cde20add015148afe1dfb433b8bbaf03e7d
                    • Instruction Fuzzy Hash: C23127B4D042098FDB49DFA9D9083EEBBF2FB89304F109829D614B3240D7744A45CFA6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3c825d9e42bd9639f8ee114a9b231e631a28f9a571de9c6d6c4174a7f78428dd
                    • Instruction ID: e5d82f47d2e6a4e07432bbb70ac17b12a77b267315815cda27c1cd91c4a95ebb
                    • Opcode Fuzzy Hash: 3c825d9e42bd9639f8ee114a9b231e631a28f9a571de9c6d6c4174a7f78428dd
                    • Instruction Fuzzy Hash: 1721B375B006498FCB00EF78C4849AEBBB5EF89200F10426ED545DB361EB34A946CBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 93e2f4b4ec3f642389c6411161ee121615cca071bb3c2f35b9f40eadbbe24102
                    • Instruction ID: 2ba505d2cd1db6a50c109e567a3b261fde895852ede28729a9331e653fffc746
                    • Opcode Fuzzy Hash: 93e2f4b4ec3f642389c6411161ee121615cca071bb3c2f35b9f40eadbbe24102
                    • Instruction Fuzzy Hash: AF215172E00219DFEB10DF74D9047EEBBF5AB48340F209465D955DB250E734DA44CBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ec0b468204944b2ba9230d41f276941b9b8c531fc31e92a7ac695ab8e4229b04
                    • Instruction ID: 11a1b52552c014e44afb0dfb6626468bdced8f31dd3a35033265379b793e9cf5
                    • Opcode Fuzzy Hash: ec0b468204944b2ba9230d41f276941b9b8c531fc31e92a7ac695ab8e4229b04
                    • Instruction Fuzzy Hash: 0D2125B4D04209CFDB48DFA9C4083EEB7F2BB89304F109829D615B3240D7744A44CFA6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807521631.00000000025FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 025FD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_25fd000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e2be254aba19f1ce0b40e27502deb235fa56fd752eb7cc608a30d1d7bc8dbb2c
                    • Instruction ID: f529e1727ede3d72ef3224a6d288cdafa0380d02a586e0ab7f53c699a6375ed0
                    • Opcode Fuzzy Hash: e2be254aba19f1ce0b40e27502deb235fa56fd752eb7cc608a30d1d7bc8dbb2c
                    • Instruction Fuzzy Hash: 032142B2105200DFCB54DF14D9C4B26BF79FB88314F20CA69EA0A0B646D336D806CBA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807521631.00000000025FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 025FD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_25fd000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4f0f6bf3a050e8e52fcde14f5efe4093c0b35b0e34abe1ccf010487c8bdd7182
                    • Instruction ID: 7cc095625104eb61b926d2dcf94128cfd0f0f8aeda7bea6d6eacf27f0ecbbcc8
                    • Opcode Fuzzy Hash: 4f0f6bf3a050e8e52fcde14f5efe4093c0b35b0e34abe1ccf010487c8bdd7182
                    • Instruction Fuzzy Hash: 3C216D7550E3C08FCB13CF24D994715BF71AB46214F2981EBD9858F6A7C33A981ACB62
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 038561e3b538555029941a7c5df1966baa935e6b42e14346d14c24583c4fd3a0
                    • Instruction ID: e634cc7b2927750f7aae256fe7829af1b07e71a6edaba4298d31120232e4985f
                    • Opcode Fuzzy Hash: 038561e3b538555029941a7c5df1966baa935e6b42e14346d14c24583c4fd3a0
                    • Instruction Fuzzy Hash: 6B212876A002098FDB08DF64C585ADDB7F2FF88305F2055A9E445BB3A1CB71AD41CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d95e4352e55a94008027e37e851f09558f87c2e7938b16ca8e195557b1d46940
                    • Instruction ID: 3d01fea7a5d1287c49e6025b2b686f6e0ccc97b5a99dc3b8d7355b513e49cb27
                    • Opcode Fuzzy Hash: d95e4352e55a94008027e37e851f09558f87c2e7938b16ca8e195557b1d46940
                    • Instruction Fuzzy Hash: 2521F370D05619CBDB04DFA9D5087EEBBF6FB88324F20842ED505B3644DB755A84CBA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 77d9a662c9ecee0dfb1e86ed2653c748f62f63e92b58d5e21553e78c9fff892e
                    • Instruction ID: badd0b41d4e004bb8226c1cae031da1ffd3153633e476d69fc79eb1457fa137d
                    • Opcode Fuzzy Hash: 77d9a662c9ecee0dfb1e86ed2653c748f62f63e92b58d5e21553e78c9fff892e
                    • Instruction Fuzzy Hash: E1217CB4E0960ACFCB44DFE9D4416AEBBB2FB48300F10C16AD455A7240D7349A81CF90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 606d5ac7b2a6634db4801d00c585d4d7bd8de4c566c7aeb18673070f3fabcc37
                    • Instruction ID: 973cd084943728ce2dcd834009f858c5a9657a42c3f53fbe93634aee3c8a6c45
                    • Opcode Fuzzy Hash: 606d5ac7b2a6634db4801d00c585d4d7bd8de4c566c7aeb18673070f3fabcc37
                    • Instruction Fuzzy Hash: 8D319278A15228CFEB65DF68C884E99BBF1FB48305F1042E6D919A7351DB31AE85CF40
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d3a3e23e8df57f7ab42e1029634379269965f87d2181c0dc9ed9ab089bae86bf
                    • Instruction ID: ddbb635a0fffdb1a92bbaef2eaa2b95c34339d788e4f85510215424edfe36ef3
                    • Opcode Fuzzy Hash: d3a3e23e8df57f7ab42e1029634379269965f87d2181c0dc9ed9ab089bae86bf
                    • Instruction Fuzzy Hash: D211B6333093005FD7358B79E484A2ABBA5EB84325B16A6BEE09ECB191CB31FC45C750
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b99b9832f3b4a68f6b358dec9f52e17017bc804dbd161901d552c5d5e3420461
                    • Instruction ID: 01399495ce9071c90b64296a29003c981fbe93821ebfa8d942a6d4efe4d82cbb
                    • Opcode Fuzzy Hash: b99b9832f3b4a68f6b358dec9f52e17017bc804dbd161901d552c5d5e3420461
                    • Instruction Fuzzy Hash: 90213935A002099BCB159FA9C8599DE7FB6FF8D324F14812AE815A7390CE759841CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 94918f7343cf1564656e68b03353692aa1e2b9a4e80e79a265d9c1017cb4f8b3
                    • Instruction ID: 8157e42ded19062dffb70ab946a91900a4b931981b65990ba6e3bb096fb6baec
                    • Opcode Fuzzy Hash: 94918f7343cf1564656e68b03353692aa1e2b9a4e80e79a265d9c1017cb4f8b3
                    • Instruction Fuzzy Hash: 3D21F270D44608DFDB44EFB8E4A87ADBBF1EB89304F2489AED205A7241D7344A95DF08
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 44186f3457b7577b8fa09dc5d74b7fad530f6b5c1dea8c6ba0798c6c5fedea1f
                    • Instruction ID: be9d3300184e6443b8e9721bc53e23536b803fb038234dc342e6cb3f3df32cbb
                    • Opcode Fuzzy Hash: 44186f3457b7577b8fa09dc5d74b7fad530f6b5c1dea8c6ba0798c6c5fedea1f
                    • Instruction Fuzzy Hash: 6C215772A002088FDB08DFA4C585ADDB7F2FF48304F205699E085BB3A1CB31AD40CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cc210eabc60e7d45ba49018ac7e4d30184c8e27d6321e76014a80949c2e9c29c
                    • Instruction ID: e53b8c1507c54fc85dc7ecf4fa5f7d31ce4fa302845cc98700bd57e063c5f6d6
                    • Opcode Fuzzy Hash: cc210eabc60e7d45ba49018ac7e4d30184c8e27d6321e76014a80949c2e9c29c
                    • Instruction Fuzzy Hash: F6211F70D44608DFDB44EFB8E0687ADBBF1EB89304F2088ADD209B3240DB344A95CB08
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3792211777632b94b34a2e57aa37927ba05f1f2cfdc7dad3ca227f9de9f0a897
                    • Instruction ID: b1b5ef331c3d889315260edd3b3a1afeef93ce44f1ce1062d3adbc2a329025f5
                    • Opcode Fuzzy Hash: 3792211777632b94b34a2e57aa37927ba05f1f2cfdc7dad3ca227f9de9f0a897
                    • Instruction Fuzzy Hash: F221C0706102045FCB18EB69D8867AE7BF6EBC8304F10492DF04AD7685DEB59D0587F0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cd7414c9f842ee989bc0befe68e004a88e174fd68ea249cc6687b0f54435c71f
                    • Instruction ID: 40a00ac74b5249901f9d3970b86a63ff2f4c4ddbfd3b1a145708ffea312983ae
                    • Opcode Fuzzy Hash: cd7414c9f842ee989bc0befe68e004a88e174fd68ea249cc6687b0f54435c71f
                    • Instruction Fuzzy Hash: 9E216271D05209CFCB94CFAAC8446EEBBF6BB8C314F14842AD614B3240D7340955CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c8d7021f5ace3722a71fedbf95707d6ba8d47fa6adb82e726c11ef3a0b99677d
                    • Instruction ID: f081e5edcf52eb5cf59b0e24df34b627b4dcea8957814d61bf52e3b94dfec792
                    • Opcode Fuzzy Hash: c8d7021f5ace3722a71fedbf95707d6ba8d47fa6adb82e726c11ef3a0b99677d
                    • Instruction Fuzzy Hash: A6113271D0520ACBCF94CFAAC8446FEBBF6FB88310F20842AD615B3200D7345A95CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1ee0ad4b24fb3f4938a3ae29eb3d702855684323272504aa76cc6d54b9b6ccca
                    • Instruction ID: 18f9a939c43967aa70d54ef7b6617783e5f850a13b182904d69a9fe33fd4ddf1
                    • Opcode Fuzzy Hash: 1ee0ad4b24fb3f4938a3ae29eb3d702855684323272504aa76cc6d54b9b6ccca
                    • Instruction Fuzzy Hash: 6D0161323002104B9B14AE7AE48896EB7DBEFC4629314903AE546CF315CE31DC05C7A4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 62f4f39a177c789f604d839191c2ae172b9616fa2d2a715238aa4a767dd1cd6c
                    • Instruction ID: ed24377dfbf8cb170374ad8aa682617204b56c374db22d2ee9aefc0063425f93
                    • Opcode Fuzzy Hash: 62f4f39a177c789f604d839191c2ae172b9616fa2d2a715238aa4a767dd1cd6c
                    • Instruction Fuzzy Hash: BF117376B002549FDF24DB79C859BAA7FF2BB88701F14402AE585DB380DA71E9018BA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b9214ed1b20d0d157854a5b376e6f89437b6c62c56609744924739fe07f99af6
                    • Instruction ID: 13906c6f16089d4a1802da8d05d3b93683c068893917f9433c978950adcb75ac
                    • Opcode Fuzzy Hash: b9214ed1b20d0d157854a5b376e6f89437b6c62c56609744924739fe07f99af6
                    • Instruction Fuzzy Hash: 50216F79A42219AFDB04DFA8D594EADBBF2FF49304F204059E802AB361DB34AD41CF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1187b25e7b1f0bcd789740a87e6cc45fae9ef7eac50365ee898488bb93452d14
                    • Instruction ID: 56d86816ad8832cc4028350c35be73845af1f0a662dba0d3dd3d5fd532142658
                    • Opcode Fuzzy Hash: 1187b25e7b1f0bcd789740a87e6cc45fae9ef7eac50365ee898488bb93452d14
                    • Instruction Fuzzy Hash: BF0128367002008FC7559B7DE855A6E3FF6DFC9320B1540A9E606CB362EE21CC068790
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a822d377d347eea64fb7a4afdc68e95d840bd1ea99dc2cd1b42afaf4f154cc5a
                    • Instruction ID: 6e405ff37a61f623102c31523e87a715bd5e5556a19c3ee5e23103d1977f2bfb
                    • Opcode Fuzzy Hash: a822d377d347eea64fb7a4afdc68e95d840bd1ea99dc2cd1b42afaf4f154cc5a
                    • Instruction Fuzzy Hash: 21018436340214AFDB148E59DC84FAB7BA9FB89721F108026FA04CB3A0CAB1D8048760
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 11cb91eae29cc6e98d17c69f9e4349aae61da316d4777fad7f55675faef3069f
                    • Instruction ID: 5f2152f09a095461274acb3ce454ea00e037c26e42c122a93545cc760425c4e0
                    • Opcode Fuzzy Hash: 11cb91eae29cc6e98d17c69f9e4349aae61da316d4777fad7f55675faef3069f
                    • Instruction Fuzzy Hash: F901C43A3002008FD7299B38C455BAA77A2EBC5324F14662CE0968F790DB75EC42C790
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: aaa4b1b3437253d70fbb002842fc28c7dfe72cdede6e57efc9b28fb446e70095
                    • Instruction ID: fe1f986e336c2378a634afdd81a3e6c12034ec416769efe30ee4aa3875481676
                    • Opcode Fuzzy Hash: aaa4b1b3437253d70fbb002842fc28c7dfe72cdede6e57efc9b28fb446e70095
                    • Instruction Fuzzy Hash: EE216274A14228CFEB68DF68D889AD9BBB2FB48704F5045D5E509AB244DB349F81CF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8c295e5f0822de3d09eb2f253d47e3077f225f285bb42243f1394da944a633a0
                    • Instruction ID: 488c055ec55bc492cd0de495c0be34b1cc0392cbb5087c07e1d14e14cd8057e8
                    • Opcode Fuzzy Hash: 8c295e5f0822de3d09eb2f253d47e3077f225f285bb42243f1394da944a633a0
                    • Instruction Fuzzy Hash: F211B3B0E002199FCB44DFF9D9456AFBBF5FF88300F20846A9518A7350DB359A419BA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8fbe2f95e1ef0696e436a91c44ebedc41ef9ec6eaf2b3bb46f9e9e3cbad0d176
                    • Instruction ID: 0c8c2733455d81252516d8fc0b4a4d4762f60308b128771f86b56196fdbf6780
                    • Opcode Fuzzy Hash: 8fbe2f95e1ef0696e436a91c44ebedc41ef9ec6eaf2b3bb46f9e9e3cbad0d176
                    • Instruction Fuzzy Hash: 3001923A3002008FD7299B74C554A7A37A3AFC5314F10A51CE5968F794DB71EC42D790
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 813a54c0fc85966550d4f192d26f2c903317515d0ee25ab2005a36ae7755b6bf
                    • Instruction ID: ff2a4ea4692a0d5c7d2c0f26b792fcc04fb461f5c24ed3ccd0f6aa7d6c7f1867
                    • Opcode Fuzzy Hash: 813a54c0fc85966550d4f192d26f2c903317515d0ee25ab2005a36ae7755b6bf
                    • Instruction Fuzzy Hash: 98F0F0323042051BCB049A2EFCC598BFFABEBC0624B40A93FB14ACB216CE719C458694
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 57ae0f82190a37316a13750bd394d2d280de988dbd9084ea76da8f692e352db3
                    • Instruction ID: 92560aacf44641e390ae99bf1237d1016ba292bfc32b8d62f6703e46bad346ab
                    • Opcode Fuzzy Hash: 57ae0f82190a37316a13750bd394d2d280de988dbd9084ea76da8f692e352db3
                    • Instruction Fuzzy Hash: F301367A6042189FDB14CEA8D444A9ABBF9FF45324F25A069E544DB390D771E980CB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e91a707402f1f43b2265d77467c0cb803097208f19824831d6e38dc766dfb3d3
                    • Instruction ID: 2dd7674662e6ffffc32420385224953de2c3c98abc37de49a1f069981a7ce0cb
                    • Opcode Fuzzy Hash: e91a707402f1f43b2265d77467c0cb803097208f19824831d6e38dc766dfb3d3
                    • Instruction Fuzzy Hash: FCF0CD777002009FDB44CE69D888F9A73F9FF98321B14816AF555CB3A0DA30D8048621
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8b15cfd1550072fa85a93dc02b4649a4c4911742f1bed3d42d68477494f47496
                    • Instruction ID: b5b1acda0d20938bd6c48a9dcfb2e9ee4c7dfc99779f5023c4038fb0b80317e9
                    • Opcode Fuzzy Hash: 8b15cfd1550072fa85a93dc02b4649a4c4911742f1bed3d42d68477494f47496
                    • Instruction Fuzzy Hash: 28012CB5D0960ADFCB84DFA9C9426AEBBF6FB48300F14D56AD509E3204E7709681CF91
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c7fa565343d6a0678e0f5d9710a4565f2c6b1c988a4cfd54f2193cd5756e8256
                    • Instruction ID: e905f150ed5171d4938b3b0d23531edddd074df5183c8d46bab36d7629aa8904
                    • Opcode Fuzzy Hash: c7fa565343d6a0678e0f5d9710a4565f2c6b1c988a4cfd54f2193cd5756e8256
                    • Instruction Fuzzy Hash: 240181353006149FC3099B25D058A1EBBA3EFCD7117108129F94A8B754CF31EC82CBC0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b7b4c5aadfd1e51bab2a6980289e1763001cb204fdbdf856a4927bfeea6b2212
                    • Instruction ID: 3f3c4f5306d51303a5a6edc658449efbeee2d91e6b8159d8dab5e2ecbca31183
                    • Opcode Fuzzy Hash: b7b4c5aadfd1e51bab2a6980289e1763001cb204fdbdf856a4927bfeea6b2212
                    • Instruction Fuzzy Hash: 9D014F30D08608DBEB44DF69DC06BD9BBBAEBC9301F008426D50967285DB349445CE15
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8246ebad2b6917b972c1285132f630ae850723c468e6132df04f46cb705219fc
                    • Instruction ID: 5255561d25f509d544f764141ee7e22758b23a1c2997416f4eec34d0f84779fb
                    • Opcode Fuzzy Hash: 8246ebad2b6917b972c1285132f630ae850723c468e6132df04f46cb705219fc
                    • Instruction Fuzzy Hash: BDF062363402009FC7049B2AD495E6A7BAAEF8C720F144169F946CB760CA35EC428B50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: feaf92aab17e79411b5204b83bd2dcfe0f4c51601653bcecf09116a53c7eb4c9
                    • Instruction ID: cfc6442830500de097ed61903c9065b342a49b48eba04bc9e1a85454324589c3
                    • Opcode Fuzzy Hash: feaf92aab17e79411b5204b83bd2dcfe0f4c51601653bcecf09116a53c7eb4c9
                    • Instruction Fuzzy Hash: 1B018C74D4A208DFCB80DFA8C84AA98BFF4AB09319F1444DAE809D3362D6759D44CB41
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5795b5f1ac92d8fc19d4c5f44ecd9fb393589322c21b085386bd355600a7863e
                    • Instruction ID: 7de7ead947e49bba93c8720c07fd451ea7b65673fc18e2d4dd0f5e44f1bba671
                    • Opcode Fuzzy Hash: 5795b5f1ac92d8fc19d4c5f44ecd9fb393589322c21b085386bd355600a7863e
                    • Instruction Fuzzy Hash: D7F0E932F052215FE7145659980476FF7A9EBCD710F14442AF5059B340CB72AC42C3C4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a95811d242fc7dd4a9462d01158e88fae3487ae9ff6130df3246c9b6464c7e4c
                    • Instruction ID: 0378ff9211835c394ad00176b91a33162545a92d25eab798b795924c5eaff29c
                    • Opcode Fuzzy Hash: a95811d242fc7dd4a9462d01158e88fae3487ae9ff6130df3246c9b6464c7e4c
                    • Instruction Fuzzy Hash: 6E110378A04128CFCB68DF58D988999BBF2FB49304F5045D8E509A7350CA30AE818F64
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f658f29198058f076a2eb819503e1bb35501b8a1183434a624a223542345ef92
                    • Instruction ID: 3a74136f028a9a698c8dd20a781b322016d5b054a9e7ec5b60937b92a67a7b97
                    • Opcode Fuzzy Hash: f658f29198058f076a2eb819503e1bb35501b8a1183434a624a223542345ef92
                    • Instruction Fuzzy Hash: 2DF024327001086BDB189A29D84496EB7AAEFC8230B044126FD2ADB3A1DE30AC168690
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6c2862f16854b70e0da42032fa872cd91e7cd0f73b29342deaf336573ca48742
                    • Instruction ID: 000f17d3a0139c41680265f27ffd5a4a79e3c86c40408ecbc78a307a12013aea
                    • Opcode Fuzzy Hash: 6c2862f16854b70e0da42032fa872cd91e7cd0f73b29342deaf336573ca48742
                    • Instruction Fuzzy Hash: 25F0ECB0D45209EFCB84DFA8D9456ADBBF4FB48304F5085AAA809E3250EB319A40DB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 70be1f0a829521556fe155141a66aaf44fb15af36bbd537ba9a6c233bcd9da3f
                    • Instruction ID: a8c22199f41b67e18ff47a9764067318025bdb009ae59ec65ed69ab6c2bd4942
                    • Opcode Fuzzy Hash: 70be1f0a829521556fe155141a66aaf44fb15af36bbd537ba9a6c233bcd9da3f
                    • Instruction Fuzzy Hash: B6F0FE753506009FC714DB29D458D3A77AAEFC9721B154069F946CB371CE71EC42DB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 806e0ac2d1de5b76b3bab5b33d4d0af99b4aa233a3dc3dd7c0237a2d061b0d9d
                    • Instruction ID: 4cb0481eb35c4fe6b70e5f698095fd08fe4e4b605da10eae4e92f5ce39e58370
                    • Opcode Fuzzy Hash: 806e0ac2d1de5b76b3bab5b33d4d0af99b4aa233a3dc3dd7c0237a2d061b0d9d
                    • Instruction Fuzzy Hash: 7AF08271A00618DBEF04EB78C85979FBEB6EB88710F60092CD506B7345DF780A459BE2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b2678e69c520da6851f08b83607de5b1917dd01c1b01a83015fa215d39349e01
                    • Instruction ID: cd92e0f4fb13974b434bf0113e6298cb6973d182ff693bd048baac7bc0c0b46b
                    • Opcode Fuzzy Hash: b2678e69c520da6851f08b83607de5b1917dd01c1b01a83015fa215d39349e01
                    • Instruction Fuzzy Hash: DEF0E276E04614AFDF09DFB4D48D38C7FB2AF44224F04859AD08AE72D1DB745A84C744
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d88c0a721f7db9240f1dbd3d30334250d68b6736ad986d3aa8e4fa812650e745
                    • Instruction ID: 4d37fb150df620c3841ee1abf3b469c7fb010bc99a9e3fc1320a1aece8abb590
                    • Opcode Fuzzy Hash: d88c0a721f7db9240f1dbd3d30334250d68b6736ad986d3aa8e4fa812650e745
                    • Instruction Fuzzy Hash: 63F034B5D04208EFCB80EFA8C940AECBBF5EB49314F14C09AA808A3311D6329A59DF44
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d3887a52662e1a75e34e5e7944d8a147fde96b26c53a59e13b5744a3c93293b6
                    • Instruction ID: 06d7ac385e7d544c5b8a47af05a29e1dcfb036e77d5647d465e339dd9a09def3
                    • Opcode Fuzzy Hash: d3887a52662e1a75e34e5e7944d8a147fde96b26c53a59e13b5744a3c93293b6
                    • Instruction Fuzzy Hash: A6019274905318DFDB54DF68E889B9CBBB2FB09304F108056E50AA7291DB749985CF00
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f07a84e8fec955ecae298671d55d1bacb56d9b5cfab6be93428122017846fff6
                    • Instruction ID: 55122ef3b05e3a754fe1d883dd8195cb8d71650e93d3308b3463f3ecb5562d59
                    • Opcode Fuzzy Hash: f07a84e8fec955ecae298671d55d1bacb56d9b5cfab6be93428122017846fff6
                    • Instruction Fuzzy Hash: 1CE0D8A771812247EB14186E6C5139DD182EBC8A38F44173EF995CF3C2D915880102A0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 478d6c90368286f99dc0d97d58bd3449cf293dfba1064a7a83de893b3ef48f73
                    • Instruction ID: 530ec244422f0dccd7045272887e12cd5d2bad886d94b9e8e259e20f37807388
                    • Opcode Fuzzy Hash: 478d6c90368286f99dc0d97d58bd3449cf293dfba1064a7a83de893b3ef48f73
                    • Instruction Fuzzy Hash: C1F0F875D05248AFCB80DFA8C951AADBBF9EB4C310F14C4AAA858D3341D6359B51DF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cad71e955c117c083ad64707e48a4f92bfee48a9d15a8e749d2274b2936fff29
                    • Instruction ID: b651beb8e24ee4f51d18dd3ecc266444e30f8cf950f7e123bc5e6182bf83deec
                    • Opcode Fuzzy Hash: cad71e955c117c083ad64707e48a4f92bfee48a9d15a8e749d2274b2936fff29
                    • Instruction Fuzzy Hash: 8DF0A731A04618AFDF05CF65D44C7DDBFB7AB44315F048096E08AA6280DB701A80C784
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2a26b83fe9b0dc52f51e42083837a35e404ac15a585fbe89811b25a6abcefa2f
                    • Instruction ID: 6e283a7d37f6f34c684dff379c3ae6fcfa702d6bc686187f68f29631f9dad2ef
                    • Opcode Fuzzy Hash: 2a26b83fe9b0dc52f51e42083837a35e404ac15a585fbe89811b25a6abcefa2f
                    • Instruction Fuzzy Hash: 31E04F32704218AFD718EAA8E4445DA7BEDEB49271F20007AD60CC3654EA3299408790
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ce49c544854756598d910385d247814f7755656a28a2384c4e4902a194432f6c
                    • Instruction ID: d30cbdc114edf74fea20d6d7a4ba4771dc0620f46995126cc3f61c8627ea4c98
                    • Opcode Fuzzy Hash: ce49c544854756598d910385d247814f7755656a28a2384c4e4902a194432f6c
                    • Instruction Fuzzy Hash: DBF01C74D04248EFCB80DFA8C951AADBBF9AB4C310F14C49AA858D3341D6359B51DF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e5068e86d2bd2834abd7725a042233d4579174a6d6cccf4038753fc4bd22a915
                    • Instruction ID: 844516695b0179226b4ab39f6cefd13d1e85a9faf5f5250dacb802085a9d425f
                    • Opcode Fuzzy Hash: e5068e86d2bd2834abd7725a042233d4579174a6d6cccf4038753fc4bd22a915
                    • Instruction Fuzzy Hash: 62F0EC74B04229CFD768DF94D844B9A7BB5FB4E314F1040E5A509A7744CB709E81CF51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ea25eb6b5be93ac53d9349c1e8550f8f1a6018609c1ce3ed8848c3dd8e4025ea
                    • Instruction ID: 9aec60f5d56bf88c8c79c316f726a1a9372e9c361581f3480ac2b81cc333f062
                    • Opcode Fuzzy Hash: ea25eb6b5be93ac53d9349c1e8550f8f1a6018609c1ce3ed8848c3dd8e4025ea
                    • Instruction Fuzzy Hash: 5DF06535A04618AFDF09CF65D48D6DDBFB7EB44215F148496E08AA7250DB705A81C784
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e42a47dba0e16a870bbfb8b3451984a016a5aa6579c2d16350a3317c628b66c3
                    • Instruction ID: 2da4376078eaee23f3c03fabcda5d6eaa78365718fe89e8243c1b0ce4232f439
                    • Opcode Fuzzy Hash: e42a47dba0e16a870bbfb8b3451984a016a5aa6579c2d16350a3317c628b66c3
                    • Instruction Fuzzy Hash: 20F03078D04218AFCB50EFE8D54A6ACBFF5EB04314F0484E9E848A3341DA359E40DF51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e41fa5df803bcddd717ee74ef5c64a0109d746a43ce158365d06ce27096a4cf7
                    • Instruction ID: 44ef24b1f5539eedfb3d027057b015e35b32a75c0add14b4a3cecedc3d6f9b6d
                    • Opcode Fuzzy Hash: e41fa5df803bcddd717ee74ef5c64a0109d746a43ce158365d06ce27096a4cf7
                    • Instruction Fuzzy Hash: B2E01A712002055BC7149A1AE88484BFB9AEFD1764710EA3AB54A87625DE71AD8A86E0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ffdfbb88809504fed7518423d5cd58a928490f4fb41c77237b8c0cde96b850bf
                    • Instruction ID: 2a49869af322db2685891a8df6d2c9fd8c8ae3327efc089b118540def866af25
                    • Opcode Fuzzy Hash: ffdfbb88809504fed7518423d5cd58a928490f4fb41c77237b8c0cde96b850bf
                    • Instruction Fuzzy Hash: DFE09270840508DEC741DFB4D9047DA3BB4AB0A204F0048D59144D3110EE324A94AB65
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 722ada928161d647949a8d6ae56ab337f1f23a70cca84df4c16886b2bf9ec063
                    • Instruction ID: 8a4c08704a61923d986889a062301e9b62fb35d77f6951325737a36644ef1f51
                    • Opcode Fuzzy Hash: 722ada928161d647949a8d6ae56ab337f1f23a70cca84df4c16886b2bf9ec063
                    • Instruction Fuzzy Hash: 25F065B4D04208EFC780DFA8D5416ACFBF4EB48314F14C4AAD848D7340D6359A41DF80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fa32860e9e219d669d30674678976cccfea150224910e7ec6b2652c341af81ad
                    • Instruction ID: b7b341981dc9dab6c38f7c0a79ad74d4b6bb02ca792c02d1c6ab5b8e6a8dc350
                    • Opcode Fuzzy Hash: fa32860e9e219d669d30674678976cccfea150224910e7ec6b2652c341af81ad
                    • Instruction Fuzzy Hash: 49F03074D04218AFCB40DFE8D54A6ACBBF4EB04314F0484E9E84893341DA359E40DF51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ceddba5788bd2a0036015f3a8a54047ac5e367854e89c1aa05a6491d6813f640
                    • Instruction ID: 36efbc26315c85c797b7e10d6cea1708a1837f86b2b642526d5f4a89dd5b2797
                    • Opcode Fuzzy Hash: ceddba5788bd2a0036015f3a8a54047ac5e367854e89c1aa05a6491d6813f640
                    • Instruction Fuzzy Hash: 54E0D863A193800FC742A3399D4918D3F909F961307087F9AE0F7855E7D924940F9652
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7002c82b440beb1508189c55e44b1e3e783b24498abf999cac251deac962a670
                    • Instruction ID: 376bb50b7519347c59245962921d4a8a4914b738b4f26d12fc11cdcf7d253120
                    • Opcode Fuzzy Hash: 7002c82b440beb1508189c55e44b1e3e783b24498abf999cac251deac962a670
                    • Instruction Fuzzy Hash: 1AE065B1A14615CBEF58EBB894583AE7EA2AB84350F60191DC406F6245DF780A449BD2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9af1ec94360afe2323485d192a69f73c7402d3be0f23ac4d2a72c8ada0805814
                    • Instruction ID: 19a0835ca905e729147400ec971bde4931610fc4e98cec23db0fe1bf55023545
                    • Opcode Fuzzy Hash: 9af1ec94360afe2323485d192a69f73c7402d3be0f23ac4d2a72c8ada0805814
                    • Instruction Fuzzy Hash: D3F0E5B5E492449FC740CFA8C545998BFF0EF05311F1092DAD854CB3A2D3318A46CB01
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5d99824df28f806e6aed348e10ad29d31ba06ada79fdafa28398ed668c0467bb
                    • Instruction ID: 13532749c89ff970085f41baf5d2c8deab1592237be8aabc9eb143df93fbc189
                    • Opcode Fuzzy Hash: 5d99824df28f806e6aed348e10ad29d31ba06ada79fdafa28398ed668c0467bb
                    • Instruction Fuzzy Hash: E4F0D474D09218DFDB54DF68E889BACBBB2FB09315F408096E459A7390DBB89985CF00
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2e10b7e1022817956c8e3d022cca9b4a9433599f2118b05accd3180f782ad5eb
                    • Instruction ID: 9c56cfe8d74d9c369f3d5ac038cdaf3bf09fc2d793154db0ef6fa4729ea25b72
                    • Opcode Fuzzy Hash: 2e10b7e1022817956c8e3d022cca9b4a9433599f2118b05accd3180f782ad5eb
                    • Instruction Fuzzy Hash: 34E0E574E05208EFCB84EFA9D584AADFBF4EB48310F10C4AA9818A3341D7369A51DF80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2e10b7e1022817956c8e3d022cca9b4a9433599f2118b05accd3180f782ad5eb
                    • Instruction ID: cd396bcdd2d445b86d878f440a47c25f57d7dfe1a2c6ee12a92a42fe62d470cf
                    • Opcode Fuzzy Hash: 2e10b7e1022817956c8e3d022cca9b4a9433599f2118b05accd3180f782ad5eb
                    • Instruction Fuzzy Hash: 88E0ED74D05208EFCB84DFA8D545A9DFBF8EB48310F10C4A99808D3340D7359A51DF80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4c49ba00432b9979e8d0381ae90e5eea767b57312e8ce592af111f488bb9c533
                    • Instruction ID: 44a57ee3542d867b77cc8fdff44008c341c7ca4eb1aed215c92312cd7b55e40c
                    • Opcode Fuzzy Hash: 4c49ba00432b9979e8d0381ae90e5eea767b57312e8ce592af111f488bb9c533
                    • Instruction Fuzzy Hash: 3AE02633780310AAEF24AAB099817A87780AF41721F246A95D3A65F1D0DAA1F401E713
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c762fe5ca7819e137c297b92e4efc0b65e30e8cf1c843300aec96ccd27777787
                    • Instruction ID: 4a065d43043fa138a630dd2b96fbe9cbe14ee53497898bc1a3f20b41e3d08a4c
                    • Opcode Fuzzy Hash: c762fe5ca7819e137c297b92e4efc0b65e30e8cf1c843300aec96ccd27777787
                    • Instruction Fuzzy Hash: B6E0DF72B0C2821FC7176239A8166DA6FE65F8610470990AAA0C9DB226ED14EC4A8792
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 237294a12536c9c3f1ef3aaddeba61d29bdfdae92502c07644a447f8e499e662
                    • Instruction ID: e947da70a62de050c6a00ed9606d7e7f903e211bb3a11f9f3eaa5c677f4c95fe
                    • Opcode Fuzzy Hash: 237294a12536c9c3f1ef3aaddeba61d29bdfdae92502c07644a447f8e499e662
                    • Instruction Fuzzy Hash: 91E09AB4D46208EFCB80DFA8CA0569DBBF5EB08300F00C4AAE804A3310D3318A50EF80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d47230fbbc7cf2beebed965941d96b6d6b9ba9f41137eba4b0e649789e66dadd
                    • Instruction ID: e47a9036ff946ab4be3ec6cb4517a9249f46427a38a6b73ddab5c85cd240035f
                    • Opcode Fuzzy Hash: d47230fbbc7cf2beebed965941d96b6d6b9ba9f41137eba4b0e649789e66dadd
                    • Instruction Fuzzy Hash: 55E09274945108EFC744CFD4D6015ACBBF1EB49310F14C1D6DC6953341C6368B42EB40
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 17fdf0ecc89f5ffed904367a170ab718e91258d03f8cfc3fade6047952b89c8c
                    • Instruction ID: f693689333f6caca0c2c1064bf42e021c6e5b919ab5db36574a768e3711f99b5
                    • Opcode Fuzzy Hash: 17fdf0ecc89f5ffed904367a170ab718e91258d03f8cfc3fade6047952b89c8c
                    • Instruction Fuzzy Hash: DAE09A71945208DFCB80DFA8C98AB9CBFF4EB08214F1480A9D848E3320E330EA44DB52
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ce8dbf8e7f84366e46155be2843a502586d2b4a05dcbaed14d91d2706563b85e
                    • Instruction ID: 2cb93ec9f235b3625f294a2ec6c98b82b3fcbe0f84ba678b530117cb459120fa
                    • Opcode Fuzzy Hash: ce8dbf8e7f84366e46155be2843a502586d2b4a05dcbaed14d91d2706563b85e
                    • Instruction Fuzzy Hash: 62E0E574E0A208EFCB84EFA8D544AACBBF4EB48314F10C4A99808D3340D7319A42DF80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ed3c0de59333bf28878ae82554113ab382cdcb10109f9b3f505c7fb0df6df9fa
                    • Instruction ID: 76b48ea046b45f92571a904368a62cce7b6dae9d04dbac3371274c76209b4d10
                    • Opcode Fuzzy Hash: ed3c0de59333bf28878ae82554113ab382cdcb10109f9b3f505c7fb0df6df9fa
                    • Instruction Fuzzy Hash: 75E01A30D892089BDB85EFB8E54579DBBF4AB48305F1048A99A0893340DA305A54DB55
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ce8dbf8e7f84366e46155be2843a502586d2b4a05dcbaed14d91d2706563b85e
                    • Instruction ID: f77a3edebb66f3e069cf9200728f1d8df03f938fe4b2dbfc661a6ddefd1b9b3a
                    • Opcode Fuzzy Hash: ce8dbf8e7f84366e46155be2843a502586d2b4a05dcbaed14d91d2706563b85e
                    • Instruction Fuzzy Hash: BDE0E574E49208EFCB84EFA8D5446ACBBF4EB88314F10C4A9980893350D735AA42DF81
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c95898776bdc08f5c8eba35d103fa93e8c074be1c5199a2f524ab98c3dee608d
                    • Instruction ID: 7558e317ac7b899669dc6d69e66acfaa3e9b17ab43d6c33f9b5d058849524d00
                    • Opcode Fuzzy Hash: c95898776bdc08f5c8eba35d103fa93e8c074be1c5199a2f524ab98c3dee608d
                    • Instruction Fuzzy Hash: 55E07D13A083404FC342A3399C511853F50DF861307086F95E0D7C35D3D934940A9221
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826177779.00000000060C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_60c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dfd3d1bb7a12897fef036a716017eaf8577579818ec465788fb8456af98f9c20
                    • Instruction ID: ba6a2e71da71457caa04d28a4bd651d6e6fa016e50a8bc0aa15b7672d37da547
                    • Opcode Fuzzy Hash: dfd3d1bb7a12897fef036a716017eaf8577579818ec465788fb8456af98f9c20
                    • Instruction Fuzzy Hash: 05E0D830849208DBC740DFA8ED4579DBFB4AB41328F14829CDC44133C1CB324D51C780
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8e2e05f0e471dfa6da1d456f113e34a9fe74dbc28586199c9df6be65e3081ca6
                    • Instruction ID: 0ad43c414f8b8c8319f1b4058f30a2760053e507e6b713302f78f1daedae035b
                    • Opcode Fuzzy Hash: 8e2e05f0e471dfa6da1d456f113e34a9fe74dbc28586199c9df6be65e3081ca6
                    • Instruction Fuzzy Hash: DDE04F349091489BC708DFF4E5516BCBFB4EB45318F2495ADD94853341C6316A47DB94
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 545227856c3d406b139e41ede556d012318e7fb26ae4899f114ad6c52b1b1855
                    • Instruction ID: 6c0d3fa62c0432f3e6eb1d06aa1588a20cfde5ba10e00b802d8e888b51f06858
                    • Opcode Fuzzy Hash: 545227856c3d406b139e41ede556d012318e7fb26ae4899f114ad6c52b1b1855
                    • Instruction Fuzzy Hash: 68E01A74D06208EFCB84DFA8D60569DBBF5EB48310F10C4AAD904A3354D7359A50EF84
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 545227856c3d406b139e41ede556d012318e7fb26ae4899f114ad6c52b1b1855
                    • Instruction ID: dc3c543f5a60e880635c577e05b6410ef92d691fbfcfd2232206abb17e39adb6
                    • Opcode Fuzzy Hash: 545227856c3d406b139e41ede556d012318e7fb26ae4899f114ad6c52b1b1855
                    • Instruction Fuzzy Hash: B4E01A74D05208EFCB94EFA8D505A9DBBF6EB48311F10C4AAD814A3350D7359A50EF84
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 108f03db84ec9da9ce7be6b273bcd68663aff378868cbab7cc33d604b457bfaf
                    • Instruction ID: b01189ea507e480ee16be57562d34541840e5528a33d575aa8a348d8e2a18d3a
                    • Opcode Fuzzy Hash: 108f03db84ec9da9ce7be6b273bcd68663aff378868cbab7cc33d604b457bfaf
                    • Instruction Fuzzy Hash: 83E0E574E05208EFCB84DFA8D5456ACBBF5EB48314F10C4AA980893340D6759E46DF80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 598de534fc52a7abfeeaab30dcc4052c04b38075ee36c0dc022a296b88521fe4
                    • Instruction ID: 635d41cc1b3af0299d015d30e4f4be33651db09c9629f1bfcd722300c9816aaf
                    • Opcode Fuzzy Hash: 598de534fc52a7abfeeaab30dcc4052c04b38075ee36c0dc022a296b88521fe4
                    • Instruction Fuzzy Hash: 39E08674D09108EFC784DF94D5409ADBFB8AB45310F14D499D94457381C7329A51DB94
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 002df23c808a0388cb59e63804961583458574698fbd53fef050dc54675a2b72
                    • Instruction ID: 5c27becacb2ed0f16451abab720804822670028cb44819793828dffb46b78f69
                    • Opcode Fuzzy Hash: 002df23c808a0388cb59e63804961583458574698fbd53fef050dc54675a2b72
                    • Instruction Fuzzy Hash: 66E086355091489BC746CBA4E611BE4FBB8A746318F24648DD80C47341DA725902D794
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 52563c058b1b6d4cc7818a3e4ad9957702645688a73ac3fb0ff803daf3a9fa00
                    • Instruction ID: fb1f70ac16e9a6b755a17c1e923fd81ce29b28fa37463504745b8b548646fca3
                    • Opcode Fuzzy Hash: 52563c058b1b6d4cc7818a3e4ad9957702645688a73ac3fb0ff803daf3a9fa00
                    • Instruction Fuzzy Hash: 84E01A74D09208EFCB44DF98D5419ACFBF5EB48310F24C0EAEC5463341D6329A92EB84
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c9fc39297c72513015c804879afe36c5f6f752d9e7c37d42aad03773ef4dc5ab
                    • Instruction ID: 803ce6a4cce627fd9c34ddce4140aeef3b453eb9d34d3f213a81850dcc8d76e3
                    • Opcode Fuzzy Hash: c9fc39297c72513015c804879afe36c5f6f752d9e7c37d42aad03773ef4dc5ab
                    • Instruction Fuzzy Hash: 47E04F34D45108EFC784DFA9D5416ACFBF4EB49324F14C4E9D84853381C7329A41DB80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dd8716e36a7fd4025b59211fbcc6dbbf12815f3c755434fdd361b95bae1d0e7d
                    • Instruction ID: c2f9dc0a1f49285d0db349a57c508cdabdf1fbdaf5e16d3050919b145d969b3d
                    • Opcode Fuzzy Hash: dd8716e36a7fd4025b59211fbcc6dbbf12815f3c755434fdd361b95bae1d0e7d
                    • Instruction Fuzzy Hash: 32D05B3338431497DF34AA709841BE17399AB45715F1464A5E7865F2C0DAE2F841D752
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826177779.00000000060C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_60c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 34a7a8b618e25fa9904c3a06d410ec35d379cd757cbcf51ec22cf22dfe66f2a1
                    • Instruction ID: 575c3f580874ef93ae3c4879755f59b1403d6b9369f950cc705665083e770770
                    • Opcode Fuzzy Hash: 34a7a8b618e25fa9904c3a06d410ec35d379cd757cbcf51ec22cf22dfe66f2a1
                    • Instruction Fuzzy Hash: 7AE0267088E284DFC3C4CB60D954A2D7FA89B02329F1841CDCC084B292CA338C44DB41
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dc70069d306b468837b97ab4d1025d73fd2c0fbfb9edd392e38c9e8fc1727a9e
                    • Instruction ID: 83324e8ee0272e1f27d080afe985228a20853b33a3610fe537321d62b0353aad
                    • Opcode Fuzzy Hash: dc70069d306b468837b97ab4d1025d73fd2c0fbfb9edd392e38c9e8fc1727a9e
                    • Instruction Fuzzy Hash: 71E08CB0C86258EFCB80DFB8D94A69CBFF4AB04205F1044A9A909E3340EE308A50CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 48609d81598a7c6ccfbf4b8e3dbb14dd725a75f0a102597b39579fe047bb66b9
                    • Instruction ID: e6f0597cd545b7b0c10eae37343b3441796acc52d08a36b4b4bcb8d21c579ff8
                    • Opcode Fuzzy Hash: 48609d81598a7c6ccfbf4b8e3dbb14dd725a75f0a102597b39579fe047bb66b9
                    • Instruction Fuzzy Hash: B3E08C30D0520CEFCB80EFA8D9466ACBBF4EB08314F2084BAD909D3341E6329E42CB40
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 15130abb5703a3554ab90ccdcc2d44f5400945b33eee25f5ee20bb6c150ec3bb
                    • Instruction ID: 0ca43fa2fa5c68824476d8b96e9b05f8dcf60645dc360a5c4158946450e4370c
                    • Opcode Fuzzy Hash: 15130abb5703a3554ab90ccdcc2d44f5400945b33eee25f5ee20bb6c150ec3bb
                    • Instruction Fuzzy Hash: 02E04678D66208DFC780EFA8C549A9CBBF8AB08314F1040EAE808D3320E6309E80CB41
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 61eb2f3ea3b19dde4f866ffc0ebb09225c123d549dc209784a8b764779d7af22
                    • Instruction ID: ce7783eac32826359a4316945956d9111494fe7bb2a2416eee1bcdce2e9a3228
                    • Opcode Fuzzy Hash: 61eb2f3ea3b19dde4f866ffc0ebb09225c123d549dc209784a8b764779d7af22
                    • Instruction Fuzzy Hash: 8BF07F74909308DFDB94DF68E985B98BBF2FB09304F108096E549A7361DB759985CF00
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c657ff444c094889259c246c14c37b97d3354fe486054a99ef7b66ded7ef0780
                    • Instruction ID: 922ed0ca0ed3cb7b3f2c42a4bc122f747a915a0343d9339537f1999b0689c8be
                    • Opcode Fuzzy Hash: c657ff444c094889259c246c14c37b97d3354fe486054a99ef7b66ded7ef0780
                    • Instruction Fuzzy Hash: 41E0263444C15487CB50CBE8CA0F7ACBFE0AB01335F1902DE8885973D2C7B90542C741
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7d07016a4c76272ffc99fe96db702f604126e6e6f71c94f7947ef98b5831ddbf
                    • Instruction ID: 39a0effe74d8cf707519c1a88b70409f8839cdb8d12cdc27b87e129ce9a2a0ee
                    • Opcode Fuzzy Hash: 7d07016a4c76272ffc99fe96db702f604126e6e6f71c94f7947ef98b5831ddbf
                    • Instruction Fuzzy Hash: 2DE04674945208DFCB80DFA8C949AACBFF4AB08224F1080AAD848E3320E730EE44DB41
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 59995753d363077481c4b73111d8d87bcc865e9527fa33abfeddf2901a4f4cea
                    • Instruction ID: 607ccc23ce5f749a79c30679f0d908c6e1f09be8729bad8a656d2a6d677d0919
                    • Opcode Fuzzy Hash: 59995753d363077481c4b73111d8d87bcc865e9527fa33abfeddf2901a4f4cea
                    • Instruction Fuzzy Hash: 59E0C234D0A108DBC744EF94D5409ACBBB8EF45314F24C5ACD80813350DB329E42DBC0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826177779.00000000060C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_60c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0c086a78619b4f53af13876562380668dc3a7d2039f6c30edd448c2ee30809e0
                    • Instruction ID: ac5160dbbca44ba1c43e8c42889e16b64b10a1e343406cd73514fdc22390e8a0
                    • Opcode Fuzzy Hash: 0c086a78619b4f53af13876562380668dc3a7d2039f6c30edd448c2ee30809e0
                    • Instruction Fuzzy Hash: 25E0C234D49108EBCB84DF98E9409ACFFB8EB45328F10C09CCC0913341CA329E52DB80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d2ed31c127c27294e39ea47f2933d135a0d7a38fc2d75abb9b049224928c9d79
                    • Instruction ID: 9d3a40d1eb68d49134dde354afa6c4af1f5a915f44c8562cf66b80ef7f67f94c
                    • Opcode Fuzzy Hash: d2ed31c127c27294e39ea47f2933d135a0d7a38fc2d75abb9b049224928c9d79
                    • Instruction Fuzzy Hash: F2E0C234E09108DBCB04DFA4D5409BCBBB9EB45324F20C09DCC0827340CB329E82DB81
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 162ebcd8d0783cfd5352d3f19eb3d296ff213f9a2c336f4d1725ca932a139ce0
                    • Instruction ID: 08020022b891534e159a788076182394e37cf700918ba99e78e4cd9dde58cf0d
                    • Opcode Fuzzy Hash: 162ebcd8d0783cfd5352d3f19eb3d296ff213f9a2c336f4d1725ca932a139ce0
                    • Instruction Fuzzy Hash: A9E01271941208DFCB45EFF4D50869E7BF8EB09315F1049A99509D3110EE324A54ABAA
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a2b64952d8dcbf21980cc164275f0e4edc581d65f6ad4c2d8d2416a877d17a90
                    • Instruction ID: 400cc2a2a78968233390ab359fe3d6045579f4db1d7f2687c57f17424a9d9903
                    • Opcode Fuzzy Hash: a2b64952d8dcbf21980cc164275f0e4edc581d65f6ad4c2d8d2416a877d17a90
                    • Instruction Fuzzy Hash: 08D02B2045E7814BE3A72778A419BFC7FA18F47319F054C9ECA8893946C924485ECB37
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 32e2b1f061b12128de5f44645d262e6a0fd7450c70abd85ccffcde969b2aeead
                    • Instruction ID: 320e15bbbde4913e879983900151288f2ffe9ff4d06365aac0fcb731fabdf56f
                    • Opcode Fuzzy Hash: 32e2b1f061b12128de5f44645d262e6a0fd7450c70abd85ccffcde969b2aeead
                    • Instruction Fuzzy Hash: FEE08670909189EFCB41DFB8ED504AD7FB6EF85204B1405EAD404DB252D5301F25E725
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b3c847e91e4aaeba89fd9d69ed60574c8011db9faf88dac09fd393af9da2c182
                    • Instruction ID: f81a3241589d918fb2f30bb33bec740d5804d81208119001afd33c8486c4fb27
                    • Opcode Fuzzy Hash: b3c847e91e4aaeba89fd9d69ed60574c8011db9faf88dac09fd393af9da2c182
                    • Instruction Fuzzy Hash: 30E0EC70D56258EFCB80DFB8D54A69CBFF4AB04215F1044A99909A3240EE309A54DB51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4e04baf1a691047c40a1bb91a95d45e5ad950495cd6df20253a2e6d2f1164633
                    • Instruction ID: 1f894fb9c0dade4dd3f568d882d94b5417e6f3a09ff6bc034457c8d304301e77
                    • Opcode Fuzzy Hash: 4e04baf1a691047c40a1bb91a95d45e5ad950495cd6df20253a2e6d2f1164633
                    • Instruction Fuzzy Hash: 88E0EC70D56208DFC784EFA8D94A69CBFF9AB04215F1444A9980993240E6305A94DF81
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 852ef99a4ca5fd240f9aadbcedee0f634c4d3bcc853d603fe3e80fc319eee5e1
                    • Instruction ID: ce655c3e2f0c9c3d01277dd922ec65363f2a8072bc109a7e2cf6436a9349c239
                    • Opcode Fuzzy Hash: 852ef99a4ca5fd240f9aadbcedee0f634c4d3bcc853d603fe3e80fc319eee5e1
                    • Instruction Fuzzy Hash: 26E01274A10208EFCB04DFB9E94166DB7B5EB49305F508999E844AB240DD319F019BA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 22b9c70eeaa927736b30b9d91a810845899d08a9eb7c580ee23c1b373ab3ff28
                    • Instruction ID: 48867b46cbc3a64c44b036cfff43013ff5fc44745052f0a231a45b57298e11f3
                    • Opcode Fuzzy Hash: 22b9c70eeaa927736b30b9d91a810845899d08a9eb7c580ee23c1b373ab3ff28
                    • Instruction Fuzzy Hash: E7E01274D59218DFCB80EFE8D54A69CBFF4AB04315F1044AAD809E3350EB715A94DB81
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 70b78164bb92c2cb109a0a5290fd92662d1c7432903ce8adbcc15a4486f39e67
                    • Instruction ID: 073d5ae263537a19b33528c71799727dfb2259f2a578aed8c6619b6cee815b6a
                    • Opcode Fuzzy Hash: 70b78164bb92c2cb109a0a5290fd92662d1c7432903ce8adbcc15a4486f39e67
                    • Instruction Fuzzy Hash: FEE06534A09228CFDB68DF64C888ADABBB1FB4E306F0041D4E409A3704CB349E81CF56
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9b28041406ba40f12809e488fdcc413117c4ed33f1129892016a0af981f46ea1
                    • Instruction ID: d836250f4e244b4aaf1c14b3804ce90af515edd3a128477bfb42a9e9185ca8bc
                    • Opcode Fuzzy Hash: 9b28041406ba40f12809e488fdcc413117c4ed33f1129892016a0af981f46ea1
                    • Instruction Fuzzy Hash: 67E01270A05209EFCF04DFA8E94169DB7F5EB44304F104999E508E7341DD715F0097A1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 12abac07cd6da27ec1590fbc3dcd380e0db25f14076478b7903ee934897f515c
                    • Instruction ID: 6056792a8441ebd3189634189bd932f3ece764bcf51c4dd4c3103fbf67f99c36
                    • Opcode Fuzzy Hash: 12abac07cd6da27ec1590fbc3dcd380e0db25f14076478b7903ee934897f515c
                    • Instruction Fuzzy Hash: 89D012327444284B9B4995FC74801FA77DADFC916571494B6D98DC7244EE22CC5293D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826177779.00000000060C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_60c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9bb3b115f3be2322665e73f92ba93d2829ad418d3f5160b207f5e7f57d140c2e
                    • Instruction ID: 1f22da7dbd7db28033d8aee60f459a2b9de95c4f83dbd4272cc29347a94078d7
                    • Opcode Fuzzy Hash: 9bb3b115f3be2322665e73f92ba93d2829ad418d3f5160b207f5e7f57d140c2e
                    • Instruction Fuzzy Hash: 3ED05E34989108DBC7C8CB94D500A6DBBECDB46228F14969CD80953341DA339D41EB80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 43dbdf40f682b8c44edd6a06a9bb01f8b87a6429f9996d20ab36858bea34441f
                    • Instruction ID: dba7671bf7f603413488405f1d8e95586ab6413ab65f900ec36f3b1265b3e445
                    • Opcode Fuzzy Hash: 43dbdf40f682b8c44edd6a06a9bb01f8b87a6429f9996d20ab36858bea34441f
                    • Instruction Fuzzy Hash: 9AD0A7200C52444DD3522BF06F0D3683FE5A70231AFC40404E2CC43911CA1960B8EB7B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c3af7461189039db29afbf01f39477bb7e5fa9111258b90064fe1b3a3dd5a60e
                    • Instruction ID: 96900aea86680c39b573e935b974dce1e7e250df32d97e0d82869ba7a33f3b3e
                    • Opcode Fuzzy Hash: c3af7461189039db29afbf01f39477bb7e5fa9111258b90064fe1b3a3dd5a60e
                    • Instruction Fuzzy Hash: 21D0A770549108DBC744CFA4D500A69F7BCDB46318F2494DE9C0C53341CB339D02D794
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80054cecd2227dce625baf063b3f97ca4c3ae54eb6c0cfbe65b271581202ed79
                    • Instruction ID: f98696f348b4b5f44877a8db55c109d38e6fc72465236a3015f3f8bec0b9054c
                    • Opcode Fuzzy Hash: 80054cecd2227dce625baf063b3f97ca4c3ae54eb6c0cfbe65b271581202ed79
                    • Instruction Fuzzy Hash: D7D05E71A0020DEFCB44EFA9EA4159EB7F9EB44304F1049A8E509E7201EA316F10ABA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fd901de7758db9e5df59bae8b8332567f1354e961e6d55abc1fc19f07e82edb9
                    • Instruction ID: 98036ed6749f13e88aaef63babdbb0f301638fe36070fe518c65161a91dd4fe0
                    • Opcode Fuzzy Hash: fd901de7758db9e5df59bae8b8332567f1354e961e6d55abc1fc19f07e82edb9
                    • Instruction Fuzzy Hash: 80E0B6B4A05618CFEB20CF24DC88BD977B1FB05305F01169A818962280C7705A84CF4A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3c39760340d879fd0aeb5dfae812d47b2eff8cb0908aad1507ac54de8fe68e5f
                    • Instruction ID: c9e590bd32f403b60c202d3c832ae5f34e215bee89209bc1b2785c2679a980a6
                    • Opcode Fuzzy Hash: 3c39760340d879fd0aeb5dfae812d47b2eff8cb0908aad1507ac54de8fe68e5f
                    • Instruction Fuzzy Hash: 43D012760142089FCB409B54D84AF817778EB15761F154051F50887331D671E814D685
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1af36e4c9cf8b9c07702dc96e955837a65e8ff36ded841e67befbc575946775f
                    • Instruction ID: 69d65918281e7d516ede823e0de9844693ed2a512da13a8653c9e59d7e69969b
                    • Opcode Fuzzy Hash: 1af36e4c9cf8b9c07702dc96e955837a65e8ff36ded841e67befbc575946775f
                    • Instruction Fuzzy Hash: 43C08C204DB2058AC2C4268AA94E3703E9C9706219F041C00A20D230108B605854C1D4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e38bfe4fedb4ec80db0d4741aef1cf69300da7a1ef9360ee6e995057e628e265
                    • Instruction ID: a7ca871f5379468ef7ae569639daff1f9ed4d3fc65919f8b42cc523742043f2f
                    • Opcode Fuzzy Hash: e38bfe4fedb4ec80db0d4741aef1cf69300da7a1ef9360ee6e995057e628e265
                    • Instruction Fuzzy Hash: 4BD0C93208830CAFC700DB14E981B59BBB5EF55315F4545A4FD8486632D63AE510D696
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 88a70892af24abaac0852936f9d78f71b9c7a9691e32272487800ae96889a13c
                    • Instruction ID: cc9ae62e880a3ec4c78e8539571e2e5a8eaf3a3720b73ad212772aa3ea363d99
                    • Opcode Fuzzy Hash: 88a70892af24abaac0852936f9d78f71b9c7a9691e32272487800ae96889a13c
                    • Instruction Fuzzy Hash: 72C080B24085040BCF11D704FCC19C17751DF9034434AAD4C90D44F933D570D843CA84
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e54727e7bd47b5d7eaba42499346322631808411dc4acfaef31368b5d9cc586b
                    • Instruction ID: 083520e0c3aff9ade4d97ce3fca67660f065657f1026364abd12d5b594949d0c
                    • Opcode Fuzzy Hash: e54727e7bd47b5d7eaba42499346322631808411dc4acfaef31368b5d9cc586b
                    • Instruction Fuzzy Hash: 89C012701086108FCB28EB28F584C82B7A2EF4830530189AEE08A8B620CB70EC81CB80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 22345dc0ddf615ae3d800ba85da90ef32d54811d16af76fff959f38cfbf046a1
                    • Instruction ID: afc4c1b42d4f21fce795a0dad13702221dc38bb3053d414b690ef5f62f7af485
                    • Opcode Fuzzy Hash: 22345dc0ddf615ae3d800ba85da90ef32d54811d16af76fff959f38cfbf046a1
                    • Instruction Fuzzy Hash: 1FC08C200C12048AC2853BF4AA0D72872E85B01329FD40808E24C528009B65A0B8D53B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 24ffb4d5736f44c19d94b99639adc7d7be7e87c033979b28c6e20c0557a32779
                    • Instruction ID: 640d8637e27f02ab986a660495d27b5927cc3ae3981a8b3d0060ed95216213a6
                    • Opcode Fuzzy Hash: 24ffb4d5736f44c19d94b99639adc7d7be7e87c033979b28c6e20c0557a32779
                    • Instruction Fuzzy Hash: D6C01235204604CF8300EB1AE481C4233A8FB496193120190E5188B329C721FC01CB44
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 36005f956b392f211fdd427c98977b69cac03c2c09ea52105b1f5f2b1441ac69
                    • Instruction ID: 8ec52312ca3c0ba6b6e53f90ee0d8cb25f385810f8fd1c8cf58a9d1f1c28a74c
                    • Opcode Fuzzy Hash: 36005f956b392f211fdd427c98977b69cac03c2c09ea52105b1f5f2b1441ac69
                    • Instruction Fuzzy Hash: B8D0C9B4A04618CFDB60DF24DC84B997B71FF05305F011AD99189A7241CB302EC48F4A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f1486e3abd0c1063d5ef6f0bdfcaad5ac3c41e1f91e37602522f4c89f1716abc
                    • Instruction ID: 746016191c738103762bd6cc8407111de534c2903a50945bc0a0a47886d40326
                    • Opcode Fuzzy Hash: f1486e3abd0c1063d5ef6f0bdfcaad5ac3c41e1f91e37602522f4c89f1716abc
                    • Instruction Fuzzy Hash: A8C00276E5001A9A8B00DAD9E8508DCB774EB94322B004026D215A6104D63015268B50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5a8d6be8a31c68cacbc275b7e08c82a5315dc19082607fb217e88a009fe25244
                    • Instruction ID: 787b59e80aa86d03a3b48dccb3e3336eee21f7c755a7d2ab8e919d6934549cdd
                    • Opcode Fuzzy Hash: 5a8d6be8a31c68cacbc275b7e08c82a5315dc19082607fb217e88a009fe25244
                    • Instruction Fuzzy Hash: F7C00235254604CF8704EB5AE485C5173A9FB496153120194E5198B329C721FC51CA50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                    • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                    • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                    • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 940e5b8db08da87e81d2cf79e9d7ab8ab872c4fd05d72bc83d55eb18b635aed8
                    • Instruction ID: 1a15f3be0cecbabb1a22fcb1164053873bc66b81305cd621091065927263b3c0
                    • Opcode Fuzzy Hash: 940e5b8db08da87e81d2cf79e9d7ab8ab872c4fd05d72bc83d55eb18b635aed8
                    • Instruction Fuzzy Hash: 34B012302442080E26806BF1280472232CC5600515380047CD50CC1001F640D0101544
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f30a0df4e870542bf1f18f59e9f9810937f78fde3cdb2cce10b6b904b57a6881
                    • Instruction ID: bd988d0fea626d3f2121fec6ac8d4102c33dc5fedcba98d3b8093cb531c55d5a
                    • Opcode Fuzzy Hash: f30a0df4e870542bf1f18f59e9f9810937f78fde3cdb2cce10b6b904b57a6881
                    • Instruction Fuzzy Hash: 3DD0E974D05118CBDF54DF64DD55B99BBB1BB15305F0051D5E50DA3391DA745D848F00
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5f0b93231847a3d2fffbd62256e45f38e812d71f1b3900041475032323432fec
                    • Instruction ID: 45b64055f77802c9444557e63d2e50064b9920f70a652847b162fea86da4e5bd
                    • Opcode Fuzzy Hash: 5f0b93231847a3d2fffbd62256e45f38e812d71f1b3900041475032323432fec
                    • Instruction Fuzzy Hash: 70B092E28151415BCF025AB4DE5E2012D01A72238AF8B2289A080C10C4D4408801C912
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3c17b021cc65ffe0f32e4ba772029f5065cc7c5e2154f0398e8f79225c9a594b
                    • Instruction ID: 03102a43cea1a250c405b3de8ebd4114965d61cc71db1b78c86a80129df574cd
                    • Opcode Fuzzy Hash: 3c17b021cc65ffe0f32e4ba772029f5065cc7c5e2154f0398e8f79225c9a594b
                    • Instruction Fuzzy Hash: 53B01237A40404C64A145B96B0081DCF734D180373F400066D70DE10009320023C86C0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 165fcc544766138fd80c1b9983959616596f2955c11c4dac9ffe0a9026ff3d72
                    • Instruction ID: cb8335f5c6da939b93f963f28c22d72aab3ce1549153676e62a094c237f4be52
                    • Opcode Fuzzy Hash: 165fcc544766138fd80c1b9983959616596f2955c11c4dac9ffe0a9026ff3d72
                    • Instruction Fuzzy Hash: 63A0123048021C8F81802F50B40C0087B1CA5401117D00C10A21DC00057A2014245548
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f328b0f2f4ee3f94614ad9950934ad106c3b776b5aed7d5eddc0e562e5181a6a
                    • Instruction ID: 3c5f5462f054b9f632fb7b090f21727c21aa5c0385003191071c0d7e526d618f
                    • Opcode Fuzzy Hash: f328b0f2f4ee3f94614ad9950934ad106c3b776b5aed7d5eddc0e562e5181a6a
                    • Instruction Fuzzy Hash:
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: TJkq$Tefq$xbiq
                    • API String ID: 0-2501753584
                    • Opcode ID: b119464f32b5120f6edf6fa6558174b84d7d6c23851f0b9716495a21b7c8f32c
                    • Instruction ID: 1a5236f23c76b72bc40fbd6ee44e3baf107e756cb16104d9639252d25cb9a4ce
                    • Opcode Fuzzy Hash: b119464f32b5120f6edf6fa6558174b84d7d6c23851f0b9716495a21b7c8f32c
                    • Instruction Fuzzy Hash: FFC18475E016188FDB58DF6AD944ADDBBF2AF89300F14C0AAD909AB365DB305E81CF50
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq$,jq
                    • API String ID: 0-324742079
                    • Opcode ID: 137a0b7633fe1a81f3a80aa1c0450df545f893d461105ee195ea1db8994fa43f
                    • Instruction ID: 481a0a36fb463adef3820c6c0e0c434208b66a6339781bc826a1ba3be8762bed
                    • Opcode Fuzzy Hash: 137a0b7633fe1a81f3a80aa1c0450df545f893d461105ee195ea1db8994fa43f
                    • Instruction Fuzzy Hash: A8D12836A00614CFDB14DF69C584AAABBF2FF88304F259899E445AF365DB31EC81CB50
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq$4'fq
                    • API String ID: 0-751858264
                    • Opcode ID: 54201676c000bf37022409bf54faf62510baadd0f394227f8f7d5a1832de70c5
                    • Instruction ID: 538847a8e3493a74e0e9d6fdb3cd4dbdd96225d3e11ff0e504ef6b84ad02e57f
                    • Opcode Fuzzy Hash: 54201676c000bf37022409bf54faf62510baadd0f394227f8f7d5a1832de70c5
                    • Instruction Fuzzy Hash: 837118B0E057488FD748EF7AE98069ABBF2FB89300F14C829D144AB269DE341909DB55
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq$4'fq
                    • API String ID: 0-751858264
                    • Opcode ID: 07cf770e67b3916d192300c0d375e9e65264feeb299d7122aa2e101c6369db7f
                    • Instruction ID: 97a284293da1bbec35c7c3c1ee7c09e3989314614d6ac238c70f32f89dd5ef76
                    • Opcode Fuzzy Hash: 07cf770e67b3916d192300c0d375e9e65264feeb299d7122aa2e101c6369db7f
                    • Instruction Fuzzy Hash: 7E7109B0E057088FD748EF6AE94069ABBF2FFC9304F14C829D204AB269DF351949DB55
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: b$~
                    • API String ID: 0-4064771009
                    • Opcode ID: 2b565972505f20b86697d19234b167c944585192c5abe2b0d0f0b4714b9ab679
                    • Instruction ID: da1614a3d4662df43bb04a0acde32ac2ff97fba86b85afffe2096516f957e876
                    • Opcode Fuzzy Hash: 2b565972505f20b86697d19234b167c944585192c5abe2b0d0f0b4714b9ab679
                    • Instruction Fuzzy Hash: 0041A771E066198BEB58DF6BCC4969AFBF7AFC9300F14C1EA845CA6214DB744A85CF10
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: {q
                    • API String ID: 0-2254525776
                    • Opcode ID: 7a6954371dc89d4ba6b54e51e13d557f0a3afb384046ad9eb27654797c8e309b
                    • Instruction ID: 4cedc692aa19a7d2709089f802ae4e9febe50696e23b65911b7274d9af23e96a
                    • Opcode Fuzzy Hash: 7a6954371dc89d4ba6b54e51e13d557f0a3afb384046ad9eb27654797c8e309b
                    • Instruction Fuzzy Hash: BD31F8B0E056588BEB68CF6AC85878EFBF6AFC5304F14C0A9C448AB255DB751985CF41
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: Tefq
                    • API String ID: 0-1066582953
                    • Opcode ID: 2fa5d2025a278e6da6446d1c0b52a834009e739e9851836cf41af66773e5a520
                    • Instruction ID: b9a07a65f035f42377ded34f2571242edeae503a7f5c946eb19950f00a4dc812
                    • Opcode Fuzzy Hash: 2fa5d2025a278e6da6446d1c0b52a834009e739e9851836cf41af66773e5a520
                    • Instruction Fuzzy Hash: 4AB1C474D04218CFEB58EF69D844B9DBBF2BF89304F2194A9D409AB355DB705986CF00
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: djq
                    • API String ID: 0-3097775593
                    • Opcode ID: 8e866ff37b806cb2da2d97d5e68e1abd26ad7573249f7c7729af81f64f222d00
                    • Instruction ID: 29d09c1324e04a919abc23122a52a9198e36c1b16f0796a7685789f349e41e43
                    • Opcode Fuzzy Hash: 8e866ff37b806cb2da2d97d5e68e1abd26ad7573249f7c7729af81f64f222d00
                    • Instruction Fuzzy Hash: AF812570D05218CFDB14EFA8D944BEDBBB2FF59318F2090AAD559AB254DB345A86CF00
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: djq
                    • API String ID: 0-3097775593
                    • Opcode ID: 862ac958412c98a7a261577596d25b4a3982ca3fdcad68dedb3afecb156665e4
                    • Instruction ID: 6d8d03be450d0595fff370eefb51d8b1f359fc42e765f6576e9f0cb03acc483e
                    • Opcode Fuzzy Hash: 862ac958412c98a7a261577596d25b4a3982ca3fdcad68dedb3afecb156665e4
                    • Instruction Fuzzy Hash: EE811470E05218CFDB14EFA8D944BEDBBB2FF59318F10906AD559AB254DB345A85CF00
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3916222277
                    • Opcode ID: b4080e1d0962e6c78ae0ac31659ffb9313c9a714bd7660c372cee82c3de3a8f1
                    • Instruction ID: cd82080d801cb56eaa1560ddba7f98ca1623b6a3fc7a53ff093e7c41feb72a52
                    • Opcode Fuzzy Hash: b4080e1d0962e6c78ae0ac31659ffb9313c9a714bd7660c372cee82c3de3a8f1
                    • Instruction Fuzzy Hash: 3351CD71B001158FCB54CB79D8849AEBBF2FBC8311B25857AD615D734ADB30EC558B90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824610975.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d90000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: '
                    • API String ID: 0-1997036262
                    • Opcode ID: 5b909e7ea5b0ba733a8e070edc3b7c80e4fdb1d200489636a9f68f247b1ae5b4
                    • Instruction ID: 668347da88c60333e5261a18a4de1e0e97810df180f73eee6b0cfae5b7cd7d71
                    • Opcode Fuzzy Hash: 5b909e7ea5b0ba733a8e070edc3b7c80e4fdb1d200489636a9f68f247b1ae5b4
                    • Instruction Fuzzy Hash: 00513C71D056688BEB2CCF2B9D446DAFAF7AFC8340F04C1FA994CA6254DB700AC58E10
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: W
                    • API String ID: 0-655174618
                    • Opcode ID: 9eaecb61d1435332228abd640ea39b04b66dccdf7b068626ef7b27328946a4cf
                    • Instruction ID: 04f408ad88a768097194a574c3b3e5a815a8028b49671d59ec5a1f5b00698633
                    • Opcode Fuzzy Hash: 9eaecb61d1435332228abd640ea39b04b66dccdf7b068626ef7b27328946a4cf
                    • Instruction Fuzzy Hash: 59417DB1E05A188BEB18CF67CD4169EFAF3AFC9301F18C1AAC85CAA255DB7055468F11
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: c
                    • API String ID: 0-112844655
                    • Opcode ID: af5d37831a5b808013be5b321eefbf11e83e6b873651bdd9b27789e16e747228
                    • Instruction ID: c8ba9f3bb0849405dbbb20ddbd9b9aecd716547250a6b845be3cad2be201d3dc
                    • Opcode Fuzzy Hash: af5d37831a5b808013be5b321eefbf11e83e6b873651bdd9b27789e16e747228
                    • Instruction Fuzzy Hash: 85412B70E056298BEB68CF6AC848799BBF2BF88304F00C5EAD50DA7254DB704A859F40
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: c
                    • API String ID: 0-112844655
                    • Opcode ID: 917f30054877dc6f737719178a3a7343d876760f1b3b8d4e5f89ea2e2ac67879
                    • Instruction ID: 9558f5a9ed961af70c8f24e25d60f53976243cd465c02119d6ee93f07d73c934
                    • Opcode Fuzzy Hash: 917f30054877dc6f737719178a3a7343d876760f1b3b8d4e5f89ea2e2ac67879
                    • Instruction Fuzzy Hash: AB313A71D0A2548FEB19CF6ACC14799BBF3AF89300F08C5EAC448AB265DB744A858F10
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 44ab9cc6c36117fe00f567413854a491a64ac42eaede93f0bcb71addab794d1f
                    • Instruction ID: a05b4aaed750db311057c8ec78eb9a2d4209ad31d0aa75c2c278f979ba5f82c8
                    • Opcode Fuzzy Hash: 44ab9cc6c36117fe00f567413854a491a64ac42eaede93f0bcb71addab794d1f
                    • Instruction Fuzzy Hash: 8212B671E056188BDB14CFAAC98169DFBF2FF88304F24C16AD459EB219D734A946CF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 238161f2e7af65e44288dbac37368879221228fafdb969e3ecf54a944683e850
                    • Instruction ID: da50337632b2e18b8bf4e5d376360a009610106248d0af0631c4d3a3d47bdff8
                    • Opcode Fuzzy Hash: 238161f2e7af65e44288dbac37368879221228fafdb969e3ecf54a944683e850
                    • Instruction Fuzzy Hash: 8A31CAB0D056588BEB59CF6AC85478EFBF2AFC5304F14C1AAC44CAB265DB751946CF01
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826177779.00000000060C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_60c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c0d5a5389f9abc050f1be855d658734475552d3606a093f36bce0343b22b3b27
                    • Instruction ID: 802b87e8f34c35082b0b1fcd67097e8b66fcad1e926407e7b1fb99a40d5a4fd3
                    • Opcode Fuzzy Hash: c0d5a5389f9abc050f1be855d658734475552d3606a093f36bce0343b22b3b27
                    • Instruction Fuzzy Hash: 36B16770E45218CFEB94DFA9D884BAEBBF1FF89314F109069D44AAB290DB755984CF40
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826177779.00000000060C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_60c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 692e7a0e9e0a9d2a33b1ecfff6824332dadd6ed9fd2b979f5b74f47989910792
                    • Instruction ID: 70eaeb53bdeea53a07df550e9757fcdb6f0182f6d21a44f11f6804816cc3440b
                    • Opcode Fuzzy Hash: 692e7a0e9e0a9d2a33b1ecfff6824332dadd6ed9fd2b979f5b74f47989910792
                    • Instruction Fuzzy Hash: A6B17870E45208CFEB94DFA9D884BAEBBF1FF89314F108069D44AAB290DB755984CF40
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 686998e6517734d45f72a86bb5cb9b68a5e8326d14a38c843cf8eaa330839d81
                    • Instruction ID: 7d2a4bff9c26fbd279b30c12ff16ea76a92388b9010a79607c7eee0bb9b65a54
                    • Opcode Fuzzy Hash: 686998e6517734d45f72a86bb5cb9b68a5e8326d14a38c843cf8eaa330839d81
                    • Instruction Fuzzy Hash: 44A1C174E042189FDB64DFA9D844B9DBBB2FF89300F2090A9D54DA7351DB30AD858F61
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826177779.00000000060C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_60c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 60bce43d470c782bb354da2dd51ce73b883e96411121b738f0f7e778cf70879c
                    • Instruction ID: a959923465e5e802660b72ade1b31fe3a78af77db1585fa8611735db1e892dee
                    • Opcode Fuzzy Hash: 60bce43d470c782bb354da2dd51ce73b883e96411121b738f0f7e778cf70879c
                    • Instruction Fuzzy Hash: 10812974E44208CFEB48DFA9D484BADBBF5FF89314F109129E00AAB294DB755885CF54
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826177779.00000000060C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_60c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fc92128e9f8997c00af8b2305f3fcb51b48ad3fa1c415e20bf96b713a9e9140d
                    • Instruction ID: 00843d0874762ad70116dbd2fd9fc6ae1f1074cb923886ec25112896080f63e7
                    • Opcode Fuzzy Hash: fc92128e9f8997c00af8b2305f3fcb51b48ad3fa1c415e20bf96b713a9e9140d
                    • Instruction Fuzzy Hash: 53812874E44208CFDB48DFA9D494BADBBF1FF89314F10912AE00AAB294DB755885CF54
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2256bad4844cc7d641a21d39bfc2cce30a02cdeab9ebcf04b0c1bf8f65825d60
                    • Instruction ID: ae791e2309a5b4fda2867a6c2f8db143f4eed89551aeb5e356a0d501cb6f6b75
                    • Opcode Fuzzy Hash: 2256bad4844cc7d641a21d39bfc2cce30a02cdeab9ebcf04b0c1bf8f65825d60
                    • Instruction Fuzzy Hash: FE81C2B0D06219CFDB24CFA9C6487EEBBF1EB89304F20A46ED519B7240D7B50A45CB54
                    Memory Dump Source
                    • Source File: 00000000.00000002.1826216056.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6130000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 60c2226ad4cc6ed02d0d5a7276756b1541d8429d6a2e399f352363842edd192a
                    • Instruction ID: 24313f74028ef524d19964ba9b9c5ab521ed9995062add62c62d63055b6e4530
                    • Opcode Fuzzy Hash: 60c2226ad4cc6ed02d0d5a7276756b1541d8429d6a2e399f352363842edd192a
                    • Instruction Fuzzy Hash: AE810770D06218CFEBA8EF69C844BADBBB6BF89344F11C4A9D419B7250DB705985CF81
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3a5e554a7a330eed2018a90c58ebed51f88ccc60d4c8b99b6500a8a243a32740
                    • Instruction ID: 78b1b2b907bce40a200d91c38415fbd2c3c74d41dbe2b9df4f8d9d41df594c8c
                    • Opcode Fuzzy Hash: 3a5e554a7a330eed2018a90c58ebed51f88ccc60d4c8b99b6500a8a243a32740
                    • Instruction Fuzzy Hash: A071B2B0D06219CFDB24CFA9C6487EEBBF1EB89304F20A46ED515B7250D7B50945CB58
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d8476df6e118a86a27f035e8a60a430e413346d662e59d98fc1651895f5e8704
                    • Instruction ID: 92ac29e97d599e6dd4faa3b8d86752ebbf7aeb54971f80d9297c44271db91dc6
                    • Opcode Fuzzy Hash: d8476df6e118a86a27f035e8a60a430e413346d662e59d98fc1651895f5e8704
                    • Instruction Fuzzy Hash: 84512470E09208CFEB14DFA9E948BEDBBF2FF89304F146029D149AB255EB745946CB00
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824610975.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d90000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 23a8363b6fce5e32b54add046ee12a058ff29b33defe411acbf13649869e7f5f
                    • Instruction ID: a0fcc0b8f832ca3c0f8fe82141c1905caef682206d29399947ab14a06deccc19
                    • Opcode Fuzzy Hash: 23a8363b6fce5e32b54add046ee12a058ff29b33defe411acbf13649869e7f5f
                    • Instruction Fuzzy Hash: F1516D71D056588BEB29CF2B9D556C9FBF3AFC9300F08C1FA944CA6255EB7409868F10
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c1458b5c53d7897e08b1f19b5d9d530a54d98fb0fff592da3b424fb334d2bd3c
                    • Instruction ID: 81ff1539748cfb745f6266bb85e18237c6989b3c3143cd78501d8b6c0da5d5c3
                    • Opcode Fuzzy Hash: c1458b5c53d7897e08b1f19b5d9d530a54d98fb0fff592da3b424fb334d2bd3c
                    • Instruction Fuzzy Hash: 3E4147B1E016198BDB08CFABD94069EFBF3BFC8310F14C07AD958AB214DB3059458B54
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824610975.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d90000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 56c5f7256135184c21749f73949720b84ee1e14b0365696377288fbe2ea1cf16
                    • Instruction ID: 51d97144fcf8f89b815b48da37c298d8528e605bb26598f3feb1f32da8712e36
                    • Opcode Fuzzy Hash: 56c5f7256135184c21749f73949720b84ee1e14b0365696377288fbe2ea1cf16
                    • Instruction Fuzzy Hash: 2F41EFB0D003489FDF14DFA9D985AADFBF2BB0A314F20912AE819AB350D774A845CF45
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 92b08ecbbd9bcb63209b495048abe171c8cd7a57995cdabf12c3de6ffbe16f0b
                    • Instruction ID: 6462f05730555718f276007d085badf1d7c140ccbab3305e1c7f7168c2313fde
                    • Opcode Fuzzy Hash: 92b08ecbbd9bcb63209b495048abe171c8cd7a57995cdabf12c3de6ffbe16f0b
                    • Instruction Fuzzy Hash: C941F471E05208CFEB14DFA9E548AEDBBF2FF89304F146029D149AB255DB746992CF04
                    Memory Dump Source
                    • Source File: 00000000.00000002.1807716949.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_27c0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5b0e8d394dec89837bbcd018498c4522e153980ed5f22df552a1a58072b84339
                    • Instruction ID: ce0d2a1b9520cf51f8f14e6eaf9ee39ec4ce3b269e632622a83e9f4c0a5fb932
                    • Opcode Fuzzy Hash: 5b0e8d394dec89837bbcd018498c4522e153980ed5f22df552a1a58072b84339
                    • Instruction Fuzzy Hash: 1741B974D056188FEB98DF6AC958799BBF6BF88304F14C1A9C40DA7264DB711A85CF01
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e611499f64e597fad4da61c0c352929b79a83d05573aa86e4f38bc1e239f7215
                    • Instruction ID: 3c853bc429c9eed97ba6aaf08818268665c65a66da607432a9ce7350383243e6
                    • Opcode Fuzzy Hash: e611499f64e597fad4da61c0c352929b79a83d05573aa86e4f38bc1e239f7215
                    • Instruction Fuzzy Hash: 754111B5D00258DFCB10CFA9D581AEEFBF1AB49320F24902AE454B7240D778AA45CFA4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c16cebe094a8e5248dff6fc9fd3fc345c9c4723669e45b4fdc9f85b7d3d88cdf
                    • Instruction ID: 9f1b04f5cafd9aca6abd63818470040ab4f563c87e7b0e05cd191dc0486e64c7
                    • Opcode Fuzzy Hash: c16cebe094a8e5248dff6fc9fd3fc345c9c4723669e45b4fdc9f85b7d3d88cdf
                    • Instruction Fuzzy Hash: A241FEB5D04258DFDB00CFA9D480AEEFBF5AB49320F24902AE455B7240D778AA45CF64
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824223343.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d30000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 732d3716219099e06ed0d5bcfc403d167c0c0ba50776b93b171f53ad167c9262
                    • Instruction ID: 316f7ebd367204bb2b57e3660f14aa83aef7eb989495ee974a0935321ed8b71d
                    • Opcode Fuzzy Hash: 732d3716219099e06ed0d5bcfc403d167c0c0ba50776b93b171f53ad167c9262
                    • Instruction Fuzzy Hash: 3B217171E056198BEB5CDF6BCC4969AFAF7AFC9300F18C1FA844CA6214DB3449858F40
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 56c0e9979cab9dde92c9cc226b6759d95573f02b591b75d9ffbd2cdbd59d14bd
                    • Instruction ID: 4d175a76904cd095a5f8215bcda52b14dfab1980bcad0fe468b7e2956308d6c8
                    • Opcode Fuzzy Hash: 56c0e9979cab9dde92c9cc226b6759d95573f02b591b75d9ffbd2cdbd59d14bd
                    • Instruction Fuzzy Hash: B3210FB5D00218DFCB10CFA9D981AEEBBF5BB48320F10901AD809B7310CB35A905CF64
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 37c1bde2d5202266ffa49b7564937a7ba3fa97723f68ee2c5fbdb624a6f84094
                    • Instruction ID: 51bfc8a5256688fed83a9bcef7252a8f100ce18287411bc7674e919c9b7d1922
                    • Opcode Fuzzy Hash: 37c1bde2d5202266ffa49b7564937a7ba3fa97723f68ee2c5fbdb624a6f84094
                    • Instruction Fuzzy Hash: 9521EDB5D002189FCB10CFA9D981AEEFBF5BB49320F10901AE919B7210CB35A905CFA4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9a9a1061450f8310583c46b525b46b5d9df0cc50944384e9df057f6177ee7c9f
                    • Instruction ID: baef2b6c641e7db4bac3fe3bd581ec66c8d9c35ab5c596b7932d0c6a70947007
                    • Opcode Fuzzy Hash: 9a9a1061450f8310583c46b525b46b5d9df0cc50944384e9df057f6177ee7c9f
                    • Instruction Fuzzy Hash: 3521A771D05A288BEB18CFABCD047DEBAF7AFC9301F04D06A9459AB259EB7005458E44
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8d87ba387466c7913427af0146beb4a2a31d650e1108f3fbeba7ce5b6442d1d8
                    • Instruction ID: 2221dfaf90287830e264bbab43c52feb5feebe0e07bbebe9096c638796da56b4
                    • Opcode Fuzzy Hash: 8d87ba387466c7913427af0146beb4a2a31d650e1108f3fbeba7ce5b6442d1d8
                    • Instruction Fuzzy Hash: CD21C2B1E056189BEB18CFABC94479EFBF7BFC8300F14C16AD508AA264DB7509468F54
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825516670.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ef0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 75320daa4762ab84d5825b9b98a75ba462a59875b8c7e9bd2e7b66ee23c9b6ae
                    • Instruction ID: d04597f54ed7a925abf9db3821854c5ec3401381b1ad8d5c6491c5c931960fc1
                    • Opcode Fuzzy Hash: 75320daa4762ab84d5825b9b98a75ba462a59875b8c7e9bd2e7b66ee23c9b6ae
                    • Instruction Fuzzy Hash: 8421BEB1E05618CBEB18CF9AC8447DEBBFABB88300F04C16AD519AA254EB7508458F54
                    Memory Dump Source
                    • Source File: 00000000.00000002.1824610975.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5d90000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2049433d0b28140e5ce38c944755d850836159a86179302928d81a6365b8dea4
                    • Instruction ID: 6774fe64bab4f15301317bf4063e4140c0639c8ff35703174eda7145aab006db
                    • Opcode Fuzzy Hash: 2049433d0b28140e5ce38c944755d850836159a86179302928d81a6365b8dea4
                    • Instruction Fuzzy Hash: 9121C971D05618DBDB5CCF6B89006D9FBF7AFC9300F08C4AAC489A7214DB714A858E45
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825325119.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5eb0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ccb89d32e0fcf42e612a768c2704de0396ad5f97b8613991d59f58d061f777ea
                    • Instruction ID: b4d1d558f81686963e86a005fd18828154e3ae34e48af9210ec7fd75950f7df7
                    • Opcode Fuzzy Hash: ccb89d32e0fcf42e612a768c2704de0396ad5f97b8613991d59f58d061f777ea
                    • Instruction Fuzzy Hash: D321A971D006188BEB18CFABCD442DEBBF7AFC9301F04C06AD458AB254EB7445458F40
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1825268040.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5ea0000_PO# EB202329720241007_Hardy_Process^^^^.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq$4'fq$4'fq$4'fq$4'fq$pjq
                    • API String ID: 0-799542208
                    • Opcode ID: 5adbf2bf47792444fe211c7dbb3f6207af38ce7350b8b836afc7491ad35bc1b6
                    • Instruction ID: 810fd41f9f3ece75cba71d0c945c3f1b0305e8f88e0745d8287c456fbe63ef2c
                    • Opcode Fuzzy Hash: 5adbf2bf47792444fe211c7dbb3f6207af38ce7350b8b836afc7491ad35bc1b6
                    • Instruction Fuzzy Hash: B5D16E76A00114DFCB09DFA8C944E9A7BB2FF88314F058498E649AF272DB31ED55DB90

                    Execution Graph

                    Execution Coverage:13.7%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:0%
                    Total number of Nodes:94
                    Total number of Limit Nodes:6
                    execution_graph 1539 be8a4a 1540 be8a6e 1539->1540 1541 be8b58 1539->1541 1579 beb2cb 1540->1579 1551 be9d24 1541->1551 1544 be8a86 1545 beb2cb LoadLibraryA 1544->1545 1550 be8afe 1544->1550 1546 be8ac8 1545->1546 1547 beb2cb LoadLibraryA 1546->1547 1548 be8ae4 1547->1548 1549 beb2cb LoadLibraryA 1548->1549 1549->1550 1552 beb2cb LoadLibraryA 1551->1552 1553 be9d47 1552->1553 1554 beb2cb LoadLibraryA 1553->1554 1555 be9d5f 1554->1555 1556 beb2cb LoadLibraryA 1555->1556 1557 be9d7d 1556->1557 1558 be9da6 1557->1558 1559 be9d92 VirtualAlloc 1557->1559 1558->1550 1559->1558 1561 be9dc0 1559->1561 1560 beb2cb LoadLibraryA 1562 be9e3e 1560->1562 1561->1560 1577 bea022 1561->1577 1562->1558 1566 be9e94 1562->1566 1583 beb0d2 1562->1583 1563 beb2cb LoadLibraryA 1563->1566 1565 be9ef6 1565->1577 1578 be9f58 1565->1578 1587 be8eb4 1565->1587 1566->1563 1566->1565 1566->1577 1567 bea0d7 VirtualFree 1567->1558 1568 bea0e9 RtlExitUserProcess 1567->1568 1568->1558 1571 bea064 1618 bea454 1571->1618 1572 bea019 1572->1577 1610 be9b15 1572->1610 1576 bea076 1576->1576 1577->1567 1577->1576 1578->1571 1578->1572 1578->1577 1581 beb2e2 1579->1581 1580 beb309 1580->1544 1581->1580 1642 be93d0 1581->1642 1584 beb0e7 1583->1584 1585 beb15d LoadLibraryA 1584->1585 1586 beb167 1584->1586 1585->1586 1586->1562 1588 beb0d2 LoadLibraryA 1587->1588 1589 be8ec8 1588->1589 1592 be8ed0 1589->1592 1628 beb170 1589->1628 1592->1577 1601 be8faf 1592->1601 1593 be8f06 VirtualProtect 1593->1592 1594 be8f1a 1593->1594 1595 be8f34 VirtualProtect 1594->1595 1596 beb170 LoadLibraryA 1595->1596 1597 be8f55 1596->1597 1597->1592 1598 be8f6c VirtualProtect 1597->1598 1598->1592 1599 be8f7c 1598->1599 1600 be8f91 VirtualProtect 1599->1600 1600->1592 1602 beb0d2 LoadLibraryA 1601->1602 1603 be8fc5 1602->1603 1604 beb170 LoadLibraryA 1603->1604 1605 be8fd5 1604->1605 1606 be8fde VirtualProtect 1605->1606 1607 be9012 1605->1607 1606->1607 1608 be8fee 1606->1608 1607->1578 1609 be8ffd VirtualProtect 1608->1609 1609->1607 1612 be9b48 1610->1612 1611 be9bf3 1611->1577 1612->1611 1613 be9c3a SysAllocString 1612->1613 1614 be9c22 1612->1614 1613->1614 1614->1611 1615 be9c8e SafeArrayCreate 1614->1615 1615->1611 1616 be9cb2 1615->1616 1617 be9d0e SafeArrayDestroy 1616->1617 1617->1611 1623 bea48f 1618->1623 1619 bea8d5 1627 beab03 1619->1627 1638 beae85 1619->1638 1620 beb0d2 LoadLibraryA 1620->1623 1621 beb0d2 LoadLibraryA 1622 bea837 1621->1622 1622->1619 1622->1621 1625 beb170 LoadLibraryA 1622->1625 1623->1620 1623->1622 1624 beb170 LoadLibraryA 1623->1624 1623->1627 1624->1623 1625->1622 1627->1577 1629 beb18b 1628->1629 1631 be8ee8 1628->1631 1629->1631 1632 be9575 1629->1632 1631->1592 1631->1593 1633 be95ba 1632->1633 1636 be9594 1632->1636 1634 beb0d2 LoadLibraryA 1633->1634 1635 be95c7 1633->1635 1634->1635 1635->1631 1636->1633 1636->1635 1637 beb170 LoadLibraryA 1636->1637 1637->1636 1641 beaead 1638->1641 1639 beb09f 1639->1627 1640 beb170 LoadLibraryA 1640->1641 1641->1639 1641->1640 1643 be94d5 1642->1643 1644 be93f0 1642->1644 1643->1581 1644->1643 1645 be9575 LoadLibraryA 1644->1645 1645->1643

                    Callgraph

                    • Executed
                    • Not Executed
                    • Opacity -> Relevance
                    • Disassembly available
                    callgraph 0 Function_00BE96BA 1 Function_00BE8DBB 82 Function_00BEB764 1->82 2 Function_00BE8CB8 3 Function_00BE8DB6 4 Function_00BE8EB4 35 Function_00BEB0D2 4->35 40 Function_00BEB0C8 4->40 75 Function_00BEB170 4->75 96 Function_00BEB740 4->96 5 Function_010AD006 6 Function_00B601A6 7 Function_00BE8FAF 7->35 7->75 7->96 8 Function_00BEB0AD 9 Function_00BE8EAB 10 Function_010AD01D 11 Function_00BEB7A0 12 Function_00BE969E 13 Function_00BE8E9F 14 Function_010AD12C 15 Function_00BE9696 16 Function_00BE8E95 17 Function_010AD127 18 Function_00BE968E 19 Function_00BE898C 20 Function_00BE8E89 21 Function_00BE8584 22 Function_00BEAE85 32 Function_00BE9AD4 22->32 22->75 22->96 23 Function_00BE8B83 23->40 24 Function_00BE8BFA 25 Function_00BE85F8 26 Function_00BEA0F4 26->5 26->8 26->10 27 Function_00BE96EC 28 Function_00BEB6E6 29 Function_00BE89E4 30 Function_00BE95E1 31 Function_00B601D6 33 Function_00BCB1D7 34 Function_00BEB3D5 35->11 36 Function_00BE93D0 59 Function_00BEB30E 36->59 72 Function_00BE9575 36->72 37 Function_00BEB0CD 38 Function_00BE8CCD 38->40 39 Function_00BEB2CB 39->36 40->37 41 Function_00BE99C7 42 Function_00BE89C4 43 Function_00BEACC2 43->8 43->23 43->38 48 Function_00BE972C 43->48 43->82 44 Function_00BE96C2 45 Function_00B60133 46 Function_00BEB438 47 Function_00BE9A38 48->8 48->40 49 Function_010AD69C 50 Function_00BE9D24 50->4 50->7 50->26 50->30 50->35 50->39 50->43 50->46 55 Function_00BE9018 50->55 56 Function_00BE9B15 50->56 50->59 50->82 89 Function_00BEA454 50->89 95 Function_00BEB543 50->95 50->96 51 Function_00BE8A20 52 Function_010AD5AB 53 Function_010AD6AB 54 Function_00BEB71D 54->28 55->46 55->59 55->82 55->96 56->5 56->8 56->10 57 Function_010AD0A4 58 Function_010AD0A5 59->34 59->82 60 Function_010AD4BF 61 Function_00BE8E0B 62 Function_00B60000 63 Function_00BE9706 64 Function_00BE8E06 65 Function_010AD5B0 66 Function_00BE8A00 67 Function_00BE967F 68 Function_00B60175 69 Function_010AD6CF 70 Function_00BE8B7B 71 Function_00BEB779 72->35 72->75 73 Function_00BE9A73 73->71 74 Function_010AD4C4 75->71 75->72 76 Function_00BE8C6E 77 Function_010AD3D8 78 Function_00BE8B6C 79 Function_00BE8568 80 Function_00BE8C69 81 Function_010AD3D3 83 Function_010AD6D4 84 Function_00B68E68 85 Function_00BE9A60 86 Function_010AD2E8 87 Function_00BE8C59 88 Function_010AD2E3 89->8 89->22 89->35 89->71 89->73 89->75 89->82 89->96 90 Function_00BE9A50 91 Function_00BE8A4A 91->39 91->40 91->50 92 Function_010AD1FC 93 Function_00BE8748 93->19 94 Function_010AD1F7 95->28 95->54

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00BEB0D2: LoadLibraryA.KERNELBASE(00000000,?,?), ref: 00BEB164
                    • VirtualProtect.KERNELBASE(00000000,0000000C,00000040,?), ref: 00BE8F0F
                    • VirtualProtect.KERNELBASE(00000000,0000000C,?,?), ref: 00BE8F42
                    • VirtualProtect.KERNELBASE(00000000,0040145E,00000040,?), ref: 00BE8F75
                    • VirtualProtect.KERNELBASE(00000000,0040145E,?,?), ref: 00BE8F9F
                    Memory Dump Source
                    • Source File: 00000001.00000002.1814780379.0000000000B60000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_InstallUtil.jbxd
                    Yara matches
                    Similarity
                    • API ID: ProtectVirtual$LibraryLoad
                    • String ID:
                    • API String ID: 895956442-0
                    • Opcode ID: 93985e93d1afab8f719b8aa13ce6a91e230957808ceab0eaee363415b4ddc148
                    • Instruction ID: d3c431b05d77f6a56327d26fe04f2bd69217cbc8eb8ceedd5cc6e5272927803e
                    • Opcode Fuzzy Hash: 93985e93d1afab8f719b8aa13ce6a91e230957808ceab0eaee363415b4ddc148
                    • Instruction Fuzzy Hash: C82106726047897FE310AA629C45FB776DCDB85311F0008BEFA4AD2052FB69AD0583B1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 26 beb0d2-beb0e5 27 beb0fd-beb107 26->27 28 beb0e7-beb0ea 26->28 30 beb109-beb111 27->30 31 beb116-beb122 27->31 29 beb0ec-beb0ef 28->29 29->27 32 beb0f1-beb0fb 29->32 30->31 33 beb125-beb12a 31->33 32->27 32->29 34 beb12c-beb137 33->34 35 beb15d-beb164 LoadLibraryA 33->35 36 beb139-beb151 call beb7a0 34->36 37 beb153-beb157 34->37 38 beb167-beb16b 35->38 36->37 42 beb16c-beb16e 36->42 37->33 40 beb159-beb15b 37->40 40->35 40->38 42->38
                    APIs
                    • LoadLibraryA.KERNELBASE(00000000,?,?), ref: 00BEB164
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1814780379.0000000000B60000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_InstallUtil.jbxd
                    Yara matches
                    Similarity
                    • API ID: LibraryLoad
                    • String ID: .$.dll
                    • API String ID: 1029625771-979041800
                    • Opcode ID: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                    • Instruction ID: e925cbc42197e6ec2d92b084c190a09a8edc4715e3161d964c0dec726c9df6b4
                    • Opcode Fuzzy Hash: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                    • Instruction Fuzzy Hash: DD21B4356142C59FDB21CFAEC894F6B7BE4EF05360F1841ADD816ABA42D730EC458781

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 43 be9d24-be9d88 call beb2cb * 3 50 be9d8a-be9d8c 43->50 51 be9db2 43->51 50->51 52 be9d8e-be9d90 50->52 53 be9db5-be9dbf 51->53 52->51 54 be9d92-be9da4 VirtualAlloc 52->54 55 be9da6-be9dad 54->55 56 be9dc0-be9de3 call beb740 call beb764 54->56 55->51 57 be9daf 55->57 62 be9e2d-be9e46 call beb2cb 56->62 63 be9de5-be9e1b call beb438 call beb30e 56->63 57->51 62->51 69 be9e4c 62->69 72 bea07c-bea085 63->72 73 be9e21-be9e27 63->73 71 be9e52-be9e58 69->71 74 be9e5a-be9e60 71->74 75 be9e94-be9e9d 71->75 78 bea08c-bea094 72->78 79 bea087-bea08a 72->79 73->62 73->72 80 be9e62-be9e65 74->80 76 be9e9f-be9ea5 75->76 77 be9ef6-be9f01 75->77 81 be9ea9-be9ec4 call beb2cb 76->81 84 be9f1a-be9f1d 77->84 85 be9f03-be9f0c call be9018 77->85 82 bea0c3 78->82 83 bea096-bea0c1 call beb764 78->83 79->78 79->82 86 be9e79-be9e7b 80->86 87 be9e67-be9e6c 80->87 106 be9ec6-be9ece 81->106 107 be9ee3-be9ef4 81->107 93 bea0c7-bea0e7 call beb764 VirtualFree 82->93 83->93 89 bea078 84->89 90 be9f23-be9f2c 84->90 85->89 109 be9f12-be9f18 85->109 86->75 88 be9e7d-be9e8b call beb0d2 86->88 87->86 95 be9e6e-be9e77 87->95 103 be9e90-be9e92 88->103 89->72 97 be9f2e 90->97 98 be9f32-be9f39 90->98 110 bea0ed-bea0ef 93->110 111 bea0e9-bea0eb RtlExitUserProcess 93->111 95->80 95->86 97->98 104 be9f3b-be9f44 call be8eb4 98->104 105 be9f69-be9f6d 98->105 103->71 120 be9f46-be9f4c 104->120 121 be9f52-be9f53 call be8faf 104->121 115 bea00f-bea012 105->115 116 be9f73-be9f95 105->116 106->89 113 be9ed4-be9edd 106->113 107->77 107->81 109->98 110->53 111->110 113->89 113->107 118 bea064-bea066 call bea454 115->118 119 bea014-bea017 115->119 116->89 126 be9f9b-be9fae call beb740 116->126 125 bea06b-bea06c 118->125 119->118 122 bea019-bea01c 119->122 120->89 120->121 134 be9f58-be9f5b 121->134 128 bea01e-bea020 122->128 129 bea035-bea046 call be9b15 122->129 131 bea06d-bea074 125->131 142 be9fd2-bea00b 126->142 143 be9fb0-be9fb4 126->143 128->129 130 bea022-bea025 128->130 144 bea048-bea04f call bea0f4 129->144 145 bea057-bea062 call be95e1 129->145 135 bea02c-bea033 call beacc2 130->135 136 bea027-bea02a 130->136 131->89 137 bea076 131->137 134->105 140 be9f5d-be9f63 134->140 135->125 136->131 136->135 137->137 140->89 140->105 142->89 155 bea00d 142->155 143->142 147 be9fb6-be9fb9 143->147 152 bea054 144->152 145->125 147->115 150 be9fbb-be9fd0 call beb543 147->150 150->155 152->145 155->115
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00BE9D9E
                    • VirtualFree.KERNELBASE(00000000,00000000,0000C000), ref: 00BEA0E2
                    • RtlExitUserProcess.NTDLL(00000000), ref: 00BEA0EB
                    Memory Dump Source
                    • Source File: 00000001.00000002.1814780379.0000000000B60000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_InstallUtil.jbxd
                    Yara matches
                    Similarity
                    • API ID: Virtual$AllocExitFreeProcessUser
                    • String ID:
                    • API String ID: 1828502597-0
                    • Opcode ID: 1a5418cea19d400be9e889379b85ba4036e89269bda122047750eba29fcf4b87
                    • Instruction ID: 401b6a8d05a6649ce82ce1c69e23d992f75384bf8a8b9d19519fbb7e1fbd44be
                    • Opcode Fuzzy Hash: 1a5418cea19d400be9e889379b85ba4036e89269bda122047750eba29fcf4b87
                    • Instruction Fuzzy Hash: 63B1F531500B85EBCB31AE62CC80FABB7E8FF45301F1405A9F64982152E731F958DB92

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 157 be9b15-be9b42 158 be9bca-be9bd1 157->158 159 be9b48-be9b5b 157->159 160 be9bef-be9bf1 158->160 161 be9bd3-be9be7 158->161 165 be9bfe-be9c01 159->165 166 be9b61-be9b8d call beb0ad 159->166 163 be9c03-be9c0e 160->163 164 be9bf3-be9bf9 160->164 161->160 170 be9c14-be9c20 163->170 171 be9d15 163->171 167 be9d19-be9d23 164->167 165->161 179 be9b8f-be9b9e 166->179 180 be9bc3 166->180 173 be9c2e-be9c56 call beb0ad SysAllocString 170->173 174 be9c22-be9c2c 170->174 171->167 184 be9c5a-be9c69 173->184 181 be9c6c-be9c6e 174->181 179->161 186 be9ba0-be9ba5 179->186 182 be9bc6-be9bc8 180->182 181->171 185 be9c74-be9c88 181->185 182->158 182->161 184->181 185->171 190 be9c8e-be9cb0 SafeArrayCreate 185->190 186->182 187 be9ba7-be9bbd 186->187 192 be9bc1 187->192 190->171 191 be9cb2-be9cbd 190->191 193 be9cbf-be9cd0 191->193 194 be9cd2-be9cdb 191->194 192->182 193->193 193->194 198 be9cdd call 10ad01d 194->198 199 be9cdd call 10ad006 194->199 195 be9ce3-be9cf9 196 be9d0e-be9d0f SafeArrayDestroy 195->196 197 be9cfb-be9d0c 195->197 196->171 197->196 197->197 198->195 199->195
                    APIs
                    • SysAllocString.OLEAUT32(?), ref: 00BE9C42
                    • SafeArrayCreate.OLEAUT32(00000011,00000001,?), ref: 00BE9CA6
                    • SafeArrayDestroy.OLEAUT32(00000000), ref: 00BE9D0F
                    Memory Dump Source
                    • Source File: 00000001.00000002.1814780379.0000000000B60000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_InstallUtil.jbxd
                    Yara matches
                    Similarity
                    • API ID: ArraySafe$AllocCreateDestroyString
                    • String ID:
                    • API String ID: 2997030761-0
                    • Opcode ID: e9dae07e6597974dd7a2e07dc59b16717cc00198222b0edab0e98d7cec828a5a
                    • Instruction ID: 83959176779a8c3d1a93b617da3202efe26d69c27f9dd44d07e567093282d65b
                    • Opcode Fuzzy Hash: e9dae07e6597974dd7a2e07dc59b16717cc00198222b0edab0e98d7cec828a5a
                    • Instruction Fuzzy Hash: D3614B71204246AFDB14DF61C884FA7B7E8FF49705F1486A9E959CB105DB30E909CFA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 200 be8faf-be8fdc call beb0d2 call beb170 205 be8fde-be8fec VirtualProtect 200->205 206 be9012 200->206 205->206 207 be8fee-be9010 call beb740 VirtualProtect 205->207 208 be9014-be9017 206->208 207->208
                    APIs
                      • Part of subcall function 00BEB0D2: LoadLibraryA.KERNELBASE(00000000,?,?), ref: 00BEB164
                    • VirtualProtect.KERNELBASE(00000000,00000004,00000040,?), ref: 00BE8FE7
                    • VirtualProtect.KERNELBASE(00000000,00000004,?,?), ref: 00BE900A
                    Memory Dump Source
                    • Source File: 00000001.00000002.1814780379.0000000000B60000.00000040.00000400.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_InstallUtil.jbxd
                    Yara matches
                    Similarity
                    • API ID: ProtectVirtual$LibraryLoad
                    • String ID:
                    • API String ID: 895956442-0
                    • Opcode ID: 4b81b02862df4f1b90606a87d7a95fef9c5f7f2dde159036914d36a532f09deb
                    • Instruction ID: 58c0be49eef6933f5e613cf4835b1ac5fdf2f2b7673e0a2e9326acf0dfa7b649
                    • Opcode Fuzzy Hash: 4b81b02862df4f1b90606a87d7a95fef9c5f7f2dde159036914d36a532f09deb
                    • Instruction Fuzzy Hash: 38F0AFB61006087EE620AA66CC42FFB73ECDF89B50F400468FB06D6081EB61EA0597B5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 282 10ad4c4-10ad4d6 283 10ad56a-10ad571 282->283 284 10ad4dc 282->284 285 10ad4de-10ad4ea 283->285 284->285 287 10ad4f0-10ad512 285->287 288 10ad576-10ad57b 285->288 289 10ad580-10ad595 287->289 290 10ad514-10ad532 287->290 288->287 294 10ad54c-10ad554 289->294 293 10ad53a-10ad54a 290->293 293->294 295 10ad5a2 293->295 296 10ad556-10ad567 294->296 297 10ad597-10ad5a0 294->297 297->296
                    Memory Dump Source
                    • Source File: 00000001.00000002.1815805331.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_10ad000_InstallUtil.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 76ac5525f5f826bd73fd8174169ae0cd69e9c78ae65cead5310b88113c8e4a0a
                    • Instruction ID: 39da6e0cbdf8cbd1a13ccb0462c7762cc67b09a9da96d9d957928a0ce9af01d6
                    • Opcode Fuzzy Hash: 76ac5525f5f826bd73fd8174169ae0cd69e9c78ae65cead5310b88113c8e4a0a
                    • Instruction Fuzzy Hash: 9C2167B1504200DFCB05DFA8D9C0F2ABFA5FB88318F64C5ADE9890B616C336D446CBA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 299 10ad4bf-10ad4d6 300 10ad56a-10ad571 299->300 301 10ad4dc 299->301 302 10ad4de-10ad4ea 300->302 301->302 304 10ad4f0-10ad512 302->304 305 10ad576-10ad57b 302->305 306 10ad580-10ad595 304->306 307 10ad514-10ad532 304->307 305->304 311 10ad54c-10ad554 306->311 310 10ad53a-10ad54a 307->310 310->311 312 10ad5a2 310->312 313 10ad556-10ad567 311->313 314 10ad597-10ad5a0 311->314 314->313
                    Memory Dump Source
                    • Source File: 00000001.00000002.1815805331.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_10ad000_InstallUtil.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 78d241bac5f9e434cbf566c7ece8cd0614e0595df08b723599ec006d9c96ac54
                    • Instruction ID: 5dcd0da9ad601c18d2c9c5cfdb08d746f9366646cbf43c2130ecd151dc11511a
                    • Opcode Fuzzy Hash: 78d241bac5f9e434cbf566c7ece8cd0614e0595df08b723599ec006d9c96ac54
                    • Instruction Fuzzy Hash: 5C11D376504280CFDB16CF54D5C4B16BFB1FB84318F24C6A9D9894B616C33AD45ACBA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 316 10ad006-10ad03d 319 10ad03f-10ad04a 316->319 320 10ad08d-10ad095 316->320 321 10ad04c-10ad05a 319->321 322 10ad082-10ad089 319->322 320->319 324 10ad060 321->324 322->321 326 10ad08b 322->326 327 10ad063-10ad06b 324->327 326->327 328 10ad07b-10ad080 327->328 329 10ad06d-10ad075 327->329 328->329
                    Memory Dump Source
                    • Source File: 00000001.00000002.1815805331.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_10ad000_InstallUtil.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4c8200b6e0dfc021c56788a08b7a6ec12e2cbbcf7c4a5f2d33c872cfa02cffb1
                    • Instruction ID: 8bbcb3302075b94605aaa10f1a564ada1dba5452cc763fd6683da20c82f0a689
                    • Opcode Fuzzy Hash: 4c8200b6e0dfc021c56788a08b7a6ec12e2cbbcf7c4a5f2d33c872cfa02cffb1
                    • Instruction Fuzzy Hash: 7A018C7144E3C05FE7134B698C94B52BFA8DF53624F1980DBE9888F5A3C2699C45C772

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 331 10ad01d-10ad03d 332 10ad03f-10ad04a 331->332 333 10ad08d-10ad095 331->333 334 10ad04c-10ad05a 332->334 335 10ad082-10ad089 332->335 333->332 337 10ad060 334->337 335->334 339 10ad08b 335->339 340 10ad063-10ad06b 337->340 339->340 341 10ad07b-10ad080 340->341 342 10ad06d-10ad075 340->342 341->342
                    Memory Dump Source
                    • Source File: 00000001.00000002.1815805331.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_10ad000_InstallUtil.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ab3b791fd883057105f59cf22051764ba95d8e9cb44b1344de6ac389db68b1fb
                    • Instruction ID: 138cb89c1c55eeec23a3f13b7843448f1ae850a5a1a2502c7d9d61944f56ca21
                    • Opcode Fuzzy Hash: ab3b791fd883057105f59cf22051764ba95d8e9cb44b1344de6ac389db68b1fb
                    • Instruction Fuzzy Hash: A601F2B14493409AE7208AE9C8C4F6ABFD8DF417A4F58C45AFE884B682C678D841C7B1

                    Execution Graph

                    Execution Coverage:14.2%
                    Dynamic/Decrypted Code Coverage:92.7%
                    Signature Coverage:0%
                    Total number of Nodes:247
                    Total number of Limit Nodes:28
                    execution_graph 54195 14a42f8 54196 14a4312 54195->54196 54197 14a4322 54196->54197 54202 6436d83 54196->54202 54205 6439f71 54196->54205 54208 6436c0c 54196->54208 54212 64329e6 54196->54212 54204 643d0a8 VirtualProtect 54202->54204 54203 64301d7 54204->54203 54207 643d0a8 VirtualProtect 54205->54207 54206 64301d7 54207->54206 54209 6436c2b 54208->54209 54211 643d0a8 VirtualProtect 54209->54211 54210 6436c52 54211->54210 54213 6432a05 54212->54213 54215 643d0a8 VirtualProtect 54213->54215 54214 6432a30 54215->54214 54172 643e750 54173 643e794 VirtualAlloc 54172->54173 54175 643e801 54173->54175 54444 655ec00 54445 655ec15 54444->54445 54449 655ec30 54445->54449 54453 655ec40 54445->54453 54446 655ec2b 54451 655ec40 54449->54451 54450 655ed96 54450->54446 54451->54450 54452 655c0e0 8 API calls 54451->54452 54452->54451 54455 655ec6a 54453->54455 54454 655ed96 54454->54446 54455->54454 54456 655c0e0 8 API calls 54455->54456 54456->54455 54151 137d030 54152 137d048 54151->54152 54153 137d0a3 54152->54153 54155 643dc70 54152->54155 54156 643dcc9 54155->54156 54159 643e200 54156->54159 54157 643dcfe 54160 643e22d 54159->54160 54163 643e3c3 54160->54163 54164 643d0a8 54160->54164 54163->54157 54165 643d0cf 54164->54165 54168 643d588 54165->54168 54169 643d5d1 VirtualProtect 54168->54169 54171 643d18c 54169->54171 54171->54157 54191 659ecf0 54192 659ed3f NtProtectVirtualMemory 54191->54192 54194 659edb7 54192->54194 54176 6552648 54177 655265d 54176->54177 54181 6552688 54177->54181 54186 655267a 54177->54186 54178 6552673 54183 65526b2 54181->54183 54182 6552711 54182->54178 54183->54182 54184 6550350 VirtualProtect 54183->54184 54185 6550358 VirtualProtect 54183->54185 54184->54183 54185->54183 54187 6552688 54186->54187 54188 6552711 54187->54188 54189 6550350 VirtualProtect 54187->54189 54190 6550358 VirtualProtect 54187->54190 54188->54178 54189->54187 54190->54187 54216 655ace8 54217 655acfd 54216->54217 54218 655ad13 54217->54218 54226 655ad18 54217->54226 54231 655b11e 54217->54231 54236 655aeae 54217->54236 54241 655ad9c 54217->54241 54246 655ae76 54217->54246 54251 655ada7 54217->54251 54256 655ad28 54217->54256 54228 655ad52 54226->54228 54227 655ad94 54227->54218 54228->54227 54261 655c0d0 54228->54261 54266 655c0e0 54228->54266 54233 655ad85 54231->54233 54232 655ad94 54232->54218 54233->54232 54234 655c0d0 8 API calls 54233->54234 54235 655c0e0 8 API calls 54233->54235 54234->54233 54235->54233 54238 655ad85 54236->54238 54237 655ad94 54237->54218 54238->54237 54239 655c0d0 8 API calls 54238->54239 54240 655c0e0 8 API calls 54238->54240 54239->54238 54240->54238 54243 655ad85 54241->54243 54242 655ad94 54242->54218 54243->54242 54244 655c0d0 8 API calls 54243->54244 54245 655c0e0 8 API calls 54243->54245 54244->54243 54245->54243 54248 655ad85 54246->54248 54247 655ad94 54247->54218 54248->54246 54248->54247 54249 655c0d0 8 API calls 54248->54249 54250 655c0e0 8 API calls 54248->54250 54249->54248 54250->54248 54252 655ad85 54251->54252 54253 655ad94 54252->54253 54254 655c0d0 8 API calls 54252->54254 54255 655c0e0 8 API calls 54252->54255 54253->54218 54254->54252 54255->54252 54258 655ad52 54256->54258 54257 655ad94 54257->54218 54258->54257 54259 655c0d0 8 API calls 54258->54259 54260 655c0e0 8 API calls 54258->54260 54259->54258 54260->54258 54262 655c0e0 54261->54262 54271 655c130 54262->54271 54275 655c120 54262->54275 54263 655c117 54263->54228 54267 655c0f5 54266->54267 54269 655c130 8 API calls 54267->54269 54270 655c120 8 API calls 54267->54270 54268 655c117 54268->54228 54269->54268 54270->54268 54272 655c157 54271->54272 54273 655c2ee 54272->54273 54279 655c3f9 54272->54279 54273->54263 54277 655c130 54275->54277 54276 655c2ee 54276->54263 54277->54276 54278 655c3f9 8 API calls 54277->54278 54278->54277 54280 655c41d 54279->54280 54290 655c87b 54280->54290 54295 655c90e 54280->54295 54301 655c50e 54280->54301 54305 655c5a2 54280->54305 54309 655cb11 54280->54309 54313 655c977 54280->54313 54320 655c884 54280->54320 54324 655caba 54280->54324 54291 655c8c1 54290->54291 54328 6550a50 54291->54328 54332 6550a58 54291->54332 54292 655c8ef 54344 65508e0 54295->54344 54348 65508d8 54295->54348 54296 655c547 54336 6550c21 54296->54336 54340 6550c28 54296->54340 54302 655c53a 54301->54302 54303 6550c21 NtWriteVirtualMemory 54302->54303 54304 6550c28 NtWriteVirtualMemory 54302->54304 54303->54302 54304->54302 54306 655c547 54305->54306 54307 6550c21 NtWriteVirtualMemory 54306->54307 54308 6550c28 NtWriteVirtualMemory 54306->54308 54307->54306 54308->54306 54310 655c547 54309->54310 54311 6550c21 NtWriteVirtualMemory 54310->54311 54312 6550c28 NtWriteVirtualMemory 54310->54312 54311->54310 54312->54310 54314 655c981 54313->54314 54352 655ce69 54314->54352 54367 655ce78 54314->54367 54315 655c547 54316 6550c21 NtWriteVirtualMemory 54315->54316 54317 6550c28 NtWriteVirtualMemory 54315->54317 54316->54315 54317->54315 54321 655c547 54320->54321 54322 6550c21 NtWriteVirtualMemory 54321->54322 54323 6550c28 NtWriteVirtualMemory 54321->54323 54322->54321 54323->54321 54325 655c547 54324->54325 54326 6550c21 NtWriteVirtualMemory 54325->54326 54327 6550c28 NtWriteVirtualMemory 54325->54327 54326->54325 54327->54325 54329 6550a58 NtCreateThreadEx 54328->54329 54331 6550b64 54329->54331 54331->54292 54333 6550aa1 NtCreateThreadEx 54332->54333 54335 6550b64 54333->54335 54335->54292 54337 6550c28 NtWriteVirtualMemory 54336->54337 54339 6550d0d 54337->54339 54339->54296 54341 6550c74 NtWriteVirtualMemory 54340->54341 54343 6550d0d 54341->54343 54343->54296 54345 655092c NtAllocateVirtualMemory 54344->54345 54347 65509af 54345->54347 54347->54296 54349 65508e0 NtAllocateVirtualMemory 54348->54349 54351 65509af 54349->54351 54351->54296 54353 655ce4d 54352->54353 54354 655ce76 54352->54354 54353->54315 54381 655d3d0 54354->54381 54386 655d3ba 54354->54386 54391 655d74a 54354->54391 54396 655d5bb 54354->54396 54401 655d54b 54354->54401 54406 655d8f8 54354->54406 54411 655d2e8 54354->54411 54416 655cfdd 54354->54416 54421 655d592 54354->54421 54426 655d7b3 54354->54426 54431 655dad0 54354->54431 54368 655ce8f 54367->54368 54370 655d3d0 2 API calls 54368->54370 54371 655dad0 2 API calls 54368->54371 54372 655d7b3 2 API calls 54368->54372 54373 655d592 2 API calls 54368->54373 54374 655cfdd 2 API calls 54368->54374 54375 655d2e8 2 API calls 54368->54375 54376 655d8f8 2 API calls 54368->54376 54377 655d54b 2 API calls 54368->54377 54378 655d5bb 2 API calls 54368->54378 54379 655d74a 2 API calls 54368->54379 54380 655d3ba 2 API calls 54368->54380 54369 655ceb1 54369->54315 54370->54369 54371->54369 54372->54369 54373->54369 54374->54369 54375->54369 54376->54369 54377->54369 54378->54369 54379->54369 54380->54369 54383 655d37b 54381->54383 54382 655d386 54382->54382 54383->54382 54436 659f5a0 54383->54436 54440 659f594 54383->54440 54388 655d37b 54386->54388 54387 655d386 54387->54387 54388->54387 54389 659f5a0 CreateProcessA 54388->54389 54390 659f594 CreateProcessA 54388->54390 54389->54388 54390->54388 54393 655d37b 54391->54393 54392 655d386 54392->54392 54393->54392 54394 659f5a0 CreateProcessA 54393->54394 54395 659f594 CreateProcessA 54393->54395 54394->54393 54395->54393 54398 655d37b 54396->54398 54397 655d386 54397->54397 54398->54397 54399 659f5a0 CreateProcessA 54398->54399 54400 659f594 CreateProcessA 54398->54400 54399->54398 54400->54398 54402 655d37b 54401->54402 54403 655d386 54402->54403 54404 659f5a0 CreateProcessA 54402->54404 54405 659f594 CreateProcessA 54402->54405 54403->54403 54404->54402 54405->54402 54408 655d37b 54406->54408 54407 655d386 54407->54407 54408->54407 54409 659f5a0 CreateProcessA 54408->54409 54410 659f594 CreateProcessA 54408->54410 54409->54408 54410->54408 54412 655d31b 54411->54412 54413 655d386 54412->54413 54414 659f5a0 CreateProcessA 54412->54414 54415 659f594 CreateProcessA 54412->54415 54413->54413 54414->54412 54415->54412 54418 655d2e8 54416->54418 54417 655d386 54417->54417 54418->54417 54419 659f5a0 CreateProcessA 54418->54419 54420 659f594 CreateProcessA 54418->54420 54419->54418 54420->54418 54423 655d37b 54421->54423 54422 655d386 54422->54422 54423->54422 54424 659f5a0 CreateProcessA 54423->54424 54425 659f594 CreateProcessA 54423->54425 54424->54423 54425->54423 54428 655d37b 54426->54428 54427 655d386 54427->54427 54428->54427 54429 659f5a0 CreateProcessA 54428->54429 54430 659f594 CreateProcessA 54428->54430 54429->54428 54430->54428 54433 655d37b 54431->54433 54432 655d386 54432->54432 54433->54432 54434 659f5a0 CreateProcessA 54433->54434 54435 659f594 CreateProcessA 54433->54435 54434->54433 54435->54433 54437 659f620 CreateProcessA 54436->54437 54439 659f81c 54437->54439 54441 659f5a0 CreateProcessA 54440->54441 54443 659f81c 54441->54443 54457 6553338 54458 655332a 54457->54458 54460 6553342 54457->54460 54459 6553333 54458->54459 54462 655346e 54458->54462 54463 6553490 54462->54463 54464 6553786 54463->54464 54465 6550350 VirtualProtect 54463->54465 54466 6550358 VirtualProtect 54463->54466 54464->54459 54465->54463 54466->54463
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,jq$4$$fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq
                    • API String ID: 0-2524271925
                    • Opcode ID: 969069255c7b0f92e13dc0563ab6ff1422fafbcc1052abf209c4692646896489
                    • Instruction ID: 2c2c62cc360d032ad7b737783a9e2f4e3ad9e914ecd75879cdae9311ae7c95e9
                    • Opcode Fuzzy Hash: 969069255c7b0f92e13dc0563ab6ff1422fafbcc1052abf209c4692646896489
                    • Instruction Fuzzy Hash: 90B22734A00229DFDB54EFA5C884BADB7B6BF88704F148599E505AB3A5CB70ED81CF50
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,jq$4$$fq$$fq$$fq$$fq
                    • API String ID: 0-2005009869
                    • Opcode ID: bff02640c98fb0fffcc7738f9369804dd0c2070dab59bff732a57210c6d1cce5
                    • Instruction ID: ed895354cd373ae81ad5fe9dae50b363233e68ba29488eb6a2798c6452924bb9
                    • Opcode Fuzzy Hash: bff02640c98fb0fffcc7738f9369804dd0c2070dab59bff732a57210c6d1cce5
                    • Instruction Fuzzy Hash: 2C222C34A00229DFDB64EF65C994BADB7B6BF48304F1081D9E509AB3A5DB709D81CF50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 710 14a8a90-14a8ab1 711 14a8ab8-14a8b9f 710->711 712 14a8ab3 710->712 714 14a92a1-14a92c9 711->714 715 14a8ba5-14a8ce6 call 14a4e50 711->715 712->711 718 14a99cf-14a99d8 714->718 761 14a926a-14a9294 715->761 762 14a8cec-14a8d47 715->762 719 14a99de-14a99f5 718->719 720 14a92d7-14a92e1 718->720 722 14a92e8-14a93dc call 14a4e50 720->722 723 14a92e3 720->723 743 14a93de-14a93ea 722->743 744 14a9406 722->744 723->722 747 14a93ec-14a93f2 743->747 748 14a93f4-14a93fa 743->748 746 14a940c-14a942c 744->746 753 14a942e-14a9487 746->753 754 14a948c-14a950c 746->754 750 14a9404 747->750 748->750 750->746 766 14a99cc 753->766 772 14a950e-14a9561 754->772 773 14a9563-14a95a6 call 14a4e50 754->773 775 14a929e-14a929f 761->775 776 14a9296 761->776 769 14a8d49 762->769 770 14a8d4c-14a8d57 762->770 766->718 769->770 774 14a917f-14a9185 770->774 800 14a95b1-14a95ba 772->800 773->800 778 14a918b-14a9207 call 14a3284 774->778 779 14a8d5c-14a8d7a 774->779 775->714 776->775 819 14a9254-14a925a 778->819 781 14a8d7c-14a8d80 779->781 782 14a8dd1-14a8de6 779->782 781->782 785 14a8d82-14a8d8d 781->785 786 14a8de8 782->786 787 14a8ded-14a8e03 782->787 792 14a8dc3-14a8dc9 785->792 786->787 790 14a8e0a-14a8e21 787->790 791 14a8e05 787->791 796 14a8e28-14a8e3e 790->796 797 14a8e23 790->797 791->790 798 14a8dcb-14a8dcc 792->798 799 14a8d8f-14a8d93 792->799 803 14a8e40 796->803 804 14a8e45-14a8e4c 796->804 797->796 806 14a8e4f-14a8eba 798->806 801 14a8d99-14a8db1 799->801 802 14a8d95 799->802 807 14a961a-14a9629 800->807 809 14a8db8-14a8dc0 801->809 810 14a8db3 801->810 802->801 803->804 804->806 811 14a8ece-14a9083 806->811 812 14a8ebc-14a8ec8 806->812 813 14a962b-14a96b3 807->813 814 14a95bc-14a95e4 807->814 809->792 810->809 821 14a90e7-14a90fc 811->821 822 14a9085-14a9089 811->822 812->811 849 14a982c-14a9838 813->849 815 14a95eb-14a9614 814->815 816 14a95e6 814->816 815->807 816->815 825 14a9209-14a9251 819->825 826 14a925c-14a9262 819->826 827 14a90fe 821->827 828 14a9103-14a9124 821->828 822->821 823 14a908b-14a909a 822->823 829 14a90d9-14a90df 823->829 825->819 826->761 827->828 830 14a912b-14a914a 828->830 831 14a9126 828->831 836 14a909c-14a90a0 829->836 837 14a90e1-14a90e2 829->837 833 14a914c 830->833 834 14a9151-14a9171 830->834 831->830 833->834 842 14a9178 834->842 843 14a9173 834->843 840 14a90aa-14a90cb 836->840 841 14a90a2-14a90a6 836->841 844 14a917c 837->844 845 14a90cd 840->845 846 14a90d2-14a90d6 840->846 841->840 842->844 843->842 844->774 845->846 846->829 851 14a96b8-14a96c1 849->851 852 14a983e-14a9899 849->852 853 14a96ca-14a9820 851->853 854 14a96c3 851->854 867 14a989b-14a98ce 852->867 868 14a98d0-14a98fa 852->868 872 14a9826 853->872 854->853 856 14a975a-14a979a 854->856 857 14a979f-14a97df 854->857 858 14a96d0-14a9710 854->858 859 14a9715-14a9755 854->859 856->872 857->872 858->872 859->872 876 14a9903-14a9996 867->876 868->876 872->849 880 14a999d-14a99bd 876->880 880->766
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: TJkq$Tefq$pjq$xbiq
                    • API String ID: 0-513662044
                    • Opcode ID: 6ce99add2ee18d765ba150eb7c1b3a3a4a18e6ef1f14a82ce9839a08f443e601
                    • Instruction ID: 29bf8f77f4161dbbf99398e7557c8f72fc8334c109d6a291646c04e64c10d84c
                    • Opcode Fuzzy Hash: 6ce99add2ee18d765ba150eb7c1b3a3a4a18e6ef1f14a82ce9839a08f443e601
                    • Instruction Fuzzy Hash: 23A2A475A00228CFDB65CF69C984AD9BBB2FF89304F1581E9D509AB365DB319E81CF40

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1267 14a0c98-14a0d0f 1269 14a0d11 1267->1269 1270 14a0d16-14a0d2e 1267->1270 1269->1270 1272 14a129f-14a12b8 1270->1272 1273 14a0d34-14a0eb5 1270->1273 1275 14a133e-14a1386 1272->1275 1276 14a12be-14a12de 1272->1276 1331 14a0eef-14a0ef1 1273->1331 1332 14a0eb7-14a0eed 1273->1332 1289 14a1398-14a13a0 1275->1289 1290 14a1388-14a1393 1275->1290 1281 14a157e 1276->1281 1282 14a12e4-14a12ec 1276->1282 1288 14a1583-14a158c 1281->1288 1282->1281 1284 14a12f2-14a1309 1282->1284 1284->1281 1287 14a130f-14a1339 call 14a0218 1284->1287 1287->1288 1294 14a1599 1288->1294 1295 14a158e 1288->1295 1291 14a13c2 1289->1291 1292 14a13a2-14a13c0 1289->1292 1296 14a1438-14a1482 1290->1296 1298 14a13c9-14a13cb 1291->1298 1292->1298 1304 14a159a 1294->1304 1295->1294 1306 14a1488-14a14b4 1296->1306 1307 14a1513-14a157c 1296->1307 1301 14a13cd-14a13d5 1298->1301 1302 14a13d7-14a13f7 1298->1302 1301->1296 1302->1296 1312 14a13f9-14a1402 1302->1312 1304->1304 1306->1281 1313 14a14ba-14a14c1 1306->1313 1307->1288 1312->1281 1314 14a1408-14a1436 1312->1314 1313->1281 1315 14a14c7-14a14d3 1313->1315 1314->1296 1314->1312 1315->1281 1317 14a14d9-14a14e5 1315->1317 1317->1281 1318 14a14eb-14a1511 1317->1318 1318->1288 1333 14a0ef3-14a0ef5 1331->1333 1334 14a0ef7-14a0f01 1331->1334 1332->1331 1336 14a0f03-14a0f19 1333->1336 1334->1336 1338 14a0f1b-14a0f1d 1336->1338 1339 14a0f1f-14a0f27 1336->1339 1341 14a0f29-14a0f2e 1338->1341 1339->1341 1343 14a0f30-14a0f3f 1341->1343 1344 14a0f45-14a0f73 1341->1344 1343->1344 1347 14a0fa8-14a0fb2 1344->1347 1348 14a0f75-14a0f82 1344->1348 1349 14a0fbb-14a1047 1347->1349 1350 14a0fb4 1347->1350 1348->1347 1352 14a0f84-14a0f91 1348->1352 1362 14a108a-14a1098 1349->1362 1363 14a1049-14a1088 1349->1363 1350->1349 1356 14a0f93-14a0f95 1352->1356 1357 14a0f97-14a0fa2 1352->1357 1356->1347 1357->1347 1366 14a10a3-14a10df 1362->1366 1363->1366 1383 14a10e5 call 14a1ee0 1366->1383 1384 14a10e5 call 14a1f91 1366->1384 1370 14a10eb-14a11aa 1375 14a11d8-14a11f4 1370->1375 1376 14a11ac-14a11c8 1370->1376 1378 14a1202 1375->1378 1379 14a11f6 1375->1379 1382 14a11d4-14a11d6 1376->1382 1381 14a1203 1378->1381 1379->1378 1381->1381 1382->1375 1382->1376 1383->1370 1384->1370
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: LRfq$\sfq
                    • API String ID: 0-373085665
                    • Opcode ID: e0ab1275c77749208b74e287189e23fee5103d5cf5faa16efb6d1c286d0da995
                    • Instruction ID: 682c0d9d2b4cd0990c3d236d1a6c041291fd26dfa7c78d58d150491ee2919290
                    • Opcode Fuzzy Hash: e0ab1275c77749208b74e287189e23fee5103d5cf5faa16efb6d1c286d0da995
                    • Instruction Fuzzy Hash: FA323074E002298FDB24CF69D894AAEBBF2BF88300F55C65AE446EB355DB309945CF50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1875 14a0c89-14a0d0f 1877 14a0d11 1875->1877 1878 14a0d16-14a0d2e 1875->1878 1877->1878 1880 14a129f-14a12b8 1878->1880 1881 14a0d34-14a0eb5 1878->1881 1883 14a133e-14a1386 1880->1883 1884 14a12be-14a12de 1880->1884 1939 14a0eef-14a0ef1 1881->1939 1940 14a0eb7-14a0eed 1881->1940 1897 14a1398-14a13a0 1883->1897 1898 14a1388-14a1393 1883->1898 1889 14a157e 1884->1889 1890 14a12e4-14a12ec 1884->1890 1896 14a1583-14a158c 1889->1896 1890->1889 1892 14a12f2-14a1309 1890->1892 1892->1889 1895 14a130f-14a1339 call 14a0218 1892->1895 1895->1896 1902 14a1599 1896->1902 1903 14a158e 1896->1903 1899 14a13c2 1897->1899 1900 14a13a2-14a13c0 1897->1900 1904 14a1438-14a1482 1898->1904 1906 14a13c9-14a13cb 1899->1906 1900->1906 1912 14a159a 1902->1912 1903->1902 1914 14a1488-14a14b4 1904->1914 1915 14a1513-14a157c 1904->1915 1909 14a13cd-14a13d5 1906->1909 1910 14a13d7-14a13f7 1906->1910 1909->1904 1910->1904 1920 14a13f9-14a1402 1910->1920 1912->1912 1914->1889 1921 14a14ba-14a14c1 1914->1921 1915->1896 1920->1889 1922 14a1408-14a1436 1920->1922 1921->1889 1923 14a14c7-14a14d3 1921->1923 1922->1904 1922->1920 1923->1889 1925 14a14d9-14a14e5 1923->1925 1925->1889 1926 14a14eb-14a1511 1925->1926 1926->1896 1941 14a0ef3-14a0ef5 1939->1941 1942 14a0ef7-14a0f01 1939->1942 1940->1939 1944 14a0f03-14a0f19 1941->1944 1942->1944 1946 14a0f1b-14a0f1d 1944->1946 1947 14a0f1f-14a0f27 1944->1947 1949 14a0f29-14a0f2e 1946->1949 1947->1949 1951 14a0f30-14a0f3f 1949->1951 1952 14a0f45-14a0f73 1949->1952 1951->1952 1955 14a0fa8-14a0fb2 1952->1955 1956 14a0f75-14a0f82 1952->1956 1957 14a0fbb-14a1047 1955->1957 1958 14a0fb4 1955->1958 1956->1955 1960 14a0f84-14a0f91 1956->1960 1970 14a108a-14a1098 1957->1970 1971 14a1049-14a1088 1957->1971 1958->1957 1964 14a0f93-14a0f95 1960->1964 1965 14a0f97-14a0fa2 1960->1965 1964->1955 1965->1955 1974 14a10a3-14a10df 1970->1974 1971->1974 1991 14a10e5 call 14a1ee0 1974->1991 1992 14a10e5 call 14a1f91 1974->1992 1978 14a10eb-14a11aa 1983 14a11d8-14a11f4 1978->1983 1984 14a11ac-14a11c8 1978->1984 1986 14a1202 1983->1986 1987 14a11f6 1983->1987 1990 14a11d4-14a11d6 1984->1990 1989 14a1203 1986->1989 1987->1986 1989->1989 1990->1983 1990->1984 1991->1978 1992->1978
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: LRfq$\sfq
                    • API String ID: 0-373085665
                    • Opcode ID: 02938636fcaab2aaff59f8a3e0633ee5ea3370d9ef5f15a63aa30e60f69e692e
                    • Instruction ID: 1e9c0686c6e126d0c1ed6ddec36bd5b8e76bf02b13b316f3a37b22820e39faca
                    • Opcode Fuzzy Hash: 02938636fcaab2aaff59f8a3e0633ee5ea3370d9ef5f15a63aa30e60f69e692e
                    • Instruction Fuzzy Hash: 6AE17075E0022A8FDB24DF69D850AAEB7F6BF88300F51C65AE405EB358DB309945CF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2210 14a0cd2-14a0ce8 2212 14a0cea-14a0cf4 2210->2212 2213 14a0cf5-14a0d0f 2210->2213 2214 14a0d11 2213->2214 2215 14a0d16-14a0d2e 2213->2215 2214->2215 2217 14a129f-14a12b8 2215->2217 2218 14a0d34-14a0eb5 2215->2218 2220 14a133e-14a1386 2217->2220 2221 14a12be-14a12de 2217->2221 2276 14a0eef-14a0ef1 2218->2276 2277 14a0eb7-14a0eed 2218->2277 2234 14a1398-14a13a0 2220->2234 2235 14a1388-14a1393 2220->2235 2226 14a157e 2221->2226 2227 14a12e4-14a12ec 2221->2227 2233 14a1583-14a158c 2226->2233 2227->2226 2229 14a12f2-14a1309 2227->2229 2229->2226 2232 14a130f-14a1339 call 14a0218 2229->2232 2232->2233 2239 14a1599 2233->2239 2240 14a158e 2233->2240 2236 14a13c2 2234->2236 2237 14a13a2-14a13c0 2234->2237 2241 14a1438-14a1482 2235->2241 2243 14a13c9-14a13cb 2236->2243 2237->2243 2249 14a159a 2239->2249 2240->2239 2251 14a1488-14a14b4 2241->2251 2252 14a1513-14a157c 2241->2252 2246 14a13cd-14a13d5 2243->2246 2247 14a13d7-14a13f7 2243->2247 2246->2241 2247->2241 2257 14a13f9-14a1402 2247->2257 2249->2249 2251->2226 2258 14a14ba-14a14c1 2251->2258 2252->2233 2257->2226 2259 14a1408-14a1436 2257->2259 2258->2226 2260 14a14c7-14a14d3 2258->2260 2259->2241 2259->2257 2260->2226 2262 14a14d9-14a14e5 2260->2262 2262->2226 2263 14a14eb-14a1511 2262->2263 2263->2233 2278 14a0ef3-14a0ef5 2276->2278 2279 14a0ef7-14a0f01 2276->2279 2277->2276 2281 14a0f03-14a0f19 2278->2281 2279->2281 2283 14a0f1b-14a0f1d 2281->2283 2284 14a0f1f-14a0f27 2281->2284 2286 14a0f29-14a0f2e 2283->2286 2284->2286 2288 14a0f30-14a0f3f 2286->2288 2289 14a0f45-14a0f73 2286->2289 2288->2289 2292 14a0fa8-14a0fb2 2289->2292 2293 14a0f75-14a0f82 2289->2293 2294 14a0fbb-14a1047 2292->2294 2295 14a0fb4 2292->2295 2293->2292 2297 14a0f84-14a0f91 2293->2297 2307 14a108a-14a1098 2294->2307 2308 14a1049-14a1088 2294->2308 2295->2294 2301 14a0f93-14a0f95 2297->2301 2302 14a0f97-14a0fa2 2297->2302 2301->2292 2302->2292 2311 14a10a3-14a10df 2307->2311 2308->2311 2328 14a10e5 call 14a1ee0 2311->2328 2329 14a10e5 call 14a1f91 2311->2329 2315 14a10eb-14a11aa 2320 14a11d8-14a11f4 2315->2320 2321 14a11ac-14a11c8 2315->2321 2323 14a1202 2320->2323 2324 14a11f6 2320->2324 2327 14a11d4-14a11d6 2321->2327 2326 14a1203 2323->2326 2324->2323 2326->2326 2327->2320 2327->2321 2328->2315 2329->2315
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: LRfq$\sfq
                    • API String ID: 0-373085665
                    • Opcode ID: d2a116deb35ece2494ac4c7d30af4803e8bde033354dca9d798dc520094e1b3d
                    • Instruction ID: 3fd968ab236e53feb7dfac7cb5813f90db8c82c192ba8e3aed68e04183bc26d7
                    • Opcode Fuzzy Hash: d2a116deb35ece2494ac4c7d30af4803e8bde033354dca9d798dc520094e1b3d
                    • Instruction Fuzzy Hash: 5ED16E75E0022A8FDB24DF69D850AAEB7F6BF88300F55C659E405EB358DB30A945CF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2330 14a0d49-14a0eb5 2349 14a0eef-14a0ef1 2330->2349 2350 14a0eb7-14a0eed 2330->2350 2351 14a0ef3-14a0ef5 2349->2351 2352 14a0ef7-14a0f01 2349->2352 2350->2349 2354 14a0f03-14a0f19 2351->2354 2352->2354 2356 14a0f1b-14a0f1d 2354->2356 2357 14a0f1f-14a0f27 2354->2357 2359 14a0f29-14a0f2e 2356->2359 2357->2359 2361 14a0f30-14a0f3f 2359->2361 2362 14a0f45-14a0f73 2359->2362 2361->2362 2365 14a0fa8-14a0fb2 2362->2365 2366 14a0f75-14a0f82 2362->2366 2367 14a0fbb-14a1047 2365->2367 2368 14a0fb4 2365->2368 2366->2365 2370 14a0f84-14a0f91 2366->2370 2380 14a108a-14a1098 2367->2380 2381 14a1049-14a1088 2367->2381 2368->2367 2374 14a0f93-14a0f95 2370->2374 2375 14a0f97-14a0fa2 2370->2375 2374->2365 2375->2365 2384 14a10a3-14a10df 2380->2384 2381->2384 2401 14a10e5 call 14a1ee0 2384->2401 2402 14a10e5 call 14a1f91 2384->2402 2388 14a10eb-14a11aa 2393 14a11d8-14a11f4 2388->2393 2394 14a11ac-14a11c8 2388->2394 2396 14a1202 2393->2396 2397 14a11f6 2393->2397 2400 14a11d4-14a11d6 2394->2400 2399 14a1203 2396->2399 2397->2396 2399->2399 2400->2393 2400->2394 2401->2388 2402->2388
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: LRfq$\sfq
                    • API String ID: 0-373085665
                    • Opcode ID: 72a6c22293223114f1ab9c8d1c9f05f99529b277aa288779c00da2d34171eb75
                    • Instruction ID: 09170426031d34a50a0b5a2f71b84d6ec4e4d60f29802d9dc0e3de7562fda888
                    • Opcode Fuzzy Hash: 72a6c22293223114f1ab9c8d1c9f05f99529b277aa288779c00da2d34171eb75
                    • Instruction Fuzzy Hash: 50D15D75E0022A8FDB24DF69D850AAEB7F6BF88300F55C659E405EB358DB30A945CF90
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: 2
                    • API String ID: 0-450215437
                    • Opcode ID: 7f2d5ad3f68a8f17bd85302004852a6bc996c5094b6f5366cc97ea51ac64cdcf
                    • Instruction ID: a3d9eddea8760704ce858ebacb82f2d71498c04bad8f2aa530e66705351842dd
                    • Opcode Fuzzy Hash: 7f2d5ad3f68a8f17bd85302004852a6bc996c5094b6f5366cc97ea51ac64cdcf
                    • Instruction Fuzzy Hash: CDC2C2B4A002298FDB65DF69C984B9DBBB5FB98300F1081EAD50DAB355DB309E85CF40
                    APIs
                    • NtCreateThreadEx.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 06550B52
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076136879.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6550000_wpappx.jbxd
                    Similarity
                    • API ID: CreateThread
                    • String ID:
                    • API String ID: 2422867632-0
                    • Opcode ID: df6beb33443903b3c88c2fae50d7ad62acaea2b6c4c32a59075ef59ba2b9feb3
                    • Instruction ID: 9e5a4624ddfe1f126c1076921470753eeec7c28c12601f039a6b174dd6d699da
                    • Opcode Fuzzy Hash: df6beb33443903b3c88c2fae50d7ad62acaea2b6c4c32a59075ef59ba2b9feb3
                    • Instruction Fuzzy Hash: 42518AB9D052489FCF10CFA9D9809DEFBF5BB59310F20A02AE814B7210D735A955DF58
                    APIs
                    • NtCreateThreadEx.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 06550B52
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076136879.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6550000_wpappx.jbxd
                    Similarity
                    • API ID: CreateThread
                    • String ID:
                    • API String ID: 2422867632-0
                    • Opcode ID: 03abf8e73a648942c8e6fe5553a7def46dee1c0b4cc939adf7c174852614fe9d
                    • Instruction ID: e2e3036f7c366a05aa06076003f12751c056f6010cfffa9ac602af051418b0d3
                    • Opcode Fuzzy Hash: 03abf8e73a648942c8e6fe5553a7def46dee1c0b4cc939adf7c174852614fe9d
                    • Instruction Fuzzy Hash: 694189B9D042489FCF10CFA9D980ADEFBF1BB19310F20A02AE814B7210D335A955DF58
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: LRfq
                    • API String ID: 0-2333822924
                    • Opcode ID: ea2fe34384f2b9a2e5952d8ef59866d40579eb86f0ecb67a3ecd4f4cc43be512
                    • Instruction ID: a283d156c4748d8aa48dfc587e69b29b3adcbe66bfcce6566677b8d174655973
                    • Opcode Fuzzy Hash: ea2fe34384f2b9a2e5952d8ef59866d40579eb86f0ecb67a3ecd4f4cc43be512
                    • Instruction Fuzzy Hash: E4F18131E002698FDB14CF69C990BADBBF2BF94300F5AC5AAD059AB256D7349D81CF50
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: Tefq
                    • API String ID: 0-1066582953
                    • Opcode ID: 17b9742d4c69b3eda402f65fbf7ba6d5c7876d34249bbf82baadbdfbb522aa21
                    • Instruction ID: 9b17262cf5317763f7ecac3938aca6ad7bff77128e91305f41218568c294cee1
                    • Opcode Fuzzy Hash: 17b9742d4c69b3eda402f65fbf7ba6d5c7876d34249bbf82baadbdfbb522aa21
                    • Instruction Fuzzy Hash: C602E374E05628CFEBA4DF6AD844BA9B7F2BF89300F1085A9D409AB355D7705A89CF40
                    APIs
                    • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 06550CFB
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076136879.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6550000_wpappx.jbxd
                    Similarity
                    • API ID: MemoryVirtualWrite
                    • String ID:
                    • API String ID: 3527976591-0
                    • Opcode ID: a1cd3fc6a5b95476cbe43e68103bb1636570b75481920a69841d95d580cf2f6b
                    • Instruction ID: 2776d98f6f4cfacc22148ce4facf623c6a7a8e1a6c223de13c26d3082f568178
                    • Opcode Fuzzy Hash: a1cd3fc6a5b95476cbe43e68103bb1636570b75481920a69841d95d580cf2f6b
                    • Instruction Fuzzy Hash: DF4198B4D012589FCB10CFA9D984ADEFBF5FB49310F20902AE818BB250D775A941CFA4
                    APIs
                    • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 0655099D
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076136879.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6550000_wpappx.jbxd
                    Similarity
                    • API ID: AllocateMemoryVirtual
                    • String ID:
                    • API String ID: 2167126740-0
                    • Opcode ID: a100795a2af63c9085b6b34f040e8b561d3ec3a64c85fe19cb0f9b0ebd096e9a
                    • Instruction ID: 39f22e23499e16be21d67c9589934ca8793a46bbe1f07c10640b1731f44c19b1
                    • Opcode Fuzzy Hash: a100795a2af63c9085b6b34f040e8b561d3ec3a64c85fe19cb0f9b0ebd096e9a
                    • Instruction Fuzzy Hash: 6041A9B4D052589FCF10CFA9D984ADEFBB5BF09310F20A02AE818B7250D735A901CF94
                    APIs
                    • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 06550CFB
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076136879.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6550000_wpappx.jbxd
                    Similarity
                    • API ID: MemoryVirtualWrite
                    • String ID:
                    • API String ID: 3527976591-0
                    • Opcode ID: e9c23766eecc9ba54e6962f28e5c9a32ec4777fcdfffe18cdf2fcf227518bb2d
                    • Instruction ID: fda550d1a1a1dc963962db3cc7ec4458ea734d5a1de9d9a5639d768ccb890e5a
                    • Opcode Fuzzy Hash: e9c23766eecc9ba54e6962f28e5c9a32ec4777fcdfffe18cdf2fcf227518bb2d
                    • Instruction Fuzzy Hash: A24186B5D012599FCF10CFA9D984ADEFBF1BB49310F20902AE818BB250D775AA05CF64
                    APIs
                    • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 0655099D
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076136879.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6550000_wpappx.jbxd
                    Similarity
                    • API ID: AllocateMemoryVirtual
                    • String ID:
                    • API String ID: 2167126740-0
                    • Opcode ID: e4cfe48aafc828c5f90190b6436dc11a86666b9c93f50f8606d13f8e95f5e3c7
                    • Instruction ID: 77a7074b9941cac734937cf72b9e6c2c949a9990f06fd92a52ec2480ba5f9f09
                    • Opcode Fuzzy Hash: e4cfe48aafc828c5f90190b6436dc11a86666b9c93f50f8606d13f8e95f5e3c7
                    • Instruction Fuzzy Hash: 884198B5D042599FCF10CFA9D984A9EFBF1BF49310F20A42AE818B7214D735A901CF94
                    APIs
                    • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 0659EDA5
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076445263.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6590000_wpappx.jbxd
                    Similarity
                    • API ID: MemoryProtectVirtual
                    • String ID:
                    • API String ID: 2706961497-0
                    • Opcode ID: f52c5f4899f8170afde63e505a4b7b4cf0b8354213c8bf447e579e0da8ec3bf2
                    • Instruction ID: 213582cc14d162d7d684b0ed8a0d269ae5bd466a5736e9472012722ddb208874
                    • Opcode Fuzzy Hash: f52c5f4899f8170afde63e505a4b7b4cf0b8354213c8bf447e579e0da8ec3bf2
                    • Instruction Fuzzy Hash: 114187B4D002589BCF10CFAAD981ADEFBB5BB49320F10942AE819B7210D735A905CF64
                    APIs
                    • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 0659EDA5
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076445263.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6590000_wpappx.jbxd
                    Similarity
                    • API ID: MemoryProtectVirtual
                    • String ID:
                    • API String ID: 2706961497-0
                    • Opcode ID: 93372b9da63f3c20c913069eeb130dce1a12559ef520ff578f36453ca0a95d73
                    • Instruction ID: 7dd462cbcb1247d42c6db8b2ec7e0671267d197319e511145b932842a7249e08
                    • Opcode Fuzzy Hash: 93372b9da63f3c20c913069eeb130dce1a12559ef520ff578f36453ca0a95d73
                    • Instruction Fuzzy Hash: A04177B4D002599FCF10CFAAD981A9EFBB5BF49310F14942AE818B7310D735A905CF64
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: Tefq
                    • API String ID: 0-1066582953
                    • Opcode ID: 7c9e4d598e1691310802b8bdd3d8cca5df1ed2c139df6a8abaef5f526b7ac0bc
                    • Instruction ID: 6be79b42eca8c3e06dab505c1f3cb0138dc06c896da579e9ee7fbd861d69db44
                    • Opcode Fuzzy Hash: 7c9e4d598e1691310802b8bdd3d8cca5df1ed2c139df6a8abaef5f526b7ac0bc
                    • Instruction Fuzzy Hash: DAA15A71E05218CFEB54DFA9E84579DBBF6BF8A300F20906AE419AB255DB305985CF80
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: Tefq
                    • API String ID: 0-1066582953
                    • Opcode ID: e1b57e9182b1de05a59fab26216e9ae2bf6dfe1d528bc5a33a919c87244fb611
                    • Instruction ID: aa70781593d1a74f8b57555ec656e45a37beacb22c6191459dc803775f38abbb
                    • Opcode Fuzzy Hash: e1b57e9182b1de05a59fab26216e9ae2bf6dfe1d528bc5a33a919c87244fb611
                    • Instruction Fuzzy Hash: 40A12871E01218CFEB64DFA9E84579DBBF6BF8A300F20906AE419A7355DB705985CF80
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: LRfq
                    • API String ID: 0-2333822924
                    • Opcode ID: 451bbf56232d7a3d90f129d0a5b6d2719303763e3b23dbadf33e7244d45174d7
                    • Instruction ID: 76ea94f532e9757da331e068d585dd2023eefc82bbdd599a271f09f75dba853e
                    • Opcode Fuzzy Hash: 451bbf56232d7a3d90f129d0a5b6d2719303763e3b23dbadf33e7244d45174d7
                    • Instruction Fuzzy Hash: 1991A475E001298FDB15CF69C990BADFBB2BF94300F6AC69AD045AB295D734AD81CF40
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: \sfq
                    • API String ID: 0-3800904836
                    • Opcode ID: 0c42cecf102d06e8855feec9b3f7a60f17b81fe1bc86aa77c66cc8431154075d
                    • Instruction ID: bfb01aaa3d0321880a9e2a2c06e16e5b56626205dd97db6a24b60e7e22356be3
                    • Opcode Fuzzy Hash: 0c42cecf102d06e8855feec9b3f7a60f17b81fe1bc86aa77c66cc8431154075d
                    • Instruction Fuzzy Hash: 0181E6B8E4010E9FDF14DFAAD584ABEBBF1BB48304F10A655D412EB2A4DB31A941CB50
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5442078ff1095b07cc7cacc55479857f4fa0ab60b54aedb62201893db9572177
                    • Instruction ID: b4dd9256fcb87d2e6bfcd89af414c07261113f512d813e52a02162d51599c893
                    • Opcode Fuzzy Hash: 5442078ff1095b07cc7cacc55479857f4fa0ab60b54aedb62201893db9572177
                    • Instruction Fuzzy Hash: 6132B4B4A10229CFCB65DF28C984AA9BBB6FB48310F5191D9D54DA7351DB30AE85CF40
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bd0f3f37af93bbd3d8a9a89b8cc15e70ad066942b4ad65f95dbc4b379364d498
                    • Instruction ID: 46cb1c88554a87712bd41f6bc01c65e1b99340e477177ff5d81f733ae4dac8e0
                    • Opcode Fuzzy Hash: bd0f3f37af93bbd3d8a9a89b8cc15e70ad066942b4ad65f95dbc4b379364d498
                    • Instruction Fuzzy Hash: 2581B076F106259FD714DB69CC90A9EB7E7AFD8710F1A8165E409DB3A9DE30EC018B80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 51fbaab072730248f3f87eb2b39858dafd19f386568fe1f403bab8ae5c20fa8e
                    • Instruction ID: 7ef5846cdb3c570137d903fc0009e6a734edc92fd3f9ad85cbfdf3992229cb8a
                    • Opcode Fuzzy Hash: 51fbaab072730248f3f87eb2b39858dafd19f386568fe1f403bab8ae5c20fa8e
                    • Instruction Fuzzy Hash: 21615C36F105258FD714DB69CC90A6EB7E3AFD8710F1A8165E4099B3AADE70EC019B80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a3597bb362790b1aa3b947730f2ee7c92cdef5266e6c54328d47a6a863638543
                    • Instruction ID: 2c7a10cacb133d776665d47fa820e32c1c0887d355935d75e8bb12a3d2f811e5
                    • Opcode Fuzzy Hash: a3597bb362790b1aa3b947730f2ee7c92cdef5266e6c54328d47a6a863638543
                    • Instruction Fuzzy Hash: C141E670D01208DFDB58DFBAD59469DBBB2BF89300F20812AE41AAB265DB319945CF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 642 65495b0-65495fc 646 6549602-6549614 642->646 647 654977a-65497e6 642->647 650 6549664-65496ad 646->650 651 6549616-6549662 646->651 661 6549a35-6549a3c 647->661 662 65497ec-65497f5 647->662 679 65496b0-65496f0 650->679 651->679 663 65497f7-65497fb 662->663 664 654986b-6549884 662->664 667 6549814-6549820 663->667 668 65497fd-6549812 663->668 677 65499b1-65499c1 664->677 678 654988a 664->678 669 6549829-6549866 667->669 668->669 669->661 689 65499c3-65499d8 677->689 690 65499da-65499e6 677->690 680 6549891-65498d4 678->680 681 6549921-6549964 678->681 682 65498d9-654991c 678->682 683 6549969-65499ac 678->683 697 65496f2-65496f8 679->697 698 65496fa-6549704 679->698 680->661 681->661 682->661 683->661 692 65499ef-6549a30 689->692 690->692 692->661 699 6549707-6549720 697->699 698->699 702 6549727-654974a 699->702 706 6549770-6549777 702->706 707 654974c-6549768 702->707 707->706
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq$4'fq$4'fq$4'fq$4'fq$pjq
                    • API String ID: 0-799542208
                    • Opcode ID: 8ff4781b0a7c0dea618dae9c27a5148ae806bd01ddec4d89f8b15cc413501645
                    • Instruction ID: 1f7a009e4e95f48ec884040859e004084cdf9c25e8af99968b65d6cc51862e5f
                    • Opcode Fuzzy Hash: 8ff4781b0a7c0dea618dae9c27a5148ae806bd01ddec4d89f8b15cc413501645
                    • Instruction Fuzzy Hash: 0BD14C76A00114DFCB45DFA8C844EAA7BB2FF88314F0544D8E609AB272DB32ED55DB90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 882 65482f0-6548318 884 6548366-6548374 882->884 885 654831a-6548361 882->885 886 6548376-6548381 call 6545e10 884->886 887 6548383 884->887 933 65487bd-65487c4 885->933 889 6548385-654838c 886->889 887->889 892 6548475-6548479 889->892 893 6548392-6548396 889->893 894 65484cf-65484d9 892->894 895 654847b-654848a call 6544028 892->895 896 65487c5-65487ed 893->896 897 654839c-65483a0 893->897 902 6548512-6548538 894->902 903 65484db-65484ea call 6543748 894->903 911 654848e-6548493 895->911 906 65487f4-654881e 896->906 900 65483b2-6548410 call 6545b50 call 65465b8 897->900 901 65483a2-65483ac 897->901 942 6548416-6548470 900->942 943 6548883-65488ad 900->943 901->900 901->906 929 6548545 902->929 930 654853a-6548543 902->930 916 6548826-654883c 903->916 917 65484f0-654850d 903->917 906->916 918 6548495-65484ca call 6547db8 911->918 919 654848c 911->919 944 6548844-654887c 916->944 917->933 918->933 919->911 935 6548547-654856f 929->935 930->935 947 6548575-654858e 935->947 948 6548640-6548644 935->948 942->933 952 65488b7-65488bd 943->952 953 65488af-65488b5 943->953 944->943 947->948 973 6548594-65485a3 call 6543170 947->973 954 6548646-654865f 948->954 955 65486be-65486c8 948->955 953->952 961 65488be-65488fb 953->961 954->955 977 6548661-6548670 call 6543170 954->977 958 6548725-654872e 955->958 959 65486ca-65486d4 955->959 963 6548766-65487b3 958->963 964 6548730-654875e call 6545360 call 6545380 958->964 974 65486d6-65486d8 959->974 975 65486da-65486ec 959->975 983 65487bb 963->983 964->963 992 65485a5-65485ab 973->992 993 65485bb-65485d0 973->993 980 65486ee-65486f0 974->980 975->980 999 6548672-6548678 977->999 1000 6548688-6548693 977->1000 988 65486f2-65486f6 980->988 989 654871e-6548723 980->989 983->933 995 6548714-6548719 call 6541f70 988->995 996 65486f8-6548711 988->996 989->958 989->959 1001 65485ad 992->1001 1002 65485af-65485b1 992->1002 1005 6548604-654860d 993->1005 1006 65485d2-65485fe call 65444b0 993->1006 995->989 996->995 1011 654867c-654867e 999->1011 1012 654867a 999->1012 1000->943 1013 6548699-65486bc 1000->1013 1001->993 1002->993 1005->943 1010 6548613-654863a 1005->1010 1006->944 1006->1005 1010->948 1010->973 1011->1000 1012->1000 1013->955 1013->977
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: Hjq$Hjq$Hjq
                    • API String ID: 0-2296473396
                    • Opcode ID: b30a3d8c14c5959a95c1eef48276f97c5485df4a4dc8cc2577e787624289ce31
                    • Instruction ID: a46fb3689b8d0d9007a357ac8604df8625db0576d21f4d9011ee2ba754eea8a9
                    • Opcode Fuzzy Hash: b30a3d8c14c5959a95c1eef48276f97c5485df4a4dc8cc2577e787624289ce31
                    • Instruction Fuzzy Hash: 0F125E71A002159FCBA4EFA5C8946AEB7F6FF88304F14856DD50A9B391DB31EC49CB90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1024 654e572-654e590 1025 654e596-654e59a 1024->1025 1026 654e6a9-654e6ce 1024->1026 1027 654e6d5-654e6fa 1025->1027 1028 654e5a0-654e5a9 1025->1028 1026->1027 1029 654e701-654e737 1027->1029 1028->1029 1030 654e5af-654e5d6 1028->1030 1046 654e73e-654e794 1029->1046 1040 654e5dc-654e5de 1030->1040 1041 654e69e-654e6a8 1030->1041 1044 654e5e0-654e5e3 1040->1044 1045 654e5ff-654e601 1040->1045 1044->1046 1047 654e5e9-654e5f3 1044->1047 1048 654e604-654e608 1045->1048 1065 654e796-654e7aa call 654ea51 1046->1065 1066 654e7b8-654e7cf 1046->1066 1047->1046 1050 654e5f9-654e5fd 1047->1050 1051 654e669-654e675 1048->1051 1052 654e60a-654e619 1048->1052 1050->1045 1050->1048 1051->1046 1053 654e67b-654e698 call 6541fa0 1051->1053 1052->1046 1059 654e61f-654e666 call 6541fa0 1052->1059 1053->1040 1053->1041 1059->1051 1141 654e7ad call 654ec98 1065->1141 1142 654e7ad call 654edf9 1065->1142 1076 654e7d5-654e8bb call 6549db0 call 65497b8 * 2 call 6549df0 call 654d5b8 call 65497b8 call 654c750 call 654a658 1066->1076 1077 654e8c0-654e8d0 1066->1077 1072 654e7b3 1074 654e9e3-654e9ee 1072->1074 1085 654e9f0-654ea00 1074->1085 1086 654ea1d-654ea3e call 6549f00 1074->1086 1076->1077 1083 654e8d6-654e9b0 call 6549db0 * 2 call 654a568 call 65497b8 * 2 call 6549a68 call 6549f00 call 65497b8 1077->1083 1084 654e9be-654e9da call 65497b8 1077->1084 1138 654e9b2 1083->1138 1139 654e9bb 1083->1139 1084->1074 1097 654ea10-654ea18 call 654a658 1085->1097 1098 654ea02-654ea08 1085->1098 1097->1086 1098->1097 1138->1139 1139->1084 1141->1072 1142->1072
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq$(jq$Hjq
                    • API String ID: 0-2836811127
                    • Opcode ID: 506c4370f9d3cf167b3a72e02cb1470877699a2f07142175d63518a59e740df0
                    • Instruction ID: 8b1ed35bcbd2d6b9af460dc11ad9bae82ce8ea7f8e08a6d953c129955485bdd4
                    • Opcode Fuzzy Hash: 506c4370f9d3cf167b3a72e02cb1470877699a2f07142175d63518a59e740df0
                    • Instruction Fuzzy Hash: 09F15134A01219DFCB54EF64D8949AEBBB2FF89314F108558E406AB365DF30EC46CB90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1144 6549fa8-6549fd3 1145 6549fdb-6549fe5 1144->1145 1260 6549fd5 call 654a4c8 1144->1260 1146 654a007-654a01d call 6549db0 1145->1146 1147 6549fe7-6549fea 1145->1147 1153 654a393-654a3a7 1146->1153 1154 654a023-654a02f 1146->1154 1263 6549fec call 654a8c0 1147->1263 1264 6549fec call 654a8b0 1147->1264 1265 6549fec call 654a918 1147->1265 1266 6549fec call 654a908 1147->1266 1150 6549ff2-6549ff4 1150->1146 1151 6549ff6-6549ffe 1150->1151 1151->1146 1162 654a3e7-654a3f0 1153->1162 1155 654a035-654a038 1154->1155 1156 654a160-654a167 1154->1156 1158 654a03b-654a044 1155->1158 1159 654a296-654a2d0 call 65497b8 1156->1159 1160 654a16d-654a176 1156->1160 1163 654a488 1158->1163 1164 654a04a-654a05e 1158->1164 1258 654a2d3 call 654c750 1159->1258 1259 654a2d3 call 654c741 1159->1259 1160->1159 1165 654a17c-654a288 call 65497b8 call 6549d48 call 65497b8 1160->1165 1167 654a3b5-654a3be 1162->1167 1168 654a3f2-654a3f9 1162->1168 1170 654a48d-654a491 1163->1170 1180 654a064-654a0f9 call 6549db0 * 2 call 65497b8 call 6549d48 call 6549df0 call 6549e98 call 6549f00 1164->1180 1181 654a150-654a15a 1164->1181 1255 654a293-654a294 1165->1255 1256 654a28a 1165->1256 1167->1163 1171 654a3c4-654a3d6 1167->1171 1173 654a447-654a44e 1168->1173 1174 654a3fb-654a43e call 65497b8 1168->1174 1176 654a493 1170->1176 1177 654a49c 1170->1177 1189 654a3e6 1171->1189 1190 654a3d8-654a3dd 1171->1190 1178 654a450-654a460 1173->1178 1179 654a473-654a486 1173->1179 1174->1173 1176->1177 1188 654a49d 1177->1188 1178->1179 1195 654a462-654a46a 1178->1195 1179->1170 1234 654a118-654a14b call 6549f00 1180->1234 1235 654a0fb-654a113 call 6549e98 call 65497b8 call 6549a68 1180->1235 1181->1156 1181->1158 1188->1188 1189->1162 1261 654a3e0 call 654cef0 1190->1261 1262 654a3e0 call 654cee1 1190->1262 1195->1179 1204 654a2d9-654a38a call 65497b8 1204->1153 1234->1181 1235->1234 1255->1159 1256->1255 1258->1204 1259->1204 1260->1145 1261->1189 1262->1189 1263->1150 1264->1150 1265->1150 1266->1150
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq$4'fq$4'fq
                    • API String ID: 0-3646979650
                    • Opcode ID: b2c7d69f1ca638bd22175c98a19cc49bc467cc2d445c190dbfc535f433b805cd
                    • Instruction ID: c224d27bc49a5ebd1ce7d105a283204c51d1cd126e24afe8ff8fb6102906a577
                    • Opcode Fuzzy Hash: b2c7d69f1ca638bd22175c98a19cc49bc467cc2d445c190dbfc535f433b805cd
                    • Instruction Fuzzy Hash: F2F1D934A00219CFCB48EFA4D998A9DB7B6FF89704F518158E506AB3A5DB31EC46CF50
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075327960.0000000006320000.00000040.00000800.00020000.00000000.sdmp, Offset: 06320000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6320000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq$4'fq
                    • API String ID: 0-751858264
                    • Opcode ID: 34f5f5a7cf1b6cc9e525b304c3a6abe54913afe081b0dbe37f7ac3e34b41556e
                    • Instruction ID: e4a448ae7119e462c3422501b5888ead129084f5754c66c0287940265283ddf6
                    • Opcode Fuzzy Hash: 34f5f5a7cf1b6cc9e525b304c3a6abe54913afe081b0dbe37f7ac3e34b41556e
                    • Instruction Fuzzy Hash: BF42E774E1022ACFDB98DFA4C5846AEB7B6FF48304F108059EA1667754DB34688ACFD1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1706 6544801 1707 6544802-6544804 1706->1707 1708 6544806-654482e 1707->1708 1709 654486b-6544877 1707->1709 1710 6544830-654483d 1708->1710 1711 654483f-6544848 1708->1711 1709->1707 1716 6544878-6544894 1709->1716 1710->1711 1712 654484b-6544858 1710->1712 1714 6544863 1712->1714 1715 654485a-6544861 1712->1715 1717 654486a 1714->1717 1715->1717 1718 6544896 1716->1718 1719 654489d-65448b0 call 65444e8 1716->1719 1717->1709 1718->1719 1722 65449f4-65449fb 1719->1722 1723 65448b6-65448c9 1719->1723 1724 6544c95-6544c9c 1722->1724 1725 6544a01-6544a16 1722->1725 1729 65448d7-65448f1 1723->1729 1730 65448cb-65448d2 1723->1730 1727 6544c9e-6544ca7 1724->1727 1728 6544d0b-6544d12 1724->1728 1735 6544a36-6544a3c 1725->1735 1736 6544a18-6544a1a 1725->1736 1727->1728 1733 6544ca9-6544cbc 1727->1733 1731 6544dae-6544db5 1728->1731 1732 6544d18-6544d21 1728->1732 1753 65448f3-65448f6 1729->1753 1754 65448f8-6544905 1729->1754 1737 65449ed 1730->1737 1739 6544db7-6544dc8 1731->1739 1740 6544dd1-6544dd7 1731->1740 1732->1731 1738 6544d27-6544d3a 1732->1738 1733->1728 1749 6544cbe-6544d03 call 65419a0 1733->1749 1745 6544b04-6544b08 1735->1745 1746 6544a42-6544a44 1735->1746 1736->1735 1742 6544a1c-6544a33 1736->1742 1737->1722 1761 6544d3c-6544d4b 1738->1761 1762 6544d4d-6544d51 1738->1762 1739->1740 1757 6544dca 1739->1757 1743 6544de9-6544df2 1740->1743 1744 6544dd9-6544ddf 1740->1744 1742->1735 1750 6544df5-6544e6a 1744->1750 1751 6544de1-6544de7 1744->1751 1745->1724 1755 6544b0e-6544b10 1745->1755 1746->1745 1752 6544a4a-6544a53 1746->1752 1749->1728 1793 6544d05-6544d08 1749->1793 1831 6544e6c-6544e76 1750->1831 1832 6544e78 1750->1832 1751->1743 1751->1750 1873 6544a55 call 6544f87 1752->1873 1874 6544a55 call 6544f98 1752->1874 1759 6544907-654491b 1753->1759 1754->1759 1755->1724 1760 6544b16-6544b1f 1755->1760 1757->1740 1759->1737 1786 6544921-6544975 1759->1786 1769 6544c72-6544c78 1760->1769 1761->1762 1763 6544d71-6544d73 1762->1763 1764 6544d53-6544d55 1762->1764 1763->1731 1772 6544d75-6544d7b 1763->1772 1764->1763 1771 6544d57-6544d6e 1764->1771 1766 6544a5b-6544aab call 65419a0 * 3 1870 6544aad call 6545140 1766->1870 1871 6544aad call 6545130 1766->1871 1872 6544aad call 65450d1 1766->1872 1773 6544c7a-6544c89 1769->1773 1774 6544c8b 1769->1774 1771->1763 1772->1731 1777 6544d7d-6544dab 1772->1777 1780 6544c8d-6544c8f 1773->1780 1774->1780 1777->1731 1780->1724 1785 6544b24-6544b32 call 6543170 1780->1785 1795 6544b34-6544b3a 1785->1795 1796 6544b4a-6544b64 1785->1796 1834 6544977-6544979 1786->1834 1835 6544983-6544987 1786->1835 1793->1728 1801 6544b3c 1795->1801 1802 6544b3e-6544b40 1795->1802 1796->1769 1808 6544b6a-6544b6e 1796->1808 1801->1796 1802->1796 1812 6544b70-6544b79 1808->1812 1813 6544b8f 1808->1813 1809 6544ab3-6544acb call 65419a0 1823 6544ae2-6544b01 call 65419a0 1809->1823 1824 6544acd-6544adf call 65419a0 1809->1824 1815 6544b80-6544b83 1812->1815 1816 6544b7b-6544b7e 1812->1816 1817 6544b92-6544bac 1813->1817 1821 6544b8d 1815->1821 1816->1821 1817->1769 1836 6544bb2-6544c33 call 65419a0 * 4 1817->1836 1821->1817 1823->1745 1824->1823 1837 6544e7d-6544e7f 1831->1837 1832->1837 1834->1835 1835->1737 1838 6544989-65449a1 1835->1838 1864 6544c35-6544c47 call 65419a0 1836->1864 1865 6544c4a-6544c70 call 65419a0 1836->1865 1839 6544e86-6544e8b 1837->1839 1840 6544e81-6544e84 1837->1840 1838->1737 1844 65449a3-65449af 1838->1844 1843 6544e91-6544ebe 1839->1843 1840->1843 1846 65449b1-65449b4 1844->1846 1847 65449be-65449c4 1844->1847 1846->1847 1849 65449c6-65449c9 1847->1849 1850 65449cc-65449d5 1847->1850 1849->1850 1853 65449e4-65449ea 1850->1853 1854 65449d7-65449da 1850->1854 1853->1737 1854->1853 1864->1865 1865->1724 1865->1769 1870->1809 1871->1809 1872->1809 1873->1766 1874->1766
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: $fq$$fq
                    • API String ID: 0-2537786760
                    • Opcode ID: 7521f8e73c970e0eeee274ea738c90205d4784becac9cc165a92608732ce7b4e
                    • Instruction ID: 021b1fae21c7ac57e7b3969b149ba10320e7a522a8ff737ebbefbac28614361a
                    • Opcode Fuzzy Hash: 7521f8e73c970e0eeee274ea738c90205d4784becac9cc165a92608732ce7b4e
                    • Instruction Fuzzy Hash: 7B22AB31E002299FCB55EFA5C840BAEBBF6FF88744F148598E911AB394CB359945CF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1993 63218c0-63218e8 1994 63218ea 1993->1994 1995 63218ef-6321918 1993->1995 1994->1995 1996 632191a-6321923 1995->1996 1997 6321939 1995->1997 1998 6321925-6321928 1996->1998 1999 632192a-632192d 1996->1999 2000 632193c-6321940 1997->2000 2001 6321937 1998->2001 1999->2001 2002 6321cf7-6321d0e 2000->2002 2001->2000 2004 6321d14-6321d18 2002->2004 2005 6321945-6321949 2002->2005 2006 6321d1a-6321d4a 2004->2006 2007 6321d4d-6321d51 2004->2007 2008 632194b-63219a8 2005->2008 2009 632194e-6321952 2005->2009 2006->2007 2010 6321d72 2007->2010 2011 6321d53-6321d5c 2007->2011 2019 63219aa-6321a1b 2008->2019 2020 63219ad-63219b1 2008->2020 2013 6321954-6321978 2009->2013 2014 632197b-632197e 2009->2014 2016 6321d75-6321d7b 2010->2016 2017 6321d63-6321d66 2011->2017 2018 6321d5e-6321d61 2011->2018 2013->2014 2118 6321980 call 6592fb9 2014->2118 2119 6321980 call 6592fc8 2014->2119 2022 6321d70 2017->2022 2018->2022 2028 6321a20-6321a24 2019->2028 2029 6321a1d-6321a7a 2019->2029 2025 63219b3-63219d7 2020->2025 2026 63219da-6321a01 2020->2026 2022->2016 2023 6321986-632199f 2023->2002 2025->2026 2048 6321a03-6321a09 2026->2048 2049 6321a11-6321a12 2026->2049 2030 6321a26-6321a4a 2028->2030 2031 6321a4d-6321a71 2028->2031 2038 6321a7f-6321a83 2029->2038 2039 6321a7c-6321ad8 2029->2039 2030->2031 2031->2002 2046 6321a85-6321aa9 2038->2046 2047 6321aac-6321acf 2038->2047 2050 6321ada-6321b3c 2039->2050 2051 6321add-6321ae1 2039->2051 2046->2047 2047->2002 2048->2049 2049->2002 2060 6321b41-6321b45 2050->2060 2061 6321b3e-6321ba0 2050->2061 2058 6321ae3-6321b07 2051->2058 2059 6321b0a-6321b22 2051->2059 2058->2059 2070 6321b32-6321b33 2059->2070 2071 6321b24-6321b2a 2059->2071 2068 6321b47-6321b6b 2060->2068 2069 6321b6e-6321b86 2060->2069 2072 6321ba2-6321c04 2061->2072 2073 6321ba5-6321ba9 2061->2073 2068->2069 2081 6321b96-6321b97 2069->2081 2082 6321b88-6321b8e 2069->2082 2070->2002 2071->2070 2083 6321c06-6321c68 2072->2083 2084 6321c09-6321c0d 2072->2084 2079 6321bd2-6321bea 2073->2079 2080 6321bab-6321bcf 2073->2080 2092 6321bfa-6321bfb 2079->2092 2093 6321bec-6321bf2 2079->2093 2080->2079 2081->2002 2082->2081 2094 6321c6a-6321cc3 2083->2094 2095 6321c6d-6321c71 2083->2095 2090 6321c36-6321c4e 2084->2090 2091 6321c0f-6321c33 2084->2091 2103 6321c50-6321c56 2090->2103 2104 6321c5e-6321c5f 2090->2104 2091->2090 2092->2002 2093->2092 2105 6321cc5-6321ce9 2094->2105 2106 6321cec-6321cef 2094->2106 2101 6321c73-6321c97 2095->2101 2102 6321c9a-6321cbd 2095->2102 2101->2102 2102->2002 2103->2104 2104->2002 2105->2106 2106->2002 2118->2023 2119->2023
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075327960.0000000006320000.00000040.00000800.00020000.00000000.sdmp, Offset: 06320000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6320000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq$4'fq
                    • API String ID: 0-751858264
                    • Opcode ID: 1dba3caf2df72662ade0a7eab054f96159580230509d3202fdc427d2eced3b45
                    • Instruction ID: 52e02d9a23339f4df0f9f14b851dc51178d963523b47fe95157220f910c85f1d
                    • Opcode Fuzzy Hash: 1dba3caf2df72662ade0a7eab054f96159580230509d3202fdc427d2eced3b45
                    • Instruction Fuzzy Hash: 2FF1E634D01229DFCBA4DFA4D5946ECBBB6FF49751F20812AE506AB350DB31598ACF80

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2403 65405a0-65405a1 2404 65405f5-65405ff 2403->2404 2405 65405a3-65405bf 2403->2405 2411 6540601-6540618 2404->2411 2406 65405c5-65405d1 2405->2406 2407 65406d8-65406fd 2405->2407 2412 6540704-6540749 2406->2412 2413 65405d7-65405df 2406->2413 2407->2412 2421 6540622-6540624 2411->2421 2422 654061a 2411->2422 2438 654079d-65407c6 2412->2438 2439 654074b-6540776 2412->2439 2423 65405ea-65405ee 2413->2423 2426 654062b-6540638 2421->2426 2424 6540626 2422->2424 2425 654061c-6540620 2422->2425 2423->2411 2427 65405f0 2423->2427 2424->2426 2425->2421 2425->2424 2429 6540640-6540643 2426->2429 2430 654063a-654063e 2426->2430 2427->2404 2431 6540646-654064e 2429->2431 2430->2431 2433 6540650-6540658 2431->2433 2434 654065a 2431->2434 2435 654065e-65406bd 2433->2435 2434->2435 2442 65406d1-65406d5 2435->2442 2443 65406bf-65406c9 2435->2443 2447 65407c8-65407cb 2438->2447 2448 6540829-654082d 2438->2448 2443->2442 2452 6540855 2447->2452 2453 65407cd-65407d7 2447->2453 2450 654083d-6540853 2448->2450 2451 654082f-6540835 2448->2451 2454 654085a-6540862 2450->2454 2451->2452 2455 6540837-6540839 2451->2455 2452->2454 2459 654081d-6540827 2453->2459 2460 65407d9-65407dc 2453->2460 2465 6540863 2454->2465 2455->2450 2459->2447 2459->2448 2460->2459 2462 65407de-65407e0 2460->2462 2463 65407e2-65407e8 2462->2463 2464 65407ea-6540803 2462->2464 2463->2459 2463->2464 2468 6540805-654080e 2464->2468 2469 6540818-654081a 2464->2469 2465->2465 2468->2452 2470 6540810-6540816 2468->2470 2469->2459 2470->2459
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq$Hjq
                    • API String ID: 0-2151573235
                    • Opcode ID: f3a5a5bd50162025c50a98b0bbe0898a4449a6da15f7c930a25a2d30b5d99d5e
                    • Instruction ID: 9253509e1b09560cbd2392ef8ec99abce3feed96c70efa758e260285dff9b221
                    • Opcode Fuzzy Hash: f3a5a5bd50162025c50a98b0bbe0898a4449a6da15f7c930a25a2d30b5d99d5e
                    • Instruction Fuzzy Hash: 2C81E2706047518FD7A4EF29C49065ABBE2FF84308F24CA9DE11A8B2D1DB35E885CF91
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: $\sfq
                    • API String ID: 0-1105643209
                    • Opcode ID: 6a3aa738744e501e965c4248180a64bca105339d727037910f61ba7e3ae2bbeb
                    • Instruction ID: e0b967ec63335bf398398eba7748f90acb369d7b38ca594a17de4a7caca9a02e
                    • Opcode Fuzzy Hash: 6a3aa738744e501e965c4248180a64bca105339d727037910f61ba7e3ae2bbeb
                    • Instruction Fuzzy Hash: B051CE71B001158FDB10DFACD8809AFBBB6FB84621F56856BE619DB761C730EC428B80
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq$Hjq
                    • API String ID: 0-2151573235
                    • Opcode ID: 945fdead5931fe245bfb21730a6ca228fe0a7a288fed4a4a93830b99cac91980
                    • Instruction ID: 8f7537f6b924c9fc26e3e0f222b4a071f322c9d5879500430db8bc3db08ffa26
                    • Opcode Fuzzy Hash: 945fdead5931fe245bfb21730a6ca228fe0a7a288fed4a4a93830b99cac91980
                    • Instruction Fuzzy Hash: 3E5168347002119FCB99AF29D49452EBBB7FF8974572044ACE5068B3A5CF35EC4ACBA0
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: X$s
                    • API String ID: 0-2768922426
                    • Opcode ID: de2cde29500a644dc37b93f62c9e08ab748dda9817ef48f56d4db76935938e6f
                    • Instruction ID: d6e3d70cde37e8163c2333e621b2339a1bc240d08baef256a4d2cd57358dcf43
                    • Opcode Fuzzy Hash: de2cde29500a644dc37b93f62c9e08ab748dda9817ef48f56d4db76935938e6f
                    • Instruction Fuzzy Hash: 1131E5B8A10229CFDB64DF64C8847EDB7B5FB49315F1045EA9509A7390DB30AE85CF00
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,jq
                    • API String ID: 0-1538246120
                    • Opcode ID: 38c50193893935c9bb4d5f26136ed38837ee17af323808c2313fdc507582aa96
                    • Instruction ID: 00a9dfe33fb1a862fcb8b6c45e8fb480a2ecb83c1aca7679193983c73849c8c1
                    • Opcode Fuzzy Hash: 38c50193893935c9bb4d5f26136ed38837ee17af323808c2313fdc507582aa96
                    • Instruction Fuzzy Hash: BE52F775A102288FDB64DF68C980BEDBBF6BB88700F1541D9E509A7391DA30DE85CF61
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: (_fq
                    • API String ID: 0-931642571
                    • Opcode ID: 99ce60a4cabd5b0a7aa7aff803ecbd0d51c0c641771e819add76903bc5364b2c
                    • Instruction ID: 0f5d247ecf1f8fca430aa7dab5c6811ccb376863bf4d0ab8be00f1e809e3864d
                    • Opcode Fuzzy Hash: 99ce60a4cabd5b0a7aa7aff803ecbd0d51c0c641771e819add76903bc5364b2c
                    • Instruction Fuzzy Hash: 03229B75A00215DFDB44EF69D494A6DB7F6FF88304F1480A9E905AB3A1EB31EC84CB90
                    APIs
                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0659F807
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076445263.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6590000_wpappx.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 7933235d3513b8239f23ed72410743a3d4b84cbdf3b16ec765dcac8d097c071e
                    • Instruction ID: be8fe326f2eb865abe75cfc2e9c16930de0975241f741bb7542bc460f83b711c
                    • Opcode Fuzzy Hash: 7933235d3513b8239f23ed72410743a3d4b84cbdf3b16ec765dcac8d097c071e
                    • Instruction Fuzzy Hash: 37A10EB0D002199FDF64CFA9C881BEEBBB1BF09310F149569E858E7290DB748985CF95
                    APIs
                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0659F807
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076445263.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6590000_wpappx.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: b3519e4ca01aaa90fb3f950c2a548a9e0049d11f4b932e22bae20704b06c4ad0
                    • Instruction ID: 2cb778237c5dd22a77c9d3901d8cd96e1ac8636e5d16dcf96c8f21d7aa4fa251
                    • Opcode Fuzzy Hash: b3519e4ca01aaa90fb3f950c2a548a9e0049d11f4b932e22bae20704b06c4ad0
                    • Instruction Fuzzy Hash: 9DA100B1D002199FDF64CFA9C881BEEBBB1BF09310F149169E858E7290DB748985CF95
                    APIs
                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 065503FC
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076136879.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6550000_wpappx.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: e49186a88d4a1c8607b165dafd0e3c5f8b0857ed0924b15cc670598c8f70937c
                    • Instruction ID: d7e6da7255a60f7f2f0004f70ce2e5c98cff1315656b07bc466894443070c080
                    • Opcode Fuzzy Hash: e49186a88d4a1c8607b165dafd0e3c5f8b0857ed0924b15cc670598c8f70937c
                    • Instruction Fuzzy Hash: 7B31EBB4D012589FCF10CFAAD884AEEFBB4BB49310F10902AE814B7210D734A945CF64
                    APIs
                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 065503FC
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076136879.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6550000_wpappx.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: f78fa402a73e15f19d46bfc1447e6a7fa71595e8760128da3ad350b2c73db7de
                    • Instruction ID: f3ec0c96151afc894dfd7f8e9347b1f38b24d5d1c73903e581e27a3e2172c834
                    • Opcode Fuzzy Hash: f78fa402a73e15f19d46bfc1447e6a7fa71595e8760128da3ad350b2c73db7de
                    • Instruction Fuzzy Hash: 7731B8B4D00258DFCB10CFAAD984AEEFBB1BB59320F24942AE814B7250D779A945CF54
                    APIs
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076445263.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6590000_wpappx.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 997af850b4469cd2c09ec5130f0eae4fe0bf9ef3868a251e93664dc02c63046b
                    • Instruction ID: 6b9bd546247cf68f0a3e32e3c16742163b1fd79032a6b8f0e228e20c8c951992
                    • Opcode Fuzzy Hash: 997af850b4469cd2c09ec5130f0eae4fe0bf9ef3868a251e93664dc02c63046b
                    • Instruction Fuzzy Hash: 2731C9B4D012199FCB10CFAAD980A9EBBF5BB49310F24942AE804B7200D734A945CBA4
                    APIs
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076445263.0000000006590000.00000040.00000800.00020000.00000000.sdmp, Offset: 06590000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6590000_wpappx.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: f84cf69f14c650f6c7126a1c5a7578eea56060ed15f09deb13ec85b00c002773
                    • Instruction ID: 55c824db4ade24d4d00defb655ea0a4718ac7c8ac3a8e14b2bdccbfc38822e80
                    • Opcode Fuzzy Hash: f84cf69f14c650f6c7126a1c5a7578eea56060ed15f09deb13ec85b00c002773
                    • Instruction Fuzzy Hash: 9431CCB4D012199FDF10CFAAD980A9EFBF5BF59310F14942AE414B7240D735A945CFA4
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: Plfq
                    • API String ID: 0-3206639473
                    • Opcode ID: c529a65091e342094202aecbcc1225294e8c30f786cad914b38014ac34edefde
                    • Instruction ID: b3e9503d65aadbdc0ae0ed0167bafed17f6a5b31f56d90779e8349d2ca6f32a5
                    • Opcode Fuzzy Hash: c529a65091e342094202aecbcc1225294e8c30f786cad914b38014ac34edefde
                    • Instruction Fuzzy Hash: D9910274B001148FDB54EF28C884AAA7BF6FF89714B1440A9E506CB3B5EB70ED41CBA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: 6f813a85b8f4d214946f6af4b8c2fd2362f7ec1efe2131d3d28758c8265aa89f
                    • Instruction ID: e91a0c777ecad4d299a655a3362d1213a400a7637bfa769a14157722e9aeb2e3
                    • Opcode Fuzzy Hash: 6f813a85b8f4d214946f6af4b8c2fd2362f7ec1efe2131d3d28758c8265aa89f
                    • Instruction Fuzzy Hash: 17A11E34A10219DFCB44EFA4D89899EB7B6FF88304F558159E405AB365DF30AC46CF50
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: \sfq
                    • API String ID: 0-3800904836
                    • Opcode ID: cab99969396b4cfe21d4262982bc5f3d1263d84fd567238b38812756c12caab8
                    • Instruction ID: 2a691d0c6c5277363eddf26aa51bac7cd9273bac20753a8c28e7eee4d3814f48
                    • Opcode Fuzzy Hash: cab99969396b4cfe21d4262982bc5f3d1263d84fd567238b38812756c12caab8
                    • Instruction Fuzzy Hash: 2E51E8B8E4020A9FDF14DFA9D980AEEBBF1BF88314F10A665D401FB254DB359946CB50
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq
                    • API String ID: 0-3225323518
                    • Opcode ID: 61046b6448bdc05acd9eb49c46f68b17b0dfe179473c9c55fc378fc32049dfe2
                    • Instruction ID: 073b8f7a1be678d810e2c4db07d5fa964e7d25506153ffe79e17345672c4bc66
                    • Opcode Fuzzy Hash: 61046b6448bdc05acd9eb49c46f68b17b0dfe179473c9c55fc378fc32049dfe2
                    • Instruction Fuzzy Hash: F6518E36704250AFCB469F68D814D597FB6FF89710B1980EAF605CF2B2CA32D815DB60
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: 5bd32488508ccbc700551e3e66d5a06b05ac03119bc0acad79a2036f3667ed3d
                    • Instruction ID: d77dbc0b6080236f6c8d7dd542c829b48cbf7d126657155fd1b47c02b5667b4f
                    • Opcode Fuzzy Hash: 5bd32488508ccbc700551e3e66d5a06b05ac03119bc0acad79a2036f3667ed3d
                    • Instruction Fuzzy Hash: 74415D34B106158FCB94FF68D894AAEB7BABFC9704F104559E406AB398CF749C06CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq
                    • API String ID: 0-3225323518
                    • Opcode ID: ea60e55b7956b0cd6f0c3f7caeb5be04a12fa8108bfcca8ddafaf49a19ca6278
                    • Instruction ID: 77fc662fd9bb5ceb74ffd7dbb7d0f58ff520bee5c2269eeafbe6050f0bb6d2a1
                    • Opcode Fuzzy Hash: ea60e55b7956b0cd6f0c3f7caeb5be04a12fa8108bfcca8ddafaf49a19ca6278
                    • Instruction Fuzzy Hash: A841D670A01616DFCB00DF68C484A6AFBB5FF89314F258599D6159B382C730ED55CBE0
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: cac23ad34e9a761da842a4792f9c38cf4900a54cf4144c8e593ba0bcafe74fef
                    • Instruction ID: 9d6ca2de9414736036bcfad7aea9e865141daa03adb9f3f1d27c3252063fb7bd
                    • Opcode Fuzzy Hash: cac23ad34e9a761da842a4792f9c38cf4900a54cf4144c8e593ba0bcafe74fef
                    • Instruction Fuzzy Hash: E241C3317002119FCB159FA5D888D9ABFB7FF89710B0581AAF60A9B365CA319C46DB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: pjq
                    • API String ID: 0-551751012
                    • Opcode ID: ca29dfa5eafaf1d2b0fea01f069a89b95eea993ea2a52a034848e354499baf3b
                    • Instruction ID: 7beb25f138d72ecd73cba3295d555ee9bea9373060b4d902c8e64cbdabde7f8f
                    • Opcode Fuzzy Hash: ca29dfa5eafaf1d2b0fea01f069a89b95eea993ea2a52a034848e354499baf3b
                    • Instruction Fuzzy Hash: 9F41C776600110AFCB469FA9D944D6A7FF6FF8C31471A8198E2099B372DB32DC61EB50
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: TJkq
                    • API String ID: 0-3106782265
                    • Opcode ID: ee23354d5a1c645cdfe814dc9ff27617efece9087e869c181d1594d9f603b15a
                    • Instruction ID: b335c1aa1468ca5679d86ed90bfee96794ecc7559fd18d0c56f57f327104b40b
                    • Opcode Fuzzy Hash: ee23354d5a1c645cdfe814dc9ff27617efece9087e869c181d1594d9f603b15a
                    • Instruction Fuzzy Hash: 6251E3B4D01209DFDB24DFA9E5886AEBBBAFF88314F50802AE415A7368DB345945CF50
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: 06c1f3d9b88141b2b4328b7935cc9a567a98adddb865132ba3f59ed63d6ec9ab
                    • Instruction ID: 69480a0599fc7dca6d4af6b3b1f4a8983c1736e22e5e42fcec948113f78d66df
                    • Opcode Fuzzy Hash: 06c1f3d9b88141b2b4328b7935cc9a567a98adddb865132ba3f59ed63d6ec9ab
                    • Instruction Fuzzy Hash: B5415F717006109FD349EB69C995F2B7BEABFC9B04F104598E20A8B3A1DE71EC41C791
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,jq
                    • API String ID: 0-1538246120
                    • Opcode ID: 1155032dcd57ffffae8deace2d59dbc4ac731ff30f7e9cf0b3f4273ce191dba2
                    • Instruction ID: 10c4c0e90d93218305337a3155f8fb22b2bc0ebdaca4fbeb649a2e4b421c99df
                    • Opcode Fuzzy Hash: 1155032dcd57ffffae8deace2d59dbc4ac731ff30f7e9cf0b3f4273ce191dba2
                    • Instruction Fuzzy Hash: F541BC357005058FCB14EF69C8909AEBBF2FF85350B1185A9E9059F361DB31ED45CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: TJkq
                    • API String ID: 0-3106782265
                    • Opcode ID: 2db5829947f3287d7c4304e1352e76f1dc547ff2318da76423c2d2d06f749e39
                    • Instruction ID: 8271c4a95437b0e9b45eed97f0f634f2e9ace426b5c93d58f5a2fdb511fa5430
                    • Opcode Fuzzy Hash: 2db5829947f3287d7c4304e1352e76f1dc547ff2318da76423c2d2d06f749e39
                    • Instruction Fuzzy Hash: BA41E5B4D01209DFDB24DFA9E5886ADBBBAFF88314F50802AE415A3368DB345945CF50
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: 84d05db73caa2b3e0897fde2bb1a37905e2fcaebd175ffc3f14cee4cf646f70d
                    • Instruction ID: 7096ac35a483f8a38e44e7c34db3fccbf7c31aeeee28989680c255600e4d01e5
                    • Opcode Fuzzy Hash: 84d05db73caa2b3e0897fde2bb1a37905e2fcaebd175ffc3f14cee4cf646f70d
                    • Instruction Fuzzy Hash: 23311F757006109FD348EB69C995B2B77EABFC8B04F104558E60A8B3A1DE71EC41CB91
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: (jq
                    • API String ID: 0-3225323518
                    • Opcode ID: 6ddd1abffeaba5d9e713e93a4ed407c4370a7d4370ae1a45fd8275d428fa442b
                    • Instruction ID: 01f53954a70fec401aaf318bd478fc498c9e66a9ddeecc5f7fa9dee112b262f8
                    • Opcode Fuzzy Hash: 6ddd1abffeaba5d9e713e93a4ed407c4370a7d4370ae1a45fd8275d428fa442b
                    • Instruction Fuzzy Hash: D43129357042555FDB056B29EC409AF7BA6EFD9364B20407EFA05CB390DE329C15C7A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: 3dfd95314e2a6dd7ec375e98af41555527bd04f907f20474ab21b2beb4f39a8a
                    • Instruction ID: e537d833de44cf8ea12f1522ad06b949cc3ad4b6c3993b3576865801b8170238
                    • Opcode Fuzzy Hash: 3dfd95314e2a6dd7ec375e98af41555527bd04f907f20474ab21b2beb4f39a8a
                    • Instruction Fuzzy Hash: 402191356001119FCF159FA4D898DAE7BB7FF88710B0540A9FA069B3A5CA72DC46DB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: Tefq
                    • API String ID: 0-1066582953
                    • Opcode ID: 277e01fb566ddf0aeaa11917aaaf8d67e25af1d2ba6a5b72c4b7ded520bf2549
                    • Instruction ID: b0e89bda8afd792f663ccd994357cee08e6e500c01dbc33329a132660eb221c0
                    • Opcode Fuzzy Hash: 277e01fb566ddf0aeaa11917aaaf8d67e25af1d2ba6a5b72c4b7ded520bf2549
                    • Instruction Fuzzy Hash: 4021BF307002459FCB44DB79C498AAEBBF6BFA9300F51416EE405AB3B5CE349C05CB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: p<fq
                    • API String ID: 0-1940909823
                    • Opcode ID: 0fa34503bee18065128a5196e6a8b7b0da337baa70c2cdc12827bb8af43a3952
                    • Instruction ID: 5ecaafe6021195d76b1322fa856f3e116a3944ac8c7b6faf5f777b111b0256a0
                    • Opcode Fuzzy Hash: 0fa34503bee18065128a5196e6a8b7b0da337baa70c2cdc12827bb8af43a3952
                    • Instruction Fuzzy Hash: EA217C74308244AFCB159F2AC880EAB3BEAFF8A254B054095F944CB271CA31EC52CF60
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: ,jq
                    • API String ID: 0-1538246120
                    • Opcode ID: 912381675397fc46d8b7ab341c85d635f7f611976bc27f3f572b374d2738265a
                    • Instruction ID: 36c8f2db4a8f583c12527c3ecb4b6a3c5b10e14836da4ef4680630260af5fc80
                    • Opcode Fuzzy Hash: 912381675397fc46d8b7ab341c85d635f7f611976bc27f3f572b374d2738265a
                    • Instruction Fuzzy Hash: 3D21D334A006059FCB10EF69D850AAABFF9EF85340F1581AAE9409F361DB31ED40CBA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075327960.0000000006320000.00000040.00000800.00020000.00000000.sdmp, Offset: 06320000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6320000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4'fq
                    • API String ID: 0-2007657732
                    • Opcode ID: 11fa36265943e70ec37acd0775962b97fd4769cb36b877c65a060765f4ff66fa
                    • Instruction ID: 9a97da18745639b12f83f3bdd85c8fab9a4e4c4f1dd5d8415a53047db5b0a14a
                    • Opcode Fuzzy Hash: 11fa36265943e70ec37acd0775962b97fd4769cb36b877c65a060765f4ff66fa
                    • Instruction Fuzzy Hash: E831DD30D0526ACFDB59CFA9C5146BEBBB1FF45300F1480AAC125A7291D7386989CFD1
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: p<fq
                    • API String ID: 0-1940909823
                    • Opcode ID: 9a5aa08f4e9764679455d3a761bf7a796d203129c95a1aa75a737245cdc175a3
                    • Instruction ID: 79d17c5ac498eb4fc92b17cb1a1089297086fe9f0a457f5371d4d69859c23c30
                    • Opcode Fuzzy Hash: 9a5aa08f4e9764679455d3a761bf7a796d203129c95a1aa75a737245cdc175a3
                    • Instruction Fuzzy Hash: 6F215974344154AFCB55DF2AC880EAA7BEAFF8A244B044095FC14CB2A1DB31EC52DF60
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: Tefq
                    • API String ID: 0-1066582953
                    • Opcode ID: dae7064e20bfff818549cfd77acc4ec7049ce1854464a10ef1d19d6a54ab8cff
                    • Instruction ID: c5eaa13a9b65b3aa453bc99198fbe846fbfb88a54e095253d935cbe2c3401b2b
                    • Opcode Fuzzy Hash: dae7064e20bfff818549cfd77acc4ec7049ce1854464a10ef1d19d6a54ab8cff
                    • Instruction Fuzzy Hash: 6F21AE707002159FCB48EF7AC458A6EBAF6BFA8700F514429E506EB3A4DE719C05CB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: \sfq
                    • API String ID: 0-3800904836
                    • Opcode ID: b32c90b3a13e51b1d8ff4b6b59a3f0df42529f2fd80514a196c8618e3b30ad12
                    • Instruction ID: 85d1557623a1f3f997398452ba9e5c7c0babf1a36acb08baf9a6d0f6d55210dc
                    • Opcode Fuzzy Hash: b32c90b3a13e51b1d8ff4b6b59a3f0df42529f2fd80514a196c8618e3b30ad12
                    • Instruction Fuzzy Hash: E70184707006118FD765DF39D854C3B37FAAF89A60B1285AED50ACB372DA30DC418B51
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: I
                    • API String ID: 0-3707901625
                    • Opcode ID: 90e0e7c417fd6ef0edce50aabfc27bee16033c4ff3d2cad172130ff091c53c09
                    • Instruction ID: 446c1a433862bae192b3dadb299aecb8fa5321597ef5b285c128a684b961402e
                    • Opcode Fuzzy Hash: 90e0e7c417fd6ef0edce50aabfc27bee16033c4ff3d2cad172130ff091c53c09
                    • Instruction Fuzzy Hash: E6214E74915628CFDBA4DF29DC88B9EBBB1BB49302F0441EB9809A7290DB305E85CF41
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: o
                    • API String ID: 0-252678980
                    • Opcode ID: 3d3349d9c17e3ddc335428a3da18291061436262cdf6a7896fccf6d6dcb497f7
                    • Instruction ID: c7db651ef3b57d3ab0da344b9d3e302002ec1e01b694236e6732ae97dc0d43f5
                    • Opcode Fuzzy Hash: 3d3349d9c17e3ddc335428a3da18291061436262cdf6a7896fccf6d6dcb497f7
                    • Instruction Fuzzy Hash: DD01EF79D15228CFDBA5DF64E888B9DBBB1BF0A318F5450EAD509A2242C7300988CF56
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: o
                    • API String ID: 0-252678980
                    • Opcode ID: 872ad26f15a2c2c3830309b26e593967eee8ffbc94ec09b7e63a26a5e44956ea
                    • Instruction ID: 96504ae107d8b2483f177bbfe2e1be55107025ea96ff7b85b7924add8150dd08
                    • Opcode Fuzzy Hash: 872ad26f15a2c2c3830309b26e593967eee8ffbc94ec09b7e63a26a5e44956ea
                    • Instruction Fuzzy Hash: 15F0CF74D112198FDBA4DF28D889B8DBBB1BF0A328F5052DAD518A7692C7304D88CF11
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID: .
                    • API String ID: 0-248832578
                    • Opcode ID: e5db8872eb1d0e32acf49e5f2a8d6166690366f76294ad392521dfae65ac7719
                    • Instruction ID: f2dd2040b0372e72c36ab5d5a6ce304fb4cbd14a5ccc96a27e48db7f6ff02fd2
                    • Opcode Fuzzy Hash: e5db8872eb1d0e32acf49e5f2a8d6166690366f76294ad392521dfae65ac7719
                    • Instruction Fuzzy Hash: 23D05EF16002388FDBA4EF39E884A5E77B9FB45300F104698D00AAB388DE301D858FD1
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 705700bc140bf4e40c802244820f12df899178635f353b422f8f01bb445a32c2
                    • Instruction ID: fe97643e8e93b72936adb7a8b13190a01be78767025e4b0a793fd40a3885d544
                    • Opcode Fuzzy Hash: 705700bc140bf4e40c802244820f12df899178635f353b422f8f01bb445a32c2
                    • Instruction Fuzzy Hash: D8120934A002198FCB54EF64C995B9DB7B2BF89304F5185A8E54AAB365DF30ED89CF40
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4cae9bcb75fedabe3477215ac3c7a34fd304a58587c59e1030ec2b505dc87762
                    • Instruction ID: 03dce0e07256659f552c8b8012471eec43986098bcd1c0549f8e8010cd6d6305
                    • Opcode Fuzzy Hash: 4cae9bcb75fedabe3477215ac3c7a34fd304a58587c59e1030ec2b505dc87762
                    • Instruction Fuzzy Hash: FE918835A016149FCB25EFA5D584AADBBF2FB88755F1080A9E9029B390CB31DD85CF90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 25824a3ff2ebf544ea0612e58a0e898509f9240f19eb919449b8913798e869fb
                    • Instruction ID: 3fe59839e5e797d7aed3c3ef542a0781a85839fd0db8282cc32bff172970b1e0
                    • Opcode Fuzzy Hash: 25824a3ff2ebf544ea0612e58a0e898509f9240f19eb919449b8913798e869fb
                    • Instruction Fuzzy Hash: 63A11834A002158FDB64EF24C889B9DBBB6BF89314F5085E8E549AB355DF30AD85CF50
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3e343276dd5f6d6f35ca3c0666f7633715b831ec5a37ae8b4aab3749b5751cd3
                    • Instruction ID: 019b23f697a5e5be5ebd58dbe71860519f7d69e1cf06f0b76aa67cb2498af95f
                    • Opcode Fuzzy Hash: 3e343276dd5f6d6f35ca3c0666f7633715b831ec5a37ae8b4aab3749b5751cd3
                    • Instruction Fuzzy Hash: 2BA13774E05218DFDB94DFA8E4446AEBBB6FF49310F104129E605BB384CB746A85CF90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6a3cc35d2c999ce1356f9161d05f3c23e66474b513b3bcfdcf1ed48c2095ff38
                    • Instruction ID: 84c0face60e1c9b46cf75b3d09751e3f2e2375beadaf77705b59d959bbdc8c80
                    • Opcode Fuzzy Hash: 6a3cc35d2c999ce1356f9161d05f3c23e66474b513b3bcfdcf1ed48c2095ff38
                    • Instruction Fuzzy Hash: 39914D30B10215DFCB54EF68D898AADB7B6FF89714F1040A9E50A9B3A5CB35DC45CB90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 091ddd37ecd7f0e84a840da9d79fd057ece2fd8f5e064ca77b28a11221dde76d
                    • Instruction ID: 635c769cbfc35649abbfa11dc6f4ae48df0028666fda7ba02fa9f6a562424ec8
                    • Opcode Fuzzy Hash: 091ddd37ecd7f0e84a840da9d79fd057ece2fd8f5e064ca77b28a11221dde76d
                    • Instruction Fuzzy Hash: F3813875A00618CFCB54EF68C484A9EBBF5FF89354B1580A9E8069B361DB31ED42CF90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e2cddd28fbe63d13dccc4f38d88fed41457962e18e2bb005d4371a8eff2ba8d4
                    • Instruction ID: 045eb5010cee230b8befee58bc710f55ffaa4b93bef1d29cad3687d093e70316
                    • Opcode Fuzzy Hash: e2cddd28fbe63d13dccc4f38d88fed41457962e18e2bb005d4371a8eff2ba8d4
                    • Instruction Fuzzy Hash: 27816975D04258DFDB94DFA8E4446EEBBF9FF49310F10802AE605AB644C7746A89CF90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ee8392ab16eccee985e6d9fcd5e5c16594b8cf3c51abdafe4ab99949707b58d0
                    • Instruction ID: 4c5f49b6ae373511ad1b0a84c1455d622e34f3b255b19965a4ca58427c7f43bb
                    • Opcode Fuzzy Hash: ee8392ab16eccee985e6d9fcd5e5c16594b8cf3c51abdafe4ab99949707b58d0
                    • Instruction Fuzzy Hash: 80613B34B11215DFCB54EF68D898AAEB7B6FF89714F1081A9E5069B365CB30EC41CB90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 775567f3dea201ab5921cf75cd26b237342a35f55134d4f4cb5f0daf8f1509d4
                    • Instruction ID: 4ec04b0928f838cf7c141be02f4971851bb5e6df1f08ab8c67c710a8d57b2a0d
                    • Opcode Fuzzy Hash: 775567f3dea201ab5921cf75cd26b237342a35f55134d4f4cb5f0daf8f1509d4
                    • Instruction Fuzzy Hash: EF713CB1D05218CFEB50DFA9E886BADBBF6BF46304F108069D029AB755D7749984CF80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 524df125d971c4456742eb1250285dacab5621c3d977b32aa489011d89ff67d0
                    • Instruction ID: f1f4e0170d5a14216ab3eccd21fd72e06dba2d3fd7753f85d6caac3f04ec0381
                    • Opcode Fuzzy Hash: 524df125d971c4456742eb1250285dacab5621c3d977b32aa489011d89ff67d0
                    • Instruction Fuzzy Hash: F0519075D04219DFDB44DFA8E4845AEBBFABF49300F10846AE626BB350DB706A45CF90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 519c0997b3fa602ae5c4d048ebd2b59a0f81051af400de354749bb11eed548a4
                    • Instruction ID: f0d9debe1d760f4617f8d05c0b1c84c4969a63992efd66a57ff082da1c05e2a1
                    • Opcode Fuzzy Hash: 519c0997b3fa602ae5c4d048ebd2b59a0f81051af400de354749bb11eed548a4
                    • Instruction Fuzzy Hash: C5516E34B006199FCB04EF64E858AAEB7B6FFC8705F008119F5429B364DF74994ADB91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 465e83dd18be1c454a59a8f3993e24147b999ecef945623f38417a23e74c4b58
                    • Instruction ID: f22a7910409c0bfa7e791ba59070a998636993f6ceef1579e857da1c6335dc87
                    • Opcode Fuzzy Hash: 465e83dd18be1c454a59a8f3993e24147b999ecef945623f38417a23e74c4b58
                    • Instruction Fuzzy Hash: 5551A375D14219DFDB44DFA8E4849AEBBFAFF49300F108469E526AB350DB306A45CF90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7a41b0b87ffb2ad723413910a24187ff9cf894f33588d97b1664f869de6a199b
                    • Instruction ID: 780b98306cde3d9a7f07c22ebeb293550f5205f4b75f357a50842693ddf43601
                    • Opcode Fuzzy Hash: 7a41b0b87ffb2ad723413910a24187ff9cf894f33588d97b1664f869de6a199b
                    • Instruction Fuzzy Hash: 0D51D374E01208CFDB58DFBAD585A9DBBB2FF89300F209029E416AB364DB319945CF90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4782bd9bdde332389739001e9bf5c55ced94b1fb899e2a07b868e3dd781e9f82
                    • Instruction ID: aed613046b17e5b4addc54ab7c293d487aae4dd744d285d6365d308469c3b835
                    • Opcode Fuzzy Hash: 4782bd9bdde332389739001e9bf5c55ced94b1fb899e2a07b868e3dd781e9f82
                    • Instruction Fuzzy Hash: C6319039A01219AFCB14EFA5DC55AEEBBB9FF89310F104065E905B7290CB319D05CBB0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2c0a30ff943bf4b4da645cf6d452fbec94d1b38c352951fea41bdf1c22cf6410
                    • Instruction ID: d2e5b71e695fcb3d869c87ff405dd8fccd004e9f83d8d81984fb50a3c1e3449c
                    • Opcode Fuzzy Hash: 2c0a30ff943bf4b4da645cf6d452fbec94d1b38c352951fea41bdf1c22cf6410
                    • Instruction Fuzzy Hash: 0931F536A111149FCB45DF99D888E99BBB2FF88724B0680A8E5099B372CB31EC55DF40
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7d0ce229e4de8cb7fba4b890700f1f4e6abd32de363d9f3c8b472ccb6f3a53c7
                    • Instruction ID: 4293a249ca6383067b5147e85300ec0cf5e35003590837bce99ad7951b2a8a06
                    • Opcode Fuzzy Hash: 7d0ce229e4de8cb7fba4b890700f1f4e6abd32de363d9f3c8b472ccb6f3a53c7
                    • Instruction Fuzzy Hash: DB41BF71E0062A8FDB60EFA5C9446BEBBB1FF88344F0085A9D905E7265D730D985CF90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b800b89ae4466a72d17379b0fdc59acc474304080c0e0199fdc2a4ec94133879
                    • Instruction ID: eb2165519d67d79ad26840c950ccdb5257ea2d74bc2cae38d1146d19bef2baee
                    • Opcode Fuzzy Hash: b800b89ae4466a72d17379b0fdc59acc474304080c0e0199fdc2a4ec94133879
                    • Instruction Fuzzy Hash: 4F31F6317003148FD758AB78D4546AE3BF6EFC9310F11056AE406DB3A5DF384C068BA2
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d9bc598ee0d71b18f436ad5605bccc2f3e510998d5f0c75028adf0e779edfcb2
                    • Instruction ID: 4b46c4e35ef7695bb6aebab0675589ff0b554a4d784e965d951a640b673a02da
                    • Opcode Fuzzy Hash: d9bc598ee0d71b18f436ad5605bccc2f3e510998d5f0c75028adf0e779edfcb2
                    • Instruction Fuzzy Hash: BB41F2B1E41218DFDB44DF9AE944BEEBBF6BF88310F109029E409A7250D7B05A84CB90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 01aac07d099ee45966bebdc2ec8b00a53d70a71dd77897729478ddf7a06ea997
                    • Instruction ID: dc125b8a141290d954f11c7411edc8d4b38f1a560038cb06fb5e43fb5ca66e9d
                    • Opcode Fuzzy Hash: 01aac07d099ee45966bebdc2ec8b00a53d70a71dd77897729478ddf7a06ea997
                    • Instruction Fuzzy Hash: 573181317042518FDB559F24D894AAA3BB2AF85345F1440AAE841CF2E2CA35DC45DBA1
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a1ff8838acc032e2df94ee4c9eac89497ae394af802b99f456800a84132b207c
                    • Instruction ID: ff2b0dbe791e770fb65a291d7a1d403a0e97691fa74b7c7dac326c093cbac12a
                    • Opcode Fuzzy Hash: a1ff8838acc032e2df94ee4c9eac89497ae394af802b99f456800a84132b207c
                    • Instruction Fuzzy Hash: FA318D30601711EFC729EF25D88496AB7B6FF85745710486CE9468B3A5CF35EC4ACBA0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e3187c7f28e7fda7cd74329b24e1b179a192d1e7aff19cd8ceb1f9e58098fd0d
                    • Instruction ID: 9be149c157b3914aa9ea15a9768fcc91ed072a1cc05d4c24f64578ba7a1db5c2
                    • Opcode Fuzzy Hash: e3187c7f28e7fda7cd74329b24e1b179a192d1e7aff19cd8ceb1f9e58098fd0d
                    • Instruction Fuzzy Hash: B4414EB1D01218CFEB60DF69D84AB9DBBF6BF46304F104169D419B7651DBB49984CF80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: be3d8f70bf152507c482b68e2de71b163326b98f0fedbee418850707bf4c2cbf
                    • Instruction ID: a752c6a8071cd6f6b3a8c57b836406eab5fcdffad88b61c92d11e2074599cdd4
                    • Opcode Fuzzy Hash: be3d8f70bf152507c482b68e2de71b163326b98f0fedbee418850707bf4c2cbf
                    • Instruction Fuzzy Hash: 3B31CF34A013089FCB54EF78D8859AEBBB2FFC9314F1445A9E5129B365CB30E845CB91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4f9bda28ec519ad837ddd86b2f32d775d793281defaa61ae29c66e4792de45ef
                    • Instruction ID: 04e17da85963b2511f30538acb02cf60a9c264e3e3052e0ca653e90314f0c38f
                    • Opcode Fuzzy Hash: 4f9bda28ec519ad837ddd86b2f32d775d793281defaa61ae29c66e4792de45ef
                    • Instruction Fuzzy Hash: B03112B4E00219DFDB44DFAAE4846AEBBF6FB89314F10C06AD41AA7354D7349945CF90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dded11c09a5a587a22eb2745148a56ebd4e915a31eb26b3c3044d18cd35852c4
                    • Instruction ID: 0bdc184f973322f51cad5a30f3bd773b83f8dd449e611c4addd3ef9dc4e068e1
                    • Opcode Fuzzy Hash: dded11c09a5a587a22eb2745148a56ebd4e915a31eb26b3c3044d18cd35852c4
                    • Instruction Fuzzy Hash: 3421D6323452105FD3A49B69E880967BBE9EBC1324B1684BAE44DC7245DB23EC45C7A0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4b8facf6db2f2d00266ebdde15ebbee1aab67a5bd68b5f5ff4f48e19032ce68a
                    • Instruction ID: eb4413681a47ff2d227d53113f36ae08b107244fb4016f3fbd27e50c9e25c833
                    • Opcode Fuzzy Hash: 4b8facf6db2f2d00266ebdde15ebbee1aab67a5bd68b5f5ff4f48e19032ce68a
                    • Instruction Fuzzy Hash: 573146B4E0020ACBEB50DFA9C9043EEBBF9FB88305F00852AD518A7394D7784945CF92
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 70332ecd02640f5d726bf98fe70677b7f54c3e18b280958e827bc6d6100db7d4
                    • Instruction ID: c90ac29956c04399f6237afdd108eb1fc80a48e0129c153725e94d8429c99e1d
                    • Opcode Fuzzy Hash: 70332ecd02640f5d726bf98fe70677b7f54c3e18b280958e827bc6d6100db7d4
                    • Instruction Fuzzy Hash: 73214C36A11114AFCB05DFA9E848D9ABFB6FF89320B0640A9F1099B372C731DC15DB50
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 852bfaddd5f3a34c386b5a9cb83cbcaabc6d6309e97703a040a5ed9cdbb1c997
                    • Instruction ID: 12c89a7b9650839b5b694a73cb6ded158493b07dc1e1377b09d9ff91d8ba49f0
                    • Opcode Fuzzy Hash: 852bfaddd5f3a34c386b5a9cb83cbcaabc6d6309e97703a040a5ed9cdbb1c997
                    • Instruction Fuzzy Hash: 32219434B0061ACFCB40FF68C5548AEB7B5FFC9704B10426AD50697324EF30AA06CB91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2044489950.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_126d000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8c61e243e51d6f445442910b8ad56aea56b8d85fd69d2df3414425828187682b
                    • Instruction ID: f03a37c99d03b2df9eb888271ee6835f3bae629c1c7305a42f2ccf82de23b128
                    • Opcode Fuzzy Hash: 8c61e243e51d6f445442910b8ad56aea56b8d85fd69d2df3414425828187682b
                    • Instruction Fuzzy Hash: EF2166B161420CDFCB15CF58E8C0F26BF69FB88318F20C569E9490A686C336D486CAA1
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1bb90773babd8c507a836d4e0a53c8848a803170f34589323999c589ea79dbe0
                    • Instruction ID: 94d8d3f32d560bdc2cd1eefa82a0edf2a8e1987441f06cfbe03bf11a6e0dd92f
                    • Opcode Fuzzy Hash: 1bb90773babd8c507a836d4e0a53c8848a803170f34589323999c589ea79dbe0
                    • Instruction Fuzzy Hash: 582144B4E0420ACBEB50DFA9C5043EEBBF9FB89305F00852AC519A7394DB7449418F92
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 624462b48fa4b670b9e07d2ef70e515c4cb1d4cc5611fc53b4fe3ee79b07dc25
                    • Instruction ID: 48f1e50701e7d1732b6eecea97325467eba99f226ec9711388991c16012ef442
                    • Opcode Fuzzy Hash: 624462b48fa4b670b9e07d2ef70e515c4cb1d4cc5611fc53b4fe3ee79b07dc25
                    • Instruction Fuzzy Hash: 58215C71E00229DFDB90EBB9D5047AEBBF5BF44244F1084A6D915DB2A0E734CA44CB91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047700652.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_137d000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7ea8ad07fd342c9d9dae7d4181ddace47429393f9304c7debc88732cbd0a6413
                    • Instruction ID: 42c867949b5fa93a182113c734e75831157ebfd29c3554a4867a1e898131157c
                    • Opcode Fuzzy Hash: 7ea8ad07fd342c9d9dae7d4181ddace47429393f9304c7debc88732cbd0a6413
                    • Instruction Fuzzy Hash: BA2125B1504204DFCB26DF58E9C0B26BF65FF84318F24C569E9091B246C33AD806CBA2
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5f24cca7010f099ccfabdf8c2e6101ed35f6fab77b5300e24b5cc4aa88cce71c
                    • Instruction ID: 9ac680f54654fcc8b0b29330063349af005d55a2f9be9704c8c62d0a74d682cb
                    • Opcode Fuzzy Hash: 5f24cca7010f099ccfabdf8c2e6101ed35f6fab77b5300e24b5cc4aa88cce71c
                    • Instruction Fuzzy Hash: F5219834A0061A9FCB40FF68D8558EFBBB5FF8A704B10416AE505D7364DB309A45CBE1
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 195f5d219821a1e240879d83618cd62a042aa140194e0132091b09618eb9ecba
                    • Instruction ID: 858cb34c8f81d60482d4ac0baa9a027d23b678b1ef2c837af311c7699fb057fb
                    • Opcode Fuzzy Hash: 195f5d219821a1e240879d83618cd62a042aa140194e0132091b09618eb9ecba
                    • Instruction Fuzzy Hash: 4D219F39A042549FC765AA78EC44AAF7BA6FFC9328F1445A9E5158B290CF349C41CBA0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b70f9961bb8cdc1d27217ef5dc1f270075c17df7ebfbeaf2259d45f50c85b874
                    • Instruction ID: e5a7809ab15b8838d936b34676710082f1ec58fc7e71b6156cc24a82996b109b
                    • Opcode Fuzzy Hash: b70f9961bb8cdc1d27217ef5dc1f270075c17df7ebfbeaf2259d45f50c85b874
                    • Instruction Fuzzy Hash: 7F2189B4E45219CFDB04DFA9D4043EEBBF5FB98314F40802AD105B3354DB745A898B91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6a14aa4c633ddd2bc3ea65518e702bd9d271fc10d4b7ca0f0536fccec5f63cf1
                    • Instruction ID: 6d7b19ee72f55a7423f712eb1e4b42541f5a0fc2376e7674c5e479ce8319a715
                    • Opcode Fuzzy Hash: 6a14aa4c633ddd2bc3ea65518e702bd9d271fc10d4b7ca0f0536fccec5f63cf1
                    • Instruction Fuzzy Hash: 950109369001199FCF05DF94C804CD9BB76FF49310B0684A0EA056F235D272E929EB80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047700652.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_137d000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 83b8b17ddc97a902276d5d9da2cd06628c88da7ef7ae400d9191280e559dcfcd
                    • Instruction ID: ef92dec2ee03d27cc0e4b8ccee4c4abc381063276f7c5791a2bf64e2eb54cfa3
                    • Opcode Fuzzy Hash: 83b8b17ddc97a902276d5d9da2cd06628c88da7ef7ae400d9191280e559dcfcd
                    • Instruction Fuzzy Hash: BA216D755093C08FDB13CF64D990715BF71AF46214F2981EBD8458F6A7C33A981ACB62
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 26352bc0128b00a924e5f3d201031f1f6f8cf82d6f9e0c07e84ec17bb92ee184
                    • Instruction ID: 90103451fe81e9d5c147f65a352c2bca06f433ffe96195094f5400afe886a835
                    • Opcode Fuzzy Hash: 26352bc0128b00a924e5f3d201031f1f6f8cf82d6f9e0c07e84ec17bb92ee184
                    • Instruction Fuzzy Hash: 5121F771A002198FDB54EFA4C580ADDB7F2FB8C305F2045A8E505BB361CB719D45CBA0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 384f67cc8f03aa67beed9aa6b075e813f495e1bf6c0dedd836ee81e19edcb0a5
                    • Instruction ID: 7bc6102368cae7f09d5c1730053a38bd8bfe3eb746ee9e9ae26542838779c28f
                    • Opcode Fuzzy Hash: 384f67cc8f03aa67beed9aa6b075e813f495e1bf6c0dedd836ee81e19edcb0a5
                    • Instruction Fuzzy Hash: 5A2179B4D09219CFDB04CFA9D5046EEBBF6FB99310F41802AD105B3354D7745A49CBA1
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fb83c93db04cf25fee594e6717c372544cc8ddbbb26008e610aeed2e846f3ae0
                    • Instruction ID: 3e76b215572ef437210d796e67e0cb444390ccfb92bc9e32cdff0738aa8d3d88
                    • Opcode Fuzzy Hash: fb83c93db04cf25fee594e6717c372544cc8ddbbb26008e610aeed2e846f3ae0
                    • Instruction Fuzzy Hash: 6D214875E0421ACFCB54DFE9E0446AEBBB6FB48304F14C2AAD815A7244D7349A82CFD0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 23a3036979b905173fe5f16c8e4beefd466b9d36443225c38619d27ca24a3f40
                    • Instruction ID: 01da75a826c23967dc0153b7f7b08ddf7efc7f81ff6b2c9476bace535a6d9d11
                    • Opcode Fuzzy Hash: 23a3036979b905173fe5f16c8e4beefd466b9d36443225c38619d27ca24a3f40
                    • Instruction Fuzzy Hash: 3E31A278A14228CFEB65CF68C884E99B7B1FB48315F1082E6D90CA7351DB31AE85CF00
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7fec7ada7f4fe919f142ba2025775152e434c4071647c347f125786a17c8f632
                    • Instruction ID: b705cca51a56f9b38c506ebaccb9448ca5cf223729c06f82fc6ee4a1e40ff4d6
                    • Opcode Fuzzy Hash: 7fec7ada7f4fe919f142ba2025775152e434c4071647c347f125786a17c8f632
                    • Instruction Fuzzy Hash: FA218032A00218DFCB04DF68C8449DEBBB7FF8C720F149129E516A7394DB319845DB90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7c332588c4b516f76c7060a256977038940360dd133ef288a7bfb76dd5f43771
                    • Instruction ID: 3afa671e608a2dff830832444428d2759d09d31d091ff1c4dae9f016b6e69a3c
                    • Opcode Fuzzy Hash: 7c332588c4b516f76c7060a256977038940360dd133ef288a7bfb76dd5f43771
                    • Instruction Fuzzy Hash: 442157B0A00209DFEB14EFA8C0487ADBFF5FB99315F59C6AAD115A7264D7B45A84CB00
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 19ea3231268c1ddab114de19cdd5c27e92e417d428d2996374a30db3dfd4fa13
                    • Instruction ID: 6debb293360f6161f5ffe2456eb8c5cccff49a0fd6d5c3df9c8ad31e40538e1f
                    • Opcode Fuzzy Hash: 19ea3231268c1ddab114de19cdd5c27e92e417d428d2996374a30db3dfd4fa13
                    • Instruction Fuzzy Hash: 38217970E00208DFDB10EFA8C0487ADBBF5FB99314F99C6AAC119A3254D7B44A84CB00
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fc636b88591b59bf0d088d8504eaf681b4fc2aabeee42c263022532f75d24f45
                    • Instruction ID: 814c540177b5a3dddc0f4af42e8185406d1676dc3102f0d5b7df7960e9e118f8
                    • Opcode Fuzzy Hash: fc636b88591b59bf0d088d8504eaf681b4fc2aabeee42c263022532f75d24f45
                    • Instruction Fuzzy Hash: 9421D5706002259FC754EB69E84476E7BEAFF84740F108938E10ADB680DF75AD4A97D0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ea4ef6e4e868862a0e9ce93e8d5c254982295af908d4157d3bcc506e1d08e15d
                    • Instruction ID: 33a4f5b57b2214fc4d0ea6a2b28c6e352ce2702924c4a9593da63e87706f6b49
                    • Opcode Fuzzy Hash: ea4ef6e4e868862a0e9ce93e8d5c254982295af908d4157d3bcc506e1d08e15d
                    • Instruction Fuzzy Hash: FD213370D0460A8FCB14CFA9D8446EEBFF5FB88318F04802AD515A3264D7340985CBA0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e0b0121ede7a606ac6cf51bd02f0f084c6b899f393cd73ecb4a2e1dd550daf6f
                    • Instruction ID: 9c181330f03b103a2cdefe4509306f87e9a6aa915462996c957adcccd8a618a7
                    • Opcode Fuzzy Hash: e0b0121ede7a606ac6cf51bd02f0f084c6b899f393cd73ecb4a2e1dd550daf6f
                    • Instruction Fuzzy Hash: 5D11C836314650AFD7009F59EC80FAB7BB9EB89665F144096F604CB391C671CD05CB60
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9cf525dcd9ac73071c0081c3832f47ec1c390c0a9c96f87d8b99e5064d197fac
                    • Instruction ID: 3f56fd8558649e4da694a7bb466de52544f23e132f8873152dfc5ff6d43fc58e
                    • Opcode Fuzzy Hash: 9cf525dcd9ac73071c0081c3832f47ec1c390c0a9c96f87d8b99e5064d197fac
                    • Instruction Fuzzy Hash: 4E112370D0460ACFCB14CF99D8446EEBBFAFB88314F14802AD505A3264D7301986CBA0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 84b715d4c098286bf4f4c45bc23616214c93a6e5f96b330f1308c590a1e647e4
                    • Instruction ID: 85f4379579dab58e4b69638d95bcd04032b919fe27574007aa8f867f0b830f34
                    • Opcode Fuzzy Hash: 84b715d4c098286bf4f4c45bc23616214c93a6e5f96b330f1308c590a1e647e4
                    • Instruction Fuzzy Hash: AD11C135A00215AFCB64AF78CC00BBABBF6BB89641F148069E615DB3C0DB71C905DBA0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4ef30fac0b08806d14d571f300dcffa5c4e75e46caaaa090a1ea0e9be0f40491
                    • Instruction ID: 7ad30a7ee199e7bc1d1181c71b2e0763fdafd9ba0b9f1efe03b12bd97ba09208
                    • Opcode Fuzzy Hash: 4ef30fac0b08806d14d571f300dcffa5c4e75e46caaaa090a1ea0e9be0f40491
                    • Instruction Fuzzy Hash: 170192327401108B8B54AE29E8C8DAEB7DBFFD8665318807AE606CB365DE31DC05DB90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2044489950.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_126d000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                    • Instruction ID: 061167101f7d412ef2d960cda5f55d32761465cee20b992375062ed21171a844
                    • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                    • Instruction Fuzzy Hash: 26110372504288CFCB12CF44D5C0B16BF72FB84318F24C5A9D9490BA97C33AD49ACBA1
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7c1aa2938bc7d94ae7c7667c765492006812df18b86906995e6b6435e8f67254
                    • Instruction ID: f92d776b1e606b0eb5abd0ada231bc2207ecd9c392a3941ce39a467967db0c32
                    • Opcode Fuzzy Hash: 7c1aa2938bc7d94ae7c7667c765492006812df18b86906995e6b6435e8f67254
                    • Instruction Fuzzy Hash: EA110631B002159FCB54AF78C8107AA7BF2BB88701F104069E605DB380DB71C905DBA0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 67c5bbaf7cc6201fa927a50a84abfb355bd55c7d940004bbb56429f5c4c5a17b
                    • Instruction ID: 04503792d2fa15cdc018060b6aaa272388ec476d9a5f919e9407759620e42772
                    • Opcode Fuzzy Hash: 67c5bbaf7cc6201fa927a50a84abfb355bd55c7d940004bbb56429f5c4c5a17b
                    • Instruction Fuzzy Hash: E8216F79A42619AFDB04DFA8D594EADB7F2FF49704F204098E911AB361CB34AD41CF50
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9df68c575f8ad2ff2950a792cb3017750ce972ae2e102bbc7c24061b7324e4d1
                    • Instruction ID: 89a2d544ad2b49a1aa4103ba1cb9d718804954edd0cbb859dd43e1491a6ba25b
                    • Opcode Fuzzy Hash: 9df68c575f8ad2ff2950a792cb3017750ce972ae2e102bbc7c24061b7324e4d1
                    • Instruction Fuzzy Hash: 8401D435301214AFC7159B25EC48CAB7FBDEFC9661B0040EAF9858B361CA31EC46CBA0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0f504031d16e7de598735df9dcd3179efd457ae2f02626f344962f02992438dc
                    • Instruction ID: 2ee28531157f1d7c9e4839c1696a76dc0d0635cb89fb8b798cebfb5767c9cca5
                    • Opcode Fuzzy Hash: 0f504031d16e7de598735df9dcd3179efd457ae2f02626f344962f02992438dc
                    • Instruction Fuzzy Hash: 5301A736350215AFDB149F59DC84F9F77A9FB88B61F108066FB14CB390C6B2D9108B60
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 082e5287119e78f74656b19c60ead61b96f1f0f356541e8b6a5ebd092e52c42c
                    • Instruction ID: 453e198fb0f3167d1f02a428e1fc1626901938139f9e6ba1ba5a98843d5c8ca2
                    • Opcode Fuzzy Hash: 082e5287119e78f74656b19c60ead61b96f1f0f356541e8b6a5ebd092e52c42c
                    • Instruction Fuzzy Hash: 33219778A10228CFEB64DF28C888AE9B7B5FB49314F1085D5E509A7744DB349F85CF50
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9cd3b2192bcb8358bc7d6f05a1b45f68827a7e1d19ad2a54ad4d7979594f7c7d
                    • Instruction ID: 183b98dd196dc88e8bef4ced1eba44e08da301977b98689277b4c0bb34ddc5fc
                    • Opcode Fuzzy Hash: 9cd3b2192bcb8358bc7d6f05a1b45f68827a7e1d19ad2a54ad4d7979594f7c7d
                    • Instruction Fuzzy Hash: DAF0C836711108AFDB149629EC55DBBFBAEEFC4268B04806AFD1997321DA319C16C7F0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: adc88ea54b0904f060c0894444597c3e162bbab0ea8d15612fa633f5d2050ebc
                    • Instruction ID: 1c5c89ab3ded188081bc9186cfdcd6c2a531bc792c0f636875d2008aed705095
                    • Opcode Fuzzy Hash: adc88ea54b0904f060c0894444597c3e162bbab0ea8d15612fa633f5d2050ebc
                    • Instruction Fuzzy Hash: EB11C9B0E0020A9FCB44DFF9C9456BFBBF5FF88300F10856A9518A7354DB315A419B91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6e2ec25263204b56d409896066845527962dcc379fde015f894047e9f00d2fcc
                    • Instruction ID: 7efb636096559f0ca12cea44cadf75106e7b2271b3760d4dd0f05b744e0492bc
                    • Opcode Fuzzy Hash: 6e2ec25263204b56d409896066845527962dcc379fde015f894047e9f00d2fcc
                    • Instruction Fuzzy Hash: 710129B1D1420ADFDB94CFB9D4412AEBBF6FB49310F14C66AD418E2214E7314682CB80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fb87681ed6678af01cc4e75cf04f0e8a78a25c8f7bfd9e23f5d528f6bdfa7a7a
                    • Instruction ID: 75d1986034fc5139aad2156943289a8af752b50154770ad3bae9cffeb0c2f999
                    • Opcode Fuzzy Hash: fb87681ed6678af01cc4e75cf04f0e8a78a25c8f7bfd9e23f5d528f6bdfa7a7a
                    • Instruction Fuzzy Hash: 07019A357042409FC368AB28C844A2A37A3FBC9328F2086ACE5564B794CF71EC02DB90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 171e0586259266867e1d09ab21cf925de1276aed376c98eb312ad959b3a8db9e
                    • Instruction ID: e327cc72597a4cea918f9c87fce3d88289acca7819030e8b8a558f5ecf0761c3
                    • Opcode Fuzzy Hash: 171e0586259266867e1d09ab21cf925de1276aed376c98eb312ad959b3a8db9e
                    • Instruction Fuzzy Hash: 0AF062317105109FD7149A1DD994E66F7DAFBCC654B2480B9EA09CB366DE35DC0287D0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0aca2fd5368deddfc2f71f55c462c477cc69e914749ec08dd3b933fba1c3cad6
                    • Instruction ID: 25719da4abf28d89dbfdbba7bb40d70f5f18c2b39dc1fbb04bd208984f540e20
                    • Opcode Fuzzy Hash: 0aca2fd5368deddfc2f71f55c462c477cc69e914749ec08dd3b933fba1c3cad6
                    • Instruction Fuzzy Hash: 2F01FFB1D0520DDFCB50DFB8D9456AEBBF9EB09305F1084BAD819E3240DB319A45DB91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c672509e5485587a72d86ed4c8a04fc9b9ce02a7ebd307b38d47ec8f388e80c3
                    • Instruction ID: 33e40932fa29e9231b0fb7c5005476f02a936a3cd8c98483c3c26ef0e9bb92c1
                    • Opcode Fuzzy Hash: c672509e5485587a72d86ed4c8a04fc9b9ce02a7ebd307b38d47ec8f388e80c3
                    • Instruction Fuzzy Hash: 3D013C76A40208AFD768DE98D444B9ABBF9FF45324F2580AAE944D7394D731E980CF90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b2aeaa8bf7a7d7ecc999e50f6ee261eb1176af90d4c9319ae8690b1dc0170e70
                    • Instruction ID: 3682c3d88c5b8150b460a0877d752ac4966f9b6d31b65871d427a0e17ce47bdd
                    • Opcode Fuzzy Hash: b2aeaa8bf7a7d7ecc999e50f6ee261eb1176af90d4c9319ae8690b1dc0170e70
                    • Instruction Fuzzy Hash: 6C013C75A00209EFDB58DF98D844B9ABBF5FB48324F1584AAE584D7260E731A980CF54
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 53d8826fffc72086ce7a9d3b076c2710e56e490b087e5263fe4593cb833d26b0
                    • Instruction ID: 7ae5f6f347b3ebc02a28f3a7b88ce814ee2d0f499c46f11684d5a48daf1dd132
                    • Opcode Fuzzy Hash: 53d8826fffc72086ce7a9d3b076c2710e56e490b087e5263fe4593cb833d26b0
                    • Instruction Fuzzy Hash: C1016D71D04618CFEB54DF6AE844BEDBFBAFB89711F008025D5096A244DB345449CBA1
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 713c0f7dd336a56e5031c2704e4553b4ed45b06845f9e0669b5c48df7f230e3a
                    • Instruction ID: d11040269329a9ff53b676742d4be322d347c161d86531e8f5364ca747a28e75
                    • Opcode Fuzzy Hash: 713c0f7dd336a56e5031c2704e4553b4ed45b06845f9e0669b5c48df7f230e3a
                    • Instruction Fuzzy Hash: 2F11A578A15128CFCB68DF18D9849A9B7F6FF49310F5045D8D50EA7390CA30AE85CF41
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b8776bb1f38bd6181ba1f7e0861f8049f1d16d3b59fcdfd7fe99aa82cea7db1c
                    • Instruction ID: caac02a4a8e30c957cb63701ffc13927ab0a09bc5b20319afe835be2f44522c0
                    • Opcode Fuzzy Hash: b8776bb1f38bd6181ba1f7e0861f8049f1d16d3b59fcdfd7fe99aa82cea7db1c
                    • Instruction Fuzzy Hash: F1F0E972F056215FE3144619981472FF7A9EBCD720F148069F505AF340CB75AC45C7C4
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5aac3aececeac6d472133166c6df9a8f490cfc79b45700f1d69806093c3d8645
                    • Instruction ID: 1f63faad7740ddd964b919ddfd03895b0633776fcc023edc88eae2e6d0a824aa
                    • Opcode Fuzzy Hash: 5aac3aececeac6d472133166c6df9a8f490cfc79b45700f1d69806093c3d8645
                    • Instruction Fuzzy Hash: 68F0AF30910715CFCB65DBA8E484AAE77F4EF40720F0189AED4099B261EB749D848B41
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c291a55cba4b6b023d776b9291614f11b5789d744ae29370a21ed51683dde46b
                    • Instruction ID: 51ee5ea09939ad68b63b663566f85babe4db6c6c3e9415423a97abb043ae8d27
                    • Opcode Fuzzy Hash: c291a55cba4b6b023d776b9291614f11b5789d744ae29370a21ed51683dde46b
                    • Instruction Fuzzy Hash: 39F0F630A042A47FEB06CB64C858BEE7FB6DB81650F04C0A9F009D7292D7745E45CBA0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8626ff785f05b4cdee03aeaa1c7fa2097dad609f0c68a4cc5952ed5935211361
                    • Instruction ID: 5aa43247408ab926de6497dd657ddcccf40c565322e8f81636325d06acb977a1
                    • Opcode Fuzzy Hash: 8626ff785f05b4cdee03aeaa1c7fa2097dad609f0c68a4cc5952ed5935211361
                    • Instruction Fuzzy Hash: FEF027303066112FD705962CBC10CA77BEDEBC6354301C1AAB058C7265DA21CD498BF1
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f9b1a42a6b35c762827c891279ce6143a7a653822b355ae5ff43b5edbd8f0340
                    • Instruction ID: 74fe05a91f0de232ed9c35356229584222ff1be37a2b4c0a553c58ae2b293600
                    • Opcode Fuzzy Hash: f9b1a42a6b35c762827c891279ce6143a7a653822b355ae5ff43b5edbd8f0340
                    • Instruction Fuzzy Hash: 82E02BB170E5625FE752195D2C506AB97D9BBC9E14B4401FEF505C7381D4508C0947A0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 25b569266e2287866b9a6e16ebd5e5c682fe80aab43096aa54ddeea5f8bbc58b
                    • Instruction ID: 79ab93f4f1328497116419e5ae7e0404f6ac7109ddf9783fdc6e8f56181d2f5a
                    • Opcode Fuzzy Hash: 25b569266e2287866b9a6e16ebd5e5c682fe80aab43096aa54ddeea5f8bbc58b
                    • Instruction Fuzzy Hash: 29F03A393002109FC3049B19D858D2A77AAEFC8B21B1040A9EA868B360CA71EC42DB90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 33eb354f415ba8f9e2d482b2b1540a9cbd56f893e5a595ef9352be31ec0aea2c
                    • Instruction ID: cb14e680685d385a82049d6d35e59c19710a0dc7b30d0ac8e6bcfb740219e158
                    • Opcode Fuzzy Hash: 33eb354f415ba8f9e2d482b2b1540a9cbd56f893e5a595ef9352be31ec0aea2c
                    • Instruction Fuzzy Hash: BBF01D75D04248AFCB94DFA9D850AAEFFF9AB49300F04C09AE858D3241D6359B11DB51
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7fc4074fae28656d999ab85fc2d067bd1184a72b0c2c79a832295f73124af661
                    • Instruction ID: 1e224d46766024827714f7082373fa950d114100704a38aedd5a5e8ba164fb71
                    • Opcode Fuzzy Hash: 7fc4074fae28656d999ab85fc2d067bd1184a72b0c2c79a832295f73124af661
                    • Instruction Fuzzy Hash: 2EF0E2316002299BDF14EB69C8147AEBEBABB98300F910429E001B7354CF780D058BE2
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 39c180f085c26adf67e029b6dbe7b3fe7aef90dde23c179d7f413da756abe8f6
                    • Instruction ID: 4226345a8d47cf4f2fe2e279a8b0c872c90c959c59f0cc19e33efc085bced6d0
                    • Opcode Fuzzy Hash: 39c180f085c26adf67e029b6dbe7b3fe7aef90dde23c179d7f413da756abe8f6
                    • Instruction Fuzzy Hash: 2AF08274D05208AFD790EFB5E5097ADBBF9EB04300F0080D9EC48A3351DA359A44CF91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5576a8c33b26348afee2404fa9d783494ebef5a5b8f098537b54a18ee78dda25
                    • Instruction ID: f9b335e6974a39cf790dd463aa93153cb1afb79b6cc26dce9323e9e8d34c1e72
                    • Opcode Fuzzy Hash: 5576a8c33b26348afee2404fa9d783494ebef5a5b8f098537b54a18ee78dda25
                    • Instruction Fuzzy Hash: 06F05EB5D05208AFC790DFA8D801AAEBFF8AF49300F14C0AA9818D7351D6359A42CF91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fd28ea4d26df0bfb4374041b75f0c5d8197510ebff2f79ecffb474c749d52566
                    • Instruction ID: 2d3d05cbcf4875c0810e8c2de5ddfc434744df02d1dcdeaf8d9b055b8ca1df86
                    • Opcode Fuzzy Hash: fd28ea4d26df0bfb4374041b75f0c5d8197510ebff2f79ecffb474c749d52566
                    • Instruction Fuzzy Hash: 60F05E75D04208AFCB80EFA8C45069CBFF4FB58304F04C09A9808A7321D6329A05DF40
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 01577629cf2295a228f1eed03086364f5a40f4a426703294118d64416b012715
                    • Instruction ID: e71176e5736d15e563fd221ff3f6507d7d4b6dd746f29eea8b4a8c11ec1570a5
                    • Opcode Fuzzy Hash: 01577629cf2295a228f1eed03086364f5a40f4a426703294118d64416b012715
                    • Instruction Fuzzy Hash: DD01F674D01228CFDB85DF69E488B9CB7FAFB09314F108055E409AB390CB745985CF80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d9569b8cf85e33fd69991aba3596aed3ad44241c8f4383da55b185222d427ee8
                    • Instruction ID: 4728398d1a4ed312091f376df567b555136f4a9af4ebddda7d8f94966ef44de5
                    • Opcode Fuzzy Hash: d9569b8cf85e33fd69991aba3596aed3ad44241c8f4383da55b185222d427ee8
                    • Instruction Fuzzy Hash: 1CE0DF3150010CAFCB60EBA8DA1478E7BB9EB0931AF1145A5900493200DE328A84A751
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e89b6be117c3b61b1e3e51b5e0a1bfdefd2d1a319aed6d312b62a3285f71bcee
                    • Instruction ID: 22a3ab899781aaaae2f116a1b2aeb4bc7f8b36ae9d31e434251fc651331a9c8e
                    • Opcode Fuzzy Hash: e89b6be117c3b61b1e3e51b5e0a1bfdefd2d1a319aed6d312b62a3285f71bcee
                    • Instruction Fuzzy Hash: 57E08632704228AFD718EAA9E4005DE7BEDEB49271F14007BE50DC3754EA32D940C790
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 68156134fe81d35fea7a9803314d47411e7effb76ace77dba55573192fec3de8
                    • Instruction ID: 947775e7863d62140a44699956a1e1982fc6d6560fd401beff582fe4f72fe981
                    • Opcode Fuzzy Hash: 68156134fe81d35fea7a9803314d47411e7effb76ace77dba55573192fec3de8
                    • Instruction Fuzzy Hash: DAF01C74D0A208EFC750DFA9E958A9CBFF8EF49304F1181EAE80497351D6349A44CF92
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1a1d9cbabbbd6b72848eac96a968f4d8462e42cda407206f15979c1040e4cd14
                    • Instruction ID: 23426f43bb3ca3a2afb877688224e5c751b476c20ad6c8f084eecc39250fdd93
                    • Opcode Fuzzy Hash: 1a1d9cbabbbd6b72848eac96a968f4d8462e42cda407206f15979c1040e4cd14
                    • Instruction Fuzzy Hash: 5DF05874D04208AFCB80CFA8D800AADFBF8AB4C300F04C09AA858D3240C2359B11DF90
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1975a50e191a009694fa9a0af5182eaa5d811a267792c0eb8b6138013c5ef467
                    • Instruction ID: ccd5790ec0e59e0db57ea3bc7ec95f2b9cf88f609db0d165fd6550b3ca1c7941
                    • Opcode Fuzzy Hash: 1975a50e191a009694fa9a0af5182eaa5d811a267792c0eb8b6138013c5ef467
                    • Instruction Fuzzy Hash: 88F03C78B04229CFC764DF54C844BAEB7B9FB4A324F1041E59509A3784CB309E85CF51
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 120d5628ddb43bdaada8fc3d30bc6ee126b6f220b5047581e4c05ec03a62868c
                    • Instruction ID: fa30d7734c8cb9904889554aee4bd3acbcc6530dacd2d7aa7967fa04c7e8cf77
                    • Opcode Fuzzy Hash: 120d5628ddb43bdaada8fc3d30bc6ee126b6f220b5047581e4c05ec03a62868c
                    • Instruction Fuzzy Hash: F7E0D874A48108ABDB44EB98D9057ADFBB8EB81308F54809AC80467350CA329D82C741
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5a9bcc8474c0ebc421ea22e9ffd252a7ee7813135065e37605f53b7a2239337d
                    • Instruction ID: 08daa8f24fc751bb85ed8ceb6394fad74ba98ae5ecf0f49ea63c4c78edbb53e9
                    • Opcode Fuzzy Hash: 5a9bcc8474c0ebc421ea22e9ffd252a7ee7813135065e37605f53b7a2239337d
                    • Instruction Fuzzy Hash: 1AF0F8B6A08219CFCB10CF95C440ADDBBB5FB98315F9285AAD509A7321C7309A418F10
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3234774b08fc3e57f1a1098498168d95b27a97e92619e7a831dc5e17a288c99a
                    • Instruction ID: 2bd9dff744dc728d969c6e4b3288c1ef1d6b8b6e5534b396ddbeb5170b2a9c56
                    • Opcode Fuzzy Hash: 3234774b08fc3e57f1a1098498168d95b27a97e92619e7a831dc5e17a288c99a
                    • Instruction Fuzzy Hash: 48E06D75D55208AFCB90DFA8D544B987BF8EF08305F1044E8E80493361D2309954DB91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2f2b97412eb4f50347237d0042d9dfe7f12161fe1e8f5d4d0828751707614e5d
                    • Instruction ID: dd5c0f3be8cf0403012a9544d740204f1659a55c7a3e371674d3ccc4f206ffcd
                    • Opcode Fuzzy Hash: 2f2b97412eb4f50347237d0042d9dfe7f12161fe1e8f5d4d0828751707614e5d
                    • Instruction Fuzzy Hash: F0E08C7031A6512FD7169229AE608A33BEADBCAA08308859AB045D7306DD108E098BB1
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4bb74f6c84362ba9eaaac985b6a4d059784493d81069121deeb7e41ff8269685
                    • Instruction ID: 40b6a31d4bee30092e07d1d4958e8f618cc79679ea5199672f305531dcaaba58
                    • Opcode Fuzzy Hash: 4bb74f6c84362ba9eaaac985b6a4d059784493d81069121deeb7e41ff8269685
                    • Instruction Fuzzy Hash: 06F03931E04628AFDB09DBA9D0886DDBFF7AB84665F1480A9E00993251DB705A85CB94
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1d4a4a71085e8a39ccdd328da7593c837ab26e9e2106008aa860196e6c19dd68
                    • Instruction ID: 6b0aa338af89d9ddfd182b04924b51c22ef4f8d2780012a6ed1638c7fa2185dc
                    • Opcode Fuzzy Hash: 1d4a4a71085e8a39ccdd328da7593c837ab26e9e2106008aa860196e6c19dd68
                    • Instruction Fuzzy Hash: E2F03074D05208EFC790EFA5E0056ACBBF9EB04300F0080D9E848A3351DA319A44CF81
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4b112108306f8a72b4300f2a960432014ac9fc97d3e55d73225670ff625d2bf3
                    • Instruction ID: bc8e036079d33ef598a1008f6b83299fce4d1e75e7d47fe636d3bdfcdaf4fd93
                    • Opcode Fuzzy Hash: 4b112108306f8a72b4300f2a960432014ac9fc97d3e55d73225670ff625d2bf3
                    • Instruction Fuzzy Hash: B6E09A313002055BC7149A1AEC8484BFB9AEFC0360300DA3AB14A87221CE70AC4A96E0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 21338e8ce49f8b6a27912916bfa52d16d657ba8ea38690902bef60d7899ac812
                    • Instruction ID: c1791f5f4fcd71e222907f1b99d351053912f6ad518942f2b82c9acaf7da2652
                    • Opcode Fuzzy Hash: 21338e8ce49f8b6a27912916bfa52d16d657ba8ea38690902bef60d7899ac812
                    • Instruction Fuzzy Hash: 3BE0DF34A08208EBD704DAE8E9457ECBBB8EB80304F1480A98844A7751C632AE46CB80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 98a95f1f9c77445cbd88d9bcb57e0976961e1d985e50138a8db68e22b60cfe88
                    • Instruction ID: 74582246e82ade647993bb839166fb7fefc9c4efdec0c3a5747cc756f0e33502
                    • Opcode Fuzzy Hash: 98a95f1f9c77445cbd88d9bcb57e0976961e1d985e50138a8db68e22b60cfe88
                    • Instruction Fuzzy Hash: 33E065B1A00225CBEF28EB75D4543AD7EA6BBA8340F91051AE006EB255CF780D058B92
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: aae507bfc072316e3ebe0b7de60197ac70b8dc16d7bd3f00fcf379e4793a7d3e
                    • Instruction ID: 1383c3d1ca582d25b93f32e929121e677f930088875a96492886dd4d2690a89f
                    • Opcode Fuzzy Hash: aae507bfc072316e3ebe0b7de60197ac70b8dc16d7bd3f00fcf379e4793a7d3e
                    • Instruction Fuzzy Hash: EAF05874D11228CFEB90DF65E488B9CB7F5BB09324F409099E418AB390CB7858C9CF80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0ad6e3b10edef5c46d9ce1191a24b55068aa9d6927b4440a2134d946437e6ef0
                    • Instruction ID: 282ab035db9f2c2b70ae831a5574daa6ad41e53dc318f658e4ac38f2e8cad90f
                    • Opcode Fuzzy Hash: 0ad6e3b10edef5c46d9ce1191a24b55068aa9d6927b4440a2134d946437e6ef0
                    • Instruction Fuzzy Hash: 8EE09A76C16218BFCB90DFA8E94839DBBF8EB08300F0050A8D804A3241E6306A44DBC1
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4df0829cb6c5c3669a6e9d4ee4106cf1ba867e0b2277bbf4488bd6e67ecddcb1
                    • Instruction ID: 70f89b58bdf2b564a8818d4a1877bb4f5a73b203091befc89089918c551dc7cf
                    • Opcode Fuzzy Hash: 4df0829cb6c5c3669a6e9d4ee4106cf1ba867e0b2277bbf4488bd6e67ecddcb1
                    • Instruction Fuzzy Hash: B5E06DB4915208AFC790DFA8E544ADABFF8EF08300F1044E9E904A3361E6309A80CB91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f8f371a3ba7bff070bd88a3cdabfa9c8f8149e7ca5a2697952360a689f19f054
                    • Instruction ID: 60af3987f4b67c4fff61067ed478dadcbe673127873619438cdf6b0d4a97d76e
                    • Opcode Fuzzy Hash: f8f371a3ba7bff070bd88a3cdabfa9c8f8149e7ca5a2697952360a689f19f054
                    • Instruction Fuzzy Hash: E1E09270C0B348AFC781DFB8D50559DBFF89B06200F0500E6D404E3242DA300A44CB91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2699bb3f88dc4b374a0e96d1b9a354b090202cfa7d86dce54fe32d5045d476f4
                    • Instruction ID: 5eddfda3d3eee7563c3065eb1d6367b833f9048c461d9136f82dc2c5142c5b00
                    • Opcode Fuzzy Hash: 2699bb3f88dc4b374a0e96d1b9a354b090202cfa7d86dce54fe32d5045d476f4
                    • Instruction Fuzzy Hash: 12E0C274E05208EFCB94DFA8D944AADBBF8EB4C310F14C0AA9818A3344D6329A55DF80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2699bb3f88dc4b374a0e96d1b9a354b090202cfa7d86dce54fe32d5045d476f4
                    • Instruction ID: d627108a4b568a826462220760af3a5954f2d2e57b962602d6735287a05ff050
                    • Opcode Fuzzy Hash: 2699bb3f88dc4b374a0e96d1b9a354b090202cfa7d86dce54fe32d5045d476f4
                    • Instruction Fuzzy Hash: C8E0E574E05208EFCB94DFA8D545AACFBF8EB48310F14C0AA9808A3340D6369A55DF80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9fb6080d22d0f3d45f9d7c1e42f284330952e3bd77cba7464e24caaecc224b40
                    • Instruction ID: c8ea199aca7fcc8925f026ccf3a265a4ac36125f7bd5fba3dfa0b8e886b27019
                    • Opcode Fuzzy Hash: 9fb6080d22d0f3d45f9d7c1e42f284330952e3bd77cba7464e24caaecc224b40
                    • Instruction Fuzzy Hash: C2E0CD70605104ABD744C748D591BD9F7ACEB91318F659499E8084B391C6369D43C680
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d2fdeadfe3d7ad5152bb95dfee8cf7a6e1c96b092e74cf9c6e5d9f86961f1f6a
                    • Instruction ID: 9f13ee541a88f2de46fbee7065592ac29fa4e5260eed18131d169ecedcb09bdf
                    • Opcode Fuzzy Hash: d2fdeadfe3d7ad5152bb95dfee8cf7a6e1c96b092e74cf9c6e5d9f86961f1f6a
                    • Instruction Fuzzy Hash: F6E06D71915248EFC791DFB8D544A58BFF8AF09311F1540E9D84497362D2309940CB81
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a360778d2fe327eb5ee83bcfa3a2794ff0788bee4262a124a16b4e2ec3cd1fa6
                    • Instruction ID: 98b84b4d9de091cd15bd497abcf395ba3b5a4a92947dd2728e87ef90ddb1bbc1
                    • Opcode Fuzzy Hash: a360778d2fe327eb5ee83bcfa3a2794ff0788bee4262a124a16b4e2ec3cd1fa6
                    • Instruction Fuzzy Hash: A7F06D75D09208EFD755CFA4DA00AADBFB1EB49314F14C0EAD805A3750C2368A56DF81
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f13d4fa49ca8e506b2bb91517772c030dd32432e7e64a1f5c8a280b58dc81520
                    • Instruction ID: 68ca67d0b532dba0b19d195f62abd1d0ecad200980382216b4b9bf33b26776a2
                    • Opcode Fuzzy Hash: f13d4fa49ca8e506b2bb91517772c030dd32432e7e64a1f5c8a280b58dc81520
                    • Instruction Fuzzy Hash: DAE0CD307C03149BDBE0F6B55C1176177D5FBC6A18F1048E9D71A9F280DD72E8418795
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ce06fded459e8ebd365572a08d06fa74a4df2a906bce3d11dd8ec7b57424f81b
                    • Instruction ID: 6b54b0c16bb116e25bd40a5fc0e06c71ece722eab645f83757fac1c0b8a86516
                    • Opcode Fuzzy Hash: ce06fded459e8ebd365572a08d06fa74a4df2a906bce3d11dd8ec7b57424f81b
                    • Instruction Fuzzy Hash: 25E0E574E05208EFCB94DFA8D5446ACBBF4EB48304F14C0A9D80893390D6359A46CF80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0d94672ea398d436957a0a8e8fc2bad31f3f0cfd59cf96b9e9cdc34624fbb3a1
                    • Instruction ID: f4479b783bf3d543d8590d1b5fa5744b40f116d92998a81b6b047caa331933b9
                    • Opcode Fuzzy Hash: 0d94672ea398d436957a0a8e8fc2bad31f3f0cfd59cf96b9e9cdc34624fbb3a1
                    • Instruction Fuzzy Hash: A0E04F74D4920CDFDBA1EFB8D5497ADBBF8EB49315F1081A9D80893340DA305A44CB51
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ce06fded459e8ebd365572a08d06fa74a4df2a906bce3d11dd8ec7b57424f81b
                    • Instruction ID: 8aeecbca7854d7e901747fb350c8d5da39a72d14e41fa1ba1b85e1c550e888c5
                    • Opcode Fuzzy Hash: ce06fded459e8ebd365572a08d06fa74a4df2a906bce3d11dd8ec7b57424f81b
                    • Instruction Fuzzy Hash: FBE07574E05208EFCB94DFA9D645AACBBF4EB48314F14C1A9981893341D6359A46DF81
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fc29966ece43e9718498497fbf5564eaf812bd7e13dc54ef40ea1881782a8c7d
                    • Instruction ID: ec2f2df0640cb8454633ddf68e1a77f8343cc1d44253a05781c55d124ecf6a94
                    • Opcode Fuzzy Hash: fc29966ece43e9718498497fbf5564eaf812bd7e13dc54ef40ea1881782a8c7d
                    • Instruction Fuzzy Hash: E7E02238049244AFC716CBA8E2008AA7F70AB12318F0980EACC44072A7C3335C0BC744
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 564800a84d823894447c0ab346f50ad0b5c8e75aabbc3ac23a9df3a06184e9db
                    • Instruction ID: 8ca57ac6400b0f8e432d64ec728b29e0aeac33b3fd257a43f521007e35c0bede
                    • Opcode Fuzzy Hash: 564800a84d823894447c0ab346f50ad0b5c8e75aabbc3ac23a9df3a06184e9db
                    • Instruction Fuzzy Hash: 7BE0E575E05208EFCB94DFA8E5846ACBBF8EB48304F14C0A9980993340D6319A46CF80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 73633adfad2d1b3b8fef4754c8e0f7d7a16c3987dc9513e342ee3b49408a9651
                    • Instruction ID: e3c433250f9855745c866788c23a9ab488785af47a74105b0d7711f2b80111b3
                    • Opcode Fuzzy Hash: 73633adfad2d1b3b8fef4754c8e0f7d7a16c3987dc9513e342ee3b49408a9651
                    • Instruction Fuzzy Hash: 1AE0E5B4D05208EFCB94DFA8E504A9DBFF9EF48314F10C0A9D814A3354D6359A54DF80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 828001d86ce2bcfcf1ffcb11aa624dcb430439fec1530810f08b9b92e04dcf3d
                    • Instruction ID: 84e3d899786afdfb3bee0e0bcc438c1220a3a48ad80c6c8f2b1003e6501a60c3
                    • Opcode Fuzzy Hash: 828001d86ce2bcfcf1ffcb11aa624dcb430439fec1530810f08b9b92e04dcf3d
                    • Instruction Fuzzy Hash: ACE08674909208EFC794DF98E5409BDBFFCAB49310F14D499D84457341C6329A45DB91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 672b838f138b9fa925436d4fb1935ddbe3a8a1ac8bfcc29ae476271db8309fb5
                    • Instruction ID: 225a9a428eadee8a41bfaae529bd60cc67016586824f4f32455109429705a7ed
                    • Opcode Fuzzy Hash: 672b838f138b9fa925436d4fb1935ddbe3a8a1ac8bfcc29ae476271db8309fb5
                    • Instruction Fuzzy Hash: 8CE01A75D05208EFCB54DF98E9409ACFFB8EB48314F24C0AADC4463741D6329A52DBC0
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 08f17f2a351994a4a967f2a68a7cd15bf5850daed095d205a85070d542c8642f
                    • Instruction ID: 9d239d1e5dfe244d9e595bfb6240a3745360e56e1869f69444b2324833904fc2
                    • Opcode Fuzzy Hash: 08f17f2a351994a4a967f2a68a7cd15bf5850daed095d205a85070d542c8642f
                    • Instruction Fuzzy Hash: 6EE04F34D09208EFC754DFA9D5416ACFBF8EF49304F14C0E9D84893341C6329A45DB80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0fe0ffb6c83777e583775be399d90d919a53ace42fa906070939401641235b52
                    • Instruction ID: 383ba6c14b883989f0ad042531afeb53e67aabdf6374c1bbb89faef1228a7bf3
                    • Opcode Fuzzy Hash: 0fe0ffb6c83777e583775be399d90d919a53ace42fa906070939401641235b52
                    • Instruction Fuzzy Hash: A8E08670915249EFCB11EFB4EA644AC7BF5EB85304B1046EAE408EB251D6341E58EB11
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3facfaf9096ad9a7d358653fd96ca41bca2a2f5a5994c4aa010160012df9ca1f
                    • Instruction ID: 03454f3de68f1c3f32cf3d831fe9cddfc1d8a45b129f492cd0c4ccb32f7372d8
                    • Opcode Fuzzy Hash: 3facfaf9096ad9a7d358653fd96ca41bca2a2f5a5994c4aa010160012df9ca1f
                    • Instruction Fuzzy Hash: CCE04674945208EFCB80DFA8E648AACBFF8AB08314F1041E9D80893321E730AE40CB81
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 72590bb8d79d693e4446ca0e55d598bd1fa049b365c18e3ba210afc3a9576cb6
                    • Instruction ID: adba94e5853a9076cd11c35297c6f92d9cb4cb4c5b77e461c7924b3d398ad750
                    • Opcode Fuzzy Hash: 72590bb8d79d693e4446ca0e55d598bd1fa049b365c18e3ba210afc3a9576cb6
                    • Instruction Fuzzy Hash: BBF0F274901228CFDB80EF69E484B8CB7F6FB19324F108094E408AB364CB75AD85CF40
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fa5570b86429c84d61e4e721cd586953304a39269f5de946a7cf5d6769182082
                    • Instruction ID: 1466d9d509a1b86e665d59d77ebfeb0d4ace556c4ac71117535677304804c190
                    • Opcode Fuzzy Hash: fa5570b86429c84d61e4e721cd586953304a39269f5de946a7cf5d6769182082
                    • Instruction Fuzzy Hash: 10E04674925208EFC780EFA8E548A9CBBF8AB08304F1040E9E90893320E6309E80CB91
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7156a052bab85ed2997216ea41e6f3a51417213623ae41ea42b64b3c4db31555
                    • Instruction ID: 2359507eeba6cf1fe7be257279eb48b6f0e605470a99efa3c4142e031796d2e6
                    • Opcode Fuzzy Hash: 7156a052bab85ed2997216ea41e6f3a51417213623ae41ea42b64b3c4db31555
                    • Instruction Fuzzy Hash: 15E0BF74915208EFC794EFA8E68569CBBF8AB48314F1480AD9909D3341D6319A45CB81
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2a0f14309a007f40aaba511cdac0e560f338e9652bc9ff471ca86b6fed7965e1
                    • Instruction ID: caef5a7bb0f3f5b9e1b902f2eee3e30e0133869f0a47d0868b3c6deb724e8462
                    • Opcode Fuzzy Hash: 2a0f14309a007f40aaba511cdac0e560f338e9652bc9ff471ca86b6fed7965e1
                    • Instruction Fuzzy Hash: C4F07478941268CFDBA4EF14D888AADB7B1FB49310F2042D6D91967364CB319D81DF54
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3ce8d7199a89534815d0f7529b6edbddbd577d67aeca5de279c8932a324b922b
                    • Instruction ID: ef4968e50a98b7935565675b8ae1ded9d1b8fd037ae52d5b145a6463c3ad8741
                    • Opcode Fuzzy Hash: 3ce8d7199a89534815d0f7529b6edbddbd577d67aeca5de279c8932a324b922b
                    • Instruction Fuzzy Hash: B0E05E7194220CEFC791FFF9DA05A9EBBFCEB4A300F1045EA950597110EE325A44EB92
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 269c24436d3b88f90e4d5ac04dc9768ff607eef4f91cdb41f68b8ec37beae99f
                    • Instruction ID: d9d211aef672f880a0979c6b6669d1ec8c4b80d811c82b0c3f8101a2b3567846
                    • Opcode Fuzzy Hash: 269c24436d3b88f90e4d5ac04dc9768ff607eef4f91cdb41f68b8ec37beae99f
                    • Instruction Fuzzy Hash: BAE01238949208EBC754EF94E5459ACBBB9EB89314F18C1EDD80817341DA329E46DB81
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f8c9859c8761bced1e07b3df4719b1ac450669afd1f7544c6baddc5747c99f52
                    • Instruction ID: 35cd8c7d024d2995db43777eba95381383fbdd2cbd31b82da3b4e576b78fb488
                    • Opcode Fuzzy Hash: f8c9859c8761bced1e07b3df4719b1ac450669afd1f7544c6baddc5747c99f52
                    • Instruction Fuzzy Hash: 80E0C274949208EBCB44DF98E5409BDFFB8EB45304F14C0DDC80827350CA729E46CB80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bf84bc455283d7a944e6c628ac299742f6864ab7facf4e1fa52dcefe71b3f5e0
                    • Instruction ID: 19f01d635c09c3272f695e22eb57b37ec019c745bc2bcfcdce245e1aa34333d8
                    • Opcode Fuzzy Hash: bf84bc455283d7a944e6c628ac299742f6864ab7facf4e1fa52dcefe71b3f5e0
                    • Instruction Fuzzy Hash: 84D0A7210419080EE3B1729AAF0535C3A98AB11309FCD0015914C46A50CE2980908752
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 188da3d9a2659bf1187586c500efc6a627ee5546616a5dbbc6f266376bfad8e9
                    • Instruction ID: 6126a40b64261c2f6ab6dd11976ac4914b363a689172d3c231b1a61ccbfe5535
                    • Opcode Fuzzy Hash: 188da3d9a2659bf1187586c500efc6a627ee5546616a5dbbc6f266376bfad8e9
                    • Instruction Fuzzy Hash: C5D02B6049E7468BF371A778B008AB97F68DB6332EF06496FC80D43595C93844498302
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7007d9368502d8994945ed3c62c7d207089b2610e90e5aea8b3953952e2dc59e
                    • Instruction ID: e8eb119a600dfa31cf2ba54758a15551c622f6c652c430d99b786fd1c8aacc7c
                    • Opcode Fuzzy Hash: 7007d9368502d8994945ed3c62c7d207089b2610e90e5aea8b3953952e2dc59e
                    • Instruction Fuzzy Hash: A6E0127140120CEFCB60EFF8DA0469E7BF8EB09315F1145A6950593110EE324A44AB92
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 66b899b29fa5bde35da4025ca31f958f4ff88c504ea38efdf3ce51fcb3e4bb34
                    • Instruction ID: 15686a240b88a1e8c5a09b52d8fa7175cbf5ce1bc0a99cfc9d1da4904da11a2e
                    • Opcode Fuzzy Hash: 66b899b29fa5bde35da4025ca31f958f4ff88c504ea38efdf3ce51fcb3e4bb34
                    • Instruction Fuzzy Hash: 83E01275D5620CEFC790EFF8E94969CBFFCAB04311F1050A9D908A3340E6315A84DB81
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1a952f5345ee77613be30c71aadace9a941990d7ac38447304ba2bdc248788ed
                    • Instruction ID: 08d0e4e2f32e991d193a0431b5af361b72717723ccf7c8d0a994cea8a3e9942b
                    • Opcode Fuzzy Hash: 1a952f5345ee77613be30c71aadace9a941990d7ac38447304ba2bdc248788ed
                    • Instruction Fuzzy Hash: A8E01274D5621CEFCB90DFB8E54969CBFF9AB05301F1040A99909A3345EF305A84CB81
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 735c68b89679121a855476ddb6c9c4f20d453e1ae7687905e1763c3042492e6e
                    • Instruction ID: 4e9ae6149b42d2133a8e629dde7c8d9bde06ac1976a9d05a7ca40a535cf7314f
                    • Opcode Fuzzy Hash: 735c68b89679121a855476ddb6c9c4f20d453e1ae7687905e1763c3042492e6e
                    • Instruction Fuzzy Hash: 21E01270A10248EFCB04DFB5E94066DB7BAEB45640F1085A9E909AB240DD315E05AB85
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 27fe7b24c125b0a422bd892b082fb7be6716e8d7c8089187a3c8163249c0ef99
                    • Instruction ID: d1d265db4334378409359ed73b0e14749af54c38467ff1b4b14544b76b2fc0b0
                    • Opcode Fuzzy Hash: 27fe7b24c125b0a422bd892b082fb7be6716e8d7c8089187a3c8163249c0ef99
                    • Instruction Fuzzy Hash: 86E0EC74D16218EFC790EFA8E54969CBBF8AB04301F1051A9980893351E6705A84DB81
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5a6ead9e660b05d5b55f6ba0dbf3e7f011215663f3a142641597fe1db5b1068f
                    • Instruction ID: 035869380a35d4ec759e8889afb249a236cad94acb14d6e398afaf798a73c9a4
                    • Opcode Fuzzy Hash: 5a6ead9e660b05d5b55f6ba0dbf3e7f011215663f3a142641597fe1db5b1068f
                    • Instruction Fuzzy Hash: 3CE01270A01209EFCB44DFA5E94065DB7FAEB45200F108598E509E7340D9715F44A791
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c47ed9422fe7d54d60196bea584245a4f0090a85198f8001f1e50dbe791ddc16
                    • Instruction ID: 37c3335491a1763288d315d75e09878dd74d67bbd15b1e80ccc849f689b8e400
                    • Opcode Fuzzy Hash: c47ed9422fe7d54d60196bea584245a4f0090a85198f8001f1e50dbe791ddc16
                    • Instruction Fuzzy Hash: B9D0A77050A108EFC794CB98D550A69FBBCDB55318F54C0DEA80847391CB339D02C780
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b7390b4c12524bce4e5c9428b25522ec37b5aa939ae38e04e12e2d49d6d55714
                    • Instruction ID: 1f71812e594cace63c70b5434e087e644f1bcfd8b8d868f28e3ccdeeb253c502
                    • Opcode Fuzzy Hash: b7390b4c12524bce4e5c9428b25522ec37b5aa939ae38e04e12e2d49d6d55714
                    • Instruction Fuzzy Hash: 72D05EB0A1020DEFCB14EFA9E95599DB7FDFB44304F1045A9E409E7241EB312F489B81
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 09b9c0b151867b68ea79dc249021ac82beea0b77ed8d34b9d3bbf9346d9bfce0
                    • Instruction ID: c11734cfc36cc508453f2b88a1a9ce62bfb100f03b98b95f4ade39e86cddb4f9
                    • Opcode Fuzzy Hash: 09b9c0b151867b68ea79dc249021ac82beea0b77ed8d34b9d3bbf9346d9bfce0
                    • Instruction Fuzzy Hash: 86D080F011B6503FD7030710CD15CF73F7DD5D1740B01859AF140C602286244E34D6B1
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ae93c56eae8c16a55359d7a156d57540a876cf19430e78d960970e44d79aae5c
                    • Instruction ID: 04759f0aa6abf8ef279fd1da5e17f553f5e831c974b19ee98687e8b0c1c407f1
                    • Opcode Fuzzy Hash: ae93c56eae8c16a55359d7a156d57540a876cf19430e78d960970e44d79aae5c
                    • Instruction Fuzzy Hash: C7E0B6B1A05228CFEBB4CB14ED48BDD77B5FB01306F001299904962680CB701A84CF86
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ed4f972bf2a1d26370227a0a42c4070f65c64d88ae9f5ae84e8da6afb2e03934
                    • Instruction ID: cb01b30f328e6f4836a6396aa42b4ccb111ecc60ba7e3378e238a19a74b4937d
                    • Opcode Fuzzy Hash: ed4f972bf2a1d26370227a0a42c4070f65c64d88ae9f5ae84e8da6afb2e03934
                    • Instruction Fuzzy Hash: 2CD0A93120B380DFC702CF20E884C827FB0AF4A71030581C3F08A8B173C230A924CB65
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7b81668079e2d4d291424f4ef65df599fe09c86559e4e96bfe9ef2a754b35464
                    • Instruction ID: d9e275dbbc419826b2b260484b2c1d5c0b262b9e8fe98f2fbdfd7cd914c748d8
                    • Opcode Fuzzy Hash: 7b81668079e2d4d291424f4ef65df599fe09c86559e4e96bfe9ef2a754b35464
                    • Instruction Fuzzy Hash: 21D0523028B3C6AFC3038B20E840C823F64AF8A61030904CAF8868B233C2219A28C760
                    Memory Dump Source
                    • Source File: 00000004.00000002.2077281462.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_67d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4a69bf44fbb7cdcf6472ed58c6ef78876ae73473fafe8fc8ea0b4027ee2dbfc1
                    • Instruction ID: 65bfbcc8d153ac6110a1393a4b6ea57bd1760dc35affa28ff8043181a6eaa845
                    • Opcode Fuzzy Hash: 4a69bf44fbb7cdcf6472ed58c6ef78876ae73473fafe8fc8ea0b4027ee2dbfc1
                    • Instruction Fuzzy Hash: 7FC09B340DBB08CED3E516A4B90E7757FDC9B0F315F4C6C50951D12465CF616458C695
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1f23da8661e9afc355affe5d42066176ee44bd0c2ede19cc3c004fb8b14de8e8
                    • Instruction ID: 93930064ddac5d4a7e641ac76c86551fe21cb67cbb2431ee461a1095f06cf77a
                    • Opcode Fuzzy Hash: 1f23da8661e9afc355affe5d42066176ee44bd0c2ede19cc3c004fb8b14de8e8
                    • Instruction Fuzzy Hash: C0D052B2910200CFC704DB29E44881537B0BB59319B0206AAE00A8B2A6D222E802CA01
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 848b67c39d83c310b5c71c5d1f771d11650c524bf247cbdc7dbca1ceb012a778
                    • Instruction ID: 82aff2f5040db48488b1a3583e06bcbcc3f49b19486f6b44d9e40173459e2f74
                    • Opcode Fuzzy Hash: 848b67c39d83c310b5c71c5d1f771d11650c524bf247cbdc7dbca1ceb012a778
                    • Instruction Fuzzy Hash: 83C0926400E3823EEF427B200CD08FB6B3CECD274078980EBF490A9053DA189A0683B1
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a4ad6c993b6213e41ca2f98394325747df2d7b20f21a9c8ec80fd77bb6520ccc
                    • Instruction ID: 833d1abe71446a7db7930bbca5132a467438f7203dcfcbae8af1030b3a7a44c0
                    • Opcode Fuzzy Hash: a4ad6c993b6213e41ca2f98394325747df2d7b20f21a9c8ec80fd77bb6520ccc
                    • Instruction Fuzzy Hash: 62C08C200812084ED2B037EABB0876C3AAC5B22306FC9001AE20C025208E749040CB26
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8384e27b1cd1e5ed4961b11c82f937066479ff982c5f8d9930d97efcb090860c
                    • Instruction ID: f2b45251243010848599bd5b3161ef4a0f979da8d3224479c19a6e8f0f635e15
                    • Opcode Fuzzy Hash: 8384e27b1cd1e5ed4961b11c82f937066479ff982c5f8d9930d97efcb090860c
                    • Instruction Fuzzy Hash: C7C08C70208620CFCB29EB28F584C82B3E2EF4070130189ADE00A8B220CB70EC81CF80
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9db53f153096563c8306e45298168e43eae51071c7c86d8f85ac56be85524acb
                    • Instruction ID: e2053e1a4e7abecfafe9048b3826ff041128af8873b83bc184fa1d35b1c1b089
                    • Opcode Fuzzy Hash: 9db53f153096563c8306e45298168e43eae51071c7c86d8f85ac56be85524acb
                    • Instruction Fuzzy Hash: 96C08C3008C7939FCB529B208865640BF30BB02322F0543CBD0049A09AC32D4846C7B2
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0c46eacaef1f4ce285e7165dcddda00ba5c9a209c1e20024c02ff8e5d7811ba0
                    • Instruction ID: 0e7ba73ce8b16ff68d0bb5daa4430bcf56e0bf57dab2596f0dd5e4b853815f9f
                    • Opcode Fuzzy Hash: 0c46eacaef1f4ce285e7165dcddda00ba5c9a209c1e20024c02ff8e5d7811ba0
                    • Instruction Fuzzy Hash: A3C00235250214CF8704EB5AE485C1173B9BB4D6197110294E5094B365C721FC41CA50
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7ecf654a74945da8ef83f078d04d7f987c2065f36f02371ac3cee4ccff24f60c
                    • Instruction ID: 746016191c738103762bd6cc8407111de534c2903a50945bc0a0a47886d40326
                    • Opcode Fuzzy Hash: 7ecf654a74945da8ef83f078d04d7f987c2065f36f02371ac3cee4ccff24f60c
                    • Instruction Fuzzy Hash: A8C00276E5001A9A8B00DAD9E8508DCB774EB94322B004026D215A6104D63015268B50
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5ec2d8ae92c4c9f73262e9175111646484e95707a646bcf35f251de23cfe9021
                    • Instruction ID: 6b444cc31aa042c9c9744cc40a7021306f9d7b864fc89c6bc5b636298cf576de
                    • Opcode Fuzzy Hash: 5ec2d8ae92c4c9f73262e9175111646484e95707a646bcf35f251de23cfe9021
                    • Instruction Fuzzy Hash: 9DD092B4A00628CFDB64DB24DC84B9D7775FB01306F0016989049A3645CB302A848F85
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9ff0627ca48a0d9d9e33ae6eb910681fcc4a811e95e71cc39119011aa47938fe
                    • Instruction ID: 3e3c40aa865806e2e30dcb02bd277e81d4bb5a718980b7da2120a7bcc10d5f2d
                    • Opcode Fuzzy Hash: 9ff0627ca48a0d9d9e33ae6eb910681fcc4a811e95e71cc39119011aa47938fe
                    • Instruction Fuzzy Hash: 02B012702046080A7A6067F52815A2336CC5600914B800025D51CC1101F510D0000640
                    Memory Dump Source
                    • Source File: 00000004.00000002.2075643461.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_63d0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: aa73cc5aae12d76f8b963db823ba115225907296add6c067d5a85ec00d00f901
                    • Instruction ID: ca27415ca1e59d8c2fde9003a72c9dccfc9fc777b7a8cee5ed9dff36781a8066
                    • Opcode Fuzzy Hash: aa73cc5aae12d76f8b963db823ba115225907296add6c067d5a85ec00d00f901
                    • Instruction Fuzzy Hash: 10D0EA78D06228CFEB64DF24ED95B99BBF6BB19301F0061D9D60EA3791DB741A848F40
                    Memory Dump Source
                    • Source File: 00000004.00000002.2076026425.0000000006540000.00000040.00000800.00020000.00000000.sdmp, Offset: 06540000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_6540000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                    • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                    • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                    • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9b468f27f8d9e51cc56da08b58d6385914bb84d64f14fc3bedb784eb4b46932e
                    • Instruction ID: 49e083581a0bde5758acc8a60b0b102ac427dfe4e59233e622709b7161aa85cb
                    • Opcode Fuzzy Hash: 9b468f27f8d9e51cc56da08b58d6385914bb84d64f14fc3bedb784eb4b46932e
                    • Instruction Fuzzy Hash: 57B01237A00004C68A244A85B0090DCF738D280373F410063E60D92010833002294780
                    Memory Dump Source
                    • Source File: 00000004.00000002.2047982492.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_14a0000_wpappx.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1ee546458a072a184b16f117961c484ab90e6dbefaaaa36b108b576eb0b922dc
                    • Instruction ID: b5b312fda3349ded4c5b74a4badb306185dc564355a5674ee9781a7294d48afc
                    • Opcode Fuzzy Hash: 1ee546458a072a184b16f117961c484ab90e6dbefaaaa36b108b576eb0b922dc
                    • Instruction Fuzzy Hash: ACA0113000030C8FCA383BA0B80C008BB2CAB80332FA02820A00EB000AAA2028008B80